Notification
This report is provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained herein. The DHS does not endorse any commercial product or service referenced in this bulletin or otherwise.
This document is marked TLP:WHITE--Disclosure is not limited. Sources may use TLP:WHITE when information carries minimal or no foreseeable risk of misuse, in accordance with applicable rules and procedures for public release. Subject to standard copyright rules, TLP:WHITE information may be distributed without restriction. For more information on the Traffic Light Protocol (TLP), see http://www.us-cert.gov/tlp.
Summary
Description
This Malware Analysis Report (MAR) is the result of analytic efforts between the Department of Homeland Security (DHS), the Federal Bureau of Investigation (FBI), and the Department of Defense (DoD). Working with U.S. Government partners, DHS, FBI, and DoD identified Remote Access Tool (RAT) malware variants used by the North Korean government. This malware variant has been identified as COPPERHEDGE. The U.S. Government refers to malicious cyber activity by the North Korean government as HIDDEN COBRA. For more information on HIDDEN COBRA activity, visit https[:]//www[.]us-cert.gov/hiddencobra.
FBI has high confidence that HIDDEN COBRA actors are using malware variants in conjunction with proxy servers to maintain a presence on victim networks and to further network exploitation. DHS, FBI, and DoD are distributing this MAR to enable network defense and reduce exposure to North Korean government malicious cyber activity.
This MAR includes malware descriptions related to HIDDEN COBRA, suggested response actions and recommended mitigation techniques. Users or administrators should flag activity associated with the malware and report the activity to the Cybersecurity and Infrastructure Security Agency (CISA) or the FBI Cyber Watch (CyWatch), and give the activity the highest priority for enhanced mitigation.
The Manuscrypt family of malware is used by advanced persistent threat (APT) cyber actors in the targeting of cryptocurrency exchanges and related entities. Manuscrypt is a full-featured Remote Access Tool (RAT) capable of running arbitrary commands, performing system reconnaissance, and exfiltrating data. Six distinct variants have been identified based on network and code features. The variants are categorized based on common code and a common class structure. A symbol remains in some of the implants identifying a class name of "WinHTTP_Protocol" and later "WebPacket".
For a downloadable copy of IOCs, see MAR-10288834-1.v1.stix.
The breakdown for the variants is displayed below:
Variant A
D8AF45210BF931BC5B03215ED30FB731E067E91F25EDA02A404BD55169E3E3C3
7985AF0A87780D27DC52C4F73C38DE44E5AD477CB78B2E8E89708168FBC4A882
Variant B
E98991CDD9DDD30ADF490673C67A4F8241993F26810DA09B52D8748C6160A292
4838F85499E3C68415010D4F19E83E2C9E3F2302290138ABE79C380754F97324
E76B3FD3E906AC23218B1FBD66FD29C3945EE209A29E9462BBC46B07D1645DE2
1FAAA939087C3479441D9F9C83A80AC7EC9B929E626CB34A7417BE9FF0316FF7
3FF4EBAE6C255D4AE6B747A77F2821F2B619825C7789C7EE5338DA5ECB375395
C2F150DBE9A8EFB72DC46416CA29ACDBAE6FD4A2AF16B27F153EAABD4772A2A1
1678327C5F36074CF5F18D1A92C2D9FEA9BFAE6C245EAAD01640FD75AF4D6C11
C0EE19D7545F98FCD15725A3D9F0DBD0F35B2091E1C5B9CF4744F16E81A030C5
9E4BD9676BB3460BE68BA4559A824940A393BDE7613850EDA9196259E453B9F3
EEE38C632C62CA95B5C66F8D39A18E23B9175845560AF84B6A2F69B7F9B6EC1C
F6E1A146543D2903146698DA5698B2A214201720C0BE756C6E8D2A2F27DCFAFF
Variant C
37BB27F4EB40B8947E184AFDDBA019001C12F97588E7F596AB6BC07F7C152602
E6FC788B5FF7436DA4450191A003966A68E2A1913C83F1D3AEC78C65F3BA85CA
284BC471647F951C79E3E333B2B19AA37F84CC39B55441A82E2A5F7319131FAC
A1CDB784100906D0AC895297C5A0959AB21A9FB39C687BAF176324EE84095472
Variant D
B4BF6322C67A23553D5A9AF6FCD9510EB613FFAC963A21E32A9CED83132A09BA
Variant E
134B082B418129FFA390FBEE1568BD9510C54BFDD0E6B1F36BC7B8F867E56283
Variant F
0A763DA26A67CB2B09A3AE6E1AC07828065EB980E452CE7D3354347976038E7E
1884DDC53EF66488CA8FC641B438895FCAADA77C15210118465377C63223B3BC
C24C322F4535DEF3F8D1579C39F2F9E323787D15B96E2EE457C38925EFFE2D39
Submitted Files (22)
0a763da26a67cb2b09a3ae6e1ac07828065eb980e452ce7d3354347976038e7e (171B9135540F89BF727B690B9E587A...)
134b082b418129ffa390fbee1568bd9510c54bfdd0e6b1f36bc7b8f867e56283 (633BD738AE63B6CE9C2A48CBDDD154...)
1678327c5f36074cf5f18d1a92c2d9fea9bfae6c245eaad01640fd75af4d6c11 (86D3C1B354CE696E454C42D8DC6DF1...)
1884ddc53ef66488ca8fc641b438895fcaada77c15210118465377c63223b3bc (22F8D2A0C8D9B54A553FCA1B2393B2...)
1faaa939087c3479441d9f9c83a80ac7ec9b929e626cb34a7417be9ff0316ff7 (667CF9E8EC1DAC7812F92BD77AF702...)
284bc471647f951c79e3e333b2b19aa37f84cc39b55441a82e2a5f7319131fac (DB590EA77A92AE6435E2EC954D065E...)
37bb27f4eb40b8947e184afddba019001c12f97588e7f596ab6bc07f7c152602 (A8B6EC51ED88C0329FD3329CB615BB...)
3ff4ebae6c255d4ae6b747a77f2821f2b619825c7789c7ee5338da5ecb375395 (A7C804B62AE93D708478949F498342...)
4838f85499e3c68415010d4f19e83e2c9e3f2302290138abe79c380754f97324 (EB6275A24D047E3BE05C2B4E5F5070...)
7985af0a87780d27dc52c4f73c38de44e5ad477cb78b2e8e89708168fbc4a882 (C6801F90AAA11CE81C9B66450E0029...)
9e4bd9676bb3460be68ba4559a824940a393bde7613850eda9196259e453b9f3 (668D5B5761755C9D061DA74CB21A8B...)
a1cdb784100906d0ac895297c5a0959ab21a9fb39c687baf176324ee84095472 (0856655351ACFFA1EE459EEEAF1647...)
b4bf6322c67a23553d5a9af6fcd9510eb613ffac963a21e32a9ced83132a09ba (34C2AC6DAA44116713F882694B6B41...)
c0ee19d7545f98fcd15725a3d9f0dbd0f35b2091e1c5b9cf4744f16e81a030c5 (5182E7A2037717F2F9BBF6BA298C48...)
c24c322f4535def3f8d1579c39f2f9e323787d15b96e2ee457c38925effe2d39 (FDD55A38A45DE8AF6F8C34A33BAE11...)
c2f150dbe9a8efb72dc46416ca29acdbae6fd4a2af16b27f153eaabd4772a2a1 (86685EC8C3C717AA2A9702E2C9DEC3...)
d8af45210bf931bc5b03215ed30fb731e067e91f25eda02a404bd55169e3e3c3 (12C786C490366727CF7279FC141921...)
e6fc788b5ff7436da4450191a003966a68e2a1913c83f1d3aec78c65f3ba85ca (117FA0B8B8B965680C7B630C6E2BF0...)
e76b3fd3e906ac23218b1fbd66fd29c3945ee209a29e9462bbc46b07d1645de2 (AA7F506B0C30D76557C82DBA45116C...)
e98991cdd9ddd30adf490673c67a4f8241993f26810da09b52d8748c6160a292 (912F87392A889070DBB1097A82CCD9...)
eee38c632c62ca95b5c66f8d39a18e23b9175845560af84b6a2f69b7f9b6ec1c (35E38D023B253C0CD9BD3E16AFC362...)
f6e1a146543d2903146698da5698b2a214201720c0be756c6e8d2a2f27dcfaff (72FE869AA394EF0A62BB8324857770...)
Domains (42)
028xmz.com
168wangpi.com
33cow.com
3x-tv.com
51shousheng.com
530hr.com
919xy.com
92myhw.com
97nb.net
aedlifepower.com
aisou123.com
aloe-china.com
anlway.com
ap8898.com
apshenyihl.com
as-brant.ru
aurumgroup.co.id
bogorcenter.com
cabba-cacao.com
castorbyg.dk
creativefishstudio.com
danagloverinteriors.com
duratransgroup.com
eventum.cwsdev3.biz
eygingenieros.com
growthincone.com
inverstingpurpose.com
locphuland.com
markcoprintandcopy.com
marmarademo.com
matthias-dlugi.de
new.titanik.fr
nuokejs.com
pakteb.com
qdbazaar.com
rhythm86.com
rxrenew.us
sensationalsecrets.com
stokeinvestor.com
streamf.ru
theinspectionconsultant.com
vinhsake.com
Findings
d8af45210bf931bc5b03215ed30fb731e067e91f25eda02a404bd55169e3e3c3
Tags
backdoortrojan
Details
Name |
12C786C490366727CF7279FC141921D8 |
Size |
166400 bytes |
Type |
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows |
MD5 |
12c786c490366727cf7279fc141921d8 |
SHA1 |
a2e966edee45b30bb6bb5c978e55833eec169098 |
SHA256 |
d8af45210bf931bc5b03215ed30fb731e067e91f25eda02a404bd55169e3e3c3 |
SHA512 |
3abe4cd0d287fdf38715feac4096a16ed8c9ed113897e8e8e26d22adb4346df3c8a14a2c6660fbc2e01beb98e5cc770616866e5e319cfd95624710011f5f60f3 |
ssdeep |
3072:G2K5QbCpgMFlQ0O4t5E13j0S0wBiCRcnHaApUiCDyY:G2bSQ0NS3jq6Apm |
Entropy |
6.529499 |
Antivirus
Ahnlab |
Trojan/Win32.Manuscrypt |
Antiy |
Trojan/Win32.Manuscrypt |
Avira |
TR/AD.APTLazerus.gqbgi |
BitDefender |
Gen:Variant.Graftor.452205 |
ClamAV |
Win.Trojan.Agent-6459669-0 |
Cyren |
W32/Nukesped.EBPS-8656 |
ESET |
a variant of Win32/NukeSped.AG trojan |
Emsisoft |
Gen:Variant.Graftor.452205 (B) |
Ikarus |
Trojan-Spy.Agent |
K7 |
Trojan ( 005202c91 ) |
McAfee |
HiddenCobra!12C786C49036 |
Microsoft Security Essentials |
Trojan:Win32/Autophyte.M!dha |
NANOAV |
Trojan.Win32.Manuscrypt.eyleld |
NetGate |
Trojan.Win32.Malware |
Sophos |
Troj/Agent-AYKU |
Symantec |
Backdoor.Cruprox |
Systweak |
malware.gen-ra |
TrendMicro |
TROJ_NUKESPED.B |
TrendMicro House Call |
TROJ_NUKESPED.B |
Vir.IT eXplorer |
Trojan.Win32.Genus.BGU |
VirusBlokAda |
BScope.Trojan.Manuscrypt |
Zillya! |
Trojan.Manuscrypt.Win32.10 |
YARA Rules
- rule CISA_3P_10135536_24 : success_fail_codes
{
meta:
Author = "CISA Trusted Third Party"
Incident = "10135536-A"
Date = "2017-11-14"
Actor = "Hidden Cobra"
Category = "n/a"
Family = "FALLCHILL"
Description = ""
strings:
$s0 = { 68 7a 34 12 00 }
$s1 = { ba 7a 34 12 00 }
$f0 = { 68 5c 34 12 00 }
$f1 = { ba 5c 34 12 00 }
condition:
(uint16(0) == 0x5A4D and uint16(uint32(0x3c)) == 0x4550) and (($s0 and $f0) or ($s1 and $f1))
}
- rule CISA_3P_10135536_24 : success_fail_codes
{
meta:
Author = "CISA Trusted Third Party"
Incident = "10135536-A"
Date = "2017-11-14"
Actor = "Hidden Cobra"
Category = "n/a"
Family = "FALLCHILL"
Description = ""
strings:
$s0 = { 68 7a 34 12 00 }
$s1 = { ba 7a 34 12 00 }
$f0 = { 68 5c 34 12 00 }
$f1 = { ba 5c 34 12 00 }
condition:
(uint16(0) == 0x5A4D and uint16(uint32(0x3c)) == 0x4550) and (($s0 and $f0) or ($s1 and $f1))
}
ssdeep Matches
No matches found.
PE Metadata
Compile Date |
2018-02-24 01:52:42-05:00 |
Import Hash |
04f1d2f5c7c06a209c29beeff2fce817 |
PE Sections
MD5 |
Name |
Raw Size |
Entropy |
c37a64a60af18ec7b8360e84d5b85d0d |
header |
1024 |
2.917803 |
3056f69baa8301ae1f6aef85bf88d0b8 |
.text |
121344 |
6.526051 |
3c4cc09c827a1bb000669e8922d7d6d9 |
.rdata |
29184 |
5.443973 |
4cda142760a96a9e47daeafc0ea5ed7c |
.data |
5120 |
5.302725 |
8b7fa4533b5f57eebfd85a72154aeafe |
.gfids |
512 |
2.058608 |
f040daaf746c66507cba208212c65d00 |
.rsrc |
2560 |
2.715102 |
0d82adf85bb2476ed8bd2bb6c297e301 |
.reloc |
6656 |
6.477462 |
Packers/Compilers/Cryptors
Relationships
d8af45210b... |
Connected_To |
530hr.com |
d8af45210b... |
Connected_To |
028xmz.com |
d8af45210b... |
Connected_To |
168wangpi.com |
Description
This file is a 32-bit Dynamic Link Library (DLL) and has been identified as Variant A. Variant A uses RC4 encryption to obfuscate import loading with an RC4 key of "0x78292E4C5DA3B5D067F081B736E5D593". A hard-coded string of "*dJU!*JE&!M@UNQ@" is embedded in the malware beacons. This variant also obfuscates Hypertext Transfer Protocol (HTTP) header strings using a custom character manipulation where the certain ranges of characters are modified by either adding or subtracting a constant value 9.
Variant A will generate HTTP POST requests with the following format:
--Begin HTTP POST request--
POST /<uri> HTTP/1.1
Connection: keep-alive
Cache-Control: max-age=0
Accept: */*
Content-Type: multipart/form-data; boundary=----FormBoundary<randomCharacters>
Accept-Encoding: gzip,deflate,sdch
Accept-Language: ko-KR
User-Agent: <obtained from ObtainUserAgentString otherwise: Mozilla/5.0 (Windows NT 6.1; WOW64) Chrome/28.0.1500.95 Safari/537.36>
Host: <domain>
Content-Length: <length>
------FormBoundary<randomCharacters>
Content-Disposition: form-data; name="board_id"
<sessionID>
------FormBoundary<randomCharacters>
Content-Disposition: form-data; name="user_id"
<*dJU!*JE&!M@UNQ@ if beacon request otherwise empty>
------FormBoundary<randomCharacters>
Content-Disposition: form-data; name="file1"; filename="<randomly picked>"
Content-Type: application/octet-stream
<datagram>
--End HTTP POST request--
Variant A uses a custom algorithm to encrypt data from datagrams. An implementation of the algorithm is provided below:
--Begin custom algorithm--
modVal = 0x6be
addVal = 0x95d9
keyVal = 0x25
def encrypt(data):
global keyVal
r = ""
for c in data:
r += chr((ord(c) ^ keyVal) & 0xff)
keyVal = (((ord(c) + keyVal) % modVal) + addVal) & 0xffffffff
return r
--End custom algorithm--
Screenshots
Figure 1 - Variant A contains the commands displayed in the table.
