tonto team: exploring the ttps of an advanced operating a ... · tonto team: exploring the ttps of...

63
Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu), Jaromir Horejsi (@JaromirHorejsi) October 2, 2020, Virus Bulletin

Upload: others

Post on 07-Oct-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

Tonto Team Exploring the TTPs of an advanced threat actor operating a large infrastructureDaniel Lunghi (thehellu) Jaromir Horejsi (JaromirHorejsi)

October 2 2020 Virus Bulletin

copy 2019 Trend Micro Inc2

Outline

bull Introduction and history of the threat actor

bull Infection vectors

bull Custom and shared backdoors

bull Post-exploitation tools

bull Infrastructure targets and further links

bull Conclusion and references

copy 2019 Trend Micro Inc3

Introduction

bull Advanced threat actor likely based in China

bull Known under aliases Earth Akhlut Cactus Pete Lone Ranger Tonto team

bull Operating for more than 10 years

bull Targets multiple government organizations and worldwide companies

copy 2019 Trend Micro Inc4

History

bull 2012 ndash HeartBeat campaign

bull 2017 ndash Operation ORCA (Virus Bulletin)

bull 2018 ndash Operation Bitter Biscuit

bull 2018 ndash Bisonal Malware Used in Attacks Against Russia and South Korea

bull 2020 ndash Bisonal 10 years of play

bull 2020 ndash Earth Akhlut

copy 2019 Trend Micro Inc5

History ndash naming

bull Earth Information

theft espionage

bull Akhlut orca spirithalf wolf half orca

copy 2019 Trend Micro Inc6

Infection vectors

copy 2019 Trend Micro Inc7

Infection vectors

bull Phishing websites

bull Spear-phishing emails with malicious attachments

bull Exploitation of vulnerabilities in security solutions

copy 2019 Trend Micro Inc8

Infection vector ndash phishing websites

bull Phishing domain similar to legitimate domain emailgovmn

copy 2019 Trend Micro Inc9

Infection vector ndash phishing websites

bull For a successful attack the attacker requires strong user interaction

bull User awareness lowers the success rate of this type of attack

bull Phishing websites were blocked once noticed

copy 2019 Trend Micro Inc10

Infection vector ndash spear phishing

bull Malicious attachments

copy 2019 Trend Micro Inc11

Infection vector ndash spear phishing

bull Malicious attachments

copy 2019 Trend Micro Inc12

Infection vector ndash spear phishing

bull Malicious attachments

copy 2019 Trend Micro Inc13

Infection vector ndash spear phishing

bull Job application-themed spear phishing emails

bull RTF files with Microsoft Equation 20 related exploits (CVE-2017-11882 CVE-2018-0802)

bull Royal Road RTF document builder

bull ldquoOLE Package Objectsrdquo with names 8t or wd32PrvSEwmf

bull Custom encryption starting with 0xb07477 or 0xb2a66d

copy 2019 Trend Micro Inc14

Infection vector ndash spear phishing

bull For a successful attack the attacker requires user interaction

bull User awareness lowers the success rate of this type of attack

bull Applying updates prevents code execution in this context

bull Malicious documents and CampC were blocked once noticed

copy 2019 Trend Micro Inc15

Infection vector ndash exploiting vulnerabilities

bull Exploiting vulnerabilities in security solutionrsquos services exposed to Internet

bull CVE-2019-9489 (patched Apr 2019)

bull CVE-2020-8468 (patched Mar 2020)

copy 2019 Trend Micro Inc16

Infection vector ndash exploiting vulnerabilities

bull Exploiting vulnerabilities in security solutionrsquos services exposed to Internet

bull CVE-2019-9489 (patched Apr 2019)

bull CVE-2020-8468 (patched Mar 2020)

copy 2019 Trend Micro Inc17

Infection vector ndash exploiting vulnerabilities

bull Minority of the cases used this infection vectors

bull Both vulnerabilities are required for a successful attack

bull Delivered payload was a dropper for the Shadowpad malware family

copy 2019 Trend Micro Inc18

Infection vector ndash exploiting vulnerabilities

bull For a successful attack the attacker requires

bull A network access to the management server

bull An authentication bypass to such server

bull A vulnerability to execute code from this server

bull All of these conditions can be mitigated by network design and patch management

bull Malicious payloads and CampC were blocked once noticed

copy 2019 Trend Micro Inc19

Backdoors

copy 2019 Trend Micro Inc20

Custom backdoorsBackdoor family name First seen

Heartbeat 2009

Old Bisonal 2011

Chimaera 2012

Dexbia 2014

Bisonal01 2014

Bisonal02 2017

SPM 2018

Typehash 2019

Dumboc 2020

Idles 2020

copy 2019 Trend Micro Inc21

Custom backdoors ndash commands

bull All of them

bull Process enumeration download and file execution interactive shell

bull Most of them

bull File upload and deletion terminate process

bull Some of them

bull OS information collection uninstall wipe

copy 2019 Trend Micro Inc22

Custom backdoors ndash OS info

bull IP address

bull Code page

bull Time (tick count)

bull OS version token information

bull Computer name proxy information

bull Campaign ID presence of VM

copy 2019 Trend Micro Inc23

Custom backdoors ndash CampC encryption

bull No encryption

bull XOR used keys 0x15 0x1d 0x1f

bull RC4 hardcoded password 0x12345678

bull Custom use of atypical constants 0x58BF and 0x3193

copy 2019 Trend Micro Inc24

Custom backdoors ndash dexbia

bull Decryption steps

bull ELDLJFDRILGOEYFZGMCXDIHYGEDKAJIAFTFE

bull sYxef_xdbxaax80x9bxa8KVxcexa0Xtxd0x95x86

bull www[]riss[]ntdll[]net

copy 2019 Trend Micro Inc25

Custom backdoors ndash dexbia

bull Decryption steps

bull ELDLJFDRILGOEYFZGMCXDIHYGEDKAJIAFTFE

bull sYxef_xdbxaax80x9bxa8KVxcexa0Xtxd0x95x86

bull www[]riss[]ntdll[]net

copy 2019 Trend Micro Inc26

Custom backdoors ndash dexbia

bull Second loop with constants 0xCE6D (52845) =-0x3193 and 0x58BF (22719) can be also found in

Adobe Type 1 Font Format Specification

httpswwwadobecomcontentdamacomendevnetfontpdfsT1_SPECpdf

copy 2019 Trend Micro Inc27

Custom backdoors ndash network encryption

bull No encryption

bull Encodingcompress hex zlib base32 base64

bull XOR used keys 0x28 0x3f

bull RC4 hardcoded password 0x12345678

bull zlib + RC4

bull RC4 with 128-byte state vector

copy 2019 Trend Micro Inc28

Custom backdoors ndash network encryption

bull No encryption

bull Encodingcompress hex zlib base32 base64

bull XOR used keys 0x28 0x3f

bull RC4 hardcoded password 0x12345678

bull zlib + RC4

bull RC4 with 128-byte state vector

copy 2019 Trend Micro Inc29

Custom backdoors ndash network traffic

bull Example of Chimaera CampC communication

copy 2019 Trend Micro Inc30

Custom backdoors ndash VM check

bull Most of these families try to detect whether they are running inside a virtual machine

copy 2019 Trend Micro Inc31

Custom backdoors ndash sandbox evasion

bull Time delay

copy 2019 Trend Micro Inc32

Custom backdoors ndash sandbox evasion

bull Likely anti-sandbox trick

bull request for a non-existent website

bull prefix wwwgithub

bull httpswww[]github5o52d[]comDafpost[]asp

bull if this request fails the backdoor code flow continues as expected

copy 2019 Trend Micro Inc33

Custom backdoors - chimaera

bull Named after a caption

found in the control panel

copy 2019 Trend Micro Inc34

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc35

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc36

Custom backdoors - chimaera

bull Code similarity with old bisonal

bull Send machine info

bull Campaign ID

copy 2019 Trend Micro Inc37

Custom backdoors ndash campaign IDs

bull Some of these families have a campaign ID

416-J 0209J 0216jHC 228KJ 3sa new 711 Tranru Test DS MN1223 1228 dis ser mfa820 ser_ru rogx64 m0N~1 word0302 low_mn tnkk solr fvckrus ENERGY

copy 2019 Trend Micro Inc38

Shared backdoor - ShadowPad

bull Backdoor handling multiple plugins

bull Used in advanced supply chain attacks discovered in 2017 and 2018

bull Exclusive to WinntiAPT41 until 2019

copy 2019 Trend Micro Inc39

Shared backdoor - ShadowPad

bull Usually only 5 plugins are embeded

bull ldquoPluginsrdquo ldquoConfigrdquo ldquoInstallrdquo ldquoOnlinerdquo ldquoHTTPrdquo

bull In some cases ldquoTCPrdquo ldquoUDPrdquo

bull Loaded through DLL side-loading vulnerabilities in signed executables

bull Uses anti-disassembly techniques

bull Sometimes packed with VMProtect

copy 2019 Trend Micro Inc40

Shared backdoor - ShadowPad

bull New in 2020 sandbox evasion

bull if the loading DLL is not the expected one the program exits

It evades sandboxes that usually load DLLs with rundll32exe

copy 2019 Trend Micro Inc41

Shared backdoor - ShadowPad

bull Noticeable version tags

copy 2019 Trend Micro Inc42

Post-exploitation tools

copy 2019 Trend Micro Inc43

Post-exploitation tools - public

bull privilege escalation tools

bull CVE-2019-0803 and MS16-032 exploits

bull hash computational tools

bull credential dumpers

bull gsecdump v07

bull wdigest_extract

bull LaZagne

copy 2019 Trend Micro Inc44

Post-exploitation tools - public

bull Network shares enumeration

bull nbtscan 1035

bull Inbtscan (Python version of nbtscan)

bull Keyloggers

bull Keylogger1217

bull Lateral movement

bull Eternal Blue exploits

copy 2019 Trend Micro Inc45

Post-exploitation tools - private

bull Dumps information from the Domain Controller

bull Uses NetworkManagementAPIs

copy 2019 Trend Micro Inc46

Post-exploitation tools ndash hub relaying

Port 3925 Port 5688

CampC server

1 connects 2 sends traffic

3 forwards traffic

copy 2019 Trend Micro Inc47

Post-exploitation tools ndash hub relaying

bull Losing control of CampC does not expose the backend logic

bull CampC is simply a connection information forwarder

copy 2019 Trend Micro Inc48

Infrastructure

copy 2019 Trend Micro Inc49

Infrastructure

bull Multiple ldquoclustersrdquo of domain names

bull Infrastructure overlap

bull Clusters were usually bound to a specific malware family

copy 2019 Trend Micro Inc50

Infrastructure

bull From March to August 2020

bull 49 domains resolving to an IP address

bull Of which 38 dynamic domain names

bull 46 different IP addresses

copy 2019 Trend Micro Inc51

Infrastructure ndash attackerrsquos mistakes

bull Attacker misconfigured some CampC servers

bull We could find some new malware samples and families as well as victims

copy 2019 Trend Micro Inc52

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc53

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc54

Custom backdoors ndash attackerrsquos mistakes

bull Files with list of victims

copy 2019 Trend Micro Inc55

Targets

copy 2019 Trend Micro Inc56

Targets

bull 61 targets in 19 different countries from January to July 2020

bull Taiwan is the most targeted country followed by India and Russia

bull Technology and manufacturing industries were the most targeted followed by education and healthcare

copy 2019 Trend Micro Inc57

Targets ndash industries

Technology213

Manufacturing180

Education164

Healthcare131

Government82

Others230

copy 2019 Trend Micro Inc58

Targets ndash countries

Taiwan213

India131

Russia115

Germany66

Canada66

Australia66

Thailand66

Others277

copy 2019 Trend Micro Inc59

Links to other threat actors

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 2: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc2

Outline

bull Introduction and history of the threat actor

bull Infection vectors

bull Custom and shared backdoors

bull Post-exploitation tools

bull Infrastructure targets and further links

bull Conclusion and references

copy 2019 Trend Micro Inc3

Introduction

bull Advanced threat actor likely based in China

bull Known under aliases Earth Akhlut Cactus Pete Lone Ranger Tonto team

bull Operating for more than 10 years

bull Targets multiple government organizations and worldwide companies

copy 2019 Trend Micro Inc4

History

bull 2012 ndash HeartBeat campaign

bull 2017 ndash Operation ORCA (Virus Bulletin)

bull 2018 ndash Operation Bitter Biscuit

bull 2018 ndash Bisonal Malware Used in Attacks Against Russia and South Korea

bull 2020 ndash Bisonal 10 years of play

bull 2020 ndash Earth Akhlut

copy 2019 Trend Micro Inc5

History ndash naming

bull Earth Information

theft espionage

bull Akhlut orca spirithalf wolf half orca

copy 2019 Trend Micro Inc6

Infection vectors

copy 2019 Trend Micro Inc7

Infection vectors

bull Phishing websites

bull Spear-phishing emails with malicious attachments

bull Exploitation of vulnerabilities in security solutions

copy 2019 Trend Micro Inc8

Infection vector ndash phishing websites

bull Phishing domain similar to legitimate domain emailgovmn

copy 2019 Trend Micro Inc9

Infection vector ndash phishing websites

bull For a successful attack the attacker requires strong user interaction

bull User awareness lowers the success rate of this type of attack

bull Phishing websites were blocked once noticed

copy 2019 Trend Micro Inc10

Infection vector ndash spear phishing

bull Malicious attachments

copy 2019 Trend Micro Inc11

Infection vector ndash spear phishing

bull Malicious attachments

copy 2019 Trend Micro Inc12

Infection vector ndash spear phishing

bull Malicious attachments

copy 2019 Trend Micro Inc13

Infection vector ndash spear phishing

bull Job application-themed spear phishing emails

bull RTF files with Microsoft Equation 20 related exploits (CVE-2017-11882 CVE-2018-0802)

bull Royal Road RTF document builder

bull ldquoOLE Package Objectsrdquo with names 8t or wd32PrvSEwmf

bull Custom encryption starting with 0xb07477 or 0xb2a66d

copy 2019 Trend Micro Inc14

Infection vector ndash spear phishing

bull For a successful attack the attacker requires user interaction

bull User awareness lowers the success rate of this type of attack

bull Applying updates prevents code execution in this context

bull Malicious documents and CampC were blocked once noticed

copy 2019 Trend Micro Inc15

Infection vector ndash exploiting vulnerabilities

bull Exploiting vulnerabilities in security solutionrsquos services exposed to Internet

bull CVE-2019-9489 (patched Apr 2019)

bull CVE-2020-8468 (patched Mar 2020)

copy 2019 Trend Micro Inc16

Infection vector ndash exploiting vulnerabilities

bull Exploiting vulnerabilities in security solutionrsquos services exposed to Internet

bull CVE-2019-9489 (patched Apr 2019)

bull CVE-2020-8468 (patched Mar 2020)

copy 2019 Trend Micro Inc17

Infection vector ndash exploiting vulnerabilities

bull Minority of the cases used this infection vectors

bull Both vulnerabilities are required for a successful attack

bull Delivered payload was a dropper for the Shadowpad malware family

copy 2019 Trend Micro Inc18

Infection vector ndash exploiting vulnerabilities

bull For a successful attack the attacker requires

bull A network access to the management server

bull An authentication bypass to such server

bull A vulnerability to execute code from this server

bull All of these conditions can be mitigated by network design and patch management

bull Malicious payloads and CampC were blocked once noticed

copy 2019 Trend Micro Inc19

Backdoors

copy 2019 Trend Micro Inc20

Custom backdoorsBackdoor family name First seen

Heartbeat 2009

Old Bisonal 2011

Chimaera 2012

Dexbia 2014

Bisonal01 2014

Bisonal02 2017

SPM 2018

Typehash 2019

Dumboc 2020

Idles 2020

copy 2019 Trend Micro Inc21

Custom backdoors ndash commands

bull All of them

bull Process enumeration download and file execution interactive shell

bull Most of them

bull File upload and deletion terminate process

bull Some of them

bull OS information collection uninstall wipe

copy 2019 Trend Micro Inc22

Custom backdoors ndash OS info

bull IP address

bull Code page

bull Time (tick count)

bull OS version token information

bull Computer name proxy information

bull Campaign ID presence of VM

copy 2019 Trend Micro Inc23

Custom backdoors ndash CampC encryption

bull No encryption

bull XOR used keys 0x15 0x1d 0x1f

bull RC4 hardcoded password 0x12345678

bull Custom use of atypical constants 0x58BF and 0x3193

copy 2019 Trend Micro Inc24

Custom backdoors ndash dexbia

bull Decryption steps

bull ELDLJFDRILGOEYFZGMCXDIHYGEDKAJIAFTFE

bull sYxef_xdbxaax80x9bxa8KVxcexa0Xtxd0x95x86

bull www[]riss[]ntdll[]net

copy 2019 Trend Micro Inc25

Custom backdoors ndash dexbia

bull Decryption steps

bull ELDLJFDRILGOEYFZGMCXDIHYGEDKAJIAFTFE

bull sYxef_xdbxaax80x9bxa8KVxcexa0Xtxd0x95x86

bull www[]riss[]ntdll[]net

copy 2019 Trend Micro Inc26

Custom backdoors ndash dexbia

bull Second loop with constants 0xCE6D (52845) =-0x3193 and 0x58BF (22719) can be also found in

Adobe Type 1 Font Format Specification

httpswwwadobecomcontentdamacomendevnetfontpdfsT1_SPECpdf

copy 2019 Trend Micro Inc27

Custom backdoors ndash network encryption

bull No encryption

bull Encodingcompress hex zlib base32 base64

bull XOR used keys 0x28 0x3f

bull RC4 hardcoded password 0x12345678

bull zlib + RC4

bull RC4 with 128-byte state vector

copy 2019 Trend Micro Inc28

Custom backdoors ndash network encryption

bull No encryption

bull Encodingcompress hex zlib base32 base64

bull XOR used keys 0x28 0x3f

bull RC4 hardcoded password 0x12345678

bull zlib + RC4

bull RC4 with 128-byte state vector

copy 2019 Trend Micro Inc29

Custom backdoors ndash network traffic

bull Example of Chimaera CampC communication

copy 2019 Trend Micro Inc30

Custom backdoors ndash VM check

bull Most of these families try to detect whether they are running inside a virtual machine

copy 2019 Trend Micro Inc31

Custom backdoors ndash sandbox evasion

bull Time delay

copy 2019 Trend Micro Inc32

Custom backdoors ndash sandbox evasion

bull Likely anti-sandbox trick

bull request for a non-existent website

bull prefix wwwgithub

bull httpswww[]github5o52d[]comDafpost[]asp

bull if this request fails the backdoor code flow continues as expected

copy 2019 Trend Micro Inc33

Custom backdoors - chimaera

bull Named after a caption

found in the control panel

copy 2019 Trend Micro Inc34

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc35

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc36

Custom backdoors - chimaera

bull Code similarity with old bisonal

bull Send machine info

bull Campaign ID

copy 2019 Trend Micro Inc37

Custom backdoors ndash campaign IDs

bull Some of these families have a campaign ID

416-J 0209J 0216jHC 228KJ 3sa new 711 Tranru Test DS MN1223 1228 dis ser mfa820 ser_ru rogx64 m0N~1 word0302 low_mn tnkk solr fvckrus ENERGY

copy 2019 Trend Micro Inc38

Shared backdoor - ShadowPad

bull Backdoor handling multiple plugins

bull Used in advanced supply chain attacks discovered in 2017 and 2018

bull Exclusive to WinntiAPT41 until 2019

copy 2019 Trend Micro Inc39

Shared backdoor - ShadowPad

bull Usually only 5 plugins are embeded

bull ldquoPluginsrdquo ldquoConfigrdquo ldquoInstallrdquo ldquoOnlinerdquo ldquoHTTPrdquo

bull In some cases ldquoTCPrdquo ldquoUDPrdquo

bull Loaded through DLL side-loading vulnerabilities in signed executables

bull Uses anti-disassembly techniques

bull Sometimes packed with VMProtect

copy 2019 Trend Micro Inc40

Shared backdoor - ShadowPad

bull New in 2020 sandbox evasion

bull if the loading DLL is not the expected one the program exits

It evades sandboxes that usually load DLLs with rundll32exe

copy 2019 Trend Micro Inc41

Shared backdoor - ShadowPad

bull Noticeable version tags

copy 2019 Trend Micro Inc42

Post-exploitation tools

copy 2019 Trend Micro Inc43

Post-exploitation tools - public

bull privilege escalation tools

bull CVE-2019-0803 and MS16-032 exploits

bull hash computational tools

bull credential dumpers

bull gsecdump v07

bull wdigest_extract

bull LaZagne

copy 2019 Trend Micro Inc44

Post-exploitation tools - public

bull Network shares enumeration

bull nbtscan 1035

bull Inbtscan (Python version of nbtscan)

bull Keyloggers

bull Keylogger1217

bull Lateral movement

bull Eternal Blue exploits

copy 2019 Trend Micro Inc45

Post-exploitation tools - private

bull Dumps information from the Domain Controller

bull Uses NetworkManagementAPIs

copy 2019 Trend Micro Inc46

Post-exploitation tools ndash hub relaying

Port 3925 Port 5688

CampC server

1 connects 2 sends traffic

3 forwards traffic

copy 2019 Trend Micro Inc47

Post-exploitation tools ndash hub relaying

bull Losing control of CampC does not expose the backend logic

bull CampC is simply a connection information forwarder

copy 2019 Trend Micro Inc48

Infrastructure

copy 2019 Trend Micro Inc49

Infrastructure

bull Multiple ldquoclustersrdquo of domain names

bull Infrastructure overlap

bull Clusters were usually bound to a specific malware family

copy 2019 Trend Micro Inc50

Infrastructure

bull From March to August 2020

bull 49 domains resolving to an IP address

bull Of which 38 dynamic domain names

bull 46 different IP addresses

copy 2019 Trend Micro Inc51

Infrastructure ndash attackerrsquos mistakes

bull Attacker misconfigured some CampC servers

bull We could find some new malware samples and families as well as victims

copy 2019 Trend Micro Inc52

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc53

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc54

Custom backdoors ndash attackerrsquos mistakes

bull Files with list of victims

copy 2019 Trend Micro Inc55

Targets

copy 2019 Trend Micro Inc56

Targets

bull 61 targets in 19 different countries from January to July 2020

bull Taiwan is the most targeted country followed by India and Russia

bull Technology and manufacturing industries were the most targeted followed by education and healthcare

copy 2019 Trend Micro Inc57

Targets ndash industries

Technology213

Manufacturing180

Education164

Healthcare131

Government82

Others230

copy 2019 Trend Micro Inc58

Targets ndash countries

Taiwan213

India131

Russia115

Germany66

Canada66

Australia66

Thailand66

Others277

copy 2019 Trend Micro Inc59

Links to other threat actors

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 3: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc3

