stantinko - botconf 2020stantinko a massive adware campaign operating covertly since 2012 ... •...

86
Stantinko A massive adware campaign operating covertly since 2012 Matthieu Faou <[email protected]> @matthieu_faou Frédéric Vachon <[email protected]> @Freddrickk_ Marc-Etienne M.Léveillé <[email protected]> @marc_etienne_

Upload: others

Post on 25-Mar-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

StantinkoA massive adware campaign operating covertly since 2012

Matthieu Faou <[email protected]> @matthieu_faou

Frédéric Vachon <[email protected]> @Freddrickk_

Marc-Etienne M.Léveillé <[email protected]> @marc_etienne_

Page 2: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

Agenda

• Overview of Stantinko• Infection vector

• The core: Stantinko’s persistent services• Anti-analysis and anti-detection techniques• Advertising fraud browser extensions• Plugins: Beyond adware• Stantinko’s Linux malware

2

Page 3: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

How it all started

3

Page 4: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

wsaudio.dll

4

Page 5: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

wsaudio.dllHKLM\SOFTWARE\Classes\<volSN>.FieldListCtrl.1\DefaultIcon -> system32\fdclient.dll

5

Page 6: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

Not bad

6

Page 7: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

Let’s fast forward to the results

7

Page 8: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

Overview of Stantinko’s ecosystem

8

Page 9: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

Victims from sinkhole

9

Page 10: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

Victims using ESET Telemetry

10

Page 11: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

Infection VectorWin32/FileTour

Page 12: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

Win32/FileTour

• Downloader

• MoneyInst and InstallRed PPI platforms

• Targets Russian speakers

12

Page 13: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

Distribution – Fake pirated software

13

Page 14: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

Win32/FileTour

• Signed

• Uploaded on Yandex Disk

• And removed after download

• Packed with VMProtect

14

Page 15: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

15

Page 16: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

Payloads

• Not actual AVI video files

• Encrypted PE files (custom encryption)

• Decryption script in our GitHub

16

Page 17: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

Black box crypto reversing

17

Page 18: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

Payloads

18

Page 19: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

Click fraud malwareWin32/Packed.VMProtect.ABU trojan

19

Page 20: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

AdStantinko – Ultimate Discounter

20

Page 21: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

• Gate to Stantinko

• Windows service

• Setup group id (gid) and user id (uid)

AdStantinko – Ultimate Discounter

21

Page 22: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

Last version: Remote Dictionary Server

22

C2C domain

Page 23: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

Stantinko’s persistent servicesThe core of Stantinko

Page 24: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

Stantinko’s Persistance

2 Windows services

Plugin Downloader Service (PDS)

Browser Extension Downloader Service (BEDS)

Re-install each other

24

Page 25: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

Plugin Downloader Service

2 components :

Loader (DLL)

Encrypted library (DLL)

The encrypted library contains the C&C communication code

25

Page 26: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

26

Page 27: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

PDS’ features

Embeds a PE loader

Update mechanism

Drops the Browser Extension Downloader Service (BEDS)

Very flexible plugin system

27

Page 28: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

PDS’ purposes

Find and compromise CMS websites (WordPress and Joomla)

Remote administration tool

Facebook bot

28

Page 29: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

Browser Extension Downloader Service (BEDS)

2 components

Loader (DLL)

Encrypted code (Windows Registry)

The encrypted code contains the C&C communication code

29

Page 30: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

30

Page 31: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

BEDS’ features

Embeds a PE loader

Update mechanism

Very flexible plugin system

Can reinstall the PDS

31

Page 32: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

BEDS’ purpose

Installs malicious browser extensions

The Safe Surfing

Teddy Protection

32

Page 33: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

Anti-analysis andAnti-detection techniques

Page 34: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

Code encryption

Encrypted malicious code

Unique key per infection (Bot id, Volume SN)

Lots of hashes for the same sample

To perform analysis

Find the dropper

Get a sample + related context34

Page 35: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

Fileless Plugin System

Final payloads never written to disk

Non-persistent payloads

To get the payloads

Code a bot mimicking an infected machine

Monitor infected machines

35

Page 36: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

Hiding in legitimate software

On-disk components are embedded into open source software

From GitHub, SourceForge, etc

LAME, libart, AFNI (Analysis of Functional NeuroImages)

Makes classification more difficult

36

Page 37: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

37

Page 38: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

38

Page 39: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

39

Page 40: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

40

Page 41: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

41

Page 42: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

42

Page 43: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

Obfuscation

Custom obfuscator

Merges multiple functions together

Control flow flattening

To perform analysis

Find non-obfuscated older variant

Dynamic analysis

43

Page 44: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

44

Page 45: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

45

Page 46: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

Ad Fraud browser ExtensionsStantinko’s main usage

Page 47: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

Overview

• Installed by the Browser Extension Downloader Service (BEDS)

• Share a custom encryption algorithm with AdStantinko

2014APIHelper

2015The Safe Surfing

2016Teddy Protection

47

Page 48: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

Ad Fraud

• Inject advertisement in targeted websites

• Redirect the user when a targeted domain is browsed

48

Page 49: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

Redirection Process

49

Click

Page 50: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

Redirection Process

50

Click hijacked

Redirection

The user is finally redirected to the landing page of those who paid GoLinks for the visit.