530hr.com
Tags
command-and-control
URLs
- 530hr.com/data/common.php
Relationships
530hr.com |
Connected_From |
d8af45210bf931bc5b03215ed30fb731e067e91f25eda02a404bd55169e3e3c3 |
530hr.com |
Connected_From |
7985af0a87780d27dc52c4f73c38de44e5ad477cb78b2e8e89708168fbc4a882 |
Description
12C786C490366727CF7279FC141921D8 and C6801F90AAA11CE81C9B66450E002972 attempt to connect to the domain.
028xmz.com
Tags
command-and-control
URLs
- 028xmz.com/include/common.php
Relationships
028xmz.com |
Connected_From |
d8af45210bf931bc5b03215ed30fb731e067e91f25eda02a404bd55169e3e3c3 |
028xmz.com |
Connected_From |
7985af0a87780d27dc52c4f73c38de44e5ad477cb78b2e8e89708168fbc4a882 |
Description
12C786C490366727CF7279FC141921D8 and C6801F90AAA11CE81C9B66450E002972 attempt to connect to the domain.
168wangpi.com
Tags
command-and-control
URLs
- 168wangpi.com/include/charset.php
Relationships
168wangpi.com |
Connected_From |
d8af45210bf931bc5b03215ed30fb731e067e91f25eda02a404bd55169e3e3c3 |
168wangpi.com |
Connected_From |
7985af0a87780d27dc52c4f73c38de44e5ad477cb78b2e8e89708168fbc4a882 |
Description
12C786C490366727CF7279FC141921D8 and C6801F90AAA11CE81C9B66450E002972 attempt to connect to the domain.
7985af0a87780d27dc52c4f73c38de44e5ad477cb78b2e8e89708168fbc4a882
Tags
backdoorbottrojan
Details
Name |
C6801F90AAA11CE81C9B66450E002972 |
Size |
176640 bytes |
Type |
PE32+ executable (DLL) (GUI) x86-64, for MS Windows |
MD5 |
c6801f90aaa11ce81c9b66450e002972 |
SHA1 |
4e30ebb98bb9f984c05eb0c0a365ff95305e8c55 |
SHA256 |
7985af0a87780d27dc52c4f73c38de44e5ad477cb78b2e8e89708168fbc4a882 |
SHA512 |
2568ed6468f6d6b4ec6a930e003b04a2fd9e3379ac9fa320f6130f789ff8471ef2ca596ef2699bc45fd0997a5972243627199eb94e42028fcaf0882639b45008 |
ssdeep |
3072:FhjE3GVSDW52icOf+CDqRHiEGK+M/0ivZSRMlxbs6D79vrXqx7C5:DE3o52Q+VRHiEGK+M/1hSmZ67 |
Entropy |
6.244198 |
Antivirus
Ahnlab |
Trojan/Win32.Manuscrypt |
Antiy |
Trojan/Win32.Manuscrypt |
Avira |
TR/Autophyte.fadtc |
BitDefender |
Trojan.GenericKD.40166196 |
ESET |
a variant of Win64/NukeSped.AL trojan |
Emsisoft |
Trojan.GenericKD.40166196 (B) |
Ikarus |
Trojan-Spy.Agent |
K7 |
Riskware ( 0040eff71 ) |
McAfee |
HiddenCobra!C6801F90AAA1 |
Microsoft Security Essentials |
Trojan:Win32/Autophyte.M!dha |
NANOAV |
Trojan.Win64.Manuscrypt.eyolaj |
NetGate |
Trojan.Win32.Malware |
Sophos |
Troj/Agent-AYKV |
Symantec |
Backdoor.Cruprox |
Systweak |
trojan-backdoor.bot |
TrendMicro |
TROJ64_.8C3165BD |
TrendMicro House Call |
TROJ64_.8C3165BD |
Vir.IT eXplorer |
Trojan.Win32.Genus.BGU |
VirusBlokAda |
Trojan.Manuscrypt |
Zillya! |
Trojan.NukeSped.Win64.13 |
YARA Rules
- rule CISA_3P_10135536_24 : success_fail_codes
{
meta:
Author = "CISA Trusted Third Party"
Incident = "10135536-A"
Date = "2017-11-14"
Actor = "Hidden Cobra"
Category = "n/a"
Family = "FALLCHILL"
Description = ""
strings:
$s0 = { 68 7a 34 12 00 }
$s1 = { ba 7a 34 12 00 }
$f0 = { 68 5c 34 12 00 }
$f1 = { ba 5c 34 12 00 }
condition:
(uint16(0) == 0x5A4D and uint16(uint32(0x3c)) == 0x4550) and (($s0 and $f0) or ($s1 and $f1))
}
- rule CISA_3P_10135536_24 : success_fail_codes
{
meta:
Author = "CISA Trusted Third Party"
Incident = "10135536-A"
Date = "2017-11-14"
Actor = "Hidden Cobra"
Category = "n/a"
Family = "FALLCHILL"
Description = ""
strings:
$s0 = { 68 7a 34 12 00 }
$s1 = { ba 7a 34 12 00 }
$f0 = { 68 5c 34 12 00 }
$f1 = { ba 5c 34 12 00 }
condition:
(uint16(0) == 0x5A4D and uint16(uint32(0x3c)) == 0x4550) and (($s0 and $f0) or ($s1 and $f1))
}
ssdeep Matches
No matches found.
PE Metadata
Compile Date |
2018-02-24 01:52:37-05:00 |
Import Hash |
a789d7d213a81de1ef22719353b5a15a |
PE Sections
MD5 |
Name |
Raw Size |
Entropy |
5869d6b6233e336c6aad801596ad0467 |
header |
1024 |
3.153109 |
33470b7e064ef6a3d0da14b6ce12cf0f |
.text |
111104 |
6.424442 |
39564530ada80c0adb6a0d5b0c53cb96 |
.rdata |
46592 |
5.184555 |
bbf22987d7c4bfec2c3fdf371454d2b6 |
.data |
6144 |
4.989277 |
74b4e027ae891b3728ab6efa84bd2614 |
.pdata |
6656 |
5.232089 |
346bac74e00a330d731022626b43a9c3 |
.gfids |
512 |
1.773634 |
9f5bcd42d44606048eb3e04477c78ac7 |
.rsrc |
2560 |
2.714498 |
a8898561836ddcc26054cd0933d39599 |
.reloc |
2048 |
4.853460 |
Relationships
7985af0a87... |
Connected_To |
530hr.com |
7985af0a87... |
Connected_To |
028xmz.com |
7985af0a87... |
Connected_To |
168wangpi.com |
Description
This file is a 64-bit DLL and has been identified as Variant A. Refer to 12C786C490366727CF7279FC141921D8 for analysis.
e98991cdd9ddd30adf490673c67a4f8241993f26810da09b52d8748c6160a292
Tags
backdoortrojan
Details
Name |
912F87392A889070DBB1097A82CCD93F |
Size |
128512 bytes |
Type |
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows |
MD5 |
912f87392a889070dbb1097a82ccd93f |
SHA1 |
58c5b86691dc922945c8204b465e76fc15c498fb |
SHA256 |
e98991cdd9ddd30adf490673c67a4f8241993f26810da09b52d8748c6160a292 |
SHA512 |
968d7ff1a39b95428d139d0c7febd76ebcd37612c133ac238fb2a2accf853a2ceb5827f2344c09dafcd7e5936ddbc4da401bcb328d483158430f5f7dc482ba58 |
ssdeep |
1536:Jg6dIYHXVp0AMkysbkQfRkChJlTToZdRYKgZXTrP5Dr4vDQeAsWq8McdLEA8CHr:FdnXVpIsXRjlTToNYKgZjiDwLEA8CH |
Entropy |
6.559526 |
Antivirus
Ahnlab |
Trojan/Win32.Lumal |
Avira |
TR/AD.APTLazerus.yvywt |
BitDefender |
Trojan.GenericKD.30910621 |
ClamAV |
Win.Trojan.Autophyte-6582725-0 |
ESET |
Win32/NukeSped.EI trojan |
Emsisoft |
Trojan.GenericKD.30910621 (B) |
Ikarus |
Trojan.Win32.Autophyte |
Microsoft Security Essentials |
Trojan:Win32/Autophyte.F!dha |
NANOAV |
Trojan.Win32.Manuscrypt.fdnkqz |
NetGate |
Trojan.Win32.Malware |
Quick Heal |
Trojan.Manuscrypt |
Sophos |
Troj/Mdrop-IEI |
Symantec |
Trojan Horse |
Systweak |
malware.gen-ra |
TrendMicro |
BKDR_NU.91A5ED8F |
TrendMicro House Call |
BKDR_NU.91A5ED8F |
Vir.IT eXplorer |
Backdoor.Win32.NukeSped.S |
VirusBlokAda |
BScope.Trojan.Manuscrypt |
Zillya! |
Trojan.Manuscrypt.Win32.15 |
YARA Rules
No matches found.
ssdeep Matches
No matches found.
PE Metadata
Compile Date |
2018-05-30 23:29:44-04:00 |
Import Hash |
95dff862e0b00db0b05bcf957ad9e12e |
PE Sections
MD5 |
Name |
Raw Size |
Entropy |
f72cbf29269ccff8e8ad284f34fbc0b1 |
header |
1024 |
2.894160 |
50ec6e3135350d312c343fb6f8663146 |
.text |
89600 |
6.597021 |
f276082813b38691ceeb9a5d6cc631b3 |
.rdata |
28160 |
5.353008 |
d8727a0a5051d7418591aae3a42a3f01 |
.data |
3072 |
4.460652 |
7d67fff10fcba2d1075511a8598e6906 |
.gfids |
512 |
1.761800 |
89b7e19270b2a5563c301b84b28e423f |
.rsrc |
512 |
4.714485 |
14cf8bfde5b679909af8942ae7ca3ca6 |
.reloc |
5632 |
6.597866 |
Packers/Compilers/Cryptors
Relationships
e98991cdd9... |
Connected_To |
marmarademo.com |
e98991cdd9... |
Connected_To |
33cow.com |
e98991cdd9... |
Connected_To |
97nb.net |
Description
This file is a 32-bit DLL and has been identified as Variant B. Variant B generates an HTTP POST request similar to Variant A. However, in Variant B datagrams are RC4 encrypted. The implant maintains separate RC4 key streams for each side of the conversation. The RC4 key used is "0x271A16AB6D7A900EF3FA677DCE8AB268". The RC4 key streams will reset after the implant receives a "SystemInfo" command. Variant B performs the same RC4 key as variant A for Application Programming Interface (API) obfuscation.
Screenshots
Figure 2 - Variant B contains the commands displayed in the table.
marmarademo.com
Tags
command-and-control
URLs
- marmarademo.com/include/extend.php
Relationships
marmarademo.com |
Connected_From |
e98991cdd9ddd30adf490673c67a4f8241993f26810da09b52d8748c6160a292 |
Description
912F87392A889070DBB1097A82CCD93F attempts to connect to the domain.
33cow.com
Tags
command-and-control
URLs
- 33cow.com/include/control.php
Relationships
33cow.com |
Connected_From |
e98991cdd9ddd30adf490673c67a4f8241993f26810da09b52d8748c6160a292 |
Description
912F87392A889070DBB1097A82CCD93F attempts to connect to the domain.
97nb.net
Tags
command-and-control
URLs
- 97nb.net/include/arc.sglistview.php
Relationships
97nb.net |
Connected_From |
e98991cdd9ddd30adf490673c67a4f8241993f26810da09b52d8748c6160a292 |
Description
912F87392A889070DBB1097A82CCD93F attempts to connect to the domain.
4838f85499e3c68415010d4f19e83e2c9e3f2302290138abe79c380754f97324
Tags
backdoortrojan
Details
Name |
EB6275A24D047E3BE05C2B4E5F50703D |
Size |
128512 bytes |
Type |
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows |
MD5 |
eb6275a24d047e3be05c2b4e5f50703d |
SHA1 |
62faf15eddb64dce9a2b1ba242254271facffd9f |
SHA256 |
4838f85499e3c68415010d4f19e83e2c9e3f2302290138abe79c380754f97324 |
SHA512 |
f2715f867a1729d3ff77a5ee561da0df0f736517d0f0197e726e2a5867d21c16f0558afd8e6b38d9a166d0715b51d95407943865e577fb01c172681edcbc822a |
ssdeep |
3072:wIjV9Tmp7TvnhplTznm4qg5aHDwU+A8Yr:ljV9ap7TPPlmbay8Y |
Entropy |
6.561793 |
Antivirus
Ahnlab |
Trojan/Win32.Lumal |
Antiy |
Trojan/Win32.TSGeneric |
Avira |
TR/AD.LazerusAPT.bowts |
BitDefender |
Trojan.GenericKD.40293468 |
ClamAV |
Win.Trojan.Autophyte-6582725-0 |
ESET |
Win32/NukeSped.EN trojan |
Emsisoft |
Trojan.GenericKD.40293468 (B) |
Ikarus |
Trojan.Win32.Autophyte |
K7 |
Riskware ( 0040eff71 ) |
McAfee |
Generic BackDoor.gx |
Microsoft Security Essentials |
Trojan:Win32/Autophyte.F!dha |
NANOAV |
Trojan.Win32.Manuscrypt.fekufg |
Sophos |
Troj/Bdoor-BHF |
Symantec |
Trojan.Gen.6 |
TrendMicro |
BKDR_NUKESPED.H |
TrendMicro House Call |
BKDR_NUKESPED.H |
Vir.IT eXplorer |
Backdoor.Win32.NukeSped.S |
VirusBlokAda |
BScope.Trojan.Manuscrypt |
Zillya! |
Trojan.Manuscrypt.Win32.14 |
YARA Rules
No matches found.
ssdeep Matches
No matches found.