Introduction

bull Advanced threat actor likely based in China

bull Known under aliases Earth Akhlut Cactus Pete Lone Ranger Tonto team

bull Operating for more than 10 years

bull Targets multiple government organizations and worldwide companies

copy 2019 Trend Micro Inc4

History

bull 2012 ndash HeartBeat campaign

bull 2017 ndash Operation ORCA (Virus Bulletin)

bull 2018 ndash Operation Bitter Biscuit

bull 2018 ndash Bisonal Malware Used in Attacks Against Russia and South Korea

bull 2020 ndash Bisonal 10 years of play

bull 2020 ndash Earth Akhlut

copy 2019 Trend Micro Inc5

History ndash naming

bull Earth Information

theft espionage

bull Akhlut orca spirithalf wolf half orca

copy 2019 Trend Micro Inc6

Infection vectors

copy 2019 Trend Micro Inc7

Infection vectors

bull Phishing websites

bull Spear-phishing emails with malicious attachments

bull Exploitation of vulnerabilities in security solutions

copy 2019 Trend Micro Inc8

Infection vector ndash phishing websites

bull Phishing domain similar to legitimate domain emailgovmn

copy 2019 Trend Micro Inc9

Infection vector ndash phishing websites

bull For a successful attack the attacker requires strong user interaction

bull User awareness lowers the success rate of this type of attack

bull Phishing websites were blocked once noticed

copy 2019 Trend Micro Inc10

Infection vector ndash spear phishing

bull Malicious attachments

copy 2019 Trend Micro Inc11

Infection vector ndash spear phishing

bull Malicious attachments

copy 2019 Trend Micro Inc12

Infection vector ndash spear phishing

bull Malicious attachments

copy 2019 Trend Micro Inc13

Infection vector ndash spear phishing

bull Job application-themed spear phishing emails

bull RTF files with Microsoft Equation 20 related exploits (CVE-2017-11882 CVE-2018-0802)

bull Royal Road RTF document builder

bull ldquoOLE Package Objectsrdquo with names 8t or wd32PrvSEwmf

bull Custom encryption starting with 0xb07477 or 0xb2a66d

copy 2019 Trend Micro Inc14

Infection vector ndash spear phishing

bull For a successful attack the attacker requires user interaction

bull User awareness lowers the success rate of this type of attack

bull Applying updates prevents code execution in this context

bull Malicious documents and CampC were blocked once noticed

copy 2019 Trend Micro Inc15

Infection vector ndash exploiting vulnerabilities

bull Exploiting vulnerabilities in security solutionrsquos services exposed to Internet

bull CVE-2019-9489 (patched Apr 2019)

bull CVE-2020-8468 (patched Mar 2020)

copy 2019 Trend Micro Inc16

Infection vector ndash exploiting vulnerabilities

bull Exploiting vulnerabilities in security solutionrsquos services exposed to Internet

bull CVE-2019-9489 (patched Apr 2019)

bull CVE-2020-8468 (patched Mar 2020)

copy 2019 Trend Micro Inc17

Infection vector ndash exploiting vulnerabilities

bull Minority of the cases used this infection vectors

bull Both vulnerabilities are required for a successful attack

bull Delivered payload was a dropper for the Shadowpad malware family

copy 2019 Trend Micro Inc18

Infection vector ndash exploiting vulnerabilities

bull For a successful attack the attacker requires

bull A network access to the management server

bull An authentication bypass to such server

bull A vulnerability to execute code from this server

bull All of these conditions can be mitigated by network design and patch management

bull Malicious payloads and CampC were blocked once noticed

copy 2019 Trend Micro Inc19

Backdoors

copy 2019 Trend Micro Inc20

Custom backdoorsBackdoor family name First seen

Heartbeat 2009

Old Bisonal 2011

Chimaera 2012

Dexbia 2014

Bisonal01 2014

Bisonal02 2017

SPM 2018

Typehash 2019

Dumboc 2020

Idles 2020

copy 2019 Trend Micro Inc21

Custom backdoors ndash commands

bull All of them

bull Process enumeration download and file execution interactive shell

bull Most of them

bull File upload and deletion terminate process

bull Some of them

bull OS information collection uninstall wipe

copy 2019 Trend Micro Inc22

Custom backdoors ndash OS info

bull IP address

bull Code page

bull Time (tick count)

bull OS version token information

bull Computer name proxy information

bull Campaign ID presence of VM

copy 2019 Trend Micro Inc23

Custom backdoors ndash CampC encryption

bull No encryption

bull XOR used keys 0x15 0x1d 0x1f

bull RC4 hardcoded password 0x12345678

bull Custom use of atypical constants 0x58BF and 0x3193

copy 2019 Trend Micro Inc24

Custom backdoors ndash dexbia

bull Decryption steps

bull ELDLJFDRILGOEYFZGMCXDIHYGEDKAJIAFTFE

bull sYxef_xdbxaax80x9bxa8KVxcexa0Xtxd0x95x86

bull www[]riss[]ntdll[]net

copy 2019 Trend Micro Inc25

Custom backdoors ndash dexbia

bull Decryption steps

bull ELDLJFDRILGOEYFZGMCXDIHYGEDKAJIAFTFE

bull sYxef_xdbxaax80x9bxa8KVxcexa0Xtxd0x95x86

bull www[]riss[]ntdll[]net

copy 2019 Trend Micro Inc26

Custom backdoors ndash dexbia

bull Second loop with constants 0xCE6D (52845) =-0x3193 and 0x58BF (22719) can be also found in

Adobe Type 1 Font Format Specification

httpswwwadobecomcontentdamacomendevnetfontpdfsT1_SPECpdf

copy 2019 Trend Micro Inc27

Custom backdoors ndash network encryption

bull No encryption

bull Encodingcompress hex zlib base32 base64

bull XOR used keys 0x28 0x3f

bull RC4 hardcoded password 0x12345678

bull zlib + RC4

bull RC4 with 128-byte state vector

copy 2019 Trend Micro Inc28

Custom backdoors ndash network encryption

bull No encryption

bull Encodingcompress hex zlib base32 base64

bull XOR used keys 0x28 0x3f

bull RC4 hardcoded password 0x12345678

bull zlib + RC4

bull RC4 with 128-byte state vector

copy 2019 Trend Micro Inc29

Custom backdoors ndash network traffic

bull Example of Chimaera CampC communication

copy 2019 Trend Micro Inc30

Custom backdoors ndash VM check

bull Most of these families try to detect whether they are running inside a virtual machine

copy 2019 Trend Micro Inc31

Custom backdoors ndash sandbox evasion

bull Time delay

copy 2019 Trend Micro Inc32

Custom backdoors ndash sandbox evasion

bull Likely anti-sandbox trick

bull request for a non-existent website

bull prefix wwwgithub

bull httpswww[]github5o52d[]comDafpost[]asp

bull if this request fails the backdoor code flow continues as expected

copy 2019 Trend Micro Inc33

Custom backdoors - chimaera

bull Named after a caption

found in the control panel

copy 2019 Trend Micro Inc34

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc35

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc36

Custom backdoors - chimaera

bull Code similarity with old bisonal

bull Send machine info

bull Campaign ID

copy 2019 Trend Micro Inc37

Custom backdoors ndash campaign IDs

bull Some of these families have a campaign ID

416-J 0209J 0216jHC 228KJ 3sa new 711 Tranru Test DS MN1223 1228 dis ser mfa820 ser_ru rogx64 m0N~1 word0302 low_mn tnkk solr fvckrus ENERGY

copy 2019 Trend Micro Inc38

Shared backdoor - ShadowPad

bull Backdoor handling multiple plugins

bull Used in advanced supply chain attacks discovered in 2017 and 2018

bull Exclusive to WinntiAPT41 until 2019

copy 2019 Trend Micro Inc39

Shared backdoor - ShadowPad

bull Usually only 5 plugins are embeded

bull ldquoPluginsrdquo ldquoConfigrdquo ldquoInstallrdquo ldquoOnlinerdquo ldquoHTTPrdquo

bull In some cases ldquoTCPrdquo ldquoUDPrdquo

bull Loaded through DLL side-loading vulnerabilities in signed executables

bull Uses anti-disassembly techniques

bull Sometimes packed with VMProtect

copy 2019 Trend Micro Inc40

Shared backdoor - ShadowPad

bull New in 2020 sandbox evasion

bull if the loading DLL is not the expected one the program exits

It evades sandboxes that usually load DLLs with rundll32exe

copy 2019 Trend Micro Inc41

Shared backdoor - ShadowPad

bull Noticeable version tags

copy 2019 Trend Micro Inc42

Post-exploitation tools

copy 2019 Trend Micro Inc43

Post-exploitation tools - public

bull privilege escalation tools

bull CVE-2019-0803 and MS16-032 exploits

bull hash computational tools

bull credential dumpers

bull gsecdump v07

bull wdigest_extract

bull LaZagne

copy 2019 Trend Micro Inc44

Post-exploitation tools - public

bull Network shares enumeration

bull nbtscan 1035

bull Inbtscan (Python version of nbtscan)

bull Keyloggers

bull Keylogger1217

bull Lateral movement

bull Eternal Blue exploits

copy 2019 Trend Micro Inc45

Post-exploitation tools - private

bull Dumps information from the Domain Controller

bull Uses NetworkManagementAPIs

copy 2019 Trend Micro Inc46

Post-exploitation tools ndash hub relaying

Port 3925 Port 5688

CampC server

1 connects 2 sends traffic

3 forwards traffic

copy 2019 Trend Micro Inc47

Post-exploitation tools ndash hub relaying

bull Losing control of CampC does not expose the backend logic

bull CampC is simply a connection information forwarder

copy 2019 Trend Micro Inc48

Infrastructure

copy 2019 Trend Micro Inc49

Infrastructure

bull Multiple ldquoclustersrdquo of domain names

bull Infrastructure overlap

bull Clusters were usually bound to a specific malware family

copy 2019 Trend Micro Inc50

Infrastructure

bull From March to August 2020

bull 49 domains resolving to an IP address

bull Of which 38 dynamic domain names

bull 46 different IP addresses

copy 2019 Trend Micro Inc51

Infrastructure ndash attackerrsquos mistakes

bull Attacker misconfigured some CampC servers

bull We could find some new malware samples and families as well as victims

copy 2019 Trend Micro Inc52

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc53

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc54

Custom backdoors ndash attackerrsquos mistakes

bull Files with list of victims

copy 2019 Trend Micro Inc55

Targets

copy 2019 Trend Micro Inc56

Targets

bull 61 targets in 19 different countries from January to July 2020

bull Taiwan is the most targeted country followed by India and Russia

bull Technology and manufacturing industries were the most targeted followed by education and healthcare

copy 2019 Trend Micro Inc57

Targets ndash industries

Technology213

Manufacturing180

Education164

Healthcare131

Government82

Others230

copy 2019 Trend Micro Inc58

Targets ndash countries

Taiwan213

India131

Russia115

Germany66

Canada66

Australia66

Thailand66

Others277

copy 2019 Trend Micro Inc59

Links to other threat actors

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 4: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc4

History

bull 2012 ndash HeartBeat campaign

bull 2017 ndash Operation ORCA (Virus Bulletin)

bull 2018 ndash Operation Bitter Biscuit

bull 2018 ndash Bisonal Malware Used in Attacks Against Russia and South Korea

bull 2020 ndash Bisonal 10 years of play

bull 2020 ndash Earth Akhlut

copy 2019 Trend Micro Inc5

History ndash naming

bull Earth Information

theft espionage

bull Akhlut orca spirithalf wolf half orca

copy 2019 Trend Micro Inc6

Infection vectors

copy 2019 Trend Micro Inc7

Infection vectors

bull Phishing websites

bull Spear-phishing emails with malicious attachments

bull Exploitation of vulnerabilities in security solutions

copy 2019 Trend Micro Inc8

Infection vector ndash phishing websites

bull Phishing domain similar to legitimate domain emailgovmn

copy 2019 Trend Micro Inc9

Infection vector ndash phishing websites

bull For a successful attack the attacker requires strong user interaction

bull User awareness lowers the success rate of this type of attack

bull Phishing websites were blocked once noticed

copy 2019 Trend Micro Inc10

Infection vector ndash spear phishing

bull Malicious attachments

copy 2019 Trend Micro Inc11

Infection vector ndash spear phishing

bull Malicious attachments

copy 2019 Trend Micro Inc12

Infection vector ndash spear phishing

bull Malicious attachments

copy 2019 Trend Micro Inc13

Infection vector ndash spear phishing

bull Job application-themed spear phishing emails

bull RTF files with Microsoft Equation 20 related exploits (CVE-2017-11882 CVE-2018-0802)

bull Royal Road RTF document builder

bull ldquoOLE Package Objectsrdquo with names 8t or wd32PrvSEwmf

bull Custom encryption starting with 0xb07477 or 0xb2a66d

copy 2019 Trend Micro Inc14

Infection vector ndash spear phishing

bull For a successful attack the attacker requires user interaction

bull User awareness lowers the success rate of this type of attack

bull Applying updates prevents code execution in this context

bull Malicious documents and CampC were blocked once noticed

copy 2019 Trend Micro Inc15

Infection vector ndash exploiting vulnerabilities

bull Exploiting vulnerabilities in security solutionrsquos services exposed to Internet

bull CVE-2019-9489 (patched Apr 2019)

bull CVE-2020-8468 (patched Mar 2020)

copy 2019 Trend Micro Inc16

Infection vector ndash exploiting vulnerabilities

bull Exploiting vulnerabilities in security solutionrsquos services exposed to Internet

bull CVE-2019-9489 (patched Apr 2019)

bull CVE-2020-8468 (patched Mar 2020)

copy 2019 Trend Micro Inc17

Infection vector ndash exploiting vulnerabilities

bull Minority of the cases used this infection vectors

bull Both vulnerabilities are required for a successful attack

bull Delivered payload was a dropper for the Shadowpad malware family

copy 2019 Trend Micro Inc18

Infection vector ndash exploiting vulnerabilities

bull For a successful attack the attacker requires

bull A network access to the management server

bull An authentication bypass to such server

bull A vulnerability to execute code from this server

bull All of these conditions can be mitigated by network design and patch management

bull Malicious payloads and CampC were blocked once noticed

copy 2019 Trend Micro Inc19

Backdoors

copy 2019 Trend Micro Inc20

Custom backdoorsBackdoor family name First seen

Heartbeat 2009

Old Bisonal 2011

Chimaera 2012

Dexbia 2014

Bisonal01 2014

Bisonal02 2017

SPM 2018

Typehash 2019

Dumboc 2020

Idles 2020

copy 2019 Trend Micro Inc21

Custom backdoors ndash commands

bull All of them

bull Process enumeration download and file execution interactive shell

bull Most of them

bull File upload and deletion terminate process

bull Some of them

bull OS information collection uninstall wipe

copy 2019 Trend Micro Inc22

Custom backdoors ndash OS info

bull IP address

bull Code page

bull Time (tick count)

bull OS version token information

bull Computer name proxy information

bull Campaign ID presence of VM

copy 2019 Trend Micro Inc23

Custom backdoors ndash CampC encryption

bull No encryption

bull XOR used keys 0x15 0x1d 0x1f

bull RC4 hardcoded password 0x12345678

bull Custom use of atypical constants 0x58BF and 0x3193

copy 2019 Trend Micro Inc24

Custom backdoors ndash dexbia

bull Decryption steps

bull ELDLJFDRILGOEYFZGMCXDIHYGEDKAJIAFTFE

bull sYxef_xdbxaax80x9bxa8KVxcexa0Xtxd0x95x86

bull www[]riss[]ntdll[]net

copy 2019 Trend Micro Inc25

Custom backdoors ndash dexbia

bull Decryption steps

bull ELDLJFDRILGOEYFZGMCXDIHYGEDKAJIAFTFE

bull sYxef_xdbxaax80x9bxa8KVxcexa0Xtxd0x95x86

bull www[]riss[]ntdll[]net

copy 2019 Trend Micro Inc26

Custom backdoors ndash dexbia

bull Second loop with constants 0xCE6D (52845) =-0x3193 and 0x58BF (22719) can be also found in

Adobe Type 1 Font Format Specification

httpswwwadobecomcontentdamacomendevnetfontpdfsT1_SPECpdf

copy 2019 Trend Micro Inc27

Custom backdoors ndash network encryption

bull No encryption

bull Encodingcompress hex zlib base32 base64

bull XOR used keys 0x28 0x3f

bull RC4 hardcoded password 0x12345678

bull zlib + RC4

bull RC4 with 128-byte state vector

copy 2019 Trend Micro Inc28

Custom backdoors ndash network encryption

bull No encryption

bull Encodingcompress hex zlib base32 base64

bull XOR used keys 0x28 0x3f

bull RC4 hardcoded password 0x12345678

bull zlib + RC4

bull RC4 with 128-byte state vector

copy 2019 Trend Micro Inc29

Custom backdoors ndash network traffic

bull Example of Chimaera CampC communication

copy 2019 Trend Micro Inc30

Custom backdoors ndash VM check

bull Most of these families try to detect whether they are running inside a virtual machine

copy 2019 Trend Micro Inc31

Custom backdoors ndash sandbox evasion

bull Time delay

copy 2019 Trend Micro Inc32

Custom backdoors ndash sandbox evasion

bull Likely anti-sandbox trick

bull request for a non-existent website

bull prefix wwwgithub

bull httpswww[]github5o52d[]comDafpost[]asp

bull if this request fails the backdoor code flow continues as expected

copy 2019 Trend Micro Inc33

Custom backdoors - chimaera

bull Named after a caption

found in the control panel

copy 2019 Trend Micro Inc34

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc35

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc36

Custom backdoors - chimaera

bull Code similarity with old bisonal

bull Send machine info

bull Campaign ID

copy 2019 Trend Micro Inc37

Custom backdoors ndash campaign IDs

bull Some of these families have a campaign ID

416-J 0209J 0216jHC 228KJ 3sa new 711 Tranru Test DS MN1223 1228 dis ser mfa820 ser_ru rogx64 m0N~1 word0302 low_mn tnkk solr fvckrus ENERGY

copy 2019 Trend Micro Inc38

Shared backdoor - ShadowPad

bull Backdoor handling multiple plugins

bull Used in advanced supply chain attacks discovered in 2017 and 2018

bull Exclusive to WinntiAPT41 until 2019

copy 2019 Trend Micro Inc39

Shared backdoor - ShadowPad

bull Usually only 5 plugins are embeded

bull ldquoPluginsrdquo ldquoConfigrdquo ldquoInstallrdquo ldquoOnlinerdquo ldquoHTTPrdquo

bull In some cases ldquoTCPrdquo ldquoUDPrdquo

bull Loaded through DLL side-loading vulnerabilities in signed executables

bull Uses anti-disassembly techniques

bull Sometimes packed with VMProtect

copy 2019 Trend Micro Inc40

Shared backdoor - ShadowPad

bull New in 2020 sandbox evasion

bull if the loading DLL is not the expected one the program exits

It evades sandboxes that usually load DLLs with rundll32exe

copy 2019 Trend Micro Inc41

Shared backdoor - ShadowPad

bull Noticeable version tags

copy 2019 Trend Micro Inc42

Post-exploitation tools

copy 2019 Trend Micro Inc43

Post-exploitation tools - public

bull privilege escalation tools

bull CVE-2019-0803 and MS16-032 exploits

bull hash computational tools

bull credential dumpers

bull gsecdump v07

bull wdigest_extract

bull LaZagne

copy 2019 Trend Micro Inc44

Post-exploitation tools - public

bull Network shares enumeration

bull nbtscan 1035

bull Inbtscan (Python version of nbtscan)

bull Keyloggers

bull Keylogger1217

bull Lateral movement

bull Eternal Blue exploits

copy 2019 Trend Micro Inc45

Post-exploitation tools - private

bull Dumps information from the Domain Controller

bull Uses NetworkManagementAPIs

copy 2019 Trend Micro Inc46

Post-exploitation tools ndash hub relaying

Port 3925 Port 5688

CampC server

1 connects 2 sends traffic

3 forwards traffic

copy 2019 Trend Micro Inc47

Post-exploitation tools ndash hub relaying

bull Losing control of CampC does not expose the backend logic

bull CampC is simply a connection information forwarder

copy 2019 Trend Micro Inc48

Infrastructure

copy 2019 Trend Micro Inc49

Infrastructure

bull Multiple ldquoclustersrdquo of domain names

bull Infrastructure overlap

bull Clusters were usually bound to a specific malware family

copy 2019 Trend Micro Inc50

Infrastructure

bull From March to August 2020

bull 49 domains resolving to an IP address

bull Of which 38 dynamic domain names

bull 46 different IP addresses

copy 2019 Trend Micro Inc51

Infrastructure ndash attackerrsquos mistakes

bull Attacker misconfigured some CampC servers

bull We could find some new malware samples and families as well as victims

copy 2019 Trend Micro Inc52

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc53

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc54

Custom backdoors ndash attackerrsquos mistakes

bull Files with list of victims

copy 2019 Trend Micro Inc55

Targets

copy 2019 Trend Micro Inc56

Targets

bull 61 targets in 19 different countries from January to July 2020

bull Taiwan is the most targeted country followed by India and Russia

bull Technology and manufacturing industries were the most targeted followed by education and healthcare

copy 2019 Trend Micro Inc57

Targets ndash industries

Technology213

Manufacturing180

Education164

Healthcare131

Government82

Others230

copy 2019 Trend Micro Inc58

Targets ndash countries

Taiwan213

India131

Russia115

Germany66

Canada66

Australia66

Thailand66

Others277

copy 2019 Trend Micro Inc59

Links to other threat actors

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 5: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc5

History ndash naming

bull Earth Information

theft espionage

bull Akhlut orca spirithalf wolf half orca

copy 2019 Trend Micro Inc6

Infection vectors

copy 2019 Trend Micro Inc7

Infection vectors

bull Phishing websites

bull Spear-phishing emails with malicious attachments

bull Exploitation of vulnerabilities in security solutions

copy 2019 Trend Micro Inc8

Infection vector ndash phishing websites

bull Phishing domain similar to legitimate domain emailgovmn

copy 2019 Trend Micro Inc9

Infection vector ndash phishing websites

bull For a successful attack the attacker requires strong user interaction

bull User awareness lowers the success rate of this type of attack

bull Phishing websites were blocked once noticed

copy 2019 Trend Micro Inc10

Infection vector ndash spear phishing

bull Malicious attachments

copy 2019 Trend Micro Inc11

Infection vector ndash spear phishing

bull Malicious attachments

copy 2019 Trend Micro Inc12

Infection vector ndash spear phishing

bull Malicious attachments

copy 2019 Trend Micro Inc13

Infection vector ndash spear phishing

bull Job application-themed spear phishing emails

bull RTF files with Microsoft Equation 20 related exploits (CVE-2017-11882 CVE-2018-0802)

bull Royal Road RTF document builder

bull ldquoOLE Package Objectsrdquo with names 8t or wd32PrvSEwmf

bull Custom encryption starting with 0xb07477 or 0xb2a66d

copy 2019 Trend Micro Inc14

Infection vector ndash spear phishing

bull For a successful attack the attacker requires user interaction

bull User awareness lowers the success rate of this type of attack

bull Applying updates prevents code execution in this context

bull Malicious documents and CampC were blocked once noticed

copy 2019 Trend Micro Inc15

Infection vector ndash exploiting vulnerabilities

bull Exploiting vulnerabilities in security solutionrsquos services exposed to Internet

bull CVE-2019-9489 (patched Apr 2019)

bull CVE-2020-8468 (patched Mar 2020)

copy 2019 Trend Micro Inc16

Infection vector ndash exploiting vulnerabilities

bull Exploiting vulnerabilities in security solutionrsquos services exposed to Internet

bull CVE-2019-9489 (patched Apr 2019)

bull CVE-2020-8468 (patched Mar 2020)

copy 2019 Trend Micro Inc17

Infection vector ndash exploiting vulnerabilities

bull Minority of the cases used this infection vectors

bull Both vulnerabilities are required for a successful attack

bull Delivered payload was a dropper for the Shadowpad malware family

copy 2019 Trend Micro Inc18

Infection vector ndash exploiting vulnerabilities

bull For a successful attack the attacker requires

bull A network access to the management server

bull An authentication bypass to such server

bull A vulnerability to execute code from this server

bull All of these conditions can be mitigated by network design and patch management

bull Malicious payloads and CampC were blocked once noticed

copy 2019 Trend Micro Inc19

Backdoors

copy 2019 Trend Micro Inc20

Custom backdoorsBackdoor family name First seen

Heartbeat 2009

Old Bisonal 2011

Chimaera 2012

Dexbia 2014

Bisonal01 2014

Bisonal02 2017

SPM 2018

Typehash 2019

Dumboc 2020

Idles 2020

copy 2019 Trend Micro Inc21

Custom backdoors ndash commands

bull All of them

bull Process enumeration download and file execution interactive shell

bull Most of them

bull File upload and deletion terminate process

bull Some of them

bull OS information collection uninstall wipe

copy 2019 Trend Micro Inc22

Custom backdoors ndash OS info

bull IP address

bull Code page

bull Time (tick count)

bull OS version token information

bull Computer name proxy information

bull Campaign ID presence of VM

copy 2019 Trend Micro Inc23

Custom backdoors ndash CampC encryption

bull No encryption

bull XOR used keys 0x15 0x1d 0x1f

bull RC4 hardcoded password 0x12345678

bull Custom use of atypical constants 0x58BF and 0x3193

copy 2019 Trend Micro Inc24

Custom backdoors ndash dexbia

bull Decryption steps

bull ELDLJFDRILGOEYFZGMCXDIHYGEDKAJIAFTFE

bull sYxef_xdbxaax80x9bxa8KVxcexa0Xtxd0x95x86

bull www[]riss[]ntdll[]net

copy 2019 Trend Micro Inc25

Custom backdoors ndash dexbia

bull Decryption steps

bull ELDLJFDRILGOEYFZGMCXDIHYGEDKAJIAFTFE

bull sYxef_xdbxaax80x9bxa8KVxcexa0Xtxd0x95x86

bull www[]riss[]ntdll[]net

copy 2019 Trend Micro Inc26

Custom backdoors ndash dexbia

bull Second loop with constants 0xCE6D (52845) =-0x3193 and 0x58BF (22719) can be also found in