Page 51: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

Ad injection example

51

Page 52: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

APIHelper

• Browser Helper Object for IE

• NPAPI DLL for other browsers

• npapihelper.dll

• Deprecated since ~2015

52

Page 53: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

Redirection

• Can also inject JavaScript

53

Page 54: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

Configuration Injection of

JavaScript code

We found a google.jsfile

54

Page 55: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

Configuration

Redirection

Hundreds of websites targeted

55

Page 56: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

Brenev GitHub repository

VK scripts

Index: List of C&C servers for the search parser module

56

Page 57: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

The Safe Surfing PPAPI binary

Use Stantinko’sobfuscator

Both legitimate and malicious behavior

57

Page 58: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

Installed from the store

• Block “malicious” domains

58

Page 59: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

59

Page 60: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

Installed by Stantinko Similar to

APIHelperconfiguration

Use the same scripts to block and redirect

60

Page 61: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

Teddy Protection

HTML/JS only.

Similar legit and malicious behavior.

61

Page 62: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

Configuration

• B-List: CRC of blocked domains

• Blist = [265602775, 2250089375, …

• A-List: Custom hash of targeted domains

• Ex: eset.com -> 05F2DEBC7.55D2398E68

62

Page 63: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

A-List: Advertising list? Hash →

domain not possible

Anti-debug in the hash function

63

Page 64: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

Miscellaneous

• If http://127.0.0.1:3306 (mysql) is up, the extension will not redirect the user

• Uninstalls itself when the user browses chrome://extensions

• Google removed the extension from the store

64

Page 65: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

Stantinko’s “plugins”Beyond adware

Page 66: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

66

Page 67: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

Not distributed evenly

67

Page 68: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

“Search parser”

• Perform searches on popular search engines

• Google or Yandex, but only Google is implemented

• Get C&C server URLs from encrypted file on a GitHub repository

• C&C server hosted on compromised server

• Search for websites with known CMS68

Page 69: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

Task example

"search": { "type": "text","system": "google","query": "intext:\"Powered by joomla\"

intext:\"gehrungsschraubstöcke n\""}, "options": {

"sleep_on_ban": { "min": 40, "max": 70 }, "sleep_on_next_page": { "min": 30, "max": 60 }

}

69

Page 70: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

Task result

"search": [

[...],

"http:\/\/www.fcpaok.net\/paok-news\/football-news\/32-superleague\/1466-2015-04-05",

"http:\/\/vounisios.pblogs.gr\/2013\/20130120.html",

"http:\/\/info-gate.gr\/our-partners-2",

[...]

]

70

Page 71: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

/images/banners/b1/index2.php

<?phpfunction CreateTaskObject($task) {

return array('type' => 'text','system' => 'google','query' => "inurl:\"index.php?option=com_content\"

intext:\"{$task}\"");}function CreateOptionsObject() {

return array('sleep_on_ban' => array('min' => 40, 'max' => 70), 'sleep_on_next_page' => array('min' => 30, 'max' => 60));

}

From data.dat

71

Page 72: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

Search task statistics

Number of search results

Duration (hours)

Number of search results per hour

Number of search results per second

878,419 24 36,601 10.17

1,430,208 207 6,909 1.92

1,377,508 87 15,833 4.40

72

Page 73: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

“Brutplugin”

• Bruteforces popular CMS admin page

• Joomla and WordPress

• Receive username and password to test from C&C server

• Hardcoded HTTP user agent

73

Page 74: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

“Brutplugin” task

15 3 300000 10000 |80595494 http://eurograce.com:80/ 2 admin 10085980595494 http://eurograce.com:80/ 2 admin mgomez80595494 http://eurograce.com:80/ 2 admin 2HhF1964586213 http://azov-yaseni.ru:80/ 2 admin DTM199264586213 http://azov-yaseni.ru:80/ 2 admin tomcat0264586213 http://azov-yaseni.ru:80/ 2 admin abel1234[...]

74

Page 75: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

75

Page 76: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

Facebook bot plugin

• Can perform lots of actions specifically on Facebook

• Similar user agent and code ties it to the same malware operators

• Didn’t seem active during our investigation• No commands sent to our infected machines except

“sleep”76

Page 77: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

List of commands

AddFriend AddGroup AddMembersToGroup ApproveEmail Comment

CommentOther DeleteComment DeleteFriend DeleteGroup DeletePost

FindPage GetAllIdFriends GetAllIdGroups GetAllIdMembers GetFriendRequest

InfoPost Like Login Logout Post

ReadMessage Recommendate Registration Repost SetAvatar

SetHeader SetSettings Sleep UnBan UnLike

77

Page 78: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

Zaxar Cleaner

• Zaxar is another adware

• Zaxar is installed by FileTour

• Uses a Kaspersky AVZ Antiviral Toolkit script

• Removes competition :)

78

Page 79: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

“Radmin”

• Full custom remote administration tool

• Share code with the other components too

• Deployed very rarely, only on selected victims

79

Page 80: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

“Radmin” commands

create_dir delete_file do_archive exec find_files

get_drives get_file httpget kill ls

proclist reboot reg rename_file save_file

start_svc stop_svc svclist sysinfo upload_file

80

Page 81: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

Stantinko’s Linux ProxyA multi-platform threat

Page 82: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

Discovery

• Yara on VirusTotal

• Share a C&C server with PDS modules

• Full Joomla dump

• Installed just after a bruteforce attack

• Link with the bruteforce module?

82

Page 83: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

Functionalities

• Machine fingerprint

• SOCKS proxy

• Username: scan4you

83

Page 84: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

Scan4you

VirusTotal for bad guys

Used to test Stantinkosamples?

84

Page 85: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

Conclusion

• Adware doesn’t mean only “ad injection”

• > 500 000 infected machines

• Pretty advanced usage of obfuscation and anti-detection techniques

85

Page 86: Stantinko - Botconf 2020Stantinko A massive adware campaign operating covertly since 2012 ... • Get C&C server URLs from encrypted file on a GitHub repository • C&C server hosted

Teddy Bear Surfing Out of Sight

Released in July 2017

Available on WeLiveSecurity.com

@matthieu_faou

@Freddrickk_

Stantinko whitepaper

86