PE Metadata
Compile Date |
2018-06-03 21:31:48-04:00 |
Import Hash |
95dff862e0b00db0b05bcf957ad9e12e |
PE Sections
MD5 |
Name |
Raw Size |
Entropy |
588b2a99aa2dbacf19c05e5e363a0056 |
header |
1024 |
2.899780 |
0726d6e7fdcc41dca2a7fd81df61e0a5 |
.text |
89600 |
6.597775 |
c81a53a721abdd9f27386c7590d39c8b |
.rdata |
28160 |
5.358969 |
d8727a0a5051d7418591aae3a42a3f01 |
.data |
3072 |
4.460652 |
7fd4f016c8992181e34904887d12f90f |
.gfids |
512 |
1.785783 |
89b7e19270b2a5563c301b84b28e423f |
.rsrc |
512 |
4.714485 |
13444aa676e19fb0c746d2cd954477d5 |
.reloc |
5632 |
6.600614 |
Packers/Compilers/Cryptors
Relationships
4838f85499... |
Connected_To |
anlway.com |
4838f85499... |
Connected_To |
apshenyihl.com |
4838f85499... |
Connected_To |
ap8898.com |
Description
This file is a 32-bit DLL and has been identified as Variant B. Refer to 912F87392A889070DBB1097A82CCD93F for analysis.
anlway.com
Tags
command-and-control
URLs
- anlway.com/include/arc.search.class.php
Relationships
anlway.com |
Connected_From |
4838f85499e3c68415010d4f19e83e2c9e3f2302290138abe79c380754f97324 |
Description
EB6275A24D047E3BE05C2B4E5F50703D attempts to connect to the domain.
apshenyihl.com
Tags
command-and-control
URLs
- apshenyihl.com/include/arc.speclist.class.php
Relationships
apshenyihl.com |
Connected_From |
4838f85499e3c68415010d4f19e83e2c9e3f2302290138abe79c380754f97324 |
Description
EB6275A24D047E3BE05C2B4E5F50703D attempts to connect to the domain.
ap8898.com
Tags
command-and-control
URLs
- ap8898.com/include/arc.search.class.php
Relationships
ap8898.com |
Connected_From |
4838f85499e3c68415010d4f19e83e2c9e3f2302290138abe79c380754f97324 |
Description
EB6275A24D047E3BE05C2B4E5F50703D attempts to connect to the domain.
e76b3fd3e906ac23218b1fbd66fd29c3945ee209a29e9462bbc46b07d1645de2
Tags
backdoorbottrojan
Details
Name |
AA7F506B0C30D76557C82DBA45116CCC |
Size |
128512 bytes |
Type |
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows |
MD5 |
aa7f506b0c30d76557c82dba45116ccc |
SHA1 |
b12d174088629f4e3e0009661ca589fc9f17f66a |
SHA256 |
e76b3fd3e906ac23218b1fbd66fd29c3945ee209a29e9462bbc46b07d1645de2 |
SHA512 |
38e119207cf99b6b51f41f79f05a9796b5db68c96243596f25287a82454fc31fc7398fee78940308f2a141907e736f52c4a95efbd00c3d95e6a1cd366b598cad |
ssdeep |
3072:MImnlpLjPVxPlTDYlI6gJow9DwUkA8pED8:hmnlpLjNJql7KR8qD |
Entropy |
6.562090 |
Antivirus
Ahnlab |
Trojan/Win32.Lumal |
Antiy |
Trojan/Win32.Manuscrypt |
Avira |
TR/AD.LazerusAPT.kgbeu |
BitDefender |
Trojan.GenericKD.31008542 |
ClamAV |
Win.Trojan.Autophyte-6582725-0 |
ESET |
a variant of Win32/NukeSped.EN trojan |
Emsisoft |
Trojan.GenericKD.31008542 (B) |
Ikarus |
Trojan.Win32.Autophyte |
K7 |
Riskware ( 0040eff71 ) |
McAfee |
RDN/Generic.diz |
Microsoft Security Essentials |
Trojan:Win32/Autophyte.F!dha |
NANOAV |
Trojan.Win32.Manuscrypt.femlit |
NetGate |
Trojan.Win32.Malware |
Symantec |
Trojan.Gen.2 |
Systweak |
trojan-backdoor.bot |
TrendMicro |
Backdoo.C7D30B55 |
TrendMicro House Call |
Backdoo.C7D30B55 |
VirusBlokAda |
BScope.Trojan.Manuscrypt |
Zillya! |
Trojan.Manuscrypt.Win32.13 |
YARA Rules
No matches found.
ssdeep Matches
No matches found.
PE Metadata
Compile Date |
2018-06-17 21:16:04-04:00 |
Import Hash |
95dff862e0b00db0b05bcf957ad9e12e |
PE Sections
MD5 |
Name |
Raw Size |
Entropy |
345f78e492d087ea0094b7b1a6f47748 |
header |
1024 |
2.895517 |
4a636a6ed82a4e4197590534c75a6594 |
.text |
89600 |
6.598985 |
e212140f652f7d7ff7d1656d4a9760b7 |
.rdata |
28160 |
5.356656 |
d8727a0a5051d7418591aae3a42a3f01 |
.data |
3072 |
4.460652 |
4a3c3b184454a27b36332e5a5d8d221c |
.gfids |
512 |
1.769477 |
89b7e19270b2a5563c301b84b28e423f |
.rsrc |
512 |
4.714485 |
bec045baa0e06b05d5e27a3ce159e66b |
.reloc |
5632 |
6.591434 |
Packers/Compilers/Cryptors
Relationships
e76b3fd3e9... |
Connected_To |
aloe-china.com |
e76b3fd3e9... |
Connected_To |
92myhw.com |
e76b3fd3e9... |
Connected_To |
aisou123.com |
Description
This file is a 32-bit DLL and has been identified as Variant B. Refer to 912F87392A889070DBB1097A82CCD93F for analysis.
aloe-china.com
Tags
command-and-control
URLs
- aloe-china.com/include/bottom.php
Relationships
aloe-china.com |
Connected_From |
e76b3fd3e906ac23218b1fbd66fd29c3945ee209a29e9462bbc46b07d1645de2 |
Description
AA7F506B0C30D76557C82DBA45116CCC attempts to connect to the domain.
92myhw.com
Tags
command-and-control
URLs
- 92myhw.com/include/inc/inc_common.php
Relationships
92myhw.com |
Connected_From |
e76b3fd3e906ac23218b1fbd66fd29c3945ee209a29e9462bbc46b07d1645de2 |
Description
AA7F506B0C30D76557C82DBA45116CCC attempts to connect to the domain.
aisou123.com
Tags
command-and-control
URLs
- aisou123.com/include/dialog/common.php
Relationships
aisou123.com |
Connected_From |
e76b3fd3e906ac23218b1fbd66fd29c3945ee209a29e9462bbc46b07d1645de2 |
Description
AA7F506B0C30D76557C82DBA45116CCC attempts to connect to the domain.
1faaa939087c3479441d9f9c83a80ac7ec9b929e626cb34a7417be9ff0316ff7
Tags
backdoortrojan
Details
Name |
667CF9E8EC1DAC7812F92BD77AF702A1 |
Size |
128512 bytes |
Type |
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows |
MD5 |
667cf9e8ec1dac7812f92bd77af702a1 |
SHA1 |
880fb67893d8ce559857ca783a701b5ca675eb40 |
SHA256 |
1faaa939087c3479441d9f9c83a80ac7ec9b929e626cb34a7417be9ff0316ff7 |
SHA512 |
83551fc0a12546380e0975f02fb2aff65ceab76885e9a1d47d7726b2e48d0c8cb0871c2036778c9beeaa6d9ad455501941eff51db00bec001457a68b8a2174a6 |
ssdeep |
3072:tIjV94Vp7TPnhalTDY2I6gJ66dDwUGA8Qr:qjV9mp7TvQq27Kf8Q |
Entropy |
6.561257 |
Antivirus
Ahnlab |
Trojan/Win32.Lumal |
Antiy |
Trojan/Win32.TSGeneric |
Avira |
TR/AD.LazerusAPT.nbtos |
BitDefender |
Trojan.GenericKD.40344666 |
ClamAV |
Win.Trojan.Autophyte-6582725-0 |
ESET |
a variant of Win32/NukeSped.EN trojan |
Emsisoft |
Trojan.GenericKD.40344666 (B) |
Ikarus |
Trojan.Win32.NukeSped |
K7 |
Riskware ( 0040eff71 ) |
McAfee |
Generic Trojan.fk |
Microsoft Security Essentials |
Trojan:Win32/Autophyte.F!dha |
NANOAV |
Trojan.Win32.Manuscrypt.fekufg |
NetGate |
Trojan.Win32.Malware |
Symantec |
Trojan.Gen.2 |
TACHYON |
Trojan/W32.Backdoor.128512 |
TrendMicro |
BKDR_NU.28D976A2 |
TrendMicro House Call |
BKDR_NU.28D976A2 |
Vir.IT eXplorer |
Backdoor.Win32.NukeSped.S |
VirusBlokAda |
BScope.Trojan.Manuscrypt |
Zillya! |
Trojan.GenericKD.Win32.143947 |
YARA Rules
No matches found.
ssdeep Matches
No matches found.
PE Metadata
Compile Date |
2018-07-23 20:17:47-04:00 |
Import Hash |
95dff862e0b00db0b05bcf957ad9e12e |
PE Sections
MD5 |
Name |
Raw Size |
Entropy |
30089c82e2388a4d7f83605bcd432c1e |
header |
1024 |
2.897568 |
21c783005e4e290d2d7e225fd0a17cbf |
.text |
89600 |
6.598159 |
1e3e3c4c6bee90a10fc476303ce8b1ae |
.rdata |
28160 |
5.354056 |
d8727a0a5051d7418591aae3a42a3f01 |
.data |
3072 |
4.460652 |
7fd4f016c8992181e34904887d12f90f |
.gfids |
512 |
1.785783 |
89b7e19270b2a5563c301b84b28e423f |
.rsrc |
512 |
4.714485 |
6eb49c61e08a4c2613747f6b09b79fcb |
.reloc |
5632 |
6.606865 |
Packers/Compilers/Cryptors
Relationships
1faaa93908... |
Connected_To |
markcoprintandcopy.com |
1faaa93908... |
Connected_To |
aedlifepower.com |
1faaa93908... |
Connected_To |
919xy.com |
Description
This file is a 32-bit DLL and has been identified as Variant B. Refer to 912F87392A889070DBB1097A82CCD93F for analysis.
markcoprintandcopy.com
URLs
- markcoprintandcopy.com/data/helper.php
Relationships
markcoprintandcopy.com |
Connected_From |
1faaa939087c3479441d9f9c83a80ac7ec9b929e626cb34a7417be9ff0316ff7 |
Description
667CF9E8EC1DAC7812F92BD77AF702A1 attempts to connect to the domain.
aedlifepower.com
Tags
command-and-control
URLs
- aedlifepower.com/include/image.php
Relationships
aedlifepower.com |
Connected_From |
1faaa939087c3479441d9f9c83a80ac7ec9b929e626cb34a7417be9ff0316ff7 |
Description
667CF9E8EC1DAC7812F92BD77AF702A1 attempts to connect to the domain.
919xy.com
Tags
command-and-control
URLs
- 919xy.com/contactus/about.php
Relationships
919xy.com |
Connected_From |
1faaa939087c3479441d9f9c83a80ac7ec9b929e626cb34a7417be9ff0316ff7 |
Description
667CF9E8EC1DAC7812F92BD77AF702A1 attempts to connect to the domain.
3ff4ebae6c255d4ae6b747a77f2821f2b619825c7789c7ee5338da5ecb375395
Tags
trojan
Details
Name |
A7C804B62AE93D708478949F498342F9 |
Size |
128512 bytes |
Type |
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows |
MD5 |
a7c804b62ae93d708478949f498342f9 |
SHA1 |
09db826a7b6dbb16e2d7b3046e0da9fe7342f00f |
SHA256 |
3ff4ebae6c255d4ae6b747a77f2821f2b619825c7789c7ee5338da5ecb375395 |
SHA512 |
c186485779ef22e6b65b3ba43a4290026d7b97b0d98ab8fe35f811c911be80402ea8bdf89e9c7169b3e7168d1e6a55eaa3fb8fd2165e55d9a4936be6f2b78594 |
ssdeep |
1536:JkkY5dY/p7aY3xkuvxaSfhkSn5lTToZkBYKgZXTrP5zr4t8DQeAsWq8McdC5vA8G:Ck0Y/p7TvFhllTToGYKgZj7DwC5vA8E |
Entropy |
6.557876 |
Antivirus
Ahnlab |
Trojan/Win32.Lumal |
Antiy |
Trojan/Win32.Manuscrypt |
Avira |
TR/AD.LazerusAPT.vwvsu |
BitDefender |
Trojan.GenericKD.40376367 |
ClamAV |
Win.Trojan.Autophyte-6582725-0 |
ESET |
a variant of Win32/NukeSped.EN trojan |
Emsisoft |
Trojan.GenericKD.40376367 (B) |
Ikarus |
Trojan.Win32.NukeSped |
K7 |
Trojan ( 00539ca21 ) |
Microsoft Security Essentials |
Trojan:Win32/Autophyte.F!dha |
NANOAV |
Trojan.Win32.NukeSped.fgiarj |
Symantec |
Trojan.Gen.2 |
TACHYON |
Trojan/W32.Agent.128512.AAF |
TrendMicro |
Backdoo.C7D30B55 |
TrendMicro House Call |
Backdoo.C7D30B55 |
VirusBlokAda |
BScope.Trojan.Manuscrypt |
YARA Rules
No matches found.
ssdeep Matches
No matches found.
PE Metadata
Compile Date |
2018-08-02 21:34:02-04:00 |
Import Hash |
95dff862e0b00db0b05bcf957ad9e12e |
PE Sections
MD5 |
Name |
Raw Size |
Entropy |
39810a1d06213e840b94fbb1b3858b7c |
header |
1024 |
2.896592 |
197d2613ce721b378472dfa545446db5 |
.text |
89600 |
6.595346 |
b875ef9ee01d6efadfad0d1b788851d1 |
.rdata |
28160 |
5.352208 |
d8727a0a5051d7418591aae3a42a3f01 |
.data |
3072 |
4.460652 |
302771a063d00e731afc38a29a0eda64 |
.gfids |
512 |
1.779168 |
89b7e19270b2a5563c301b84b28e423f |
.rsrc |
512 |
4.714485 |
324d867372c3590e64d7eb61f4cd1de5 |
.reloc |
5632 |
6.594775 |
Packers/Compilers/Cryptors
Relationships
3ff4ebae6c... |
Connected_To |
pakteb.com |
3ff4ebae6c... |
Connected_To |
nuokejs.com |
3ff4ebae6c... |
Connected_To |
qdbazaar.com |
Description
This file is a 32-bit DLL and has been identified as Variant B. Refer to 912F87392A889070DBB1097A82CCD93F for analysis.
pakteb.com
Tags
command-and-control
URLs
- pakteb.com/include/left.php
Relationships
pakteb.com |
Connected_From |
3ff4ebae6c255d4ae6b747a77f2821f2b619825c7789c7ee5338da5ecb375395 |
pakteb.com |
Connected_From |
c2f150dbe9a8efb72dc46416ca29acdbae6fd4a2af16b27f153eaabd4772a2a1 |
Description
A7C804B62AE93D708478949F498342F9 and 86685EC8C3C717AA2A9702E2C9DEC379 attempt to connect to the domain.
nuokejs.com
Tags
command-and-control
URLs
- nuokejs.com/contactus/about.php
Relationships
nuokejs.com |
Connected_From |
3ff4ebae6c255d4ae6b747a77f2821f2b619825c7789c7ee5338da5ecb375395 |
nuokejs.com |
Connected_From |
c2f150dbe9a8efb72dc46416ca29acdbae6fd4a2af16b27f153eaabd4772a2a1 |
Description
A7C804B62AE93D708478949F498342F9 and 86685EC8C3C717AA2A9702E2C9DEC379 attempt to connect to the domain.
qdbazaar.com
Tags
command-and-control
URLs
- qdbazaar.com/include/footer.php
Relationships
qdbazaar.com |
Connected_From |
3ff4ebae6c255d4ae6b747a77f2821f2b619825c7789c7ee5338da5ecb375395 |
qdbazaar.com |
Connected_From |
c2f150dbe9a8efb72dc46416ca29acdbae6fd4a2af16b27f153eaabd4772a2a1 |
Description
A7C804B62AE93D708478949F498342F9 and 86685EC8C3C717AA2A9702E2C9DEC379 attempt to connect to the domain.
c2f150dbe9a8efb72dc46416ca29acdbae6fd4a2af16b27f153eaabd4772a2a1
Tags
backdoortrojan
Details
Name |
86685EC8C3C717AA2A9702E2C9DEC379 |
Size |
156672 bytes |
Type |
PE32+ executable (DLL) (GUI) x86-64, for MS Windows |
MD5 |
86685ec8c3c717aa2a9702e2c9dec379 |
SHA1 |
29ddf9baad018518060814a03d424f4e08a0e914 |
SHA256 |
c2f150dbe9a8efb72dc46416ca29acdbae6fd4a2af16b27f153eaabd4772a2a1 |
SHA512 |
5bfee5737aaa7b5c42f49d2963ca3fdb0212eb4b298366e6e15ce7b6a9c09b3a1d4971683414318e5b7463eb9fa0a508179b72a72ceba8298a9d8aa6ccade4cb |
ssdeep |
3072:/ucPnT+MMMMRwVK77YWOj885LhaEuTiAQLvkkABYn9N:/ZnTwn77YWOjbL4hfq |
Entropy |
6.192260 |
Antivirus
Ahnlab |
Trojan/Win64.Manuscrypt |
Avira |
TR/AD.APTLazerus.vzbiu |
BitDefender |
Trojan.GenericKD.31159551 |
ClamAV |
Win.Trojan.Autophyte-6582725-0 |
ESET |
a variant of Win64/NukeSped.BD trojan |
Emsisoft |
Trojan.GenericKD.31159551 (B) |
Ikarus |
Trojan.Win32.Autophyte |
K7 |
Trojan ( 0053a60a1 ) |
Microsoft Security Essentials |
Trojan:Win32/Autophyte.F!dha |
NANOAV |
Trojan.Win64.NukeSped.fglqhp |
Symantec |
Trojan Horse |
TACHYON |
Backdoor/W64.Agent.156672 |
TrendMicro |
BKDR64_.37857E4E |
TrendMicro House Call |
BKDR64_.37857E4E |
VirusBlokAda |
Trojan.Manuscrypt |
Zillya! |
Trojan.GenericKD.Win32.145349 |
YARA Rules
No matches found.
ssdeep Matches
No matches found.