Adobe Type 1 Font Format Specification

httpswwwadobecomcontentdamacomendevnetfontpdfsT1_SPECpdf

copy 2019 Trend Micro Inc27

Custom backdoors ndash network encryption

bull No encryption

bull Encodingcompress hex zlib base32 base64

bull XOR used keys 0x28 0x3f

bull RC4 hardcoded password 0x12345678

bull zlib + RC4

bull RC4 with 128-byte state vector

copy 2019 Trend Micro Inc28

Custom backdoors ndash network encryption

bull No encryption

bull Encodingcompress hex zlib base32 base64

bull XOR used keys 0x28 0x3f

bull RC4 hardcoded password 0x12345678

bull zlib + RC4

bull RC4 with 128-byte state vector

copy 2019 Trend Micro Inc29

Custom backdoors ndash network traffic

bull Example of Chimaera CampC communication

copy 2019 Trend Micro Inc30

Custom backdoors ndash VM check

bull Most of these families try to detect whether they are running inside a virtual machine

copy 2019 Trend Micro Inc31

Custom backdoors ndash sandbox evasion

bull Time delay

copy 2019 Trend Micro Inc32

Custom backdoors ndash sandbox evasion

bull Likely anti-sandbox trick

bull request for a non-existent website

bull prefix wwwgithub

bull httpswww[]github5o52d[]comDafpost[]asp

bull if this request fails the backdoor code flow continues as expected

copy 2019 Trend Micro Inc33

Custom backdoors - chimaera

bull Named after a caption

found in the control panel

copy 2019 Trend Micro Inc34

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc35

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc36

Custom backdoors - chimaera

bull Code similarity with old bisonal

bull Send machine info

bull Campaign ID

copy 2019 Trend Micro Inc37

Custom backdoors ndash campaign IDs

bull Some of these families have a campaign ID

416-J 0209J 0216jHC 228KJ 3sa new 711 Tranru Test DS MN1223 1228 dis ser mfa820 ser_ru rogx64 m0N~1 word0302 low_mn tnkk solr fvckrus ENERGY

copy 2019 Trend Micro Inc38

Shared backdoor - ShadowPad

bull Backdoor handling multiple plugins

bull Used in advanced supply chain attacks discovered in 2017 and 2018

bull Exclusive to WinntiAPT41 until 2019

copy 2019 Trend Micro Inc39

Shared backdoor - ShadowPad

bull Usually only 5 plugins are embeded

bull ldquoPluginsrdquo ldquoConfigrdquo ldquoInstallrdquo ldquoOnlinerdquo ldquoHTTPrdquo

bull In some cases ldquoTCPrdquo ldquoUDPrdquo

bull Loaded through DLL side-loading vulnerabilities in signed executables

bull Uses anti-disassembly techniques

bull Sometimes packed with VMProtect

copy 2019 Trend Micro Inc40

Shared backdoor - ShadowPad

bull New in 2020 sandbox evasion

bull if the loading DLL is not the expected one the program exits

It evades sandboxes that usually load DLLs with rundll32exe

copy 2019 Trend Micro Inc41

Shared backdoor - ShadowPad

bull Noticeable version tags

copy 2019 Trend Micro Inc42

Post-exploitation tools

copy 2019 Trend Micro Inc43

Post-exploitation tools - public

bull privilege escalation tools

bull CVE-2019-0803 and MS16-032 exploits

bull hash computational tools

bull credential dumpers

bull gsecdump v07

bull wdigest_extract

bull LaZagne

copy 2019 Trend Micro Inc44

Post-exploitation tools - public

bull Network shares enumeration

bull nbtscan 1035

bull Inbtscan (Python version of nbtscan)

bull Keyloggers

bull Keylogger1217

bull Lateral movement

bull Eternal Blue exploits

copy 2019 Trend Micro Inc45

Post-exploitation tools - private

bull Dumps information from the Domain Controller

bull Uses NetworkManagementAPIs

copy 2019 Trend Micro Inc46

Post-exploitation tools ndash hub relaying

Port 3925 Port 5688

CampC server

1 connects 2 sends traffic

3 forwards traffic

copy 2019 Trend Micro Inc47

Post-exploitation tools ndash hub relaying

bull Losing control of CampC does not expose the backend logic

bull CampC is simply a connection information forwarder

copy 2019 Trend Micro Inc48

Infrastructure

copy 2019 Trend Micro Inc49

Infrastructure

bull Multiple ldquoclustersrdquo of domain names

bull Infrastructure overlap

bull Clusters were usually bound to a specific malware family

copy 2019 Trend Micro Inc50

Infrastructure

bull From March to August 2020

bull 49 domains resolving to an IP address

bull Of which 38 dynamic domain names

bull 46 different IP addresses

copy 2019 Trend Micro Inc51

Infrastructure ndash attackerrsquos mistakes

bull Attacker misconfigured some CampC servers

bull We could find some new malware samples and families as well as victims

copy 2019 Trend Micro Inc52

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc53

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc54

Custom backdoors ndash attackerrsquos mistakes

bull Files with list of victims

copy 2019 Trend Micro Inc55

Targets

copy 2019 Trend Micro Inc56

Targets

bull 61 targets in 19 different countries from January to July 2020

bull Taiwan is the most targeted country followed by India and Russia

bull Technology and manufacturing industries were the most targeted followed by education and healthcare

copy 2019 Trend Micro Inc57

Targets ndash industries

Technology213

Manufacturing180

Education164

Healthcare131

Government82

Others230

copy 2019 Trend Micro Inc58

Targets ndash countries

Taiwan213

India131

Russia115

Germany66

Canada66

Australia66

Thailand66

Others277

copy 2019 Trend Micro Inc59

Links to other threat actors

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 6: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc6

Infection vectors

copy 2019 Trend Micro Inc7

Infection vectors

bull Phishing websites

bull Spear-phishing emails with malicious attachments

bull Exploitation of vulnerabilities in security solutions

copy 2019 Trend Micro Inc8

Infection vector ndash phishing websites

bull Phishing domain similar to legitimate domain emailgovmn

copy 2019 Trend Micro Inc9

Infection vector ndash phishing websites

bull For a successful attack the attacker requires strong user interaction

bull User awareness lowers the success rate of this type of attack

bull Phishing websites were blocked once noticed

copy 2019 Trend Micro Inc10

Infection vector ndash spear phishing

bull Malicious attachments

copy 2019 Trend Micro Inc11

Infection vector ndash spear phishing

bull Malicious attachments

copy 2019 Trend Micro Inc12

Infection vector ndash spear phishing

bull Malicious attachments

copy 2019 Trend Micro Inc13

Infection vector ndash spear phishing

bull Job application-themed spear phishing emails

bull RTF files with Microsoft Equation 20 related exploits (CVE-2017-11882 CVE-2018-0802)

bull Royal Road RTF document builder

bull ldquoOLE Package Objectsrdquo with names 8t or wd32PrvSEwmf

bull Custom encryption starting with 0xb07477 or 0xb2a66d

copy 2019 Trend Micro Inc14

Infection vector ndash spear phishing

bull For a successful attack the attacker requires user interaction

bull User awareness lowers the success rate of this type of attack

bull Applying updates prevents code execution in this context

bull Malicious documents and CampC were blocked once noticed

copy 2019 Trend Micro Inc15

Infection vector ndash exploiting vulnerabilities

bull Exploiting vulnerabilities in security solutionrsquos services exposed to Internet

bull CVE-2019-9489 (patched Apr 2019)

bull CVE-2020-8468 (patched Mar 2020)

copy 2019 Trend Micro Inc16

Infection vector ndash exploiting vulnerabilities

bull Exploiting vulnerabilities in security solutionrsquos services exposed to Internet

bull CVE-2019-9489 (patched Apr 2019)

bull CVE-2020-8468 (patched Mar 2020)

copy 2019 Trend Micro Inc17

Infection vector ndash exploiting vulnerabilities

bull Minority of the cases used this infection vectors

bull Both vulnerabilities are required for a successful attack

bull Delivered payload was a dropper for the Shadowpad malware family

copy 2019 Trend Micro Inc18

Infection vector ndash exploiting vulnerabilities

bull For a successful attack the attacker requires

bull A network access to the management server

bull An authentication bypass to such server

bull A vulnerability to execute code from this server

bull All of these conditions can be mitigated by network design and patch management

bull Malicious payloads and CampC were blocked once noticed

copy 2019 Trend Micro Inc19

Backdoors

copy 2019 Trend Micro Inc20

Custom backdoorsBackdoor family name First seen

Heartbeat 2009

Old Bisonal 2011

Chimaera 2012

Dexbia 2014

Bisonal01 2014

Bisonal02 2017

SPM 2018

Typehash 2019

Dumboc 2020

Idles 2020

copy 2019 Trend Micro Inc21

Custom backdoors ndash commands

bull All of them

bull Process enumeration download and file execution interactive shell

bull Most of them

bull File upload and deletion terminate process

bull Some of them

bull OS information collection uninstall wipe

copy 2019 Trend Micro Inc22

Custom backdoors ndash OS info

bull IP address

bull Code page

bull Time (tick count)

bull OS version token information

bull Computer name proxy information

bull Campaign ID presence of VM

copy 2019 Trend Micro Inc23

Custom backdoors ndash CampC encryption

bull No encryption

bull XOR used keys 0x15 0x1d 0x1f

bull RC4 hardcoded password 0x12345678

bull Custom use of atypical constants 0x58BF and 0x3193

copy 2019 Trend Micro Inc24

Custom backdoors ndash dexbia

bull Decryption steps

bull ELDLJFDRILGOEYFZGMCXDIHYGEDKAJIAFTFE

bull sYxef_xdbxaax80x9bxa8KVxcexa0Xtxd0x95x86

bull www[]riss[]ntdll[]net

copy 2019 Trend Micro Inc25

Custom backdoors ndash dexbia

bull Decryption steps

bull ELDLJFDRILGOEYFZGMCXDIHYGEDKAJIAFTFE

bull sYxef_xdbxaax80x9bxa8KVxcexa0Xtxd0x95x86

bull www[]riss[]ntdll[]net

copy 2019 Trend Micro Inc26

Custom backdoors ndash dexbia

bull Second loop with constants 0xCE6D (52845) =-0x3193 and 0x58BF (22719) can be also found in

Adobe Type 1 Font Format Specification

httpswwwadobecomcontentdamacomendevnetfontpdfsT1_SPECpdf

copy 2019 Trend Micro Inc27

Custom backdoors ndash network encryption

bull No encryption

bull Encodingcompress hex zlib base32 base64

bull XOR used keys 0x28 0x3f

bull RC4 hardcoded password 0x12345678

bull zlib + RC4

bull RC4 with 128-byte state vector

copy 2019 Trend Micro Inc28

Custom backdoors ndash network encryption

bull No encryption

bull Encodingcompress hex zlib base32 base64

bull XOR used keys 0x28 0x3f

bull RC4 hardcoded password 0x12345678

bull zlib + RC4

bull RC4 with 128-byte state vector

copy 2019 Trend Micro Inc29

Custom backdoors ndash network traffic

bull Example of Chimaera CampC communication

copy 2019 Trend Micro Inc30

Custom backdoors ndash VM check

bull Most of these families try to detect whether they are running inside a virtual machine

copy 2019 Trend Micro Inc31

Custom backdoors ndash sandbox evasion

bull Time delay

copy 2019 Trend Micro Inc32

Custom backdoors ndash sandbox evasion

bull Likely anti-sandbox trick

bull request for a non-existent website

bull prefix wwwgithub

bull httpswww[]github5o52d[]comDafpost[]asp

bull if this request fails the backdoor code flow continues as expected

copy 2019 Trend Micro Inc33

Custom backdoors - chimaera

bull Named after a caption

found in the control panel

copy 2019 Trend Micro Inc34

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc35

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc36

Custom backdoors - chimaera

bull Code similarity with old bisonal

bull Send machine info

bull Campaign ID

copy 2019 Trend Micro Inc37

Custom backdoors ndash campaign IDs

bull Some of these families have a campaign ID

416-J 0209J 0216jHC 228KJ 3sa new 711 Tranru Test DS MN1223 1228 dis ser mfa820 ser_ru rogx64 m0N~1 word0302 low_mn tnkk solr fvckrus ENERGY

copy 2019 Trend Micro Inc38

Shared backdoor - ShadowPad

bull Backdoor handling multiple plugins

bull Used in advanced supply chain attacks discovered in 2017 and 2018

bull Exclusive to WinntiAPT41 until 2019

copy 2019 Trend Micro Inc39

Shared backdoor - ShadowPad

bull Usually only 5 plugins are embeded

bull ldquoPluginsrdquo ldquoConfigrdquo ldquoInstallrdquo ldquoOnlinerdquo ldquoHTTPrdquo

bull In some cases ldquoTCPrdquo ldquoUDPrdquo

bull Loaded through DLL side-loading vulnerabilities in signed executables

bull Uses anti-disassembly techniques

bull Sometimes packed with VMProtect

copy 2019 Trend Micro Inc40

Shared backdoor - ShadowPad

bull New in 2020 sandbox evasion

bull if the loading DLL is not the expected one the program exits

It evades sandboxes that usually load DLLs with rundll32exe

copy 2019 Trend Micro Inc41

Shared backdoor - ShadowPad

bull Noticeable version tags

copy 2019 Trend Micro Inc42

Post-exploitation tools

copy 2019 Trend Micro Inc43

Post-exploitation tools - public

bull privilege escalation tools

bull CVE-2019-0803 and MS16-032 exploits

bull hash computational tools

bull credential dumpers

bull gsecdump v07

bull wdigest_extract

bull LaZagne

copy 2019 Trend Micro Inc44

Post-exploitation tools - public

bull Network shares enumeration

bull nbtscan 1035

bull Inbtscan (Python version of nbtscan)

bull Keyloggers

bull Keylogger1217

bull Lateral movement

bull Eternal Blue exploits

copy 2019 Trend Micro Inc45

Post-exploitation tools - private

bull Dumps information from the Domain Controller

bull Uses NetworkManagementAPIs

copy 2019 Trend Micro Inc46

Post-exploitation tools ndash hub relaying

Port 3925 Port 5688

CampC server

1 connects 2 sends traffic

3 forwards traffic

copy 2019 Trend Micro Inc47

Post-exploitation tools ndash hub relaying

bull Losing control of CampC does not expose the backend logic

bull CampC is simply a connection information forwarder

copy 2019 Trend Micro Inc48

Infrastructure

copy 2019 Trend Micro Inc49

Infrastructure

bull Multiple ldquoclustersrdquo of domain names

bull Infrastructure overlap

bull Clusters were usually bound to a specific malware family

copy 2019 Trend Micro Inc50

Infrastructure

bull From March to August 2020

bull 49 domains resolving to an IP address

bull Of which 38 dynamic domain names

bull 46 different IP addresses

copy 2019 Trend Micro Inc51

Infrastructure ndash attackerrsquos mistakes

bull Attacker misconfigured some CampC servers

bull We could find some new malware samples and families as well as victims

copy 2019 Trend Micro Inc52

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc53

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc54

Custom backdoors ndash attackerrsquos mistakes

bull Files with list of victims

copy 2019 Trend Micro Inc55

Targets

copy 2019 Trend Micro Inc56

Targets

bull 61 targets in 19 different countries from January to July 2020

bull Taiwan is the most targeted country followed by India and Russia

bull Technology and manufacturing industries were the most targeted followed by education and healthcare

copy 2019 Trend Micro Inc57

Targets ndash industries

Technology213

Manufacturing180

Education164

Healthcare131

Government82

Others230

copy 2019 Trend Micro Inc58

Targets ndash countries

Taiwan213

India131

Russia115

Germany66

Canada66

Australia66

Thailand66

Others277

copy 2019 Trend Micro Inc59

Links to other threat actors

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 7: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc7

Infection vectors

bull Phishing websites

bull Spear-phishing emails with malicious attachments

bull Exploitation of vulnerabilities in security solutions

copy 2019 Trend Micro Inc8

Infection vector ndash phishing websites

bull Phishing domain similar to legitimate domain emailgovmn

copy 2019 Trend Micro Inc9

Infection vector ndash phishing websites

bull For a successful attack the attacker requires strong user interaction

bull User awareness lowers the success rate of this type of attack

bull Phishing websites were blocked once noticed

copy 2019 Trend Micro Inc10

Infection vector ndash spear phishing

bull Malicious attachments

copy 2019 Trend Micro Inc11

Infection vector ndash spear phishing

bull Malicious attachments

copy 2019 Trend Micro Inc12

Infection vector ndash spear phishing

bull Malicious attachments

copy 2019 Trend Micro Inc13

Infection vector ndash spear phishing

bull Job application-themed spear phishing emails

bull RTF files with Microsoft Equation 20 related exploits (CVE-2017-11882 CVE-2018-0802)

bull Royal Road RTF document builder

bull ldquoOLE Package Objectsrdquo with names 8t or wd32PrvSEwmf

bull Custom encryption starting with 0xb07477 or 0xb2a66d

copy 2019 Trend Micro Inc14

Infection vector ndash spear phishing

bull For a successful attack the attacker requires user interaction

bull User awareness lowers the success rate of this type of attack

bull Applying updates prevents code execution in this context

bull Malicious documents and CampC were blocked once noticed

copy 2019 Trend Micro Inc15

Infection vector ndash exploiting vulnerabilities

bull Exploiting vulnerabilities in security solutionrsquos services exposed to Internet

bull CVE-2019-9489 (patched Apr 2019)

bull CVE-2020-8468 (patched Mar 2020)

copy 2019 Trend Micro Inc16

Infection vector ndash exploiting vulnerabilities

bull Exploiting vulnerabilities in security solutionrsquos services exposed to Internet

bull CVE-2019-9489 (patched Apr 2019)

bull CVE-2020-8468 (patched Mar 2020)

copy 2019 Trend Micro Inc17

Infection vector ndash exploiting vulnerabilities

bull Minority of the cases used this infection vectors

bull Both vulnerabilities are required for a successful attack

bull Delivered payload was a dropper for the Shadowpad malware family

copy 2019 Trend Micro Inc18

Infection vector ndash exploiting vulnerabilities

bull For a successful attack the attacker requires

bull A network access to the management server

bull An authentication bypass to such server

bull A vulnerability to execute code from this server

bull All of these conditions can be mitigated by network design and patch management

bull Malicious payloads and CampC were blocked once noticed

copy 2019 Trend Micro Inc19

Backdoors

copy 2019 Trend Micro Inc20

Custom backdoorsBackdoor family name First seen

Heartbeat 2009

Old Bisonal 2011

Chimaera 2012

Dexbia 2014

Bisonal01 2014

Bisonal02 2017

SPM 2018

Typehash 2019

Dumboc 2020

Idles 2020

copy 2019 Trend Micro Inc21

Custom backdoors ndash commands

bull All of them

bull Process enumeration download and file execution interactive shell

bull Most of them

bull File upload and deletion terminate process

bull Some of them

bull OS information collection uninstall wipe

copy 2019 Trend Micro Inc22

Custom backdoors ndash OS info

bull IP address

bull Code page

bull Time (tick count)

bull OS version token information

bull Computer name proxy information

bull Campaign ID presence of VM

copy 2019 Trend Micro Inc23

Custom backdoors ndash CampC encryption

bull No encryption

bull XOR used keys 0x15 0x1d 0x1f

bull RC4 hardcoded password 0x12345678

bull Custom use of atypical constants 0x58BF and 0x3193

copy 2019 Trend Micro Inc24

Custom backdoors ndash dexbia

bull Decryption steps

bull ELDLJFDRILGOEYFZGMCXDIHYGEDKAJIAFTFE

bull sYxef_xdbxaax80x9bxa8KVxcexa0Xtxd0x95x86

bull www[]riss[]ntdll[]net

copy 2019 Trend Micro Inc25

Custom backdoors ndash dexbia

bull Decryption steps

bull ELDLJFDRILGOEYFZGMCXDIHYGEDKAJIAFTFE

bull sYxef_xdbxaax80x9bxa8KVxcexa0Xtxd0x95x86

bull www[]riss[]ntdll[]net

copy 2019 Trend Micro Inc26

Custom backdoors ndash dexbia

bull Second loop with constants 0xCE6D (52845) =-0x3193 and 0x58BF (22719) can be also found in