PE Metadata
Compile Date |
2018-08-02 21:34:37-04:00 |
Import Hash |
2013af6912650171ab98cb2d8b0b1a2e |
PE Sections
MD5 |
Name |
Raw Size |
Entropy |
41a5e8385e9725d9bbf9f9b6a0734475 |
header |
1024 |
3.078331 |
7db58e09d4ea1e65d3c0b3bb94fcd1ba |
.text |
98304 |
6.401910 |
b446c87210ab967d6db88c8aa1095ccb |
.rdata |
44032 |
5.142828 |
a748046679e968fa96c68aa53107f08a |
.data |
4096 |
3.641240 |
a1cdf2e22fff16573b4f461759d5e02d |
.pdata |
6144 |
4.913515 |
48a18c337d9c605b138a3f2e8fa572d1 |
.gfids |
512 |
1.638651 |
106eb1a5ed9fc911defec918b5086d48 |
.rsrc |
512 |
4.720823 |
452a8928c69f9af56227179f5b5b98f0 |
.reloc |
2048 |
4.794478 |
Relationships
c2f150dbe9... |
Connected_To |
pakteb.com |
c2f150dbe9... |
Connected_To |
nuokejs.com |
c2f150dbe9... |
Connected_To |
qdbazaar.com |
Description
This file is a 64-bit DLL and has been identified as Variant B. Refer to 912F87392A889070DBB1097A82CCD93F for analysis.
1678327c5f36074cf5f18d1a92c2d9fea9bfae6c245eaad01640fd75af4d6c11
Tags
trojan
Details
Name |
86D3C1B354CE696E454C42D8DC6DF1B7 |
Size |
129024 bytes |
Type |
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows |
MD5 |
86d3c1b354ce696e454c42d8dc6df1b7 |
SHA1 |
4d17c0fb13b532ba5a680c1701026d29fb1931e7 |
SHA256 |
1678327c5f36074cf5f18d1a92c2d9fea9bfae6c245eaad01640fd75af4d6c11 |
SHA512 |
cdb1338674ea9407bbffe3569fbd021df4ebefe1bc8fad2415506005d2c6bd7d6f134c89aa6c0bc5a539783fd293329d3d442cf313c8d0c70cf296e4f23f91eb |
ssdeep |
1536:Qkj1G7eW0vV7qZx1kJMZKzO12lsSKwVDF1ZTgKTTkbv+DQeAsWq8McdsLA8+nr:QkW/0JqezblsSfx1VguFDwsLA8+n |
Entropy |
6.568189 |
Antivirus
Ahnlab |
Trojan/Win32.Manuscrypt |
BitDefender |
Gen:Variant.Ursu.337564 |
ClamAV |
Win.Trojan.Autophyte-6582725-0 |
ESET |
a variant of Win32/NukeSped.EN trojan |
Emsisoft |
Gen:Variant.Ursu.337564 (B) |
Microsoft Security Essentials |
Trojan:Win32/Autophyte.F!dha |
Sophos |
Troj/NukSped-A |
TACHYON |
Trojan-Spy/W32.Manuscrypt.129024 |
TrendMicro |
Backdoo.C7D30B55 |
TrendMicro House Call |
Backdoo.C7D30B55 |
VirusBlokAda |
BScope.Trojan.Manuscrypt |
YARA Rules
No matches found.
ssdeep Matches
No matches found.
PE Metadata
Compile Date |
2018-09-02 20:34:51-04:00 |
Import Hash |
95dff862e0b00db0b05bcf957ad9e12e |
PE Sections
MD5 |
Name |
Raw Size |
Entropy |
362b9b00897b7cbef771430b593496d0 |
header |
1024 |
2.958886 |
7121ea1bf412df273b88513bd7efb39d |
.text |
90112 |
6.601268 |
cad02e58fb94dfc67ee1fae275b98902 |
.rdata |
28160 |
5.375842 |
d8727a0a5051d7418591aae3a42a3f01 |
.data |
3072 |
4.460652 |
17c535c5be4192a355ca9e8d19f10138 |
.gfids |
512 |
1.766088 |
89b7e19270b2a5563c301b84b28e423f |
.rsrc |
512 |
4.714485 |
db55d6484373493760026c3180cebf59 |
.reloc |
5632 |
6.602821 |
Packers/Compilers/Cryptors
Relationships
1678327c5f... |
Connected_To |
aurumgroup.co.id |
1678327c5f... |
Connected_To |
51shousheng.com |
1678327c5f... |
Connected_To |
new.titanik.fr |
Description
This file is a 32-bit DLL and has been identified as Variant B. Refer to 912F87392A889070DBB1097A82CCD93F for analysis.
aurumgroup.co.id
Tags
command-and-control
URLs
- aurumgroup.co.id/wp-includes/rest.php
Relationships
aurumgroup.co.id |
Connected_From |
1678327c5f36074cf5f18d1a92c2d9fea9bfae6c245eaad01640fd75af4d6c11 |
aurumgroup.co.id |
Connected_From |
c0ee19d7545f98fcd15725a3d9f0dbd0f35b2091e1c5b9cf4744f16e81a030c5 |
Description
86D3C1B354CE696E454C42D8DC6DF1B7 and 5182E7A2037717F2F9BBF6BA298C48FB attempt to connect to the domain.
51shousheng.com
Tags
command-and-control
URLs
- 51shousheng.com/include/partview.php
Relationships
51shousheng.com |
Connected_From |
1678327c5f36074cf5f18d1a92c2d9fea9bfae6c245eaad01640fd75af4d6c11 |
51shousheng.com |
Connected_From |
c0ee19d7545f98fcd15725a3d9f0dbd0f35b2091e1c5b9cf4744f16e81a030c5 |
Description
86D3C1B354CE696E454C42D8DC6DF1B7 and 5182E7A2037717F2F9BBF6BA298C48FB attempt to connect to the domain.
new.titanik.fr
Tags
command-and-control
URLs
- new.titanik.fr/wp-includes/common.php
Relationships
new.titanik.fr |
Connected_From |
1678327c5f36074cf5f18d1a92c2d9fea9bfae6c245eaad01640fd75af4d6c11 |
new.titanik.fr |
Connected_From |
c0ee19d7545f98fcd15725a3d9f0dbd0f35b2091e1c5b9cf4744f16e81a030c5 |
Description
86D3C1B354CE696E454C42D8DC6DF1B7 and 5182E7A2037717F2F9BBF6BA298C48FB attempt to connect to the domain.
c0ee19d7545f98fcd15725a3d9f0dbd0f35b2091e1c5b9cf4744f16e81a030c5
Tags
trojan
Details
Name |
5182E7A2037717F2F9BBF6BA298C48FB |
Size |
157696 bytes |
Type |
PE32+ executable (DLL) (GUI) x86-64, for MS Windows |
MD5 |
5182e7a2037717f2f9bbf6ba298c48fb |
SHA1 |
47b5d2c3f741a896a26993dbbf4a5deec6f9ac53 |
SHA256 |
c0ee19d7545f98fcd15725a3d9f0dbd0f35b2091e1c5b9cf4744f16e81a030c5 |
SHA512 |
016a80dbd78e5614e38388b3e107cb9c9f29a971dfb90cceb8e91ce0af448359ac8ad3a898e623b142f4b7bd2638ffcd7869575d50e44c05ff66fdb6d86a6788 |
ssdeep |
3072:HXyO7ibruDVtCuwxxy7Gwi6OnSaytibCCLUvg2/1Yn:HCO7ibruDVtCuIy7GwiBSaYSZ9x |
Entropy |
6.194475 |
Antivirus
Ahnlab |
Trojan/Win64.Manuscrypt |
BitDefender |
Gen:Variant.Ser.Ursu.13069 |
ClamAV |
Win.Trojan.Autophyte-6582725-0 |
ESET |
a variant of Win64/NukeSped.BD trojan |
Emsisoft |
Gen:Variant.Ser.Ursu.13069 (B) |
Microsoft Security Essentials |
Trojan:Win32/Autophyte.F!dha |
Sophos |
Troj/NukSped-A |
TACHYON |
Trojan-Spy/W64.Manuscrypt.157696 |
TrendMicro |
Backdoo.7185D059 |
TrendMicro House Call |
Backdoo.7185D059 |
YARA Rules
No matches found.
ssdeep Matches
No matches found.
PE Metadata
Compile Date |
2018-09-02 20:35:10-04:00 |
Import Hash |
2013af6912650171ab98cb2d8b0b1a2e |
PE Sections
MD5 |
Name |
Raw Size |
Entropy |
61ae8f48806dd3b4edbdc2f093941fa0 |
header |
1024 |
3.151619 |
0d0ecb30d5fc4d1be82fbfb1449842c9 |
.text |
99328 |
6.398421 |
29946785fcc534b4bb5c9591efc97c5d |
.rdata |
44032 |
5.155298 |
97eb24ae73f627856d986c0aaf5f1bd6 |
.data |
4096 |
3.639072 |
d09091ebf6183a54ca5da171553c1484 |
.pdata |
6144 |
4.949925 |
3f74a25aca1400441dae0c4256b2d870 |
.gfids |
512 |
1.622338 |
2d9583cf3eaec364bc8e0e0ad5dadf74 |
.rsrc |
512 |
4.720823 |
921b6d44e23652a86f3462e3eb523499 |
.reloc |
2048 |
4.794591 |
Relationships
c0ee19d754... |
Connected_To |
aurumgroup.co.id |
c0ee19d754... |
Connected_To |
51shousheng.com |
c0ee19d754... |
Connected_To |
new.titanik.fr |
Description
This file is a 64-bit DLL and has been identified as Variant B. Refer to 912F87392A889070DBB1097A82CCD93F for analysis.
9e4bd9676bb3460be68ba4559a824940a393bde7613850eda9196259e453b9f3
Tags
trojan
Details
Name |
668D5B5761755C9D061DA74CB21A8B75 |
Size |
2212864 bytes |
Type |
PE32+ executable (DLL) (GUI) x86-64, for MS Windows |
MD5 |
668d5b5761755c9d061da74cb21a8b75 |
SHA1 |
49da356fd99d4b7c8cb4e77f89877ee41f8948ca |
SHA256 |
9e4bd9676bb3460be68ba4559a824940a393bde7613850eda9196259e453b9f3 |
SHA512 |
8ec530a1a3fba89589f6041fc5466befa2247f3829ae46bff91f341a0957abb2515168e1ac6eaf02d04fc8bcd37a237c9071b2fa295a9963e6bb30ad75313cce |
ssdeep |
49152:h6nuk9DG/lEYtBgKPd3S7k1X2NDxDNWnnuTniH6:h6ukYEYtJV3S7aEDrWnnuTu |
Entropy |
7.958398 |
Antivirus
Ahnlab |
Trojan/Win64.Agent |
Antiy |
Trojan/Win32.Manuscrypt |
Avira |
TR/Agent.qhgqy |
BitDefender |
Trojan.GenericKD.31269235 |
ESET |
Win64/NukeSped.BT trojan |
Emsisoft |
Trojan.GenericKD.31269235 (B) |
Ikarus |
Trojan.Win64.Themida |
K7 |
Trojan ( 0054ac401 ) |
McAfee |
Generic Trojan.gw |
NANOAV |
Trojan.Win64.Manuscrypt.fouxwk |
Quick Heal |
Trojan.Manuscrypt |
Symantec |
Trojan Horse |
TACHYON |
Trojan/W64.Manuscrypt.2212864 |
TrendMicro |
Trojan.20BD6557 |
TrendMicro House Call |
Trojan.20BD6557 |
VirusBlokAda |
Trojan.Manuscrypt |
Zillya! |
Trojan.Manuscrypt.Win32.19 |
YARA Rules
No matches found.
ssdeep Matches
No matches found.
PE Metadata
Compile Date |
2018-09-16 20:16:44-04:00 |
Import Hash |
baa93d47220682c04d92f7797d9224ce |
PE Sections
MD5 |
Name |
Raw Size |
Entropy |
e7fd8dca1ed04d4a10fb802bf3c8d5ef |
header |
4096 |
0.987963 |
de0782befb39ad89b25486af66e57da0 |
|
80896 |
7.892611 |
7b576835c006db4e4bd934eedf39c4ec |
.rsrc |
512 |
4.525348 |
52add692ea0be6f14721c05b9a5dab58 |
.idata |
512 |
1.297004 |
936850d3b5e99c2a119b2a334196f7ac |
|
512 |
0.227252 |
994b9b89968924be47b7897c566017cb |
dwukfuez |
2119680 |
7.961143 |
63fc048012cf91b3840d92a6b6bbe245 |
fgwvbapa |
512 |
4.416947 |
4720f9e5ba755a82ff72caea5d49817e |
.pdataI |
6144 |
4.962182 |
Relationships
9e4bd9676b... |
Connected_To |
duratransgroup.com |
9e4bd9676b... |
Connected_To |
eygingenieros.com |
9e4bd9676b... |
Connected_To |
eventum.cwsdev3.biz |
Description
This file is a 64-bit DLL and has been identified as Variant B. Refer to 912F87392A889070DBB1097A82CCD93F for analysis.
duratransgroup.com
Tags
command-and-control
URLs
- duratransgroup.com/engl/lang.php
Relationships
duratransgroup.com |
Connected_From |
9e4bd9676bb3460be68ba4559a824940a393bde7613850eda9196259e453b9f3 |
Description
668D5B5761755C9D061DA74CB21A8B75 attempts to connect to the domain.
eygingenieros.com
Tags
command-and-control
URLs
- eygingenieros.com/wp-includes/common.php
Relationships
eygingenieros.com |
Connected_From |
9e4bd9676bb3460be68ba4559a824940a393bde7613850eda9196259e453b9f3 |
Description
668D5B5761755C9D061DA74CB21A8B75 attempts to connect to the domain.
eventum.cwsdev3.biz
URLs
- eventum.cwsdev3.biz/wp-includes/common.php
Relationships
eventum.cwsdev3.biz |
Connected_From |
9e4bd9676bb3460be68ba4559a824940a393bde7613850eda9196259e453b9f3 |
Description
668D5B5761755C9D061DA74CB21A8B75 attempts to connect to the domain.
eee38c632c62ca95b5c66f8d39a18e23b9175845560af84b6a2f69b7f9b6ec1c
Tags
trojan
Details
Name |
35E38D023B253C0CD9BD3E16AFC362A7 |
Size |
129024 bytes |
Type |
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows |
MD5 |
35e38d023b253c0cd9bd3e16afc362a7 |
SHA1 |
c850e733f4e0d4abb34969678f2a1abe3b2f4c24 |
SHA256 |
eee38c632c62ca95b5c66f8d39a18e23b9175845560af84b6a2f69b7f9b6ec1c |
SHA512 |
c605f9f895773b8a9a50581b490cfbf2434f687ec4faae0ce37082fb8fb5efa3e76f39fbc891bd38460b6ee56c240c09eada8b58cdaa9368c18dfafec620785e |
ssdeep |
1536:XbWB4W7YWyCNWf65xAkNbf+QFc9lvmKw77vliLlTrK+S31DQeAsWq8McdsX4A8PR:XbWt5yzf6kQolvmx7vliLh+DwsoA8PF |
Entropy |
6.571364 |
Antivirus
Ahnlab |
Trojan/Win32.Manuscrypt |
Antiy |
Trojan/Win32.Manuscrypt |
Avira |
TR/AD.APTLazerus.qmssk |
BitDefender |
Trojan.GenericKD.40712007 |
Cyren |
W32/Trojan.BIAI-3752 |
ESET |
a variant of Win32/NukeSped.EN trojan |
Emsisoft |
Trojan.GenericKD.40712007 (B) |
Ikarus |
Trojan.Win32.NukeSped |
K7 |
Trojan ( 00539ca21 ) |
McAfee |
Trojan-FQUB!35E38D023B25 |
Microsoft Security Essentials |
Trojan:Win32/Autophyte.F!dha |
NANOAV |
Trojan.Win32.Manuscrypt.fkqspx |
NetGate |
Trojan.Win32.Malware |
Sophos |
Troj/NukSped-A |
Symantec |
Trojan.Gen.2 |
TACHYON |
Trojan/W32.Manuscrypt.129024 |
TrendMicro |
BKDR_NU.A41D576C |
TrendMicro House Call |
BKDR_NU.A41D576C |
VirusBlokAda |
BScope.Trojan.Manuscrypt |
Zillya! |
Trojan.Manuscrypt.Win32.22 |
YARA Rules
No matches found.
ssdeep Matches
No matches found.
PE Metadata
Compile Date |
2018-10-19 03:23:31-04:00 |
Import Hash |
95dff862e0b00db0b05bcf957ad9e12e |
PE Sections
MD5 |
Name |
Raw Size |
Entropy |
a721b29ba240341403160375cd091c24 |
header |
1024 |
2.966234 |
70648fd64041effbf19466b97acb6341 |
.text |
90112 |
6.601122 |
eb845e76ca0aac042cc722b086eadc6d |
.rdata |
28160 |
5.385942 |
d8727a0a5051d7418591aae3a42a3f01 |
.data |
3072 |
4.460652 |
52ad7e79f4212b855563d2718cca7bbb |
.gfids |
512 |
1.768774 |
89b7e19270b2a5563c301b84b28e423f |
.rsrc |
512 |
4.714485 |
54cbc7874c922d6f07d0ebae7a641ffe |
.reloc |
5632 |
6.607571 |
Packers/Compilers/Cryptors
Relationships
eee38c632c... |
Connected_To |
theinspectionconsultant.com |
eee38c632c... |
Connected_To |
danagloverinteriors.com |
eee38c632c... |
Connected_To |
as-brant.ru |
Description
This file is a 32-bit DLL and has been identified as Variant B. Refer to 912F87392A889070DBB1097A82CCD93F for analysis.
theinspectionconsultant.com
Tags
command-and-control
URLs
- theinspectionconsultant.com/wp-content/plugins/akismet/index1.php
Relationships
theinspectionconsultant.com |
Connected_From |
f6e1a146543d2903146698da5698b2a214201720c0be756c6e8d2a2f27dcfaff |
theinspectionconsultant.com |
Connected_From |
eee38c632c62ca95b5c66f8d39a18e23b9175845560af84b6a2f69b7f9b6ec1c |
Description
835E38D023B253C0CD9BD3E16AFC362A7 and 72FE869AA394EF0A62BB8324857770DD attempt to connect to the domain.
danagloverinteriors.com
Tags
command-and-control
URLs
- danagloverinteriors.com/wp-content/plugins/jetpack/common.php
Relationships
danagloverinteriors.com |
Connected_From |
f6e1a146543d2903146698da5698b2a214201720c0be756c6e8d2a2f27dcfaff |
danagloverinteriors.com |
Connected_From |
eee38c632c62ca95b5c66f8d39a18e23b9175845560af84b6a2f69b7f9b6ec1c |
Description
835E38D023B253C0CD9BD3E16AFC362A7 and 72FE869AA394EF0A62BB8324857770DD attempt to connect to the domain.
as-brant.ru
Tags
command-and-control
URLs
- as-brant.ru/wp-content/themes/shapely/common.php
Relationships
as-brant.ru |
Connected_From |
f6e1a146543d2903146698da5698b2a214201720c0be756c6e8d2a2f27dcfaff |
as-brant.ru |
Connected_From |
eee38c632c62ca95b5c66f8d39a18e23b9175845560af84b6a2f69b7f9b6ec1c |
Description
835E38D023B253C0CD9BD3E16AFC362A7 and 72FE869AA394EF0A62BB8324857770DD attempt to connect to the domain.
f6e1a146543d2903146698da5698b2a214201720c0be756c6e8d2a2f27dcfaff
Tags
trojan
Details
Name |
72FE869AA394EF0A62BB8324857770DD |
Size |
157696 bytes |
Type |
PE32+ executable (DLL) (GUI) x86-64, for MS Windows |
MD5 |
72fe869aa394ef0a62bb8324857770dd |
SHA1 |
de03860d8a43358554ee4fab22c3fb25cae8992b |
SHA256 |
f6e1a146543d2903146698da5698b2a214201720c0be756c6e8d2a2f27dcfaff |
SHA512 |
54c86cef7f0b2b795d1e04323432acfeb78c751bcfdc1b693f2048b8f6af7fc06a6ef64d481764ec0c5261d5c4b020f079db6769433c705bc474ce704c1b3ff6 |
ssdeep |
3072:gXFP7wuoSeJOwxFLo7qJ/hCIEftBgbRFCLUv3w7uYngn:g1P7wuoSeJOAs7qJ5cfzkKq0G |
Entropy |
6.200286 |
Antivirus
Ahnlab |
Trojan/Win64.Manuscrypt |
Antiy |
Trojan/Win64.Manuscrypt |
Avira |
TR/AD.APTLazerus.heseo |
BitDefender |
Trojan.GenericKD.31313805 |
ESET |
a variant of Win64/NukeSped.BD trojan |
Emsisoft |
Trojan.GenericKD.31313805 (B) |
Ikarus |
Trojan.Win64.Nukesped |
K7 |
Trojan ( 0053fa3f1 ) |
McAfee |
Trojan-FQUB!72FE869AA394 |
Microsoft Security Essentials |
Trojan:Win32/Autophyte.F!dha |
NANOAV |
Trojan.Win64.NukeSped.fjscrm |
Sophos |
Troj/NukSped-A |
Symantec |
Trojan Horse |
TrendMicro |
BKDR64_.BB415F80 |
TrendMicro House Call |
BKDR64_.BB415F80 |
VirusBlokAda |
Trojan.Win64.Manuscrypt |
Zillya! |
Trojan.Manuscrypt.Win64.1 |
YARA Rules
No matches found.
ssdeep Matches
No matches found.
PE Metadata
Compile Date |
2018-10-19 03:23:52-04:00 |
Import Hash |
2013af6912650171ab98cb2d8b0b1a2e |
PE Sections
MD5 |
Name |
Raw Size |
Entropy |
1eb1d7ade0e4b678e553734e2cd3e6f3 |
header |
1024 |
3.155059 |
ab0669c74b116223c3de6213940a0268 |
.text |
99328 |
6.401690 |
911b91de22fe394f42948a75e7e87817 |
.rdata |
44032 |
5.166334 |
97eb24ae73f627856d986c0aaf5f1bd6 |
.data |
4096 |
3.639072 |
f1f39a167b5525fd01fdb683d0bf2ca8 |
.pdata |
6144 |
4.934767 |
d3a397fe89f106c07d5fa28e0bbf7edb |
.gfids |
512 |
1.653715 |
2d9583cf3eaec364bc8e0e0ad5dadf74 |
.rsrc |
512 |
4.720823 |
0814e49777e4a22532b43b74a44c2c72 |
.reloc |
2048 |
4.794082 |
Relationships
f6e1a14654... |
Connected_To |
theinspectionconsultant.com |
f6e1a14654... |
Connected_To |
danagloverinteriors.com |
f6e1a14654... |
Connected_To |
as-brant.ru |
Description
This file is a 64-bit DLL and has been identified as Variant B. Refer to 912F87392A889070DBB1097A82CCD93F for analysis.
37bb27f4eb40b8947e184afddba019001c12f97588e7f596ab6bc07f7c152602
Tags
backdoorpuptrojan
Details
Name |
A8B6EC51ED88C0329FD3329CB615BBC9 |
Size |
95744 bytes |
Type |
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows |
MD5 |
a8b6ec51ed88c0329fd3329cb615bbc9 |
SHA1 |
f744f5f97ace1a4862e764971449c28c4b880e8f |
SHA256 |
37bb27f4eb40b8947e184afddba019001c12f97588e7f596ab6bc07f7c152602 |
SHA512 |
26e1558557e3b44d18a1d97a38cc9881bc025d4979e914d40ef42248d7c5b3d09cfa17ab3893d91d65c29ba9d94047726f42be91bcd424f54b9876eddd28ab13 |
ssdeep |
1536:fIbpjZh3Qj6T4T0PY0qBbxp35d5Nh3UCzsW8cdvZ1Q6B:fM3Qe4yY0qtf/hk+vZ1Q6B |
Entropy |
6.373893 |
Antivirus
Ahnlab |
Backdoor/Win32.Agent |
Antiy |
Trojan/Win32.Manuscrypt |
Avira |
TR/Agent.ktlxw |
BitDefender |
Trojan.GenericKD.32074646 |
ClamAV |
Win.Trojan.GhostPuppet-7404648-0 |
ESET |
a variant of Win32/Agent.AAWV trojan |
Emsisoft |
Trojan.GenericKD.32074646 (B) |
Ikarus |
Trojan.Agent |
NANOAV |
Trojan.Win32.Manuscrypt.fscabu |
Quick Heal |
Trojan.Manuscrypt |
Symantec |
Trojan Horse |
TACHYON |
Trojan-Spy/W32.Agent.95744.J |
VirusBlokAda |
Trojan.Manuscrypt |
Zillya! |
Trojan.Agent.Win32.1161280 |
YARA Rules
No matches found.
ssdeep Matches
No matches found.
PE Metadata
Compile Date |
2019-06-18 08:03:21-04:00 |
Import Hash |
5446c3bf7cbf3287d9a8bffcc3ac95a9 |
PE Sections
MD5 |
Name |
Raw Size |
Entropy |
f415a11b78cf73e9c20856ebf542c7c5 |
header |
1024 |
2.732806 |
32765031f78d5821a7828a3a03fb509a |
.text |
61440 |
6.572955 |
946000c535906e58ffe121d5cff7c6ba |
.rdata |
25600 |
4.984772 |
25f93d3b0c87967785c3858f1b44cb02 |
.data |
2560 |
2.163019 |
065463fcb19d087772450d47229f013f |
.rsrc |
512 |
4.717679 |
f860381eb55d57e79cd6cf5f8972763a |
.reloc |
4608 |
6.518570 |
Packers/Compilers/Cryptors
Relationships
37bb27f4eb... |
Connected_To |
rxrenew.us |
37bb27f4eb... |
Connected_To |
creativefishstudio.com |
37bb27f4eb... |
Connected_To |
sensationalsecrets.com |
Description
This file is a 32-bit DLL and has been identified as Variant C. Variant C can be distinguished from previous versions through the absence of the beacon string "*dJU!*JE&!M@UNQ@" and the use of a generated cookie to pass certain information instead of multi-part HTTP POST requests. The cookie is designed to appear like a standard Google Analytics cookie. The format used by the malware is noted below:
--Begin cookie format--
Cookie: _ga=GA1.%d.%02d%d%d%02d.%d%05d%04d; gid=GA1.%d.%02d%d%03d.%d%05d%04d Cookie: _ga=GA1.<1>.<2><3><4><5>.<6><7><8>; gid=GA1.<1>.<9><10><11>.<6><7><8>
where
1 = rand % 10
2 = rand % 100
3 = 0 or 1 if implant is ready to receive its first command
4 = sessionID
5 = rand % 100
6 = rand % 10
7 = rand % 100000
8 = rand % 10000
9 = rand % 100
10 = 1879 or 8678 if handshake packet
11 = rand % 1000
--End cookie format--
Variant C will randomly choose from one of three hard-coded Accept-Language headers:
--Begin Accept-Language headers--
Accept-Language: en-US,en;q=0.5
Accept-Language: de-CH
Accept-Language: az-Arab
--End Accept-Language headers--
Variant C datagrams are sent in the HTTP POST body and encrypted in the same manner as Variant B with the same RC4 key. Like in Variant B, the RC4 key stream will reset after the SystemInfo command. Variant C performs API loading at runtime but does not obfuscate the strings.
Screenshots
Figure 3 - Variant C contains the commands displayed in the table.
rxrenew.us
Tags
command-and-control
URLs
- rxrenew.us/wp-content/themes/hestias/index.php
Relationships
rxrenew.us |
Connected_From |
e6fc788b5ff7436da4450191a003966a68e2a1913c83f1d3aec78c65f3ba85ca |
rxrenew.us |
Connected_From |
37bb27f4eb40b8947e184afddba019001c12f97588e7f596ab6bc07f7c152602 |
Description
A8B6EC51ED88C0329FD3329CB615BBC9 and 117FA0B8B8B965680C7B630C6E2BF01D attempt to connect to the domain.
creativefishstudio.com
Tags
command-and-control
URLs
- creativefishstudio.com/newbiesspeak/left.php
Relationships
creativefishstudio.com |
Connected_From |
e6fc788b5ff7436da4450191a003966a68e2a1913c83f1d3aec78c65f3ba85ca |
creativefishstudio.com |
Connected_From |
37bb27f4eb40b8947e184afddba019001c12f97588e7f596ab6bc07f7c152602 |
Description
A8B6EC51ED88C0329FD3329CB615BBC9 and 117FA0B8B8B965680C7B630C6E2BF01D attempt to connect to the domain.
sensationalsecrets.com
Tags
command-and-control
URLs
- sensationalsecrets.com/js/left.php
Relationships
sensationalsecrets.com |
Connected_From |
e6fc788b5ff7436da4450191a003966a68e2a1913c83f1d3aec78c65f3ba85ca |
sensationalsecrets.com |
Connected_From |
37bb27f4eb40b8947e184afddba019001c12f97588e7f596ab6bc07f7c152602 |
Description
A8B6EC51ED88C0329FD3329CB615BBC9 and 117FA0B8B8B965680C7B630C6E2BF01D attempt to connect to the domain.
e6fc788b5ff7436da4450191a003966a68e2a1913c83f1d3aec78c65f3ba85ca
Tags
puptrojan
Details
Name |
117FA0B8B8B965680C7B630C6E2BF01D |
Size |
116736 bytes |
Type |
PE32+ executable (DLL) (GUI) x86-64, for MS Windows |
MD5 |
117fa0b8b8b965680c7b630c6e2bf01d |
SHA1 |
7202fea74865e085104f839574cd150613fbcf99 |
SHA256 |
e6fc788b5ff7436da4450191a003966a68e2a1913c83f1d3aec78c65f3ba85ca |
SHA512 |
454703dd49b4b8feb36b71d7a6d18f7811c221675e272b6fe0b3d9f60a7c5c61bb6b0d8f9d84eb13cf68685dd9ef482f39b6026dda8867d9017c50ba96655e43 |
ssdeep |
3072:iN9F81gu+0WsPxRr0T7V4P2F6U6V641B820D:iN81/+0JpJ0TJrq600D |
Entropy |
6.008099 |
Antivirus
Ahnlab |
Trojan/Win64.Manuscrypt |
Antiy |
Trojan/Win32.Manuscrypt |
BitDefender |
Trojan.GenericKD.32076195 |
ClamAV |
Win.Trojan.GhostPuppet-7404648-0 |
ESET |
a variant of Win64/NukeSped.CA trojan |
Emsisoft |
Trojan.GenericKD.32076195 (B) |
Ikarus |
Trojan.Win64.Nukesped |
NANOAV |
Trojan.Win64.Manuscrypt.fslzmk |
NetGate |
Trojan.Win32.Malware |
Quick Heal |
Trojan.Manuscrypt |
Symantec |
Trojan Horse |
TACHYON |
Trojan-Spy/W64.Agent.116736 |
TrendMicro |
BKDR_NU.F8DCFF65 |
TrendMicro House Call |
BKDR_NU.F8DCFF65 |
VirusBlokAda |
Trojan.Manuscrypt |
Zillya! |
Trojan.NukeSped.Win64.35 |
YARA Rules
No matches found.
ssdeep Matches
No matches found.