Adobe Type 1 Font Format Specification

httpswwwadobecomcontentdamacomendevnetfontpdfsT1_SPECpdf

copy 2019 Trend Micro Inc27

Custom backdoors ndash network encryption

bull No encryption

bull Encodingcompress hex zlib base32 base64

bull XOR used keys 0x28 0x3f

bull RC4 hardcoded password 0x12345678

bull zlib + RC4

bull RC4 with 128-byte state vector

copy 2019 Trend Micro Inc28

Custom backdoors ndash network encryption

bull No encryption

bull Encodingcompress hex zlib base32 base64

bull XOR used keys 0x28 0x3f

bull RC4 hardcoded password 0x12345678

bull zlib + RC4

bull RC4 with 128-byte state vector

copy 2019 Trend Micro Inc29

Custom backdoors ndash network traffic

bull Example of Chimaera CampC communication

copy 2019 Trend Micro Inc30

Custom backdoors ndash VM check

bull Most of these families try to detect whether they are running inside a virtual machine

copy 2019 Trend Micro Inc31

Custom backdoors ndash sandbox evasion

bull Time delay

copy 2019 Trend Micro Inc32

Custom backdoors ndash sandbox evasion

bull Likely anti-sandbox trick

bull request for a non-existent website

bull prefix wwwgithub

bull httpswww[]github5o52d[]comDafpost[]asp

bull if this request fails the backdoor code flow continues as expected

copy 2019 Trend Micro Inc33

Custom backdoors - chimaera

bull Named after a caption

found in the control panel

copy 2019 Trend Micro Inc34

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc35

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc36

Custom backdoors - chimaera

bull Code similarity with old bisonal

bull Send machine info

bull Campaign ID

copy 2019 Trend Micro Inc37

Custom backdoors ndash campaign IDs

bull Some of these families have a campaign ID

416-J 0209J 0216jHC 228KJ 3sa new 711 Tranru Test DS MN1223 1228 dis ser mfa820 ser_ru rogx64 m0N~1 word0302 low_mn tnkk solr fvckrus ENERGY

copy 2019 Trend Micro Inc38

Shared backdoor - ShadowPad

bull Backdoor handling multiple plugins

bull Used in advanced supply chain attacks discovered in 2017 and 2018

bull Exclusive to WinntiAPT41 until 2019

copy 2019 Trend Micro Inc39

Shared backdoor - ShadowPad

bull Usually only 5 plugins are embeded

bull ldquoPluginsrdquo ldquoConfigrdquo ldquoInstallrdquo ldquoOnlinerdquo ldquoHTTPrdquo

bull In some cases ldquoTCPrdquo ldquoUDPrdquo

bull Loaded through DLL side-loading vulnerabilities in signed executables

bull Uses anti-disassembly techniques

bull Sometimes packed with VMProtect

copy 2019 Trend Micro Inc40

Shared backdoor - ShadowPad

bull New in 2020 sandbox evasion

bull if the loading DLL is not the expected one the program exits

It evades sandboxes that usually load DLLs with rundll32exe

copy 2019 Trend Micro Inc41

Shared backdoor - ShadowPad

bull Noticeable version tags

copy 2019 Trend Micro Inc42

Post-exploitation tools

copy 2019 Trend Micro Inc43

Post-exploitation tools - public

bull privilege escalation tools

bull CVE-2019-0803 and MS16-032 exploits

bull hash computational tools

bull credential dumpers

bull gsecdump v07

bull wdigest_extract

bull LaZagne

copy 2019 Trend Micro Inc44

Post-exploitation tools - public

bull Network shares enumeration

bull nbtscan 1035

bull Inbtscan (Python version of nbtscan)

bull Keyloggers

bull Keylogger1217

bull Lateral movement

bull Eternal Blue exploits

copy 2019 Trend Micro Inc45

Post-exploitation tools - private

bull Dumps information from the Domain Controller

bull Uses NetworkManagementAPIs

copy 2019 Trend Micro Inc46

Post-exploitation tools ndash hub relaying

Port 3925 Port 5688

CampC server

1 connects 2 sends traffic

3 forwards traffic

copy 2019 Trend Micro Inc47

Post-exploitation tools ndash hub relaying

bull Losing control of CampC does not expose the backend logic

bull CampC is simply a connection information forwarder

copy 2019 Trend Micro Inc48

Infrastructure

copy 2019 Trend Micro Inc49

Infrastructure

bull Multiple ldquoclustersrdquo of domain names

bull Infrastructure overlap

bull Clusters were usually bound to a specific malware family

copy 2019 Trend Micro Inc50

Infrastructure

bull From March to August 2020

bull 49 domains resolving to an IP address

bull Of which 38 dynamic domain names

bull 46 different IP addresses

copy 2019 Trend Micro Inc51

Infrastructure ndash attackerrsquos mistakes

bull Attacker misconfigured some CampC servers

bull We could find some new malware samples and families as well as victims

copy 2019 Trend Micro Inc52

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc53

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc54

Custom backdoors ndash attackerrsquos mistakes

bull Files with list of victims

copy 2019 Trend Micro Inc55

Targets

copy 2019 Trend Micro Inc56

Targets

bull 61 targets in 19 different countries from January to July 2020

bull Taiwan is the most targeted country followed by India and Russia

bull Technology and manufacturing industries were the most targeted followed by education and healthcare

copy 2019 Trend Micro Inc57

Targets ndash industries

Technology213

Manufacturing180

Education164

Healthcare131

Government82

Others230

copy 2019 Trend Micro Inc58

Targets ndash countries

Taiwan213

India131

Russia115

Germany66

Canada66

Australia66

Thailand66

Others277

copy 2019 Trend Micro Inc59

Links to other threat actors

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 8: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc8

Infection vector ndash phishing websites

bull Phishing domain similar to legitimate domain emailgovmn

copy 2019 Trend Micro Inc9

Infection vector ndash phishing websites

bull For a successful attack the attacker requires strong user interaction

bull User awareness lowers the success rate of this type of attack

bull Phishing websites were blocked once noticed

copy 2019 Trend Micro Inc10

Infection vector ndash spear phishing

bull Malicious attachments

copy 2019 Trend Micro Inc11

Infection vector ndash spear phishing

bull Malicious attachments

copy 2019 Trend Micro Inc12

Infection vector ndash spear phishing

bull Malicious attachments

copy 2019 Trend Micro Inc13

Infection vector ndash spear phishing

bull Job application-themed spear phishing emails

bull RTF files with Microsoft Equation 20 related exploits (CVE-2017-11882 CVE-2018-0802)

bull Royal Road RTF document builder

bull ldquoOLE Package Objectsrdquo with names 8t or wd32PrvSEwmf

bull Custom encryption starting with 0xb07477 or 0xb2a66d

copy 2019 Trend Micro Inc14

Infection vector ndash spear phishing

bull For a successful attack the attacker requires user interaction

bull User awareness lowers the success rate of this type of attack

bull Applying updates prevents code execution in this context

bull Malicious documents and CampC were blocked once noticed

copy 2019 Trend Micro Inc15

Infection vector ndash exploiting vulnerabilities

bull Exploiting vulnerabilities in security solutionrsquos services exposed to Internet

bull CVE-2019-9489 (patched Apr 2019)

bull CVE-2020-8468 (patched Mar 2020)

copy 2019 Trend Micro Inc16

Infection vector ndash exploiting vulnerabilities

bull Exploiting vulnerabilities in security solutionrsquos services exposed to Internet

bull CVE-2019-9489 (patched Apr 2019)

bull CVE-2020-8468 (patched Mar 2020)

copy 2019 Trend Micro Inc17

Infection vector ndash exploiting vulnerabilities

bull Minority of the cases used this infection vectors

bull Both vulnerabilities are required for a successful attack

bull Delivered payload was a dropper for the Shadowpad malware family

copy 2019 Trend Micro Inc18

Infection vector ndash exploiting vulnerabilities

bull For a successful attack the attacker requires

bull A network access to the management server

bull An authentication bypass to such server

bull A vulnerability to execute code from this server

bull All of these conditions can be mitigated by network design and patch management

bull Malicious payloads and CampC were blocked once noticed

copy 2019 Trend Micro Inc19

Backdoors

copy 2019 Trend Micro Inc20

Custom backdoorsBackdoor family name First seen

Heartbeat 2009

Old Bisonal 2011

Chimaera 2012

Dexbia 2014

Bisonal01 2014

Bisonal02 2017

SPM 2018

Typehash 2019

Dumboc 2020

Idles 2020

copy 2019 Trend Micro Inc21

Custom backdoors ndash commands

bull All of them

bull Process enumeration download and file execution interactive shell

bull Most of them

bull File upload and deletion terminate process

bull Some of them

bull OS information collection uninstall wipe

copy 2019 Trend Micro Inc22

Custom backdoors ndash OS info

bull IP address

bull Code page

bull Time (tick count)

bull OS version token information

bull Computer name proxy information

bull Campaign ID presence of VM

copy 2019 Trend Micro Inc23

Custom backdoors ndash CampC encryption

bull No encryption

bull XOR used keys 0x15 0x1d 0x1f

bull RC4 hardcoded password 0x12345678

bull Custom use of atypical constants 0x58BF and 0x3193

copy 2019 Trend Micro Inc24

Custom backdoors ndash dexbia

bull Decryption steps

bull ELDLJFDRILGOEYFZGMCXDIHYGEDKAJIAFTFE

bull sYxef_xdbxaax80x9bxa8KVxcexa0Xtxd0x95x86

bull www[]riss[]ntdll[]net

copy 2019 Trend Micro Inc25

Custom backdoors ndash dexbia

bull Decryption steps

bull ELDLJFDRILGOEYFZGMCXDIHYGEDKAJIAFTFE

bull sYxef_xdbxaax80x9bxa8KVxcexa0Xtxd0x95x86

bull www[]riss[]ntdll[]net

copy 2019 Trend Micro Inc26

Custom backdoors ndash dexbia

bull Second loop with constants 0xCE6D (52845) =-0x3193 and 0x58BF (22719) can be also found in

Adobe Type 1 Font Format Specification

httpswwwadobecomcontentdamacomendevnetfontpdfsT1_SPECpdf

copy 2019 Trend Micro Inc27

Custom backdoors ndash network encryption

bull No encryption

bull Encodingcompress hex zlib base32 base64

bull XOR used keys 0x28 0x3f

bull RC4 hardcoded password 0x12345678

bull zlib + RC4

bull RC4 with 128-byte state vector

copy 2019 Trend Micro Inc28

Custom backdoors ndash network encryption

bull No encryption

bull Encodingcompress hex zlib base32 base64

bull XOR used keys 0x28 0x3f

bull RC4 hardcoded password 0x12345678

bull zlib + RC4

bull RC4 with 128-byte state vector

copy 2019 Trend Micro Inc29

Custom backdoors ndash network traffic

bull Example of Chimaera CampC communication

copy 2019 Trend Micro Inc30

Custom backdoors ndash VM check

bull Most of these families try to detect whether they are running inside a virtual machine

copy 2019 Trend Micro Inc31

Custom backdoors ndash sandbox evasion

bull Time delay

copy 2019 Trend Micro Inc32

Custom backdoors ndash sandbox evasion

bull Likely anti-sandbox trick

bull request for a non-existent website

bull prefix wwwgithub

bull httpswww[]github5o52d[]comDafpost[]asp

bull if this request fails the backdoor code flow continues as expected

copy 2019 Trend Micro Inc33

Custom backdoors - chimaera

bull Named after a caption

found in the control panel

copy 2019 Trend Micro Inc34

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc35

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc36

Custom backdoors - chimaera

bull Code similarity with old bisonal

bull Send machine info

bull Campaign ID

copy 2019 Trend Micro Inc37

Custom backdoors ndash campaign IDs

bull Some of these families have a campaign ID

416-J 0209J 0216jHC 228KJ 3sa new 711 Tranru Test DS MN1223 1228 dis ser mfa820 ser_ru rogx64 m0N~1 word0302 low_mn tnkk solr fvckrus ENERGY

copy 2019 Trend Micro Inc38

Shared backdoor - ShadowPad

bull Backdoor handling multiple plugins

bull Used in advanced supply chain attacks discovered in 2017 and 2018

bull Exclusive to WinntiAPT41 until 2019

copy 2019 Trend Micro Inc39

Shared backdoor - ShadowPad

bull Usually only 5 plugins are embeded

bull ldquoPluginsrdquo ldquoConfigrdquo ldquoInstallrdquo ldquoOnlinerdquo ldquoHTTPrdquo

bull In some cases ldquoTCPrdquo ldquoUDPrdquo

bull Loaded through DLL side-loading vulnerabilities in signed executables

bull Uses anti-disassembly techniques

bull Sometimes packed with VMProtect

copy 2019 Trend Micro Inc40

Shared backdoor - ShadowPad

bull New in 2020 sandbox evasion

bull if the loading DLL is not the expected one the program exits

It evades sandboxes that usually load DLLs with rundll32exe

copy 2019 Trend Micro Inc41

Shared backdoor - ShadowPad

bull Noticeable version tags

copy 2019 Trend Micro Inc42

Post-exploitation tools

copy 2019 Trend Micro Inc43

Post-exploitation tools - public

bull privilege escalation tools

bull CVE-2019-0803 and MS16-032 exploits

bull hash computational tools

bull credential dumpers

bull gsecdump v07

bull wdigest_extract

bull LaZagne

copy 2019 Trend Micro Inc44

Post-exploitation tools - public

bull Network shares enumeration

bull nbtscan 1035

bull Inbtscan (Python version of nbtscan)

bull Keyloggers

bull Keylogger1217

bull Lateral movement

bull Eternal Blue exploits

copy 2019 Trend Micro Inc45

Post-exploitation tools - private

bull Dumps information from the Domain Controller

bull Uses NetworkManagementAPIs

copy 2019 Trend Micro Inc46

Post-exploitation tools ndash hub relaying

Port 3925 Port 5688

CampC server

1 connects 2 sends traffic

3 forwards traffic

copy 2019 Trend Micro Inc47

Post-exploitation tools ndash hub relaying

bull Losing control of CampC does not expose the backend logic

bull CampC is simply a connection information forwarder

copy 2019 Trend Micro Inc48

Infrastructure

copy 2019 Trend Micro Inc49

Infrastructure

bull Multiple ldquoclustersrdquo of domain names

bull Infrastructure overlap

bull Clusters were usually bound to a specific malware family

copy 2019 Trend Micro Inc50

Infrastructure

bull From March to August 2020

bull 49 domains resolving to an IP address

bull Of which 38 dynamic domain names

bull 46 different IP addresses

copy 2019 Trend Micro Inc51

Infrastructure ndash attackerrsquos mistakes

bull Attacker misconfigured some CampC servers

bull We could find some new malware samples and families as well as victims

copy 2019 Trend Micro Inc52

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc53

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc54

Custom backdoors ndash attackerrsquos mistakes

bull Files with list of victims

copy 2019 Trend Micro Inc55

Targets

copy 2019 Trend Micro Inc56

Targets

bull 61 targets in 19 different countries from January to July 2020

bull Taiwan is the most targeted country followed by India and Russia

bull Technology and manufacturing industries were the most targeted followed by education and healthcare

copy 2019 Trend Micro Inc57

Targets ndash industries

Technology213

Manufacturing180

Education164

Healthcare131

Government82

Others230

copy 2019 Trend Micro Inc58

Targets ndash countries

Taiwan213

India131

Russia115

Germany66

Canada66

Australia66

Thailand66

Others277

copy 2019 Trend Micro Inc59

Links to other threat actors

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 9: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc9

Infection vector ndash phishing websites

bull For a successful attack the attacker requires strong user interaction

bull User awareness lowers the success rate of this type of attack

bull Phishing websites were blocked once noticed

copy 2019 Trend Micro Inc10

Infection vector ndash spear phishing

bull Malicious attachments

copy 2019 Trend Micro Inc11

Infection vector ndash spear phishing

bull Malicious attachments

copy 2019 Trend Micro Inc12

Infection vector ndash spear phishing

bull Malicious attachments

copy 2019 Trend Micro Inc13

Infection vector ndash spear phishing

bull Job application-themed spear phishing emails

bull RTF files with Microsoft Equation 20 related exploits (CVE-2017-11882 CVE-2018-0802)

bull Royal Road RTF document builder

bull ldquoOLE Package Objectsrdquo with names 8t or wd32PrvSEwmf

bull Custom encryption starting with 0xb07477 or 0xb2a66d

copy 2019 Trend Micro Inc14

Infection vector ndash spear phishing

bull For a successful attack the attacker requires user interaction

bull User awareness lowers the success rate of this type of attack

bull Applying updates prevents code execution in this context

bull Malicious documents and CampC were blocked once noticed

copy 2019 Trend Micro Inc15

Infection vector ndash exploiting vulnerabilities

bull Exploiting vulnerabilities in security solutionrsquos services exposed to Internet

bull CVE-2019-9489 (patched Apr 2019)

bull CVE-2020-8468 (patched Mar 2020)

copy 2019 Trend Micro Inc16

Infection vector ndash exploiting vulnerabilities

bull Exploiting vulnerabilities in security solutionrsquos services exposed to Internet

bull CVE-2019-9489 (patched Apr 2019)

bull CVE-2020-8468 (patched Mar 2020)

copy 2019 Trend Micro Inc17

Infection vector ndash exploiting vulnerabilities

bull Minority of the cases used this infection vectors

bull Both vulnerabilities are required for a successful attack

bull Delivered payload was a dropper for the Shadowpad malware family

copy 2019 Trend Micro Inc18

Infection vector ndash exploiting vulnerabilities

bull For a successful attack the attacker requires

bull A network access to the management server

bull An authentication bypass to such server

bull A vulnerability to execute code from this server

bull All of these conditions can be mitigated by network design and patch management

bull Malicious payloads and CampC were blocked once noticed

copy 2019 Trend Micro Inc19

Backdoors

copy 2019 Trend Micro Inc20

Custom backdoorsBackdoor family name First seen

Heartbeat 2009

Old Bisonal 2011

Chimaera 2012

Dexbia 2014

Bisonal01 2014

Bisonal02 2017

SPM 2018

Typehash 2019

Dumboc 2020

Idles 2020

copy 2019 Trend Micro Inc21

Custom backdoors ndash commands

bull All of them

bull Process enumeration download and file execution interactive shell

bull Most of them

bull File upload and deletion terminate process

bull Some of them

bull OS information collection uninstall wipe

copy 2019 Trend Micro Inc22

Custom backdoors ndash OS info

bull IP address

bull Code page

bull Time (tick count)

bull OS version token information

bull Computer name proxy information

bull Campaign ID presence of VM

copy 2019 Trend Micro Inc23

Custom backdoors ndash CampC encryption

bull No encryption

bull XOR used keys 0x15 0x1d 0x1f

bull RC4 hardcoded password 0x12345678

bull Custom use of atypical constants 0x58BF and 0x3193

copy 2019 Trend Micro Inc24

Custom backdoors ndash dexbia

bull Decryption steps

bull ELDLJFDRILGOEYFZGMCXDIHYGEDKAJIAFTFE

bull sYxef_xdbxaax80x9bxa8KVxcexa0Xtxd0x95x86

bull www[]riss[]ntdll[]net

copy 2019 Trend Micro Inc25

Custom backdoors ndash dexbia

bull Decryption steps

bull ELDLJFDRILGOEYFZGMCXDIHYGEDKAJIAFTFE

bull sYxef_xdbxaax80x9bxa8KVxcexa0Xtxd0x95x86

bull www[]riss[]ntdll[]net

copy 2019 Trend Micro Inc26

Custom backdoors ndash dexbia

bull Second loop with constants 0xCE6D (52845) =-0x3193 and 0x58BF (22719) can be also found in

Adobe Type 1 Font Format Specification

httpswwwadobecomcontentdamacomendevnetfontpdfsT1_SPECpdf

copy 2019 Trend Micro Inc27

Custom backdoors ndash network encryption

bull No encryption

bull Encodingcompress hex zlib base32 base64

bull XOR used keys 0x28 0x3f

bull RC4 hardcoded password 0x12345678

bull zlib + RC4

bull RC4 with 128-byte state vector

copy 2019 Trend Micro Inc28

Custom backdoors ndash network encryption

bull No encryption

bull Encodingcompress hex zlib base32 base64

bull XOR used keys 0x28 0x3f

bull RC4 hardcoded password 0x12345678

bull zlib + RC4

bull RC4 with 128-byte state vector

copy 2019 Trend Micro Inc29

Custom backdoors ndash network traffic

bull Example of Chimaera CampC communication

copy 2019 Trend Micro Inc30

Custom backdoors ndash VM check

bull Most of these families try to detect whether they are running inside a virtual machine

copy 2019 Trend Micro Inc31

Custom backdoors ndash sandbox evasion

bull Time delay

copy 2019 Trend Micro Inc32

Custom backdoors ndash sandbox evasion

bull Likely anti-sandbox trick

bull request for a non-existent website

bull prefix wwwgithub

bull httpswww[]github5o52d[]comDafpost[]asp

bull if this request fails the backdoor code flow continues as expected

copy 2019 Trend Micro Inc33

Custom backdoors - chimaera

bull Named after a caption

found in the control panel

copy 2019 Trend Micro Inc34

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc35

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc36

Custom backdoors - chimaera

bull Code similarity with old bisonal

bull Send machine info

bull Campaign ID

copy 2019 Trend Micro Inc37

Custom backdoors ndash campaign IDs

bull Some of these families have a campaign ID

416-J 0209J 0216jHC 228KJ 3sa new 711 Tranru Test DS MN1223 1228 dis ser mfa820 ser_ru rogx64 m0N~1 word0302 low_mn tnkk solr fvckrus ENERGY

copy 2019 Trend Micro Inc38

Shared backdoor - ShadowPad

bull Backdoor handling multiple plugins

bull Used in advanced supply chain attacks discovered in 2017 and 2018

bull Exclusive to WinntiAPT41 until 2019

copy 2019 Trend Micro Inc39

Shared backdoor - ShadowPad

bull Usually only 5 plugins are embeded

bull ldquoPluginsrdquo ldquoConfigrdquo ldquoInstallrdquo ldquoOnlinerdquo ldquoHTTPrdquo

bull In some cases ldquoTCPrdquo ldquoUDPrdquo

bull Loaded through DLL side-loading vulnerabilities in signed executables

bull Uses anti-disassembly techniques

bull Sometimes packed with VMProtect

copy 2019 Trend Micro Inc40

Shared backdoor - ShadowPad

bull New in 2020 sandbox evasion

bull if the loading DLL is not the expected one the program exits

It evades sandboxes that usually load DLLs with rundll32exe

copy 2019 Trend Micro Inc41

Shared backdoor - ShadowPad

bull Noticeable version tags

copy 2019 Trend Micro Inc42

Post-exploitation tools

copy 2019 Trend Micro Inc43

Post-exploitation tools - public

bull privilege escalation tools

bull CVE-2019-0803 and MS16-032 exploits

bull hash computational tools

bull credential dumpers

bull gsecdump v07

bull wdigest_extract

bull LaZagne

copy 2019 Trend Micro Inc44

Post-exploitation tools - public

bull Network shares enumeration

bull nbtscan 1035

bull Inbtscan (Python version of nbtscan)

bull Keyloggers

bull Keylogger1217

bull Lateral movement

bull Eternal Blue exploits

copy 2019 Trend Micro Inc45

Post-exploitation tools - private

bull Dumps information from the Domain Controller

bull Uses NetworkManagementAPIs

copy 2019 Trend Micro Inc46

Post-exploitation tools ndash hub relaying

Port 3925 Port 5688

CampC server

1 connects 2 sends traffic

3 forwards traffic

copy 2019 Trend Micro Inc47

Post-exploitation tools ndash hub relaying

bull Losing control of CampC does not expose the backend logic

bull CampC is simply a connection information forwarder

copy 2019 Trend Micro Inc48

Infrastructure

copy 2019 Trend Micro Inc49

Infrastructure

bull Multiple ldquoclustersrdquo of domain names

bull Infrastructure overlap

bull Clusters were usually bound to a specific malware family

copy 2019 Trend Micro Inc50

Infrastructure

bull From March to August 2020

bull 49 domains resolving to an IP address

bull Of which 38 dynamic domain names

bull 46 different IP addresses

copy 2019 Trend Micro Inc51

Infrastructure ndash attackerrsquos mistakes

bull Attacker misconfigured some CampC servers

bull We could find some new malware samples and families as well as victims

copy 2019 Trend Micro Inc52

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc53

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc54

Custom backdoors ndash attackerrsquos mistakes

bull Files with list of victims

copy 2019 Trend Micro Inc55

Targets

copy 2019 Trend Micro Inc56

Targets

bull 61 targets in 19 different countries from January to July 2020

bull Taiwan is the most targeted country followed by India and Russia

bull Technology and manufacturing industries were the most targeted followed by education and healthcare

copy 2019 Trend Micro Inc57

Targets ndash industries

Technology213

Manufacturing180

Education164

Healthcare131

Government82

Others230

copy 2019 Trend Micro Inc58

Targets ndash countries

Taiwan213

India131

Russia115

Germany66

Canada66

Australia66

Thailand66

Others277

copy 2019 Trend Micro Inc59

Links to other threat actors

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 10: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc10