PE Metadata
Compile Date |
2019-06-18 08:03:26-04:00 |
Import Hash |
912d2b0681d67169c9ee0b4cead2c366 |
PE Sections
MD5 |
Name |
Raw Size |
Entropy |
638c9a9cdf6ecfc555c8c07f4e8c7ecf |
header |
1024 |
2.903657 |
90f4f418377655079d9186062658dd5d |
.text |
65536 |
6.364048 |
d57a642f43ef623527e4bc0870475b20 |
.rdata |
40448 |
4.798275 |
025170c7aa8e93ab068076ec3d9e871b |
.data |
2560 |
2.321313 |
082001fb6c468d8828e1019e179b5749 |
.pdata |
4608 |
4.785751 |
50c26f8b7696190a236f2e12c71402ce |
.rsrc |
512 |
4.717679 |
611f9b1269513b8c4810c722c5278660 |
.reloc |
2048 |
4.851328 |
Relationships
e6fc788b5f... |
Connected_To |
rxrenew.us |
e6fc788b5f... |
Connected_To |
creativefishstudio.com |
e6fc788b5f... |
Connected_To |
sensationalsecrets.com |
Description
This file is a 64-bit DLL and has been identified as Variant C. Refer to A8B6EC51ED88C0329FD3329CB615BBC9 for analysis.
284bc471647f951c79e3e333b2b19aa37f84cc39b55441a82e2a5f7319131fac
Tags
puptrojan
Details
Name |
DB590EA77A92AE6435E2EC954D065ED4 |
Size |
118272 bytes |
Type |
PE32+ executable (DLL) (GUI) x86-64, for MS Windows |
MD5 |
db590ea77a92ae6435e2ec954d065ed4 |
SHA1 |
ef0c0ef95b1542184a6a1f4d1f4ece583046ba0a |
SHA256 |
284bc471647f951c79e3e333b2b19aa37f84cc39b55441a82e2a5f7319131fac |
SHA512 |
07d1da9735f468fd389bcf34052f94977ffc64028b54ae4a7f077aab8488bc5e82cde82671da84c0e649d1ffb3fe05491b7bfde967581799fc484a6690ef0f25 |
ssdeep |
1536:bUtygCBUwWkWtptf4W9wuJ9r82lVOwEnSMw/XjGCpsWBMdc9dlMLTQjP8PoRbB:oty7WkYwW9L98gVVZ/zGMWUUM8Ps |
Entropy |
6.003427 |
Antivirus
Ahnlab |
Trojan/Win64.Manuscrypt |
Avira |
TR/NukeSped.wnyqo |
BitDefender |
Gen:Variant.Cerbu.38929 |
ClamAV |
Win.Trojan.GhostPuppet-7404648-0 |
Cyren |
W64/Trojan.MDBT-6130 |
ESET |
a variant of Win64/NukeSped.CA trojan |
Emsisoft |
Gen:Variant.Cerbu.38929 (B) |
Ikarus |
Trojan.Win64.Nukesped |
McAfee |
RDN/Generic.fhb |
NANOAV |
Trojan.Win64.NukeSped.ftxzll |
Symantec |
Trojan Horse |
VirusBlokAda |
Trojan.Agent |
Zillya! |
Trojan.Agent.Win32.1117465 |
YARA Rules
No matches found.
ssdeep Matches
No matches found.
PE Metadata
Compile Date |
2019-07-15 09:20:00-04:00 |
Import Hash |
0760d8e97dd31634b3dd017abf4774a0 |
PE Sections
MD5 |
Name |
Raw Size |
Entropy |
9514b568295f93b907811e056fb57c35 |
header |
1024 |
2.987943 |
c82aed4c6f8d5ed8460b51e35915a90a |
.text |
66560 |
6.363581 |
a8c513f71aaafa5199def8a965ad5e51 |
.rdata |
40448 |
4.819785 |
fe894e926ee83c0a9904cd411cdef116 |
.data |
2560 |
2.327005 |
aacfa1b64b7343d8d12dddd57154285d |
.pdata |
4608 |
4.791352 |
ed53cfac37dd783aa39a61f036e4f4e9 |
.rsrc |
1024 |
3.792752 |
06a0fac8b9ff5aff98362773e499a0f8 |
.reloc |
2048 |
4.845065 |
Relationships
284bc47164... |
Connected_To |
rhythm86.com |
284bc47164... |
Connected_To |
cabba-cacao.com |
284bc47164... |
Connected_To |
3x-tv.com |
Description
This file is a 64-bit DLL and has been identified as Variant C. Refer to A8B6EC51ED88C0329FD3329CB615BBC9 for analysis.
rhythm86.com
Tags
command-and-control
URLs
- rhythm86.com/wp-content/themes/twentysixteen/about.php
Relationships
rhythm86.com |
Connected_From |
284bc471647f951c79e3e333b2b19aa37f84cc39b55441a82e2a5f7319131fac |
Description
DB590EA77A92AE6435E2EC954D065ED4 attempts to connect to the domain.
cabba-cacao.com
Tags
command-and-control
URLs
- cabba-cacao.com/wp-content/themes/integral/about.php
Relationships
cabba-cacao.com |
Connected_From |
284bc471647f951c79e3e333b2b19aa37f84cc39b55441a82e2a5f7319131fac |
Description
DB590EA77A92AE6435E2EC954D065ED4 attempts to connect to the domain.
3x-tv.com
Tags
command-and-control
URLs
- 3x-tv.com/plugins/editors/about.php
Relationships
3x-tv.com |
Connected_From |
284bc471647f951c79e3e333b2b19aa37f84cc39b55441a82e2a5f7319131fac |
Description
DB590EA77A92AE6435E2EC954D065ED4 attempts to connect to the domain.
a1cdb784100906d0ac895297c5a0959ab21a9fb39c687baf176324ee84095472
Tags
backdoorpuptrojan
Details
Name |
0856655351ACFFA1EE459EEEAF164756 |
Size |
119808 bytes |
Type |
PE32+ executable (DLL) (GUI) x86-64, for MS Windows |
MD5 |
0856655351acffa1ee459eeeaf164756 |
SHA1 |
fe0f8a37887c8f8fb5eb3e8252a8df395b3e66e7 |
SHA256 |
a1cdb784100906d0ac895297c5a0959ab21a9fb39c687baf176324ee84095472 |
SHA512 |
1dec04eef52a9872de02fa6fc1afcc9ccdc0d756d1b2de35ebda83985aefe7111b21a1e2be45992f3a35e5f70528947f91f50d098571206c180b5aa4421b3be6 |
ssdeep |
1536:iZBO9DuBAnQ2Vv4+BjVHxcTtBEIxyvO1URh+EhmGCpsWBMdc9dlM4bzd2U8EfwVB:uBOZuBUQwPjV+TcIUvXh+NGMWU1J8E |
Entropy |
5.978562 |
Antivirus
Ahnlab |
Trojan/Win64.Manuscrypt |
Antiy |
Trojan[Backdoor]/Win32.Lazarus |
Avira |
TR/NukeSped.okrph |
BitDefender |
Gen:Variant.Cerbu.38929 |
ClamAV |
Win.Trojan.GhostPuppet-7404648-0 |
Cyren |
W64/Trojan.PWEO-6087 |
ESET |
a variant of Win64/NukeSped.CA trojan |
Emsisoft |
Gen:Variant.Cerbu.38929 (B) |
Ikarus |
Trojan.Win64.Nukesped |
NANOAV |
Trojan.Win64.Lazarus.ftxgov |
Quick Heal |
Backdoor.Lazarus |
Symantec |
Trojan.Gen.MBT |
TrendMicro |
BKDR64_.DFFFEE3F |
TrendMicro House Call |
BKDR64_.DFFFEE3F |
Vir.IT eXplorer |
Backdoor.Win32.NukeSped.BH |
VirusBlokAda |
Backdoor.Lazarus |
Zillya! |
Trojan.NukeSped.Win64.41 |
YARA Rules
No matches found.
ssdeep Matches
No matches found.
PE Metadata
Compile Date |
2019-07-23 02:17:02-04:00 |
Import Hash |
7712511643053a6d00be14bd064ba3b3 |
PE Sections
MD5 |
Name |
Raw Size |
Entropy |
f5ce198af5d5f13f685bf5e7b4321e00 |
header |
1024 |
2.998958 |
280ac4987654f06c9b59b6e73d406d0a |
.text |
66560 |
6.372604 |
20923d9916cc0109900b80bcb6f57c21 |
.rdata |
40448 |
4.826823 |
fe894e926ee83c0a9904cd411cdef116 |
.data |
2560 |
2.327005 |
5268ff6f51de87cfe39fd45f886ed02f |
.pdata |
4608 |
4.804507 |
6ca9b71152093220d3c5306c9ff4512d |
.rsrc |
2560 |
2.923477 |
aec7d049f3081bab81509c1da7ce4f5e |
.reloc |
2048 |
4.845016 |
Relationships
a1cdb78410... |
Connected_To |
castorbyg.dk |
a1cdb78410... |
Connected_To |
matthias-dlugi.de |
a1cdb78410... |
Connected_To |
locphuland.com |
Description
This file is a 64-bit DLL and has been identified as Variant C. Refer to A8B6EC51ED88C0329FD3329CB615BBC9 for analysis.
castorbyg.dk
Tags
command-and-control
URLs
- castorbyg.dk/wp-content/themes/302.php
Relationships
castorbyg.dk |
Connected_From |
a1cdb784100906d0ac895297c5a0959ab21a9fb39c687baf176324ee84095472 |
Description
0856655351ACFFA1EE459EEEAF164756 attempts to connect to the domain.
matthias-dlugi.de
Tags
command-and-control
URLs
- matthias-dlugi.de/wp-content/themes/twentyfifteen/helper.php
Relationships
matthias-dlugi.de |
Connected_From |
a1cdb784100906d0ac895297c5a0959ab21a9fb39c687baf176324ee84095472 |
Description
0856655351ACFFA1EE459EEEAF164756 attempts to connect to the domain.
locphuland.com
Tags
command-and-control
URLs
- locphuland.com/wp-content/themes/hikma/total.php
Relationships
locphuland.com |
Connected_From |
a1cdb784100906d0ac895297c5a0959ab21a9fb39c687baf176324ee84095472 |
Description
0856655351ACFFA1EE459EEEAF164756 attempts to connect to the domain.
b4bf6322c67a23553d5a9af6fcd9510eb613ffac963a21e32a9ced83132a09ba
Tags
downloadertrojan
Details
Name |
34C2AC6DAA44116713F882694B6B41E8 |
Size |
413696 bytes |
Type |
PE32 executable (GUI) Intel 80386, for MS Windows |
MD5 |
34c2ac6daa44116713f882694b6b41e8 |
SHA1 |
323258353c244b373c758906d88a2bf9663abf8d |
SHA256 |
b4bf6322c67a23553d5a9af6fcd9510eb613ffac963a21e32a9ced83132a09ba |
SHA512 |
5d4368d9de8c15b8b2945ad0aebf1bdc9c5e14dfc2927fb43d254f129675285278116ac9f32e0e3b11aeac10b488fa78c9c57ef1634a911ab76a583b27c4af81 |
ssdeep |
3072:rNXQoaFxes6EiH6Zq2dIvkapOztAzfb7zgntbeGfCDQomoRoYohoYoloodocoomn:rNXQoaFA6TdIvbxHFGfCDtoLb779qPb |
Entropy |
6.080481 |
Antivirus
Ahnlab |
Win-Trojan/Akdoor.Gen |
Antiy |
Trojan/Win32.AGeneric |
Avira |
TR/Agent.413696.177 |
BitDefender |
Trojan.GenericKD.6306955 |
ESET |
a variant of Win32/NukeSped.AS trojan |
Emsisoft |
Trojan.GenericKD.6306955 (B) |
Ikarus |
Trojan.Win32.NukeSped |
Microsoft Security Essentials |
Trojan:Win32/FoggyBrass.A!dha |
NANOAV |
Trojan.Win32.Agent.dyiqsz |
Symantec |
Infostealer.Limitail |
TACHYON |
Trojan.GenericKD.2848758 |
TrendMicro |
TROJ_FR.B20F0867 |
TrendMicro House Call |
TROJ_FR.B20F0867 |
VirusBlokAda |
BScope.Trojan.Downloader |
Zillya! |
Trojan.NukeSped.Win32.211 |
YARA Rules
No matches found.
ssdeep Matches
No matches found.
PE Metadata
Compile Date |
2015-10-26 02:49:15-04:00 |
Import Hash |
286a6d2c70e3abce9178b4dde553be1e |
PE Sections
MD5 |
Name |
Raw Size |
Entropy |
f99d1ddfaa147735453ba03902858bdd |
header |
4096 |
0.707250 |
e43e40d71706646e57eaa4bab011f1fe |
.text |
90112 |
6.601261 |
6d16ccd8c4bf43898ce90a54570ee55f |
.rdata |
8192 |
4.923082 |
6b290555b2ac46d8971af1ecd979ebd2 |
.data |
20480 |
2.478666 |
02a1e02ca134ced49ced1be22c562e26 |
.rsrc |
290816 |
5.824422 |
Packers/Compilers/Cryptors
Microsoft Visual C++ v6.0 |
Description
This file is a 32-bit Windows executable and has been identified as Variant D. Variant D generates an HTTP POST request very similar to that of Variant A. The only difference is the beacon string, this variant uses "t34kjfdla45l". Datagrams are encrypted with a combination of RC4 and differential XOR. The RC4 key used is "0x0D06092A864886F70D01010105000382".
Screenshots
Figure 4 - Variant D contains the commands displayed in the table.
134b082b418129ffa390fbee1568bd9510c54bfdd0e6b1f36bc7b8f867e56283
Details
Name |
633BD738AE63B6CE9C2A48CBDDD15406 |
Size |
110592 bytes |
Type |
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows |
MD5 |
633bd738ae63b6ce9c2a48cbddd15406 |
SHA1 |
9807eadca9016f843ee35426d06bf67860d9cc39 |
SHA256 |
134b082b418129ffa390fbee1568bd9510c54bfdd0e6b1f36bc7b8f867e56283 |
SHA512 |
681c659813ab9e7dccfe4b3f86dfcc69dc63976a78ef93bff745543501c8cdfac988e7cd4f07a1a00f7432be12203b4f77f716f62b21616ffd1c4175379f3990 |
ssdeep |
3072:xZRo0uR/IjCCvWyBra4YUzCbBAHFbEQP:xZm+GCW2m4YUzCbOv |
Entropy |
6.483560 |
Antivirus
YARA Rules
- rule CISA_10135536_06 : HiddenCobra rat
{
meta:
Author = "CISA Code & Media Analysis"
Incident = "10135536"
Date = "2018-05-04"
Actor = "HiddenCobra"
Category = "Trojan RAT"
Family = "BLINDINGCAN"
Description = "Detects Trojan RAT"
MD5_1 = "f9e6c35dbb62101498ec755152a8a67b"
SHA256_1 = "1ee75106a9113b116c54e7a5954950065b809e0bb4dd0a91dc76f778508c7954"
MD5_2 = "d742ba8cf5b24affdf77bc6869da0dc5"
SHA256_2 = "7dce6f30e974ed97a3ed024d4c62350f9396310603e185a753b63a1f9a2d5799"
MD5_3 = "aefcd8e98a231bccbc9b2c6d578fc8f3"
SHA256_3 = "96721e13bae587c75618566111675dec2d61f9f5d16e173e69bb42ad7cb2dd8a"
MD5_4 = "3a6b48871abbf2a1ce4c89b08bc0b7d8"
SHA256_4 = "f71d67659baf0569143874d5d1c5a4d655c7d296b2e86be1b8f931c2335c0cd3"
strings:
$s0 = { C7 45 EC 0D 06 09 2A C7 45 F0 86 48 86 F7 C7 45 F4 0D 01 01 01 C7 45 F8 05 00 03 82 }
$s1 = { 50 4D 53 2A 2E 74 6D 70 }
$s2 = { 79 67 60 3C 77 F9 BA 77 7A 56 1B 68 51 26 11 96 B7 98 71 39 82 B0 81 78 }
condition:
any of them
}
ssdeep Matches
No matches found.
PE Metadata
Compile Date |
2018-02-05 01:51:48-05:00 |
Import Hash |
e323d4ef56b270402fb9e6c461542ad1 |
PE Sections
MD5 |
Name |
Raw Size |
Entropy |
1879db2bfe51d8e1aeef41777c2c97e3 |
header |
1024 |
2.453253 |
af4b3b39e5faf6f61340622604f97a0e |
.text |
81920 |
6.635901 |
ddd311c7dca06e585757f426cb9178fc |
.rdata |
14848 |
5.124397 |
086be14d819327c4cb2eecb13da9bef4 |
.data |
4608 |
3.602410 |
142b335625420f8ae2ec8fc51de0b6b2 |
.rsrc |
512 |
5.112624 |
ec32cc24421e55461a5ad48fc96ff984 |
.reloc |
7680 |
4.861507 |
Packers/Compilers/Cryptors
Microsoft Visual C++ DLL *sign by CodeRipper |
Description
This file is a 64-bit DLL and has been identified as Variant E. Variant E forgoes the multi-part HTTP POST request format of Variant D and instead uses a single HTTP POST body with four parameters of Base64 encoded data as displayed below:
--Begin HTTP POST format--
POST /<uri> HTTP/1.1
Connection: Keep-Alive
Cache-Control: no-cache
Content-Type: application/x-www-form-urlencoded
Accept: */*
User-Agent: <obtained from ObtainUserAgentString otherwise: Mozilla/5.0 (Windows NT 6.1; WOW64) Chrome/28.0.1500.95 Safari/537.36>
Host: <domain>
Content-Length: <length>
id=<key><paramList>&<random_1>=<sessionID>&<random_2>=<fixedString>&<random_3>=<datagram>
--End HTTP POST format--
The first parameter, 'id', will consist of two separate base64 encoded parts. The first part consists of nine randomly generated lower case characters to be used as the RC4 key for the first three parameters. The second part of the 'id' parameter is a colon delimited list of the other three parameter names encrypted with RC4. Those three parameters are randomly selected from a list of 51 strings. The second parameter data is the session id. The third parameter data is a fixed string in the implant: "T1B7D95256A2001E". When encrypting data from the first three parameters, the encryption starts "0xC00 bytes" into the RC4 key stream. The last parameter will contain the datagram to be sent. The datagram is encrypted in the same manner as Variant B Version 1.0 using a combination of RC4 and differential XOR. The only difference is the additional layer of Base64 encoding.
Screenshots
Figure 5 - Variant E contains the commands displayed in the table.
0a763da26a67cb2b09a3ae6e1ac07828065eb980e452ce7d3354347976038e7e
Tags
trojan
Details
Name |
171B9135540F89BF727B690B9E587A4E |
Size |
1778176 bytes |
Type |
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows |
MD5 |
171b9135540f89bf727b690b9e587a4e |
SHA1 |
930577d155c41ad843be09a5910a75160eb0eca9 |
SHA256 |
0a763da26a67cb2b09a3ae6e1ac07828065eb980e452ce7d3354347976038e7e |
SHA512 |
811f9e5302b0a048d56fb54b70df2819c7219accf07c1f69f9d4c9342fbb4748017ae5acb3e3e8c6ab0d5c8c5660f9c0b542e06b306b96e78309bc92a735cc10 |
ssdeep |
49152:Z689410GBsVASqabr4nrhKCJiX1zBj7Is:Z604zehqabr4hli1zBH |
Entropy |
7.951261 |
Antivirus
Ahnlab |
Trojan/Win64.Agent |
Antiy |
Trojan/Win32.Agentb |
Avira |
TR/NukeSped.psxmr |
BitDefender |
Trojan.GenericKD.31831026 |
ESET |
Win32/NukeSped.FL trojan |
Emsisoft |
Trojan.GenericKD.31831026 (B) |
Ikarus |
Trojan.Win32.NukeSped |
K7 |
Trojan ( 0054ae921 ) |
McAfee |
Generic Trojan.gv |
NANOAV |
Trojan.Win32.NukeSped.foyooc |
Symantec |
Trojan Horse |
TACHYON |
Trojan/W32.Agent.1778176.N |
TrendMicro |
TROJ_FR.FB1AA970 |
TrendMicro House Call |
TROJ_FR.FB1AA970 |
VirusBlokAda |
TScope.Malware-Cryptor.SB |
Zillya! |
Trojan.Agentb.Win32.22138 |
YARA Rules
No matches found.
ssdeep Matches
No matches found.
PE Metadata
Compile Date |
2018-10-07 23:05:18-04:00 |
Import Hash |
baa93d47220682c04d92f7797d9224ce |
PE Sections
MD5 |
Name |
Raw Size |
Entropy |
9e19e7fb6309129d9cf0a01c4e736a05 |
header |
4096 |
0.905647 |
4ea36d953ccdb30fb625e51136a26969 |
|
54272 |
7.980761 |
302d4b306fd7974ce2b980a88adb61b2 |
.rsrc |
512 |
4.514680 |
59f642fe00fbfca3c92c42b2cae802f8 |
.idata |
512 |
1.308723 |
f69164b5fe72547bf86a52994b636858 |
|
512 |
0.256865 |
e45475d50cd89d8688e42771053c8632 |
bncavhpe |
1717760 |
7.953161 |
3c91bb7f24d17b602cc359f5fe5d2322 |
psmxndys |
512 |
3.597543 |
Relationships
0a763da26a... |
Connected_To |
streamf.ru |
0a763da26a... |
Connected_To |
vinhsake.com |
0a763da26a... |
Connected_To |
bogorcenter.com |
Description
This file is a 32-bit DLL and has been identified as Variant F. Variant F of the implant uses multi-part HTTP POST messages consisting of three parts holding the victim id, response code, and datagram, as outlined below:
--Begin HTTP POST format--
POST /<uri> HTTP/1.1
Content-Type: multipart/form-data; boundary=<boundaryString>
User-Agent: <obtained from ObtainUserAgentString>
Host: <domain>
Content-Length: <length>
Expect: 100-continue
Connection: Keep-Alive
--<boundaryString>
Content-Disposition: form-data; name="_webident_f"
<victimId>
--<boundarString>
Content-Disposition: form-data; name="_webident_s"
<response code>
--<boundaryString>
Content-Disposition: form-data; name="file"; filename="<random>.dat"
Content-Type: octet-stream
<datagram>
--<boundaryString>
--End HTTP POST format--
Two additional User-Agent strings have been used by this version:
--Begin User-Agent strings--
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.131 Safari/537.36
--End User-Agent strings--
Datagrams are encoded using a single byte XOR with the value "0xAA".
Screenshots
Figure 6 - Variant F contains the commands displayed in the table.
streamf.ru
Tags
command-and-control
URLs
- streamf.ru//wp-content/index2.php
Relationships
streamf.ru |
Connected_From |
0a763da26a67cb2b09a3ae6e1ac07828065eb980e452ce7d3354347976038e7e |
Description
171B9135540F89BF727B690B9E587A4E attempts to connect to the domain.
vinhsake.com
Tags
command-and-control
URLs
- vinhsake.com//wp-content/uploads/index2.php
Relationships
vinhsake.com |
Connected_From |
0a763da26a67cb2b09a3ae6e1ac07828065eb980e452ce7d3354347976038e7e |
Description
171B9135540F89BF727B690B9E587A4E attempts to connect to the domain.
bogorcenter.com
Tags
command-and-control
URLs
- bogorcenter.com/wp-content/themes/index2.php
Relationships
bogorcenter.com |
Connected_From |
0a763da26a67cb2b09a3ae6e1ac07828065eb980e452ce7d3354347976038e7e |
Description
171B9135540F89BF727B690B9E587A4E attempts to connect to the domain.
1884ddc53ef66488ca8fc641b438895fcaada77c15210118465377c63223b3bc
Tags
backdoortrojan
Details
Name |
22F8D2A0C8D9B54A553FCA1B2393B266 |
Size |
126976 bytes |
Type |
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows |
MD5 |
22f8d2a0c8d9b54a553fca1b2393b266 |
SHA1 |
08bacda419c5c663bd16374ee690e8822af74af0 |
SHA256 |
1884ddc53ef66488ca8fc641b438895fcaada77c15210118465377c63223b3bc |
SHA512 |
0a51be4e9d4d95d4e511b97bdfa2aaec5db39388eedf17285922f6057ca171f55734c2e5e7d556a7d3655c6b01430bae045045644013139f69b78948dcdbdbaf |
ssdeep |
3072:hdnIUhpSA9IybNLYhsmbjzwI3tFMHBNu:vnIUhpS85WsmbnKN |
Entropy |
6.417310 |
Antivirus
Ahnlab |
Trojan/Win32.Agent |
Antiy |
Trojan[Backdoor]/Win32.Manuscrypt |
Avira |
BDS/Redcap.hcfxr |
BitDefender |
Trojan.GenericKD.33520232 |
Cyren |
W32/Trojan.ITLW-8523 |
ESET |
a variant of Generik.BTKBSHE trojan |
Emsisoft |
Trojan.GenericKD.33520232 (B) |
NANOAV |
Trojan.Win32.Manuscrypt.hepayr |
Quick Heal |
Backdoor.Manuscrypt |
TACHYON |
Trojan/W32.Agent.126976.DEL |
TrendMicro |
BKDR_NU.82E0FF6A |
TrendMicro House Call |
BKDR_NU.82E0FF6A |
VirusBlokAda |
Backdoor.Manuscrypt |
YARA Rules
No matches found.
ssdeep Matches
No matches found.
PE Metadata
Compile Date |
2019-07-23 20:50:45-04:00 |
Import Hash |
33ef573774873705ce44ec95183c2e0f |
PE Sections
MD5 |
Name |
Raw Size |
Entropy |
49356d02c29028e4a4986d5770624266 |
header |
1024 |
2.940664 |
0bd65b0788f3e6043c6aa53346e88a19 |
.text |
87552 |
6.583271 |
a5be05b45ad3419c246cf21f9be20826 |
.rdata |
27136 |
5.394968 |
2bc12ba81a6644ceb7fa81303444d333 |
.data |
5120 |
1.183309 |
bfe346cfed24683b605f901394c8cf69 |
.gfids |
512 |
1.429806 |
904005e1749dcd577a0be29a83ff9ce1 |
.rsrc |
512 |
4.720823 |
2adefe9831125b0ab9459ad7733cb42e |
.reloc |
5120 |
6.468427 |
Packers/Compilers/Cryptors
Relationships
1884ddc53e... |
Connected_To |
stokeinvestor.com |
1884ddc53e... |
Connected_To |
growthincone.com |
1884ddc53e... |
Connected_To |
inverstingpurpose.com |
Description
This file is a 32-bit DLL and has been identified as Variant F. Refer to 171B9135540F89BF727B690B9E587A4E for analysis.
stokeinvestor.com
Tags
command-and-control
URLs
- stokeinvestor.com/common.php
Relationships
stokeinvestor.com |
Connected_From |
c24c322f4535def3f8d1579c39f2f9e323787d15b96e2ee457c38925effe2d39 |
stokeinvestor.com |
Connected_From |
1884ddc53ef66488ca8fc641b438895fcaada77c15210118465377c63223b3bc |
Description
22F8D2A0C8D9B54A553FCA1B2393B266 and FDD55A38A45DE8AF6F8C34A33BAE11CB attempt to connect to the domain.
growthincone.com
Tags
command-and-control
URLs
- growthincone.com/board.php
Relationships
growthincone.com |
Connected_From |
c24c322f4535def3f8d1579c39f2f9e323787d15b96e2ee457c38925effe2d39 |
growthincone.com |
Connected_From |
1884ddc53ef66488ca8fc641b438895fcaada77c15210118465377c63223b3bc |
Description
22F8D2A0C8D9B54A553FCA1B2393B266 and FDD55A38A45DE8AF6F8C34A33BAE11CB attempt to connect to the domain.
inverstingpurpose.com
Tags
command-and-control
URLs
- inverstingpurpose.com/head.php
Relationships
inverstingpurpose.com |
Connected_From |
c24c322f4535def3f8d1579c39f2f9e323787d15b96e2ee457c38925effe2d39 |
inverstingpurpose.com |
Connected_From |
1884ddc53ef66488ca8fc641b438895fcaada77c15210118465377c63223b3bc |
Description
22F8D2A0C8D9B54A553FCA1B2393B266 and FDD55A38A45DE8AF6F8C34A33BAE11CB attempt to connect to the domain.
c24c322f4535def3f8d1579c39f2f9e323787d15b96e2ee457c38925effe2d39
Tags
backdoortrojan
Details
Name |
FDD55A38A45DE8AF6F8C34A33BAE11CB |
Size |
141312 bytes |
Type |
PE32+ executable (DLL) (GUI) x86-64, for MS Windows |
MD5 |
fdd55a38a45de8af6f8c34a33bae11cb |
SHA1 |
f2da56d6a565ade77d7ebb0c31eda99b415bcced |
SHA256 |
c24c322f4535def3f8d1579c39f2f9e323787d15b96e2ee457c38925effe2d39 |
SHA512 |
f81e0cb975269483f43a35b10b8f01efe708453e675f3909585c1332d477bff69d47abc570563ac1cf8dcecc4133a702db6b0ab19548f3e0e08f096d723fa514 |
ssdeep |
3072:RFoydrw7d4uA4LsuvitZmf5eXv91596YPG:PXG7d47wsOiXmfw1DG |
Entropy |
6.089052 |
Antivirus
Ahnlab |
Trojan/Win64.Agent |
Antiy |
Trojan[Backdoor]/Win64.Manuscrypt |
BitDefender |
Trojan.GenericKD.32627436 |
Cyren |
W64/Trojan.URTH-8310 |
ESET |
a variant of Generik.CETMACQ trojan |
Emsisoft |
Trojan.GenericKD.32627436 (B) |
McAfee |
RDN/Generic BackDoor |
TACHYON |
Trojan/W64.Agent.141312.B |
TrendMicro |
BKDR64_.DFFFEE3F |
TrendMicro House Call |
BKDR64_.DFFFEE3F |
VirusBlokAda |
Backdoor.Win64.Manuscrypt |
YARA Rules
No matches found.
ssdeep Matches
No matches found.
PE Metadata
Compile Date |
2019-07-23 20:49:41-04:00 |
Import Hash |
f2da13bb8bffa45aa11aaf82d51d54b5 |
PE Sections
MD5 |
Name |
Raw Size |
Entropy |
557352a095b601682822a48dfb6ff35e |
header |
1024 |
3.105520 |
8bb19f482bddce12c71f47569cf5c732 |
.text |
84992 |
6.415516 |
a14c6a5866fe494ff5cfd42a0bb2d2c4 |
.rdata |
41984 |
5.116442 |
d0c6f887dc794cc7c49bf38a5eba50ff |
.data |
5120 |
1.262987 |
aaed812597858a671260a72da7bcb794 |
.pdata |
5120 |
4.872234 |
f0819a00354c53d2e35aa1fc5239ff49 |
.gfids |
512 |
1.283686 |
85d6df69cd236ab12321a95d2a49aff1 |
.rsrc |
512 |
4.720823 |
62de5951242abfc3312799424b9f0406 |
.reloc |
2048 |
4.712047 |
Relationships
c24c322f45... |
Connected_To |
stokeinvestor.com |
c24c322f45... |
Connected_To |
growthincone.com |
c24c322f45... |
Connected_To |
inverstingpurpose.com |
Description
This file is a 64-bit DLL and has been identified as Variant F. Refer to 171B9135540F89BF727B690B9E587A4E for analysis.