Infection vector ndash spear phishing

bull Malicious attachments

copy 2019 Trend Micro Inc11

Infection vector ndash spear phishing

bull Malicious attachments

copy 2019 Trend Micro Inc12

Infection vector ndash spear phishing

bull Malicious attachments

copy 2019 Trend Micro Inc13

Infection vector ndash spear phishing

bull Job application-themed spear phishing emails

bull RTF files with Microsoft Equation 20 related exploits (CVE-2017-11882 CVE-2018-0802)

bull Royal Road RTF document builder

bull ldquoOLE Package Objectsrdquo with names 8t or wd32PrvSEwmf

bull Custom encryption starting with 0xb07477 or 0xb2a66d

copy 2019 Trend Micro Inc14

Infection vector ndash spear phishing

bull For a successful attack the attacker requires user interaction

bull User awareness lowers the success rate of this type of attack

bull Applying updates prevents code execution in this context

bull Malicious documents and CampC were blocked once noticed

copy 2019 Trend Micro Inc15

Infection vector ndash exploiting vulnerabilities

bull Exploiting vulnerabilities in security solutionrsquos services exposed to Internet

bull CVE-2019-9489 (patched Apr 2019)

bull CVE-2020-8468 (patched Mar 2020)

copy 2019 Trend Micro Inc16

Infection vector ndash exploiting vulnerabilities

bull Exploiting vulnerabilities in security solutionrsquos services exposed to Internet

bull CVE-2019-9489 (patched Apr 2019)

bull CVE-2020-8468 (patched Mar 2020)

copy 2019 Trend Micro Inc17

Infection vector ndash exploiting vulnerabilities

bull Minority of the cases used this infection vectors

bull Both vulnerabilities are required for a successful attack

bull Delivered payload was a dropper for the Shadowpad malware family

copy 2019 Trend Micro Inc18

Infection vector ndash exploiting vulnerabilities

bull For a successful attack the attacker requires

bull A network access to the management server

bull An authentication bypass to such server

bull A vulnerability to execute code from this server

bull All of these conditions can be mitigated by network design and patch management

bull Malicious payloads and CampC were blocked once noticed

copy 2019 Trend Micro Inc19

Backdoors

copy 2019 Trend Micro Inc20

Custom backdoorsBackdoor family name First seen

Heartbeat 2009

Old Bisonal 2011

Chimaera 2012

Dexbia 2014

Bisonal01 2014

Bisonal02 2017

SPM 2018

Typehash 2019

Dumboc 2020

Idles 2020

copy 2019 Trend Micro Inc21

Custom backdoors ndash commands

bull All of them

bull Process enumeration download and file execution interactive shell

bull Most of them

bull File upload and deletion terminate process

bull Some of them

bull OS information collection uninstall wipe

copy 2019 Trend Micro Inc22

Custom backdoors ndash OS info

bull IP address

bull Code page

bull Time (tick count)

bull OS version token information

bull Computer name proxy information

bull Campaign ID presence of VM

copy 2019 Trend Micro Inc23

Custom backdoors ndash CampC encryption

bull No encryption

bull XOR used keys 0x15 0x1d 0x1f

bull RC4 hardcoded password 0x12345678

bull Custom use of atypical constants 0x58BF and 0x3193

copy 2019 Trend Micro Inc24

Custom backdoors ndash dexbia

bull Decryption steps

bull ELDLJFDRILGOEYFZGMCXDIHYGEDKAJIAFTFE

bull sYxef_xdbxaax80x9bxa8KVxcexa0Xtxd0x95x86

bull www[]riss[]ntdll[]net

copy 2019 Trend Micro Inc25

Custom backdoors ndash dexbia

bull Decryption steps

bull ELDLJFDRILGOEYFZGMCXDIHYGEDKAJIAFTFE

bull sYxef_xdbxaax80x9bxa8KVxcexa0Xtxd0x95x86

bull www[]riss[]ntdll[]net

copy 2019 Trend Micro Inc26

Custom backdoors ndash dexbia

bull Second loop with constants 0xCE6D (52845) =-0x3193 and 0x58BF (22719) can be also found in

Adobe Type 1 Font Format Specification

httpswwwadobecomcontentdamacomendevnetfontpdfsT1_SPECpdf

copy 2019 Trend Micro Inc27

Custom backdoors ndash network encryption

bull No encryption

bull Encodingcompress hex zlib base32 base64

bull XOR used keys 0x28 0x3f

bull RC4 hardcoded password 0x12345678

bull zlib + RC4

bull RC4 with 128-byte state vector

copy 2019 Trend Micro Inc28

Custom backdoors ndash network encryption

bull No encryption

bull Encodingcompress hex zlib base32 base64

bull XOR used keys 0x28 0x3f

bull RC4 hardcoded password 0x12345678

bull zlib + RC4

bull RC4 with 128-byte state vector

copy 2019 Trend Micro Inc29

Custom backdoors ndash network traffic

bull Example of Chimaera CampC communication

copy 2019 Trend Micro Inc30

Custom backdoors ndash VM check

bull Most of these families try to detect whether they are running inside a virtual machine

copy 2019 Trend Micro Inc31

Custom backdoors ndash sandbox evasion

bull Time delay

copy 2019 Trend Micro Inc32

Custom backdoors ndash sandbox evasion

bull Likely anti-sandbox trick

bull request for a non-existent website

bull prefix wwwgithub

bull httpswww[]github5o52d[]comDafpost[]asp

bull if this request fails the backdoor code flow continues as expected

copy 2019 Trend Micro Inc33

Custom backdoors - chimaera

bull Named after a caption

found in the control panel

copy 2019 Trend Micro Inc34

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc35

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc36

Custom backdoors - chimaera

bull Code similarity with old bisonal

bull Send machine info

bull Campaign ID

copy 2019 Trend Micro Inc37

Custom backdoors ndash campaign IDs

bull Some of these families have a campaign ID

416-J 0209J 0216jHC 228KJ 3sa new 711 Tranru Test DS MN1223 1228 dis ser mfa820 ser_ru rogx64 m0N~1 word0302 low_mn tnkk solr fvckrus ENERGY

copy 2019 Trend Micro Inc38

Shared backdoor - ShadowPad

bull Backdoor handling multiple plugins

bull Used in advanced supply chain attacks discovered in 2017 and 2018

bull Exclusive to WinntiAPT41 until 2019

copy 2019 Trend Micro Inc39

Shared backdoor - ShadowPad

bull Usually only 5 plugins are embeded

bull ldquoPluginsrdquo ldquoConfigrdquo ldquoInstallrdquo ldquoOnlinerdquo ldquoHTTPrdquo

bull In some cases ldquoTCPrdquo ldquoUDPrdquo

bull Loaded through DLL side-loading vulnerabilities in signed executables

bull Uses anti-disassembly techniques

bull Sometimes packed with VMProtect

copy 2019 Trend Micro Inc40

Shared backdoor - ShadowPad

bull New in 2020 sandbox evasion

bull if the loading DLL is not the expected one the program exits

It evades sandboxes that usually load DLLs with rundll32exe

copy 2019 Trend Micro Inc41

Shared backdoor - ShadowPad

bull Noticeable version tags

copy 2019 Trend Micro Inc42

Post-exploitation tools

copy 2019 Trend Micro Inc43

Post-exploitation tools - public

bull privilege escalation tools

bull CVE-2019-0803 and MS16-032 exploits

bull hash computational tools

bull credential dumpers

bull gsecdump v07

bull wdigest_extract

bull LaZagne

copy 2019 Trend Micro Inc44

Post-exploitation tools - public

bull Network shares enumeration

bull nbtscan 1035

bull Inbtscan (Python version of nbtscan)

bull Keyloggers

bull Keylogger1217

bull Lateral movement

bull Eternal Blue exploits

copy 2019 Trend Micro Inc45

Post-exploitation tools - private

bull Dumps information from the Domain Controller

bull Uses NetworkManagementAPIs

copy 2019 Trend Micro Inc46

Post-exploitation tools ndash hub relaying

Port 3925 Port 5688

CampC server

1 connects 2 sends traffic

3 forwards traffic

copy 2019 Trend Micro Inc47

Post-exploitation tools ndash hub relaying

bull Losing control of CampC does not expose the backend logic

bull CampC is simply a connection information forwarder

copy 2019 Trend Micro Inc48

Infrastructure

copy 2019 Trend Micro Inc49

Infrastructure

bull Multiple ldquoclustersrdquo of domain names

bull Infrastructure overlap

bull Clusters were usually bound to a specific malware family

copy 2019 Trend Micro Inc50

Infrastructure

bull From March to August 2020

bull 49 domains resolving to an IP address

bull Of which 38 dynamic domain names

bull 46 different IP addresses

copy 2019 Trend Micro Inc51

Infrastructure ndash attackerrsquos mistakes

bull Attacker misconfigured some CampC servers

bull We could find some new malware samples and families as well as victims

copy 2019 Trend Micro Inc52

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc53

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc54

Custom backdoors ndash attackerrsquos mistakes

bull Files with list of victims

copy 2019 Trend Micro Inc55

Targets

copy 2019 Trend Micro Inc56

Targets

bull 61 targets in 19 different countries from January to July 2020

bull Taiwan is the most targeted country followed by India and Russia

bull Technology and manufacturing industries were the most targeted followed by education and healthcare

copy 2019 Trend Micro Inc57

Targets ndash industries

Technology213

Manufacturing180

Education164

Healthcare131

Government82

Others230

copy 2019 Trend Micro Inc58

Targets ndash countries

Taiwan213

India131

Russia115

Germany66

Canada66

Australia66

Thailand66

Others277

copy 2019 Trend Micro Inc59

Links to other threat actors

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 11: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc11

Infection vector ndash spear phishing

bull Malicious attachments

copy 2019 Trend Micro Inc12

Infection vector ndash spear phishing

bull Malicious attachments

copy 2019 Trend Micro Inc13

Infection vector ndash spear phishing

bull Job application-themed spear phishing emails

bull RTF files with Microsoft Equation 20 related exploits (CVE-2017-11882 CVE-2018-0802)

bull Royal Road RTF document builder

bull ldquoOLE Package Objectsrdquo with names 8t or wd32PrvSEwmf

bull Custom encryption starting with 0xb07477 or 0xb2a66d

copy 2019 Trend Micro Inc14

Infection vector ndash spear phishing

bull For a successful attack the attacker requires user interaction

bull User awareness lowers the success rate of this type of attack

bull Applying updates prevents code execution in this context

bull Malicious documents and CampC were blocked once noticed

copy 2019 Trend Micro Inc15

Infection vector ndash exploiting vulnerabilities

bull Exploiting vulnerabilities in security solutionrsquos services exposed to Internet

bull CVE-2019-9489 (patched Apr 2019)

bull CVE-2020-8468 (patched Mar 2020)

copy 2019 Trend Micro Inc16

Infection vector ndash exploiting vulnerabilities

bull Exploiting vulnerabilities in security solutionrsquos services exposed to Internet

bull CVE-2019-9489 (patched Apr 2019)

bull CVE-2020-8468 (patched Mar 2020)

copy 2019 Trend Micro Inc17

Infection vector ndash exploiting vulnerabilities

bull Minority of the cases used this infection vectors

bull Both vulnerabilities are required for a successful attack

bull Delivered payload was a dropper for the Shadowpad malware family

copy 2019 Trend Micro Inc18

Infection vector ndash exploiting vulnerabilities

bull For a successful attack the attacker requires

bull A network access to the management server

bull An authentication bypass to such server

bull A vulnerability to execute code from this server

bull All of these conditions can be mitigated by network design and patch management

bull Malicious payloads and CampC were blocked once noticed

copy 2019 Trend Micro Inc19

Backdoors

copy 2019 Trend Micro Inc20

Custom backdoorsBackdoor family name First seen

Heartbeat 2009

Old Bisonal 2011

Chimaera 2012

Dexbia 2014

Bisonal01 2014

Bisonal02 2017

SPM 2018

Typehash 2019

Dumboc 2020

Idles 2020

copy 2019 Trend Micro Inc21

Custom backdoors ndash commands

bull All of them

bull Process enumeration download and file execution interactive shell

bull Most of them

bull File upload and deletion terminate process

bull Some of them

bull OS information collection uninstall wipe

copy 2019 Trend Micro Inc22

Custom backdoors ndash OS info

bull IP address

bull Code page

bull Time (tick count)

bull OS version token information

bull Computer name proxy information

bull Campaign ID presence of VM

copy 2019 Trend Micro Inc23

Custom backdoors ndash CampC encryption

bull No encryption

bull XOR used keys 0x15 0x1d 0x1f

bull RC4 hardcoded password 0x12345678

bull Custom use of atypical constants 0x58BF and 0x3193

copy 2019 Trend Micro Inc24

Custom backdoors ndash dexbia

bull Decryption steps

bull ELDLJFDRILGOEYFZGMCXDIHYGEDKAJIAFTFE

bull sYxef_xdbxaax80x9bxa8KVxcexa0Xtxd0x95x86

bull www[]riss[]ntdll[]net

copy 2019 Trend Micro Inc25

Custom backdoors ndash dexbia

bull Decryption steps

bull ELDLJFDRILGOEYFZGMCXDIHYGEDKAJIAFTFE

bull sYxef_xdbxaax80x9bxa8KVxcexa0Xtxd0x95x86

bull www[]riss[]ntdll[]net

copy 2019 Trend Micro Inc26

Custom backdoors ndash dexbia

bull Second loop with constants 0xCE6D (52845) =-0x3193 and 0x58BF (22719) can be also found in

Adobe Type 1 Font Format Specification

httpswwwadobecomcontentdamacomendevnetfontpdfsT1_SPECpdf

copy 2019 Trend Micro Inc27

Custom backdoors ndash network encryption

bull No encryption

bull Encodingcompress hex zlib base32 base64

bull XOR used keys 0x28 0x3f

bull RC4 hardcoded password 0x12345678

bull zlib + RC4

bull RC4 with 128-byte state vector

copy 2019 Trend Micro Inc28

Custom backdoors ndash network encryption

bull No encryption

bull Encodingcompress hex zlib base32 base64

bull XOR used keys 0x28 0x3f

bull RC4 hardcoded password 0x12345678

bull zlib + RC4

bull RC4 with 128-byte state vector

copy 2019 Trend Micro Inc29

Custom backdoors ndash network traffic

bull Example of Chimaera CampC communication

copy 2019 Trend Micro Inc30

Custom backdoors ndash VM check

bull Most of these families try to detect whether they are running inside a virtual machine

copy 2019 Trend Micro Inc31

Custom backdoors ndash sandbox evasion

bull Time delay

copy 2019 Trend Micro Inc32

Custom backdoors ndash sandbox evasion

bull Likely anti-sandbox trick

bull request for a non-existent website

bull prefix wwwgithub

bull httpswww[]github5o52d[]comDafpost[]asp

bull if this request fails the backdoor code flow continues as expected

copy 2019 Trend Micro Inc33

Custom backdoors - chimaera

bull Named after a caption

found in the control panel

copy 2019 Trend Micro Inc34

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc35

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc36

Custom backdoors - chimaera

bull Code similarity with old bisonal

bull Send machine info

bull Campaign ID

copy 2019 Trend Micro Inc37

Custom backdoors ndash campaign IDs

bull Some of these families have a campaign ID

416-J 0209J 0216jHC 228KJ 3sa new 711 Tranru Test DS MN1223 1228 dis ser mfa820 ser_ru rogx64 m0N~1 word0302 low_mn tnkk solr fvckrus ENERGY

copy 2019 Trend Micro Inc38

Shared backdoor - ShadowPad

bull Backdoor handling multiple plugins

bull Used in advanced supply chain attacks discovered in 2017 and 2018

bull Exclusive to WinntiAPT41 until 2019

copy 2019 Trend Micro Inc39

Shared backdoor - ShadowPad

bull Usually only 5 plugins are embeded

bull ldquoPluginsrdquo ldquoConfigrdquo ldquoInstallrdquo ldquoOnlinerdquo ldquoHTTPrdquo

bull In some cases ldquoTCPrdquo ldquoUDPrdquo

bull Loaded through DLL side-loading vulnerabilities in signed executables

bull Uses anti-disassembly techniques

bull Sometimes packed with VMProtect

copy 2019 Trend Micro Inc40

Shared backdoor - ShadowPad

bull New in 2020 sandbox evasion

bull if the loading DLL is not the expected one the program exits

It evades sandboxes that usually load DLLs with rundll32exe

copy 2019 Trend Micro Inc41

Shared backdoor - ShadowPad

bull Noticeable version tags

copy 2019 Trend Micro Inc42

Post-exploitation tools

copy 2019 Trend Micro Inc43

Post-exploitation tools - public

bull privilege escalation tools

bull CVE-2019-0803 and MS16-032 exploits

bull hash computational tools

bull credential dumpers

bull gsecdump v07

bull wdigest_extract

bull LaZagne

copy 2019 Trend Micro Inc44

Post-exploitation tools - public

bull Network shares enumeration

bull nbtscan 1035

bull Inbtscan (Python version of nbtscan)

bull Keyloggers

bull Keylogger1217

bull Lateral movement

bull Eternal Blue exploits

copy 2019 Trend Micro Inc45

Post-exploitation tools - private

bull Dumps information from the Domain Controller

bull Uses NetworkManagementAPIs

copy 2019 Trend Micro Inc46

Post-exploitation tools ndash hub relaying

Port 3925 Port 5688

CampC server

1 connects 2 sends traffic

3 forwards traffic

copy 2019 Trend Micro Inc47

Post-exploitation tools ndash hub relaying

bull Losing control of CampC does not expose the backend logic

bull CampC is simply a connection information forwarder

copy 2019 Trend Micro Inc48

Infrastructure

copy 2019 Trend Micro Inc49

Infrastructure

bull Multiple ldquoclustersrdquo of domain names

bull Infrastructure overlap

bull Clusters were usually bound to a specific malware family

copy 2019 Trend Micro Inc50

Infrastructure

bull From March to August 2020

bull 49 domains resolving to an IP address

bull Of which 38 dynamic domain names

bull 46 different IP addresses

copy 2019 Trend Micro Inc51

Infrastructure ndash attackerrsquos mistakes

bull Attacker misconfigured some CampC servers

bull We could find some new malware samples and families as well as victims

copy 2019 Trend Micro Inc52

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc53

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc54

Custom backdoors ndash attackerrsquos mistakes

bull Files with list of victims

copy 2019 Trend Micro Inc55

Targets

copy 2019 Trend Micro Inc56

Targets

bull 61 targets in 19 different countries from January to July 2020

bull Taiwan is the most targeted country followed by India and Russia

bull Technology and manufacturing industries were the most targeted followed by education and healthcare

copy 2019 Trend Micro Inc57

Targets ndash industries

Technology213

Manufacturing180

Education164

Healthcare131

Government82

Others230

copy 2019 Trend Micro Inc58

Targets ndash countries

Taiwan213

India131

Russia115

Germany66

Canada66

Australia66

Thailand66

Others277

copy 2019 Trend Micro Inc59

Links to other threat actors

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 12: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc12

Infection vector ndash spear phishing

bull Malicious attachments

copy 2019 Trend Micro Inc13

Infection vector ndash spear phishing

bull Job application-themed spear phishing emails

bull RTF files with Microsoft Equation 20 related exploits (CVE-2017-11882 CVE-2018-0802)

bull Royal Road RTF document builder

bull ldquoOLE Package Objectsrdquo with names 8t or wd32PrvSEwmf

bull Custom encryption starting with 0xb07477 or 0xb2a66d

copy 2019 Trend Micro Inc14

Infection vector ndash spear phishing

bull For a successful attack the attacker requires user interaction

bull User awareness lowers the success rate of this type of attack

bull Applying updates prevents code execution in this context

bull Malicious documents and CampC were blocked once noticed

copy 2019 Trend Micro Inc15

Infection vector ndash exploiting vulnerabilities

bull Exploiting vulnerabilities in security solutionrsquos services exposed to Internet

bull CVE-2019-9489 (patched Apr 2019)

bull CVE-2020-8468 (patched Mar 2020)

copy 2019 Trend Micro Inc16

Infection vector ndash exploiting vulnerabilities

bull Exploiting vulnerabilities in security solutionrsquos services exposed to Internet

bull CVE-2019-9489 (patched Apr 2019)

bull CVE-2020-8468 (patched Mar 2020)

copy 2019 Trend Micro Inc17

Infection vector ndash exploiting vulnerabilities

bull Minority of the cases used this infection vectors

bull Both vulnerabilities are required for a successful attack

bull Delivered payload was a dropper for the Shadowpad malware family

copy 2019 Trend Micro Inc18

Infection vector ndash exploiting vulnerabilities

bull For a successful attack the attacker requires

bull A network access to the management server

bull An authentication bypass to such server

bull A vulnerability to execute code from this server

bull All of these conditions can be mitigated by network design and patch management

bull Malicious payloads and CampC were blocked once noticed

copy 2019 Trend Micro Inc19

Backdoors

copy 2019 Trend Micro Inc20

Custom backdoorsBackdoor family name First seen

Heartbeat 2009

Old Bisonal 2011

Chimaera 2012

Dexbia 2014

Bisonal01 2014

Bisonal02 2017

SPM 2018

Typehash 2019

Dumboc 2020

Idles 2020

copy 2019 Trend Micro Inc21

Custom backdoors ndash commands

bull All of them

bull Process enumeration download and file execution interactive shell

bull Most of them

bull File upload and deletion terminate process

bull Some of them

bull OS information collection uninstall wipe

copy 2019 Trend Micro Inc22

Custom backdoors ndash OS info

bull IP address

bull Code page

bull Time (tick count)

bull OS version token information

bull Computer name proxy information

bull Campaign ID presence of VM

copy 2019 Trend Micro Inc23

Custom backdoors ndash CampC encryption

bull No encryption

bull XOR used keys 0x15 0x1d 0x1f

bull RC4 hardcoded password 0x12345678

bull Custom use of atypical constants 0x58BF and 0x3193

copy 2019 Trend Micro Inc24

Custom backdoors ndash dexbia

bull Decryption steps

bull ELDLJFDRILGOEYFZGMCXDIHYGEDKAJIAFTFE

bull sYxef_xdbxaax80x9bxa8KVxcexa0Xtxd0x95x86

bull www[]riss[]ntdll[]net

copy 2019 Trend Micro Inc25

Custom backdoors ndash dexbia

bull Decryption steps

bull ELDLJFDRILGOEYFZGMCXDIHYGEDKAJIAFTFE

bull sYxef_xdbxaax80x9bxa8KVxcexa0Xtxd0x95x86

bull www[]riss[]ntdll[]net

copy 2019 Trend Micro Inc26

Custom backdoors ndash dexbia

bull Second loop with constants 0xCE6D (52845) =-0x3193 and 0x58BF (22719) can be also found in

Adobe Type 1 Font Format Specification

httpswwwadobecomcontentdamacomendevnetfontpdfsT1_SPECpdf

copy 2019 Trend Micro Inc27

Custom backdoors ndash network encryption

bull No encryption

bull Encodingcompress hex zlib base32 base64

bull XOR used keys 0x28 0x3f

bull RC4 hardcoded password 0x12345678

bull zlib + RC4

bull RC4 with 128-byte state vector

copy 2019 Trend Micro Inc28

Custom backdoors ndash network encryption

bull No encryption

bull Encodingcompress hex zlib base32 base64

bull XOR used keys 0x28 0x3f

bull RC4 hardcoded password 0x12345678

bull zlib + RC4

bull RC4 with 128-byte state vector

copy 2019 Trend Micro Inc29

Custom backdoors ndash network traffic

bull Example of Chimaera CampC communication

copy 2019 Trend Micro Inc30

Custom backdoors ndash VM check

bull Most of these families try to detect whether they are running inside a virtual machine

copy 2019 Trend Micro Inc31

Custom backdoors ndash sandbox evasion

bull Time delay

copy 2019 Trend Micro Inc32

Custom backdoors ndash sandbox evasion

bull Likely anti-sandbox trick

bull request for a non-existent website

bull prefix wwwgithub

bull httpswww[]github5o52d[]comDafpost[]asp

bull if this request fails the backdoor code flow continues as expected

copy 2019 Trend Micro Inc33

Custom backdoors - chimaera

bull Named after a caption

found in the control panel

copy 2019 Trend Micro Inc34

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc35

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc36

Custom backdoors - chimaera

bull Code similarity with old bisonal

bull Send machine info

bull Campaign ID

copy 2019 Trend Micro Inc37

Custom backdoors ndash campaign IDs

bull Some of these families have a campaign ID

416-J 0209J 0216jHC 228KJ 3sa new 711 Tranru Test DS MN1223 1228 dis ser mfa820 ser_ru rogx64 m0N~1 word0302 low_mn tnkk solr fvckrus ENERGY

copy 2019 Trend Micro Inc38

Shared backdoor - ShadowPad

bull Backdoor handling multiple plugins

bull Used in advanced supply chain attacks discovered in 2017 and 2018

bull Exclusive to WinntiAPT41 until 2019

copy 2019 Trend Micro Inc39

Shared backdoor - ShadowPad

bull Usually only 5 plugins are embeded

bull ldquoPluginsrdquo ldquoConfigrdquo ldquoInstallrdquo ldquoOnlinerdquo ldquoHTTPrdquo

bull In some cases ldquoTCPrdquo ldquoUDPrdquo

bull Loaded through DLL side-loading vulnerabilities in signed executables

bull Uses anti-disassembly techniques

bull Sometimes packed with VMProtect

copy 2019 Trend Micro Inc40

Shared backdoor - ShadowPad

bull New in 2020 sandbox evasion

bull if the loading DLL is not the expected one the program exits

It evades sandboxes that usually load DLLs with rundll32exe

copy 2019 Trend Micro Inc41

Shared backdoor - ShadowPad

bull Noticeable version tags

copy 2019 Trend Micro Inc42

Post-exploitation tools

copy 2019 Trend Micro Inc43

Post-exploitation tools - public

bull privilege escalation tools

bull CVE-2019-0803 and MS16-032 exploits

bull hash computational tools

bull credential dumpers

bull gsecdump v07

bull wdigest_extract

bull LaZagne

copy 2019 Trend Micro Inc44

Post-exploitation tools - public

bull Network shares enumeration

bull nbtscan 1035

bull Inbtscan (Python version of nbtscan)

bull Keyloggers

bull Keylogger1217

bull Lateral movement

bull Eternal Blue exploits

copy 2019 Trend Micro Inc45

Post-exploitation tools - private

bull Dumps information from the Domain Controller

bull Uses NetworkManagementAPIs

copy 2019 Trend Micro Inc46

Post-exploitation tools ndash hub relaying

Port 3925 Port 5688

CampC server

1 connects 2 sends traffic

3 forwards traffic

copy 2019 Trend Micro Inc47

Post-exploitation tools ndash hub relaying

bull Losing control of CampC does not expose the backend logic

bull CampC is simply a connection information forwarder

copy 2019 Trend Micro Inc48

Infrastructure

copy 2019 Trend Micro Inc49

Infrastructure

bull Multiple ldquoclustersrdquo of domain names

bull Infrastructure overlap

bull Clusters were usually bound to a specific malware family

copy 2019 Trend Micro Inc50

Infrastructure

bull From March to August 2020

bull 49 domains resolving to an IP address

bull Of which 38 dynamic domain names

bull 46 different IP addresses

copy 2019 Trend Micro Inc51

Infrastructure ndash attackerrsquos mistakes

bull Attacker misconfigured some CampC servers

bull We could find some new malware samples and families as well as victims

copy 2019 Trend Micro Inc52

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc53

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc54

Custom backdoors ndash attackerrsquos mistakes

bull Files with list of victims

copy 2019 Trend Micro Inc55

Targets

copy 2019 Trend Micro Inc56

Targets

bull 61 targets in 19 different countries from January to July 2020

bull Taiwan is the most targeted country followed by India and Russia

bull Technology and manufacturing industries were the most targeted followed by education and healthcare

copy 2019 Trend Micro Inc57

Targets ndash industries

Technology213

Manufacturing180

Education164

Healthcare131

Government82

Others230

copy 2019 Trend Micro Inc58

Targets ndash countries

Taiwan213

India131

Russia115

Germany66

Canada66

Australia66

Thailand66

Others277

copy 2019 Trend Micro Inc59

Links to other threat actors

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 13: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc13

Infection vector ndash spear phishing

bull Job application-themed spear phishing emails

bull RTF files with Microsoft Equation 20 related exploits (CVE-2017-11882 CVE-2018-0802)

bull Royal Road RTF document builder

bull ldquoOLE Package Objectsrdquo with names 8t or wd32PrvSEwmf

bull Custom encryption starting with 0xb07477 or 0xb2a66d

copy 2019 Trend Micro Inc14

Infection vector ndash spear phishing

bull For a successful attack the attacker requires user interaction

bull User awareness lowers the success rate of this type of attack

bull Applying updates prevents code execution in this context

bull Malicious documents and CampC were blocked once noticed

copy 2019 Trend Micro Inc15

Infection vector ndash exploiting vulnerabilities

bull Exploiting vulnerabilities in security solutionrsquos services exposed to Internet

bull CVE-2019-9489 (patched Apr 2019)

bull CVE-2020-8468 (patched Mar 2020)

copy 2019 Trend Micro Inc16

Infection vector ndash exploiting vulnerabilities

bull Exploiting vulnerabilities in security solutionrsquos services exposed to Internet

bull CVE-2019-9489 (patched Apr 2019)

bull CVE-2020-8468 (patched Mar 2020)

copy 2019 Trend Micro Inc17

Infection vector ndash exploiting vulnerabilities

bull Minority of the cases used this infection vectors

bull Both vulnerabilities are required for a successful attack

bull Delivered payload was a dropper for the Shadowpad malware family

copy 2019 Trend Micro Inc18

Infection vector ndash exploiting vulnerabilities

bull For a successful attack the attacker requires

bull A network access to the management server

bull An authentication bypass to such server

bull A vulnerability to execute code from this server

bull All of these conditions can be mitigated by network design and patch management

bull Malicious payloads and CampC were blocked once noticed

copy 2019 Trend Micro Inc19

Backdoors

copy 2019 Trend Micro Inc20

Custom backdoorsBackdoor family name First seen

Heartbeat 2009

Old Bisonal 2011

Chimaera 2012

Dexbia 2014

Bisonal01 2014

Bisonal02 2017

SPM 2018

Typehash 2019

Dumboc 2020

Idles 2020

copy 2019 Trend Micro Inc21

Custom backdoors ndash commands

bull All of them

bull Process enumeration download and file execution interactive shell

bull Most of them

bull File upload and deletion terminate process

bull Some of them

bull OS information collection uninstall wipe

copy 2019 Trend Micro Inc22

Custom backdoors ndash OS info

bull IP address

bull Code page

bull Time (tick count)

bull OS version token information

bull Computer name proxy information

bull Campaign ID presence of VM

copy 2019 Trend Micro Inc23

Custom backdoors ndash CampC encryption

bull No encryption

bull XOR used keys 0x15 0x1d 0x1f

bull RC4 hardcoded password 0x12345678

bull Custom use of atypical constants 0x58BF and 0x3193

copy 2019 Trend Micro Inc24

Custom backdoors ndash dexbia

bull Decryption steps

bull ELDLJFDRILGOEYFZGMCXDIHYGEDKAJIAFTFE

bull sYxef_xdbxaax80x9bxa8KVxcexa0Xtxd0x95x86

bull www[]riss[]ntdll[]net

copy 2019 Trend Micro Inc25

Custom backdoors ndash dexbia

bull Decryption steps

bull ELDLJFDRILGOEYFZGMCXDIHYGEDKAJIAFTFE

bull sYxef_xdbxaax80x9bxa8KVxcexa0Xtxd0x95x86

bull www[]riss[]ntdll[]net

copy 2019 Trend Micro Inc26

Custom backdoors ndash dexbia

bull Second loop with constants 0xCE6D (52845) =-0x3193 and 0x58BF (22719) can be also found in

Adobe Type 1 Font Format Specification

httpswwwadobecomcontentdamacomendevnetfontpdfsT1_SPECpdf

copy 2019 Trend Micro Inc27

Custom backdoors ndash network encryption

bull No encryption

bull Encodingcompress hex zlib base32 base64

bull XOR used keys 0x28 0x3f

bull RC4 hardcoded password 0x12345678

bull zlib + RC4

bull RC4 with 128-byte state vector

copy 2019 Trend Micro Inc28

Custom backdoors ndash network encryption

bull No encryption

bull Encodingcompress hex zlib base32 base64

bull XOR used keys 0x28 0x3f

bull RC4 hardcoded password 0x12345678

bull zlib + RC4

bull RC4 with 128-byte state vector

copy 2019 Trend Micro Inc29

Custom backdoors ndash network traffic

bull Example of Chimaera CampC communication

copy 2019 Trend Micro Inc30

Custom backdoors ndash VM check

bull Most of these families try to detect whether they are running inside a virtual machine

copy 2019 Trend Micro Inc31

Custom backdoors ndash sandbox evasion

bull Time delay

copy 2019 Trend Micro Inc32

Custom backdoors ndash sandbox evasion

bull Likely anti-sandbox trick

bull request for a non-existent website

bull prefix wwwgithub

bull httpswww[]github5o52d[]comDafpost[]asp

bull if this request fails the backdoor code flow continues as expected

copy 2019 Trend Micro Inc33

Custom backdoors - chimaera

bull Named after a caption

found in the control panel

copy 2019 Trend Micro Inc34

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc35

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc36

Custom backdoors - chimaera

bull Code similarity with old bisonal

bull Send machine info

bull Campaign ID

copy 2019 Trend Micro Inc37

Custom backdoors ndash campaign IDs

bull Some of these families have a campaign ID

416-J 0209J 0216jHC 228KJ 3sa new 711 Tranru Test DS MN1223 1228 dis ser mfa820 ser_ru rogx64 m0N~1 word0302 low_mn tnkk solr fvckrus ENERGY

copy 2019 Trend Micro Inc38

Shared backdoor - ShadowPad

bull Backdoor handling multiple plugins

bull Used in advanced supply chain attacks discovered in 2017 and 2018

bull Exclusive to WinntiAPT41 until 2019

copy 2019 Trend Micro Inc39

Shared backdoor - ShadowPad

bull Usually only 5 plugins are embeded

bull ldquoPluginsrdquo ldquoConfigrdquo ldquoInstallrdquo ldquoOnlinerdquo ldquoHTTPrdquo

bull In some cases ldquoTCPrdquo ldquoUDPrdquo

bull Loaded through DLL side-loading vulnerabilities in signed executables

bull Uses anti-disassembly techniques

bull Sometimes packed with VMProtect

copy 2019 Trend Micro Inc40

Shared backdoor - ShadowPad

bull New in 2020 sandbox evasion

bull if the loading DLL is not the expected one the program exits

It evades sandboxes that usually load DLLs with rundll32exe

copy 2019 Trend Micro Inc41

Shared backdoor - ShadowPad

bull Noticeable version tags

copy 2019 Trend Micro Inc42

Post-exploitation tools

copy 2019 Trend Micro Inc43

Post-exploitation tools - public

bull privilege escalation tools

bull CVE-2019-0803 and MS16-032 exploits

bull hash computational tools

bull credential dumpers

bull gsecdump v07

bull wdigest_extract

bull LaZagne

copy 2019 Trend Micro Inc44

Post-exploitation tools - public

bull Network shares enumeration

bull nbtscan 1035

bull Inbtscan (Python version of nbtscan)

bull Keyloggers

bull Keylogger1217

bull Lateral movement

bull Eternal Blue exploits

copy 2019 Trend Micro Inc45

Post-exploitation tools - private

bull Dumps information from the Domain Controller

bull Uses NetworkManagementAPIs

copy 2019 Trend Micro Inc46

Post-exploitation tools ndash hub relaying

Port 3925 Port 5688

CampC server

1 connects 2 sends traffic

3 forwards traffic

copy 2019 Trend Micro Inc47

Post-exploitation tools ndash hub relaying

bull Losing control of CampC does not expose the backend logic

bull CampC is simply a connection information forwarder

copy 2019 Trend Micro Inc48

Infrastructure

copy 2019 Trend Micro Inc49

Infrastructure

bull Multiple ldquoclustersrdquo of domain names

bull Infrastructure overlap

bull Clusters were usually bound to a specific malware family

copy 2019 Trend Micro Inc50

Infrastructure

bull From March to August 2020

bull 49 domains resolving to an IP address

bull Of which 38 dynamic domain names

bull 46 different IP addresses

copy 2019 Trend Micro Inc51

Infrastructure ndash attackerrsquos mistakes

bull Attacker misconfigured some CampC servers

bull We could find some new malware samples and families as well as victims

copy 2019 Trend Micro Inc52

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc53

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc54

Custom backdoors ndash attackerrsquos mistakes

bull Files with list of victims

copy 2019 Trend Micro Inc55

Targets

copy 2019 Trend Micro Inc56

Targets

bull 61 targets in 19 different countries from January to July 2020

bull Taiwan is the most targeted country followed by India and Russia

bull Technology and manufacturing industries were the most targeted followed by education and healthcare

copy 2019 Trend Micro Inc57

Targets ndash industries

Technology213

Manufacturing180

Education164

Healthcare131

Government82

Others230

copy 2019 Trend Micro Inc58

Targets ndash countries

Taiwan213

India131

Russia115

Germany66

Canada66

Australia66

Thailand66

Others277

copy 2019 Trend Micro Inc59

Links to other threat actors

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 14: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc14

Infection vector ndash spear phishing

bull For a successful attack the attacker requires user interaction

bull User awareness lowers the success rate of this type of attack

bull Applying updates prevents code execution in this context

bull Malicious documents and CampC were blocked once noticed

copy 2019 Trend Micro Inc15

Infection vector ndash exploiting vulnerabilities

bull Exploiting vulnerabilities in security solutionrsquos services exposed to Internet

bull CVE-2019-9489 (patched Apr 2019)

bull CVE-2020-8468 (patched Mar 2020)

copy 2019 Trend Micro Inc16

Infection vector ndash exploiting vulnerabilities

bull Exploiting vulnerabilities in security solutionrsquos services exposed to Internet

bull CVE-2019-9489 (patched Apr 2019)

bull CVE-2020-8468 (patched Mar 2020)

copy 2019 Trend Micro Inc17

Infection vector ndash exploiting vulnerabilities

bull Minority of the cases used this infection vectors

bull Both vulnerabilities are required for a successful attack

bull Delivered payload was a dropper for the Shadowpad malware family

copy 2019 Trend Micro Inc18

Infection vector ndash exploiting vulnerabilities

bull For a successful attack the attacker requires

bull A network access to the management server

bull An authentication bypass to such server

bull A vulnerability to execute code from this server

bull All of these conditions can be mitigated by network design and patch management

bull Malicious payloads and CampC were blocked once noticed

copy 2019 Trend Micro Inc19

Backdoors

copy 2019 Trend Micro Inc20

Custom backdoorsBackdoor family name First seen

Heartbeat 2009

Old Bisonal 2011

Chimaera 2012

Dexbia 2014

Bisonal01 2014

Bisonal02 2017

SPM 2018

Typehash 2019

Dumboc 2020

Idles 2020

copy 2019 Trend Micro Inc21

Custom backdoors ndash commands

bull All of them

bull Process enumeration download and file execution interactive shell

bull Most of them

bull File upload and deletion terminate process

bull Some of them

bull OS information collection uninstall wipe

copy 2019 Trend Micro Inc22

Custom backdoors ndash OS info

bull IP address

bull Code page

bull Time (tick count)

bull OS version token information

bull Computer name proxy information

bull Campaign ID presence of VM

copy 2019 Trend Micro Inc23

Custom backdoors ndash CampC encryption

bull No encryption

bull XOR used keys 0x15 0x1d 0x1f

bull RC4 hardcoded password 0x12345678

bull Custom use of atypical constants 0x58BF and 0x3193

copy 2019 Trend Micro Inc24

Custom backdoors ndash dexbia

bull Decryption steps

bull ELDLJFDRILGOEYFZGMCXDIHYGEDKAJIAFTFE

bull sYxef_xdbxaax80x9bxa8KVxcexa0Xtxd0x95x86

bull www[]riss[]ntdll[]net

copy 2019 Trend Micro Inc25

Custom backdoors ndash dexbia

bull Decryption steps

bull ELDLJFDRILGOEYFZGMCXDIHYGEDKAJIAFTFE

bull sYxef_xdbxaax80x9bxa8KVxcexa0Xtxd0x95x86

bull www[]riss[]ntdll[]net

copy 2019 Trend Micro Inc26

Custom backdoors ndash dexbia

bull Second loop with constants 0xCE6D (52845) =-0x3193 and 0x58BF (22719) can be also found in

Adobe Type 1 Font Format Specification

httpswwwadobecomcontentdamacomendevnetfontpdfsT1_SPECpdf

copy 2019 Trend Micro Inc27

Custom backdoors ndash network encryption

bull No encryption

bull Encodingcompress hex zlib base32 base64

bull XOR used keys 0x28 0x3f

bull RC4 hardcoded password 0x12345678

bull zlib + RC4

bull RC4 with 128-byte state vector

copy 2019 Trend Micro Inc28

Custom backdoors ndash network encryption

bull No encryption

bull Encodingcompress hex zlib base32 base64

bull XOR used keys 0x28 0x3f

bull RC4 hardcoded password 0x12345678

bull zlib + RC4

bull RC4 with 128-byte state vector

copy 2019 Trend Micro Inc29

Custom backdoors ndash network traffic

bull Example of Chimaera CampC communication

copy 2019 Trend Micro Inc30

Custom backdoors ndash VM check

bull Most of these families try to detect whether they are running inside a virtual machine

copy 2019 Trend Micro Inc31

Custom backdoors ndash sandbox evasion

bull Time delay

copy 2019 Trend Micro Inc32

Custom backdoors ndash sandbox evasion

bull Likely anti-sandbox trick

bull request for a non-existent website

bull prefix wwwgithub

bull httpswww[]github5o52d[]comDafpost[]asp

bull if this request fails the backdoor code flow continues as expected

copy 2019 Trend Micro Inc33

Custom backdoors - chimaera

bull Named after a caption

found in the control panel

copy 2019 Trend Micro Inc34

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc35

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc36

Custom backdoors - chimaera

bull Code similarity with old bisonal

bull Send machine info

bull Campaign ID

copy 2019 Trend Micro Inc37

Custom backdoors ndash campaign IDs

bull Some of these families have a campaign ID

416-J 0209J 0216jHC 228KJ 3sa new 711 Tranru Test DS MN1223 1228 dis ser mfa820 ser_ru rogx64 m0N~1 word0302 low_mn tnkk solr fvckrus ENERGY

copy 2019 Trend Micro Inc38

Shared backdoor - ShadowPad

bull Backdoor handling multiple plugins

bull Used in advanced supply chain attacks discovered in 2017 and 2018

bull Exclusive to WinntiAPT41 until 2019

copy 2019 Trend Micro Inc39

Shared backdoor - ShadowPad

bull Usually only 5 plugins are embeded

bull ldquoPluginsrdquo ldquoConfigrdquo ldquoInstallrdquo ldquoOnlinerdquo ldquoHTTPrdquo

bull In some cases ldquoTCPrdquo ldquoUDPrdquo

bull Loaded through DLL side-loading vulnerabilities in signed executables

bull Uses anti-disassembly techniques

bull Sometimes packed with VMProtect

copy 2019 Trend Micro Inc40

Shared backdoor - ShadowPad

bull New in 2020 sandbox evasion

bull if the loading DLL is not the expected one the program exits

It evades sandboxes that usually load DLLs with rundll32exe

copy 2019 Trend Micro Inc41

Shared backdoor - ShadowPad

bull Noticeable version tags

copy 2019 Trend Micro Inc42

Post-exploitation tools

copy 2019 Trend Micro Inc43

Post-exploitation tools - public

bull privilege escalation tools

bull CVE-2019-0803 and MS16-032 exploits

bull hash computational tools

bull credential dumpers

bull gsecdump v07

bull wdigest_extract

bull LaZagne

copy 2019 Trend Micro Inc44

Post-exploitation tools - public

bull Network shares enumeration

bull nbtscan 1035

bull Inbtscan (Python version of nbtscan)

bull Keyloggers

bull Keylogger1217

bull Lateral movement

bull Eternal Blue exploits

copy 2019 Trend Micro Inc45

Post-exploitation tools - private

bull Dumps information from the Domain Controller

bull Uses NetworkManagementAPIs

copy 2019 Trend Micro Inc46

Post-exploitation tools ndash hub relaying

Port 3925 Port 5688

CampC server

1 connects 2 sends traffic

3 forwards traffic

copy 2019 Trend Micro Inc47

Post-exploitation tools ndash hub relaying

bull Losing control of CampC does not expose the backend logic

bull CampC is simply a connection information forwarder

copy 2019 Trend Micro Inc48

Infrastructure

copy 2019 Trend Micro Inc49

Infrastructure

bull Multiple ldquoclustersrdquo of domain names

bull Infrastructure overlap

bull Clusters were usually bound to a specific malware family

copy 2019 Trend Micro Inc50

Infrastructure

bull From March to August 2020

bull 49 domains resolving to an IP address

bull Of which 38 dynamic domain names

bull 46 different IP addresses

copy 2019 Trend Micro Inc51

Infrastructure ndash attackerrsquos mistakes

bull Attacker misconfigured some CampC servers

bull We could find some new malware samples and families as well as victims

copy 2019 Trend Micro Inc52

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc53

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc54

Custom backdoors ndash attackerrsquos mistakes

bull Files with list of victims

copy 2019 Trend Micro Inc55

Targets

copy 2019 Trend Micro Inc56

Targets

bull 61 targets in 19 different countries from January to July 2020

bull Taiwan is the most targeted country followed by India and Russia

bull Technology and manufacturing industries were the most targeted followed by education and healthcare

copy 2019 Trend Micro Inc57

Targets ndash industries

Technology213

Manufacturing180

Education164

Healthcare131

Government82

Others230

copy 2019 Trend Micro Inc58

Targets ndash countries

Taiwan213

India131

Russia115

Germany66

Canada66

Australia66

Thailand66

Others277

copy 2019 Trend Micro Inc59

Links to other threat actors

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 15: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc15