Relationship Summary
d8af45210b... |
Connected_To |
530hr.com |
d8af45210b... |
Connected_To |
028xmz.com |
d8af45210b... |
Connected_To |
168wangpi.com |
530hr.com |
Connected_From |
d8af45210bf931bc5b03215ed30fb731e067e91f25eda02a404bd55169e3e3c3 |
530hr.com |
Connected_From |
7985af0a87780d27dc52c4f73c38de44e5ad477cb78b2e8e89708168fbc4a882 |
028xmz.com |
Connected_From |
d8af45210bf931bc5b03215ed30fb731e067e91f25eda02a404bd55169e3e3c3 |
028xmz.com |
Connected_From |
7985af0a87780d27dc52c4f73c38de44e5ad477cb78b2e8e89708168fbc4a882 |
168wangpi.com |
Connected_From |
d8af45210bf931bc5b03215ed30fb731e067e91f25eda02a404bd55169e3e3c3 |
168wangpi.com |
Connected_From |
7985af0a87780d27dc52c4f73c38de44e5ad477cb78b2e8e89708168fbc4a882 |
7985af0a87... |
Connected_To |
530hr.com |
7985af0a87... |
Connected_To |
028xmz.com |
7985af0a87... |
Connected_To |
168wangpi.com |
e98991cdd9... |
Connected_To |
marmarademo.com |
e98991cdd9... |
Connected_To |
33cow.com |
e98991cdd9... |
Connected_To |
97nb.net |
marmarademo.com |
Connected_From |
e98991cdd9ddd30adf490673c67a4f8241993f26810da09b52d8748c6160a292 |
33cow.com |
Connected_From |
e98991cdd9ddd30adf490673c67a4f8241993f26810da09b52d8748c6160a292 |
97nb.net |
Connected_From |
e98991cdd9ddd30adf490673c67a4f8241993f26810da09b52d8748c6160a292 |
4838f85499... |
Connected_To |
anlway.com |
4838f85499... |
Connected_To |
apshenyihl.com |
4838f85499... |
Connected_To |
ap8898.com |
anlway.com |
Connected_From |
4838f85499e3c68415010d4f19e83e2c9e3f2302290138abe79c380754f97324 |
apshenyihl.com |
Connected_From |
4838f85499e3c68415010d4f19e83e2c9e3f2302290138abe79c380754f97324 |
ap8898.com |
Connected_From |
4838f85499e3c68415010d4f19e83e2c9e3f2302290138abe79c380754f97324 |
e76b3fd3e9... |
Connected_To |
aloe-china.com |
e76b3fd3e9... |
Connected_To |
92myhw.com |
e76b3fd3e9... |
Connected_To |
aisou123.com |
aloe-china.com |
Connected_From |
e76b3fd3e906ac23218b1fbd66fd29c3945ee209a29e9462bbc46b07d1645de2 |
92myhw.com |
Connected_From |
e76b3fd3e906ac23218b1fbd66fd29c3945ee209a29e9462bbc46b07d1645de2 |
aisou123.com |
Connected_From |
e76b3fd3e906ac23218b1fbd66fd29c3945ee209a29e9462bbc46b07d1645de2 |
1faaa93908... |
Connected_To |
markcoprintandcopy.com |
1faaa93908... |
Connected_To |
aedlifepower.com |
1faaa93908... |
Connected_To |
919xy.com |
markcoprintandcopy.com |
Connected_From |
1faaa939087c3479441d9f9c83a80ac7ec9b929e626cb34a7417be9ff0316ff7 |
aedlifepower.com |
Connected_From |
1faaa939087c3479441d9f9c83a80ac7ec9b929e626cb34a7417be9ff0316ff7 |
919xy.com |
Connected_From |
1faaa939087c3479441d9f9c83a80ac7ec9b929e626cb34a7417be9ff0316ff7 |
3ff4ebae6c... |
Connected_To |
pakteb.com |
3ff4ebae6c... |
Connected_To |
nuokejs.com |
3ff4ebae6c... |
Connected_To |
qdbazaar.com |
pakteb.com |
Connected_From |
3ff4ebae6c255d4ae6b747a77f2821f2b619825c7789c7ee5338da5ecb375395 |
pakteb.com |
Connected_From |
c2f150dbe9a8efb72dc46416ca29acdbae6fd4a2af16b27f153eaabd4772a2a1 |
nuokejs.com |
Connected_From |
3ff4ebae6c255d4ae6b747a77f2821f2b619825c7789c7ee5338da5ecb375395 |
nuokejs.com |
Connected_From |
c2f150dbe9a8efb72dc46416ca29acdbae6fd4a2af16b27f153eaabd4772a2a1 |
qdbazaar.com |
Connected_From |
3ff4ebae6c255d4ae6b747a77f2821f2b619825c7789c7ee5338da5ecb375395 |
qdbazaar.com |
Connected_From |
c2f150dbe9a8efb72dc46416ca29acdbae6fd4a2af16b27f153eaabd4772a2a1 |
c2f150dbe9... |
Connected_To |
pakteb.com |
c2f150dbe9... |
Connected_To |
nuokejs.com |
c2f150dbe9... |
Connected_To |
qdbazaar.com |
1678327c5f... |
Connected_To |
aurumgroup.co.id |
1678327c5f... |
Connected_To |
51shousheng.com |
1678327c5f... |
Connected_To |
new.titanik.fr |
aurumgroup.co.id |
Connected_From |
1678327c5f36074cf5f18d1a92c2d9fea9bfae6c245eaad01640fd75af4d6c11 |
aurumgroup.co.id |
Connected_From |
c0ee19d7545f98fcd15725a3d9f0dbd0f35b2091e1c5b9cf4744f16e81a030c5 |
51shousheng.com |
Connected_From |
1678327c5f36074cf5f18d1a92c2d9fea9bfae6c245eaad01640fd75af4d6c11 |
51shousheng.com |
Connected_From |
c0ee19d7545f98fcd15725a3d9f0dbd0f35b2091e1c5b9cf4744f16e81a030c5 |
new.titanik.fr |
Connected_From |
1678327c5f36074cf5f18d1a92c2d9fea9bfae6c245eaad01640fd75af4d6c11 |
new.titanik.fr |
Connected_From |
c0ee19d7545f98fcd15725a3d9f0dbd0f35b2091e1c5b9cf4744f16e81a030c5 |
c0ee19d754... |
Connected_To |
aurumgroup.co.id |
c0ee19d754... |
Connected_To |
51shousheng.com |
c0ee19d754... |
Connected_To |
new.titanik.fr |
9e4bd9676b... |
Connected_To |
duratransgroup.com |
9e4bd9676b... |
Connected_To |
eygingenieros.com |
9e4bd9676b... |
Connected_To |
eventum.cwsdev3.biz |
duratransgroup.com |
Connected_From |
9e4bd9676bb3460be68ba4559a824940a393bde7613850eda9196259e453b9f3 |
eygingenieros.com |
Connected_From |
9e4bd9676bb3460be68ba4559a824940a393bde7613850eda9196259e453b9f3 |
eventum.cwsdev3.biz |
Connected_From |
9e4bd9676bb3460be68ba4559a824940a393bde7613850eda9196259e453b9f3 |
eee38c632c... |
Connected_To |
theinspectionconsultant.com |
eee38c632c... |
Connected_To |
danagloverinteriors.com |
eee38c632c... |
Connected_To |
as-brant.ru |
theinspectionconsultant.com |
Connected_From |
f6e1a146543d2903146698da5698b2a214201720c0be756c6e8d2a2f27dcfaff |
theinspectionconsultant.com |
Connected_From |
eee38c632c62ca95b5c66f8d39a18e23b9175845560af84b6a2f69b7f9b6ec1c |
danagloverinteriors.com |
Connected_From |
f6e1a146543d2903146698da5698b2a214201720c0be756c6e8d2a2f27dcfaff |
danagloverinteriors.com |
Connected_From |
eee38c632c62ca95b5c66f8d39a18e23b9175845560af84b6a2f69b7f9b6ec1c |
as-brant.ru |
Connected_From |
f6e1a146543d2903146698da5698b2a214201720c0be756c6e8d2a2f27dcfaff |
as-brant.ru |
Connected_From |
eee38c632c62ca95b5c66f8d39a18e23b9175845560af84b6a2f69b7f9b6ec1c |
f6e1a14654... |
Connected_To |
theinspectionconsultant.com |
f6e1a14654... |
Connected_To |
danagloverinteriors.com |
f6e1a14654... |
Connected_To |
as-brant.ru |
37bb27f4eb... |
Connected_To |
rxrenew.us |
37bb27f4eb... |
Connected_To |
creativefishstudio.com |
37bb27f4eb... |
Connected_To |
sensationalsecrets.com |
rxrenew.us |
Connected_From |
e6fc788b5ff7436da4450191a003966a68e2a1913c83f1d3aec78c65f3ba85ca |
rxrenew.us |
Connected_From |
37bb27f4eb40b8947e184afddba019001c12f97588e7f596ab6bc07f7c152602 |
creativefishstudio.com |
Connected_From |
e6fc788b5ff7436da4450191a003966a68e2a1913c83f1d3aec78c65f3ba85ca |
creativefishstudio.com |
Connected_From |
37bb27f4eb40b8947e184afddba019001c12f97588e7f596ab6bc07f7c152602 |
sensationalsecrets.com |
Connected_From |
e6fc788b5ff7436da4450191a003966a68e2a1913c83f1d3aec78c65f3ba85ca |
sensationalsecrets.com |
Connected_From |
37bb27f4eb40b8947e184afddba019001c12f97588e7f596ab6bc07f7c152602 |
e6fc788b5f... |
Connected_To |
rxrenew.us |
e6fc788b5f... |
Connected_To |
creativefishstudio.com |
e6fc788b5f... |
Connected_To |
sensationalsecrets.com |
284bc47164... |
Connected_To |
rhythm86.com |
284bc47164... |
Connected_To |
cabba-cacao.com |
284bc47164... |
Connected_To |
3x-tv.com |
rhythm86.com |
Connected_From |
284bc471647f951c79e3e333b2b19aa37f84cc39b55441a82e2a5f7319131fac |
cabba-cacao.com |
Connected_From |
284bc471647f951c79e3e333b2b19aa37f84cc39b55441a82e2a5f7319131fac |
3x-tv.com |
Connected_From |
284bc471647f951c79e3e333b2b19aa37f84cc39b55441a82e2a5f7319131fac |
a1cdb78410... |
Connected_To |
castorbyg.dk |
a1cdb78410... |
Connected_To |
matthias-dlugi.de |
a1cdb78410... |
Connected_To |
locphuland.com |
castorbyg.dk |
Connected_From |
a1cdb784100906d0ac895297c5a0959ab21a9fb39c687baf176324ee84095472 |
matthias-dlugi.de |
Connected_From |
a1cdb784100906d0ac895297c5a0959ab21a9fb39c687baf176324ee84095472 |
locphuland.com |
Connected_From |
a1cdb784100906d0ac895297c5a0959ab21a9fb39c687baf176324ee84095472 |
0a763da26a... |
Connected_To |
streamf.ru |
0a763da26a... |
Connected_To |
vinhsake.com |
0a763da26a... |
Connected_To |
bogorcenter.com |
streamf.ru |
Connected_From |
0a763da26a67cb2b09a3ae6e1ac07828065eb980e452ce7d3354347976038e7e |
vinhsake.com |
Connected_From |
0a763da26a67cb2b09a3ae6e1ac07828065eb980e452ce7d3354347976038e7e |
bogorcenter.com |
Connected_From |
0a763da26a67cb2b09a3ae6e1ac07828065eb980e452ce7d3354347976038e7e |
1884ddc53e... |
Connected_To |
stokeinvestor.com |
1884ddc53e... |
Connected_To |
growthincone.com |
1884ddc53e... |
Connected_To |
inverstingpurpose.com |
stokeinvestor.com |
Connected_From |
c24c322f4535def3f8d1579c39f2f9e323787d15b96e2ee457c38925effe2d39 |
stokeinvestor.com |
Connected_From |
1884ddc53ef66488ca8fc641b438895fcaada77c15210118465377c63223b3bc |
growthincone.com |
Connected_From |
c24c322f4535def3f8d1579c39f2f9e323787d15b96e2ee457c38925effe2d39 |
growthincone.com |
Connected_From |
1884ddc53ef66488ca8fc641b438895fcaada77c15210118465377c63223b3bc |
inverstingpurpose.com |
Connected_From |
c24c322f4535def3f8d1579c39f2f9e323787d15b96e2ee457c38925effe2d39 |
inverstingpurpose.com |
Connected_From |
1884ddc53ef66488ca8fc641b438895fcaada77c15210118465377c63223b3bc |
c24c322f45... |
Connected_To |
stokeinvestor.com |
c24c322f45... |
Connected_To |
growthincone.com |
c24c322f45... |
Connected_To |
inverstingpurpose.com |
Mitigation
Snort rules for this malware family is displayed below:
alert tcp any any -> any 80 (msg:"handshake detected"; content:"*dJU!*JE&!M@UNQ@"; sid:5; rev:1;)
alert tcp any any -> any 80 (msg:"handshake detected"; content:"t34kjfdla45l"; sid:6; rev:1;)
alert tcp any any -> any 80 (msg:"malware traffic detected"; content: "_webident_f"; http_client_body; content: "_webident_s "; http_client_body; sid:33; rev:1;)
alert tcp any any -> any 80 (msg:"malware traffic detected"; content: "_webident_f"; http_client_body; content: "_webident_s"; http_client_body; sid:1; rev:1;)
Recommendations
CISA recommends that users and administrators consider using the following best practices to strengthen the security posture of their organization's systems. Any configuration changes should be reviewed by system owners and administrators prior to implementation to avoid unwanted impacts.
- Maintain up-to-date antivirus signatures and engines.
- Keep operating system patches up-to-date.
- Disable File and Printer sharing services. If these services are required, use strong passwords or Active Directory authentication.
- Restrict users' ability (permissions) to install and run unwanted software applications. Do not add users to the local administrators group unless required.
- Enforce a strong password policy and implement regular password changes.
- Exercise caution when opening e-mail attachments even if the attachment is expected and the sender appears to be known.
- Enable a personal firewall on agency workstations, configured to deny unsolicited connection requests.
- Disable unnecessary services on agency workstations and servers.
- Scan for and remove suspicious e-mail attachments; ensure the scanned attachment is its "true file type" (i.e., the extension matches the file header).
- Monitor users' web browsing habits; restrict access to sites with unfavorable content.
- Exercise caution when using removable media (e.g., USB thumb drives, external drives, CDs, etc.).
- Scan all software downloaded from the Internet prior to executing.
- Maintain situational awareness of the latest threats and implement appropriate Access Control Lists (ACLs).
Additional information on malware incident prevention and handling can be found in National Institute of Standards and Technology (NIST) Special Publication 800-83, "Guide to Malware Incident Prevention & Handling for Desktops and Laptops".
Contact Information
CISA continuously strives to improve its products and services. You can help by answering a very short series of questions about this product at the following URL: https://us-cert.gov/forms/feedback/
Document FAQ
What is a MIFR? A Malware Initial Findings Report (MIFR) is intended to provide organizations with malware analysis in a timely manner. In most instances this report will provide initial indicators for computer and network defense. To request additional analysis, please contact CISA and provide information regarding the level of desired analysis.
What is a MAR? A Malware Analysis Report (MAR) is intended to provide organizations with more detailed malware analysis acquired via manual reverse engineering. To request additional analysis, please contact CISA and provide information regarding the level of desired analysis.
Can I edit this document? This document is not to be edited in any way by recipients. All comments or questions related to this document should be directed to the CISA at 1-888-282-0870 or soc@us-cert.gov.
Can I submit malware to CISA? Malware samples can be submitted via three methods:
CISA encourages you to report any suspicious activity, including cybersecurity incidents, possible malicious code, software vulnerabilities, and phishing-related scams. Reporting forms can be found on CISA's homepage at www.us-cert.gov.
|