Infection vector ndash exploiting vulnerabilities

bull Exploiting vulnerabilities in security solutionrsquos services exposed to Internet

bull CVE-2019-9489 (patched Apr 2019)

bull CVE-2020-8468 (patched Mar 2020)

copy 2019 Trend Micro Inc16

Infection vector ndash exploiting vulnerabilities

bull Exploiting vulnerabilities in security solutionrsquos services exposed to Internet

bull CVE-2019-9489 (patched Apr 2019)

bull CVE-2020-8468 (patched Mar 2020)

copy 2019 Trend Micro Inc17

Infection vector ndash exploiting vulnerabilities

bull Minority of the cases used this infection vectors

bull Both vulnerabilities are required for a successful attack

bull Delivered payload was a dropper for the Shadowpad malware family

copy 2019 Trend Micro Inc18

Infection vector ndash exploiting vulnerabilities

bull For a successful attack the attacker requires

bull A network access to the management server

bull An authentication bypass to such server

bull A vulnerability to execute code from this server

bull All of these conditions can be mitigated by network design and patch management

bull Malicious payloads and CampC were blocked once noticed

copy 2019 Trend Micro Inc19

Backdoors

copy 2019 Trend Micro Inc20

Custom backdoorsBackdoor family name First seen

Heartbeat 2009

Old Bisonal 2011

Chimaera 2012

Dexbia 2014

Bisonal01 2014

Bisonal02 2017

SPM 2018

Typehash 2019

Dumboc 2020

Idles 2020

copy 2019 Trend Micro Inc21

Custom backdoors ndash commands

bull All of them

bull Process enumeration download and file execution interactive shell

bull Most of them

bull File upload and deletion terminate process

bull Some of them

bull OS information collection uninstall wipe

copy 2019 Trend Micro Inc22

Custom backdoors ndash OS info

bull IP address

bull Code page

bull Time (tick count)

bull OS version token information

bull Computer name proxy information

bull Campaign ID presence of VM

copy 2019 Trend Micro Inc23

Custom backdoors ndash CampC encryption

bull No encryption

bull XOR used keys 0x15 0x1d 0x1f

bull RC4 hardcoded password 0x12345678

bull Custom use of atypical constants 0x58BF and 0x3193

copy 2019 Trend Micro Inc24

Custom backdoors ndash dexbia

bull Decryption steps

bull ELDLJFDRILGOEYFZGMCXDIHYGEDKAJIAFTFE

bull sYxef_xdbxaax80x9bxa8KVxcexa0Xtxd0x95x86

bull www[]riss[]ntdll[]net

copy 2019 Trend Micro Inc25

Custom backdoors ndash dexbia

bull Decryption steps

bull ELDLJFDRILGOEYFZGMCXDIHYGEDKAJIAFTFE

bull sYxef_xdbxaax80x9bxa8KVxcexa0Xtxd0x95x86

bull www[]riss[]ntdll[]net

copy 2019 Trend Micro Inc26

Custom backdoors ndash dexbia

bull Second loop with constants 0xCE6D (52845) =-0x3193 and 0x58BF (22719) can be also found in

Adobe Type 1 Font Format Specification

httpswwwadobecomcontentdamacomendevnetfontpdfsT1_SPECpdf

copy 2019 Trend Micro Inc27

Custom backdoors ndash network encryption

bull No encryption

bull Encodingcompress hex zlib base32 base64

bull XOR used keys 0x28 0x3f

bull RC4 hardcoded password 0x12345678

bull zlib + RC4

bull RC4 with 128-byte state vector

copy 2019 Trend Micro Inc28

Custom backdoors ndash network encryption

bull No encryption

bull Encodingcompress hex zlib base32 base64

bull XOR used keys 0x28 0x3f

bull RC4 hardcoded password 0x12345678

bull zlib + RC4

bull RC4 with 128-byte state vector

copy 2019 Trend Micro Inc29

Custom backdoors ndash network traffic

bull Example of Chimaera CampC communication

copy 2019 Trend Micro Inc30

Custom backdoors ndash VM check

bull Most of these families try to detect whether they are running inside a virtual machine

copy 2019 Trend Micro Inc31

Custom backdoors ndash sandbox evasion

bull Time delay

copy 2019 Trend Micro Inc32

Custom backdoors ndash sandbox evasion

bull Likely anti-sandbox trick

bull request for a non-existent website

bull prefix wwwgithub

bull httpswww[]github5o52d[]comDafpost[]asp

bull if this request fails the backdoor code flow continues as expected

copy 2019 Trend Micro Inc33

Custom backdoors - chimaera

bull Named after a caption

found in the control panel

copy 2019 Trend Micro Inc34

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc35

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc36

Custom backdoors - chimaera

bull Code similarity with old bisonal

bull Send machine info

bull Campaign ID

copy 2019 Trend Micro Inc37

Custom backdoors ndash campaign IDs

bull Some of these families have a campaign ID

416-J 0209J 0216jHC 228KJ 3sa new 711 Tranru Test DS MN1223 1228 dis ser mfa820 ser_ru rogx64 m0N~1 word0302 low_mn tnkk solr fvckrus ENERGY

copy 2019 Trend Micro Inc38

Shared backdoor - ShadowPad

bull Backdoor handling multiple plugins

bull Used in advanced supply chain attacks discovered in 2017 and 2018

bull Exclusive to WinntiAPT41 until 2019

copy 2019 Trend Micro Inc39

Shared backdoor - ShadowPad

bull Usually only 5 plugins are embeded

bull ldquoPluginsrdquo ldquoConfigrdquo ldquoInstallrdquo ldquoOnlinerdquo ldquoHTTPrdquo

bull In some cases ldquoTCPrdquo ldquoUDPrdquo

bull Loaded through DLL side-loading vulnerabilities in signed executables

bull Uses anti-disassembly techniques

bull Sometimes packed with VMProtect

copy 2019 Trend Micro Inc40

Shared backdoor - ShadowPad

bull New in 2020 sandbox evasion

bull if the loading DLL is not the expected one the program exits

It evades sandboxes that usually load DLLs with rundll32exe

copy 2019 Trend Micro Inc41

Shared backdoor - ShadowPad

bull Noticeable version tags

copy 2019 Trend Micro Inc42

Post-exploitation tools

copy 2019 Trend Micro Inc43

Post-exploitation tools - public

bull privilege escalation tools

bull CVE-2019-0803 and MS16-032 exploits

bull hash computational tools

bull credential dumpers

bull gsecdump v07

bull wdigest_extract

bull LaZagne

copy 2019 Trend Micro Inc44

Post-exploitation tools - public

bull Network shares enumeration

bull nbtscan 1035

bull Inbtscan (Python version of nbtscan)

bull Keyloggers

bull Keylogger1217

bull Lateral movement

bull Eternal Blue exploits

copy 2019 Trend Micro Inc45

Post-exploitation tools - private

bull Dumps information from the Domain Controller

bull Uses NetworkManagementAPIs

copy 2019 Trend Micro Inc46

Post-exploitation tools ndash hub relaying

Port 3925 Port 5688

CampC server

1 connects 2 sends traffic

3 forwards traffic

copy 2019 Trend Micro Inc47

Post-exploitation tools ndash hub relaying

bull Losing control of CampC does not expose the backend logic

bull CampC is simply a connection information forwarder

copy 2019 Trend Micro Inc48

Infrastructure

copy 2019 Trend Micro Inc49

Infrastructure

bull Multiple ldquoclustersrdquo of domain names

bull Infrastructure overlap

bull Clusters were usually bound to a specific malware family

copy 2019 Trend Micro Inc50

Infrastructure

bull From March to August 2020

bull 49 domains resolving to an IP address

bull Of which 38 dynamic domain names

bull 46 different IP addresses

copy 2019 Trend Micro Inc51

Infrastructure ndash attackerrsquos mistakes

bull Attacker misconfigured some CampC servers

bull We could find some new malware samples and families as well as victims

copy 2019 Trend Micro Inc52

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc53

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc54

Custom backdoors ndash attackerrsquos mistakes

bull Files with list of victims

copy 2019 Trend Micro Inc55

Targets

copy 2019 Trend Micro Inc56

Targets

bull 61 targets in 19 different countries from January to July 2020

bull Taiwan is the most targeted country followed by India and Russia

bull Technology and manufacturing industries were the most targeted followed by education and healthcare

copy 2019 Trend Micro Inc57

Targets ndash industries

Technology213

Manufacturing180

Education164

Healthcare131

Government82

Others230

copy 2019 Trend Micro Inc58

Targets ndash countries

Taiwan213

India131

Russia115

Germany66

Canada66

Australia66

Thailand66

Others277

copy 2019 Trend Micro Inc59

Links to other threat actors

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 16: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc16

Infection vector ndash exploiting vulnerabilities

bull Exploiting vulnerabilities in security solutionrsquos services exposed to Internet

bull CVE-2019-9489 (patched Apr 2019)

bull CVE-2020-8468 (patched Mar 2020)

copy 2019 Trend Micro Inc17

Infection vector ndash exploiting vulnerabilities

bull Minority of the cases used this infection vectors

bull Both vulnerabilities are required for a successful attack

bull Delivered payload was a dropper for the Shadowpad malware family

copy 2019 Trend Micro Inc18

Infection vector ndash exploiting vulnerabilities

bull For a successful attack the attacker requires

bull A network access to the management server

bull An authentication bypass to such server

bull A vulnerability to execute code from this server

bull All of these conditions can be mitigated by network design and patch management

bull Malicious payloads and CampC were blocked once noticed

copy 2019 Trend Micro Inc19

Backdoors

copy 2019 Trend Micro Inc20

Custom backdoorsBackdoor family name First seen

Heartbeat 2009

Old Bisonal 2011

Chimaera 2012

Dexbia 2014

Bisonal01 2014

Bisonal02 2017

SPM 2018

Typehash 2019

Dumboc 2020

Idles 2020

copy 2019 Trend Micro Inc21

Custom backdoors ndash commands

bull All of them

bull Process enumeration download and file execution interactive shell

bull Most of them

bull File upload and deletion terminate process

bull Some of them

bull OS information collection uninstall wipe

copy 2019 Trend Micro Inc22

Custom backdoors ndash OS info

bull IP address

bull Code page

bull Time (tick count)

bull OS version token information

bull Computer name proxy information

bull Campaign ID presence of VM

copy 2019 Trend Micro Inc23

Custom backdoors ndash CampC encryption

bull No encryption

bull XOR used keys 0x15 0x1d 0x1f

bull RC4 hardcoded password 0x12345678

bull Custom use of atypical constants 0x58BF and 0x3193

copy 2019 Trend Micro Inc24

Custom backdoors ndash dexbia

bull Decryption steps

bull ELDLJFDRILGOEYFZGMCXDIHYGEDKAJIAFTFE

bull sYxef_xdbxaax80x9bxa8KVxcexa0Xtxd0x95x86

bull www[]riss[]ntdll[]net

copy 2019 Trend Micro Inc25

Custom backdoors ndash dexbia

bull Decryption steps

bull ELDLJFDRILGOEYFZGMCXDIHYGEDKAJIAFTFE

bull sYxef_xdbxaax80x9bxa8KVxcexa0Xtxd0x95x86

bull www[]riss[]ntdll[]net

copy 2019 Trend Micro Inc26

Custom backdoors ndash dexbia

bull Second loop with constants 0xCE6D (52845) =-0x3193 and 0x58BF (22719) can be also found in

Adobe Type 1 Font Format Specification

httpswwwadobecomcontentdamacomendevnetfontpdfsT1_SPECpdf

copy 2019 Trend Micro Inc27

Custom backdoors ndash network encryption

bull No encryption

bull Encodingcompress hex zlib base32 base64

bull XOR used keys 0x28 0x3f

bull RC4 hardcoded password 0x12345678

bull zlib + RC4

bull RC4 with 128-byte state vector

copy 2019 Trend Micro Inc28

Custom backdoors ndash network encryption

bull No encryption

bull Encodingcompress hex zlib base32 base64

bull XOR used keys 0x28 0x3f

bull RC4 hardcoded password 0x12345678

bull zlib + RC4

bull RC4 with 128-byte state vector

copy 2019 Trend Micro Inc29

Custom backdoors ndash network traffic

bull Example of Chimaera CampC communication

copy 2019 Trend Micro Inc30

Custom backdoors ndash VM check

bull Most of these families try to detect whether they are running inside a virtual machine

copy 2019 Trend Micro Inc31

Custom backdoors ndash sandbox evasion

bull Time delay

copy 2019 Trend Micro Inc32

Custom backdoors ndash sandbox evasion

bull Likely anti-sandbox trick

bull request for a non-existent website

bull prefix wwwgithub

bull httpswww[]github5o52d[]comDafpost[]asp

bull if this request fails the backdoor code flow continues as expected

copy 2019 Trend Micro Inc33

Custom backdoors - chimaera

bull Named after a caption

found in the control panel

copy 2019 Trend Micro Inc34

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc35

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc36

Custom backdoors - chimaera

bull Code similarity with old bisonal

bull Send machine info

bull Campaign ID

copy 2019 Trend Micro Inc37

Custom backdoors ndash campaign IDs

bull Some of these families have a campaign ID

416-J 0209J 0216jHC 228KJ 3sa new 711 Tranru Test DS MN1223 1228 dis ser mfa820 ser_ru rogx64 m0N~1 word0302 low_mn tnkk solr fvckrus ENERGY

copy 2019 Trend Micro Inc38

Shared backdoor - ShadowPad

bull Backdoor handling multiple plugins

bull Used in advanced supply chain attacks discovered in 2017 and 2018

bull Exclusive to WinntiAPT41 until 2019

copy 2019 Trend Micro Inc39

Shared backdoor - ShadowPad

bull Usually only 5 plugins are embeded

bull ldquoPluginsrdquo ldquoConfigrdquo ldquoInstallrdquo ldquoOnlinerdquo ldquoHTTPrdquo

bull In some cases ldquoTCPrdquo ldquoUDPrdquo

bull Loaded through DLL side-loading vulnerabilities in signed executables

bull Uses anti-disassembly techniques

bull Sometimes packed with VMProtect

copy 2019 Trend Micro Inc40

Shared backdoor - ShadowPad

bull New in 2020 sandbox evasion

bull if the loading DLL is not the expected one the program exits

It evades sandboxes that usually load DLLs with rundll32exe

copy 2019 Trend Micro Inc41

Shared backdoor - ShadowPad

bull Noticeable version tags

copy 2019 Trend Micro Inc42

Post-exploitation tools

copy 2019 Trend Micro Inc43

Post-exploitation tools - public

bull privilege escalation tools

bull CVE-2019-0803 and MS16-032 exploits

bull hash computational tools

bull credential dumpers

bull gsecdump v07

bull wdigest_extract

bull LaZagne

copy 2019 Trend Micro Inc44

Post-exploitation tools - public

bull Network shares enumeration

bull nbtscan 1035

bull Inbtscan (Python version of nbtscan)

bull Keyloggers

bull Keylogger1217

bull Lateral movement

bull Eternal Blue exploits

copy 2019 Trend Micro Inc45

Post-exploitation tools - private

bull Dumps information from the Domain Controller

bull Uses NetworkManagementAPIs

copy 2019 Trend Micro Inc46

Post-exploitation tools ndash hub relaying

Port 3925 Port 5688

CampC server

1 connects 2 sends traffic

3 forwards traffic

copy 2019 Trend Micro Inc47

Post-exploitation tools ndash hub relaying

bull Losing control of CampC does not expose the backend logic

bull CampC is simply a connection information forwarder

copy 2019 Trend Micro Inc48

Infrastructure

copy 2019 Trend Micro Inc49

Infrastructure

bull Multiple ldquoclustersrdquo of domain names

bull Infrastructure overlap

bull Clusters were usually bound to a specific malware family

copy 2019 Trend Micro Inc50

Infrastructure

bull From March to August 2020

bull 49 domains resolving to an IP address

bull Of which 38 dynamic domain names

bull 46 different IP addresses

copy 2019 Trend Micro Inc51

Infrastructure ndash attackerrsquos mistakes

bull Attacker misconfigured some CampC servers

bull We could find some new malware samples and families as well as victims

copy 2019 Trend Micro Inc52

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc53

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc54

Custom backdoors ndash attackerrsquos mistakes

bull Files with list of victims

copy 2019 Trend Micro Inc55

Targets

copy 2019 Trend Micro Inc56

Targets

bull 61 targets in 19 different countries from January to July 2020

bull Taiwan is the most targeted country followed by India and Russia

bull Technology and manufacturing industries were the most targeted followed by education and healthcare

copy 2019 Trend Micro Inc57

Targets ndash industries

Technology213

Manufacturing180

Education164

Healthcare131

Government82

Others230

copy 2019 Trend Micro Inc58

Targets ndash countries

Taiwan213

India131

Russia115

Germany66

Canada66

Australia66

Thailand66

Others277

copy 2019 Trend Micro Inc59

Links to other threat actors

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 17: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc17

Infection vector ndash exploiting vulnerabilities

bull Minority of the cases used this infection vectors

bull Both vulnerabilities are required for a successful attack

bull Delivered payload was a dropper for the Shadowpad malware family

copy 2019 Trend Micro Inc18

Infection vector ndash exploiting vulnerabilities

bull For a successful attack the attacker requires

bull A network access to the management server

bull An authentication bypass to such server

bull A vulnerability to execute code from this server

bull All of these conditions can be mitigated by network design and patch management

bull Malicious payloads and CampC were blocked once noticed

copy 2019 Trend Micro Inc19

Backdoors

copy 2019 Trend Micro Inc20

Custom backdoorsBackdoor family name First seen

Heartbeat 2009

Old Bisonal 2011

Chimaera 2012

Dexbia 2014

Bisonal01 2014

Bisonal02 2017

SPM 2018

Typehash 2019

Dumboc 2020

Idles 2020

copy 2019 Trend Micro Inc21

Custom backdoors ndash commands

bull All of them

bull Process enumeration download and file execution interactive shell

bull Most of them

bull File upload and deletion terminate process

bull Some of them

bull OS information collection uninstall wipe

copy 2019 Trend Micro Inc22

Custom backdoors ndash OS info

bull IP address

bull Code page

bull Time (tick count)

bull OS version token information

bull Computer name proxy information

bull Campaign ID presence of VM

copy 2019 Trend Micro Inc23

Custom backdoors ndash CampC encryption

bull No encryption

bull XOR used keys 0x15 0x1d 0x1f

bull RC4 hardcoded password 0x12345678

bull Custom use of atypical constants 0x58BF and 0x3193

copy 2019 Trend Micro Inc24

Custom backdoors ndash dexbia

bull Decryption steps

bull ELDLJFDRILGOEYFZGMCXDIHYGEDKAJIAFTFE

bull sYxef_xdbxaax80x9bxa8KVxcexa0Xtxd0x95x86

bull www[]riss[]ntdll[]net

copy 2019 Trend Micro Inc25

Custom backdoors ndash dexbia

bull Decryption steps

bull ELDLJFDRILGOEYFZGMCXDIHYGEDKAJIAFTFE

bull sYxef_xdbxaax80x9bxa8KVxcexa0Xtxd0x95x86

bull www[]riss[]ntdll[]net

copy 2019 Trend Micro Inc26

Custom backdoors ndash dexbia

bull Second loop with constants 0xCE6D (52845) =-0x3193 and 0x58BF (22719) can be also found in

Adobe Type 1 Font Format Specification

httpswwwadobecomcontentdamacomendevnetfontpdfsT1_SPECpdf

copy 2019 Trend Micro Inc27

Custom backdoors ndash network encryption

bull No encryption

bull Encodingcompress hex zlib base32 base64

bull XOR used keys 0x28 0x3f

bull RC4 hardcoded password 0x12345678

bull zlib + RC4

bull RC4 with 128-byte state vector

copy 2019 Trend Micro Inc28

Custom backdoors ndash network encryption

bull No encryption

bull Encodingcompress hex zlib base32 base64

bull XOR used keys 0x28 0x3f

bull RC4 hardcoded password 0x12345678

bull zlib + RC4

bull RC4 with 128-byte state vector

copy 2019 Trend Micro Inc29

Custom backdoors ndash network traffic

bull Example of Chimaera CampC communication

copy 2019 Trend Micro Inc30

Custom backdoors ndash VM check

bull Most of these families try to detect whether they are running inside a virtual machine

copy 2019 Trend Micro Inc31

Custom backdoors ndash sandbox evasion

bull Time delay

copy 2019 Trend Micro Inc32

Custom backdoors ndash sandbox evasion

bull Likely anti-sandbox trick

bull request for a non-existent website

bull prefix wwwgithub

bull httpswww[]github5o52d[]comDafpost[]asp

bull if this request fails the backdoor code flow continues as expected

copy 2019 Trend Micro Inc33

Custom backdoors - chimaera

bull Named after a caption

found in the control panel

copy 2019 Trend Micro Inc34

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc35

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc36

Custom backdoors - chimaera

bull Code similarity with old bisonal

bull Send machine info

bull Campaign ID

copy 2019 Trend Micro Inc37

Custom backdoors ndash campaign IDs

bull Some of these families have a campaign ID

416-J 0209J 0216jHC 228KJ 3sa new 711 Tranru Test DS MN1223 1228 dis ser mfa820 ser_ru rogx64 m0N~1 word0302 low_mn tnkk solr fvckrus ENERGY

copy 2019 Trend Micro Inc38

Shared backdoor - ShadowPad

bull Backdoor handling multiple plugins

bull Used in advanced supply chain attacks discovered in 2017 and 2018

bull Exclusive to WinntiAPT41 until 2019

copy 2019 Trend Micro Inc39

Shared backdoor - ShadowPad

bull Usually only 5 plugins are embeded

bull ldquoPluginsrdquo ldquoConfigrdquo ldquoInstallrdquo ldquoOnlinerdquo ldquoHTTPrdquo

bull In some cases ldquoTCPrdquo ldquoUDPrdquo

bull Loaded through DLL side-loading vulnerabilities in signed executables

bull Uses anti-disassembly techniques

bull Sometimes packed with VMProtect

copy 2019 Trend Micro Inc40

Shared backdoor - ShadowPad

bull New in 2020 sandbox evasion

bull if the loading DLL is not the expected one the program exits

It evades sandboxes that usually load DLLs with rundll32exe

copy 2019 Trend Micro Inc41

Shared backdoor - ShadowPad

bull Noticeable version tags

copy 2019 Trend Micro Inc42

Post-exploitation tools

copy 2019 Trend Micro Inc43

Post-exploitation tools - public

bull privilege escalation tools

bull CVE-2019-0803 and MS16-032 exploits

bull hash computational tools

bull credential dumpers

bull gsecdump v07

bull wdigest_extract

bull LaZagne

copy 2019 Trend Micro Inc44

Post-exploitation tools - public

bull Network shares enumeration

bull nbtscan 1035

bull Inbtscan (Python version of nbtscan)

bull Keyloggers

bull Keylogger1217

bull Lateral movement

bull Eternal Blue exploits

copy 2019 Trend Micro Inc45

Post-exploitation tools - private

bull Dumps information from the Domain Controller

bull Uses NetworkManagementAPIs

copy 2019 Trend Micro Inc46

Post-exploitation tools ndash hub relaying

Port 3925 Port 5688

CampC server

1 connects 2 sends traffic

3 forwards traffic

copy 2019 Trend Micro Inc47

Post-exploitation tools ndash hub relaying

bull Losing control of CampC does not expose the backend logic

bull CampC is simply a connection information forwarder

copy 2019 Trend Micro Inc48

Infrastructure

copy 2019 Trend Micro Inc49

Infrastructure

bull Multiple ldquoclustersrdquo of domain names

bull Infrastructure overlap

bull Clusters were usually bound to a specific malware family

copy 2019 Trend Micro Inc50

Infrastructure

bull From March to August 2020

bull 49 domains resolving to an IP address

bull Of which 38 dynamic domain names

bull 46 different IP addresses

copy 2019 Trend Micro Inc51

Infrastructure ndash attackerrsquos mistakes

bull Attacker misconfigured some CampC servers

bull We could find some new malware samples and families as well as victims

copy 2019 Trend Micro Inc52

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc53

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc54

Custom backdoors ndash attackerrsquos mistakes

bull Files with list of victims

copy 2019 Trend Micro Inc55

Targets

copy 2019 Trend Micro Inc56

Targets

bull 61 targets in 19 different countries from January to July 2020

bull Taiwan is the most targeted country followed by India and Russia

bull Technology and manufacturing industries were the most targeted followed by education and healthcare

copy 2019 Trend Micro Inc57

Targets ndash industries

Technology213

Manufacturing180

Education164

Healthcare131

Government82

Others230

copy 2019 Trend Micro Inc58

Targets ndash countries

Taiwan213

India131

Russia115

Germany66

Canada66

Australia66

Thailand66

Others277

copy 2019 Trend Micro Inc59

Links to other threat actors

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 18: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc18

Infection vector ndash exploiting vulnerabilities

bull For a successful attack the attacker requires

bull A network access to the management server

bull An authentication bypass to such server

bull A vulnerability to execute code from this server

bull All of these conditions can be mitigated by network design and patch management

bull Malicious payloads and CampC were blocked once noticed

copy 2019 Trend Micro Inc19

Backdoors

copy 2019 Trend Micro Inc20

Custom backdoorsBackdoor family name First seen

Heartbeat 2009

Old Bisonal 2011

Chimaera 2012

Dexbia 2014

Bisonal01 2014

Bisonal02 2017

SPM 2018

Typehash 2019

Dumboc 2020

Idles 2020

copy 2019 Trend Micro Inc21

Custom backdoors ndash commands

bull All of them

bull Process enumeration download and file execution interactive shell

bull Most of them

bull File upload and deletion terminate process

bull Some of them

bull OS information collection uninstall wipe

copy 2019 Trend Micro Inc22

Custom backdoors ndash OS info

bull IP address

bull Code page

bull Time (tick count)

bull OS version token information

bull Computer name proxy information

bull Campaign ID presence of VM

copy 2019 Trend Micro Inc23

Custom backdoors ndash CampC encryption

bull No encryption

bull XOR used keys 0x15 0x1d 0x1f

bull RC4 hardcoded password 0x12345678

bull Custom use of atypical constants 0x58BF and 0x3193

copy 2019 Trend Micro Inc24

Custom backdoors ndash dexbia

bull Decryption steps

bull ELDLJFDRILGOEYFZGMCXDIHYGEDKAJIAFTFE

bull sYxef_xdbxaax80x9bxa8KVxcexa0Xtxd0x95x86

bull www[]riss[]ntdll[]net

copy 2019 Trend Micro Inc25

Custom backdoors ndash dexbia

bull Decryption steps

bull ELDLJFDRILGOEYFZGMCXDIHYGEDKAJIAFTFE

bull sYxef_xdbxaax80x9bxa8KVxcexa0Xtxd0x95x86

bull www[]riss[]ntdll[]net

copy 2019 Trend Micro Inc26

Custom backdoors ndash dexbia

bull Second loop with constants 0xCE6D (52845) =-0x3193 and 0x58BF (22719) can be also found in

Adobe Type 1 Font Format Specification

httpswwwadobecomcontentdamacomendevnetfontpdfsT1_SPECpdf

copy 2019 Trend Micro Inc27

Custom backdoors ndash network encryption

bull No encryption

bull Encodingcompress hex zlib base32 base64

bull XOR used keys 0x28 0x3f

bull RC4 hardcoded password 0x12345678

bull zlib + RC4

bull RC4 with 128-byte state vector

copy 2019 Trend Micro Inc28

Custom backdoors ndash network encryption

bull No encryption

bull Encodingcompress hex zlib base32 base64

bull XOR used keys 0x28 0x3f

bull RC4 hardcoded password 0x12345678

bull zlib + RC4

bull RC4 with 128-byte state vector

copy 2019 Trend Micro Inc29

Custom backdoors ndash network traffic

bull Example of Chimaera CampC communication

copy 2019 Trend Micro Inc30

Custom backdoors ndash VM check

bull Most of these families try to detect whether they are running inside a virtual machine

copy 2019 Trend Micro Inc31

Custom backdoors ndash sandbox evasion

bull Time delay

copy 2019 Trend Micro Inc32

Custom backdoors ndash sandbox evasion

bull Likely anti-sandbox trick

bull request for a non-existent website

bull prefix wwwgithub

bull httpswww[]github5o52d[]comDafpost[]asp

bull if this request fails the backdoor code flow continues as expected

copy 2019 Trend Micro Inc33

Custom backdoors - chimaera

bull Named after a caption

found in the control panel

copy 2019 Trend Micro Inc34

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc35

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc36

Custom backdoors - chimaera

bull Code similarity with old bisonal

bull Send machine info

bull Campaign ID

copy 2019 Trend Micro Inc37

Custom backdoors ndash campaign IDs

bull Some of these families have a campaign ID

416-J 0209J 0216jHC 228KJ 3sa new 711 Tranru Test DS MN1223 1228 dis ser mfa820 ser_ru rogx64 m0N~1 word0302 low_mn tnkk solr fvckrus ENERGY

copy 2019 Trend Micro Inc38

Shared backdoor - ShadowPad

bull Backdoor handling multiple plugins

bull Used in advanced supply chain attacks discovered in 2017 and 2018

bull Exclusive to WinntiAPT41 until 2019

copy 2019 Trend Micro Inc39

Shared backdoor - ShadowPad

bull Usually only 5 plugins are embeded

bull ldquoPluginsrdquo ldquoConfigrdquo ldquoInstallrdquo ldquoOnlinerdquo ldquoHTTPrdquo

bull In some cases ldquoTCPrdquo ldquoUDPrdquo

bull Loaded through DLL side-loading vulnerabilities in signed executables

bull Uses anti-disassembly techniques

bull Sometimes packed with VMProtect

copy 2019 Trend Micro Inc40

Shared backdoor - ShadowPad

bull New in 2020 sandbox evasion

bull if the loading DLL is not the expected one the program exits

It evades sandboxes that usually load DLLs with rundll32exe

copy 2019 Trend Micro Inc41

Shared backdoor - ShadowPad

bull Noticeable version tags

copy 2019 Trend Micro Inc42

Post-exploitation tools

copy 2019 Trend Micro Inc43

Post-exploitation tools - public

bull privilege escalation tools

bull CVE-2019-0803 and MS16-032 exploits

bull hash computational tools

bull credential dumpers

bull gsecdump v07

bull wdigest_extract

bull LaZagne

copy 2019 Trend Micro Inc44

Post-exploitation tools - public

bull Network shares enumeration

bull nbtscan 1035

bull Inbtscan (Python version of nbtscan)

bull Keyloggers

bull Keylogger1217

bull Lateral movement

bull Eternal Blue exploits

copy 2019 Trend Micro Inc45

Post-exploitation tools - private

bull Dumps information from the Domain Controller

bull Uses NetworkManagementAPIs

copy 2019 Trend Micro Inc46

Post-exploitation tools ndash hub relaying

Port 3925 Port 5688

CampC server

1 connects 2 sends traffic

3 forwards traffic

copy 2019 Trend Micro Inc47

Post-exploitation tools ndash hub relaying

bull Losing control of CampC does not expose the backend logic

bull CampC is simply a connection information forwarder

copy 2019 Trend Micro Inc48

Infrastructure

copy 2019 Trend Micro Inc49

Infrastructure

bull Multiple ldquoclustersrdquo of domain names

bull Infrastructure overlap

bull Clusters were usually bound to a specific malware family

copy 2019 Trend Micro Inc50

Infrastructure

bull From March to August 2020

bull 49 domains resolving to an IP address

bull Of which 38 dynamic domain names

bull 46 different IP addresses

copy 2019 Trend Micro Inc51

Infrastructure ndash attackerrsquos mistakes

bull Attacker misconfigured some CampC servers

bull We could find some new malware samples and families as well as victims

copy 2019 Trend Micro Inc52

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc53

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc54

Custom backdoors ndash attackerrsquos mistakes

bull Files with list of victims

copy 2019 Trend Micro Inc55

Targets

copy 2019 Trend Micro Inc56

Targets

bull 61 targets in 19 different countries from January to July 2020

bull Taiwan is the most targeted country followed by India and Russia

bull Technology and manufacturing industries were the most targeted followed by education and healthcare

copy 2019 Trend Micro Inc57

Targets ndash industries

Technology213

Manufacturing180

Education164

Healthcare131

Government82

Others230

copy 2019 Trend Micro Inc58

Targets ndash countries

Taiwan213

India131

Russia115

Germany66

Canada66

Australia66

Thailand66

Others277

copy 2019 Trend Micro Inc59

Links to other threat actors

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 19: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc19

Backdoors

copy 2019 Trend Micro Inc20

Custom backdoorsBackdoor family name First seen

Heartbeat 2009

Old Bisonal 2011

Chimaera 2012

Dexbia 2014

Bisonal01 2014

Bisonal02 2017

SPM 2018

Typehash 2019

Dumboc 2020

Idles 2020

copy 2019 Trend Micro Inc21

Custom backdoors ndash commands

bull All of them

bull Process enumeration download and file execution interactive shell

bull Most of them

bull File upload and deletion terminate process

bull Some of them

bull OS information collection uninstall wipe

copy 2019 Trend Micro Inc22

Custom backdoors ndash OS info

bull IP address

bull Code page

bull Time (tick count)

bull OS version token information

bull Computer name proxy information

bull Campaign ID presence of VM

copy 2019 Trend Micro Inc23

Custom backdoors ndash CampC encryption

bull No encryption

bull XOR used keys 0x15 0x1d 0x1f

bull RC4 hardcoded password 0x12345678

bull Custom use of atypical constants 0x58BF and 0x3193

copy 2019 Trend Micro Inc24

Custom backdoors ndash dexbia

bull Decryption steps

bull ELDLJFDRILGOEYFZGMCXDIHYGEDKAJIAFTFE

bull sYxef_xdbxaax80x9bxa8KVxcexa0Xtxd0x95x86

bull www[]riss[]ntdll[]net

copy 2019 Trend Micro Inc25

Custom backdoors ndash dexbia

bull Decryption steps

bull ELDLJFDRILGOEYFZGMCXDIHYGEDKAJIAFTFE

bull sYxef_xdbxaax80x9bxa8KVxcexa0Xtxd0x95x86

bull www[]riss[]ntdll[]net

copy 2019 Trend Micro Inc26

Custom backdoors ndash dexbia

bull Second loop with constants 0xCE6D (52845) =-0x3193 and 0x58BF (22719) can be also found in

Adobe Type 1 Font Format Specification

httpswwwadobecomcontentdamacomendevnetfontpdfsT1_SPECpdf

copy 2019 Trend Micro Inc27

Custom backdoors ndash network encryption

bull No encryption

bull Encodingcompress hex zlib base32 base64

bull XOR used keys 0x28 0x3f

bull RC4 hardcoded password 0x12345678

bull zlib + RC4

bull RC4 with 128-byte state vector

copy 2019 Trend Micro Inc28

Custom backdoors ndash network encryption

bull No encryption

bull Encodingcompress hex zlib base32 base64

bull XOR used keys 0x28 0x3f

bull RC4 hardcoded password 0x12345678

bull zlib + RC4

bull RC4 with 128-byte state vector

copy 2019 Trend Micro Inc29

Custom backdoors ndash network traffic

bull Example of Chimaera CampC communication

copy 2019 Trend Micro Inc30

Custom backdoors ndash VM check

bull Most of these families try to detect whether they are running inside a virtual machine

copy 2019 Trend Micro Inc31

Custom backdoors ndash sandbox evasion

bull Time delay

copy 2019 Trend Micro Inc32

Custom backdoors ndash sandbox evasion

bull Likely anti-sandbox trick

bull request for a non-existent website

bull prefix wwwgithub

bull httpswww[]github5o52d[]comDafpost[]asp

bull if this request fails the backdoor code flow continues as expected

copy 2019 Trend Micro Inc33

Custom backdoors - chimaera

bull Named after a caption

found in the control panel

copy 2019 Trend Micro Inc34

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc35

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc36

Custom backdoors - chimaera

bull Code similarity with old bisonal

bull Send machine info

bull Campaign ID

copy 2019 Trend Micro Inc37

Custom backdoors ndash campaign IDs

bull Some of these families have a campaign ID

416-J 0209J 0216jHC 228KJ 3sa new 711 Tranru Test DS MN1223 1228 dis ser mfa820 ser_ru rogx64 m0N~1 word0302 low_mn tnkk solr fvckrus ENERGY

copy 2019 Trend Micro Inc38

Shared backdoor - ShadowPad

bull Backdoor handling multiple plugins

bull Used in advanced supply chain attacks discovered in 2017 and 2018

bull Exclusive to WinntiAPT41 until 2019

copy 2019 Trend Micro Inc39

Shared backdoor - ShadowPad

bull Usually only 5 plugins are embeded

bull ldquoPluginsrdquo ldquoConfigrdquo ldquoInstallrdquo ldquoOnlinerdquo ldquoHTTPrdquo

bull In some cases ldquoTCPrdquo ldquoUDPrdquo

bull Loaded through DLL side-loading vulnerabilities in signed executables

bull Uses anti-disassembly techniques

bull Sometimes packed with VMProtect

copy 2019 Trend Micro Inc40

Shared backdoor - ShadowPad

bull New in 2020 sandbox evasion

bull if the loading DLL is not the expected one the program exits

It evades sandboxes that usually load DLLs with rundll32exe

copy 2019 Trend Micro Inc41

Shared backdoor - ShadowPad

bull Noticeable version tags

copy 2019 Trend Micro Inc42

Post-exploitation tools

copy 2019 Trend Micro Inc43

Post-exploitation tools - public

bull privilege escalation tools

bull CVE-2019-0803 and MS16-032 exploits

bull hash computational tools

bull credential dumpers

bull gsecdump v07

bull wdigest_extract

bull LaZagne

copy 2019 Trend Micro Inc44

Post-exploitation tools - public

bull Network shares enumeration

bull nbtscan 1035

bull Inbtscan (Python version of nbtscan)

bull Keyloggers

bull Keylogger1217

bull Lateral movement

bull Eternal Blue exploits

copy 2019 Trend Micro Inc45

Post-exploitation tools - private

bull Dumps information from the Domain Controller

bull Uses NetworkManagementAPIs

copy 2019 Trend Micro Inc46

Post-exploitation tools ndash hub relaying

Port 3925 Port 5688

CampC server

1 connects 2 sends traffic

3 forwards traffic

copy 2019 Trend Micro Inc47

Post-exploitation tools ndash hub relaying

bull Losing control of CampC does not expose the backend logic

bull CampC is simply a connection information forwarder

copy 2019 Trend Micro Inc48

Infrastructure

copy 2019 Trend Micro Inc49

Infrastructure

bull Multiple ldquoclustersrdquo of domain names

bull Infrastructure overlap

bull Clusters were usually bound to a specific malware family

copy 2019 Trend Micro Inc50

Infrastructure

bull From March to August 2020

bull 49 domains resolving to an IP address

bull Of which 38 dynamic domain names

bull 46 different IP addresses

copy 2019 Trend Micro Inc51

Infrastructure ndash attackerrsquos mistakes

bull Attacker misconfigured some CampC servers

bull We could find some new malware samples and families as well as victims

copy 2019 Trend Micro Inc52

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc53

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc54

Custom backdoors ndash attackerrsquos mistakes

bull Files with list of victims

copy 2019 Trend Micro Inc55

Targets

copy 2019 Trend Micro Inc56

Targets

bull 61 targets in 19 different countries from January to July 2020

bull Taiwan is the most targeted country followed by India and Russia

bull Technology and manufacturing industries were the most targeted followed by education and healthcare

copy 2019 Trend Micro Inc57

Targets ndash industries

Technology213

Manufacturing180

Education164

Healthcare131

Government82

Others230

copy 2019 Trend Micro Inc58

Targets ndash countries

Taiwan213

India131

Russia115

Germany66

Canada66

Australia66

Thailand66

Others277

copy 2019 Trend Micro Inc59

Links to other threat actors

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 20: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc20

Custom backdoorsBackdoor family name First seen

Heartbeat 2009

Old Bisonal 2011

Chimaera 2012

Dexbia 2014

Bisonal01 2014

Bisonal02 2017

SPM 2018

Typehash 2019

Dumboc 2020

Idles 2020

copy 2019 Trend Micro Inc21

Custom backdoors ndash commands

bull All of them

bull Process enumeration download and file execution interactive shell

bull Most of them

bull File upload and deletion terminate process

bull Some of them

bull OS information collection uninstall wipe

copy 2019 Trend Micro Inc22

Custom backdoors ndash OS info

bull IP address

bull Code page

bull Time (tick count)

bull OS version token information

bull Computer name proxy information

bull Campaign ID presence of VM

copy 2019 Trend Micro Inc23

Custom backdoors ndash CampC encryption

bull No encryption

bull XOR used keys 0x15 0x1d 0x1f

bull RC4 hardcoded password 0x12345678

bull Custom use of atypical constants 0x58BF and 0x3193

copy 2019 Trend Micro Inc24

Custom backdoors ndash dexbia

bull Decryption steps

bull ELDLJFDRILGOEYFZGMCXDIHYGEDKAJIAFTFE

bull sYxef_xdbxaax80x9bxa8KVxcexa0Xtxd0x95x86

bull www[]riss[]ntdll[]net

copy 2019 Trend Micro Inc25

Custom backdoors ndash dexbia

bull Decryption steps

bull ELDLJFDRILGOEYFZGMCXDIHYGEDKAJIAFTFE

bull sYxef_xdbxaax80x9bxa8KVxcexa0Xtxd0x95x86

bull www[]riss[]ntdll[]net

copy 2019 Trend Micro Inc26

Custom backdoors ndash dexbia

bull Second loop with constants 0xCE6D (52845) =-0x3193 and 0x58BF (22719) can be also found in

Adobe Type 1 Font Format Specification

httpswwwadobecomcontentdamacomendevnetfontpdfsT1_SPECpdf

copy 2019 Trend Micro Inc27

Custom backdoors ndash network encryption

bull No encryption

bull Encodingcompress hex zlib base32 base64

bull XOR used keys 0x28 0x3f

bull RC4 hardcoded password 0x12345678

bull zlib + RC4

bull RC4 with 128-byte state vector

copy 2019 Trend Micro Inc28

Custom backdoors ndash network encryption

bull No encryption

bull Encodingcompress hex zlib base32 base64

bull XOR used keys 0x28 0x3f

bull RC4 hardcoded password 0x12345678

bull zlib + RC4

bull RC4 with 128-byte state vector

copy 2019 Trend Micro Inc29

Custom backdoors ndash network traffic

bull Example of Chimaera CampC communication

copy 2019 Trend Micro Inc30

Custom backdoors ndash VM check

bull Most of these families try to detect whether they are running inside a virtual machine

copy 2019 Trend Micro Inc31

Custom backdoors ndash sandbox evasion

bull Time delay

copy 2019 Trend Micro Inc32

Custom backdoors ndash sandbox evasion

bull Likely anti-sandbox trick

bull request for a non-existent website

bull prefix wwwgithub

bull httpswww[]github5o52d[]comDafpost[]asp

bull if this request fails the backdoor code flow continues as expected

copy 2019 Trend Micro Inc33

Custom backdoors - chimaera

bull Named after a caption

found in the control panel

copy 2019 Trend Micro Inc34

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc35

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc36

Custom backdoors - chimaera

bull Code similarity with old bisonal

bull Send machine info

bull Campaign ID

copy 2019 Trend Micro Inc37

Custom backdoors ndash campaign IDs

bull Some of these families have a campaign ID

416-J 0209J 0216jHC 228KJ 3sa new 711 Tranru Test DS MN1223 1228 dis ser mfa820 ser_ru rogx64 m0N~1 word0302 low_mn tnkk solr fvckrus ENERGY

copy 2019 Trend Micro Inc38

Shared backdoor - ShadowPad

bull Backdoor handling multiple plugins

bull Used in advanced supply chain attacks discovered in 2017 and 2018

bull Exclusive to WinntiAPT41 until 2019

copy 2019 Trend Micro Inc39

Shared backdoor - ShadowPad

bull Usually only 5 plugins are embeded

bull ldquoPluginsrdquo ldquoConfigrdquo ldquoInstallrdquo ldquoOnlinerdquo ldquoHTTPrdquo

bull In some cases ldquoTCPrdquo ldquoUDPrdquo

bull Loaded through DLL side-loading vulnerabilities in signed executables

bull Uses anti-disassembly techniques

bull Sometimes packed with VMProtect

copy 2019 Trend Micro Inc40

Shared backdoor - ShadowPad

bull New in 2020 sandbox evasion

bull if the loading DLL is not the expected one the program exits

It evades sandboxes that usually load DLLs with rundll32exe

copy 2019 Trend Micro Inc41

Shared backdoor - ShadowPad

bull Noticeable version tags

copy 2019 Trend Micro Inc42

Post-exploitation tools

copy 2019 Trend Micro Inc43

Post-exploitation tools - public

bull privilege escalation tools

bull CVE-2019-0803 and MS16-032 exploits

bull hash computational tools

bull credential dumpers

bull gsecdump v07

bull wdigest_extract

bull LaZagne

copy 2019 Trend Micro Inc44

Post-exploitation tools - public

bull Network shares enumeration

bull nbtscan 1035

bull Inbtscan (Python version of nbtscan)

bull Keyloggers

bull Keylogger1217

bull Lateral movement

bull Eternal Blue exploits

copy 2019 Trend Micro Inc45

Post-exploitation tools - private

bull Dumps information from the Domain Controller

bull Uses NetworkManagementAPIs

copy 2019 Trend Micro Inc46

Post-exploitation tools ndash hub relaying

Port 3925 Port 5688

CampC server

1 connects 2 sends traffic

3 forwards traffic

copy 2019 Trend Micro Inc47

Post-exploitation tools ndash hub relaying

bull Losing control of CampC does not expose the backend logic

bull CampC is simply a connection information forwarder

copy 2019 Trend Micro Inc48

Infrastructure

copy 2019 Trend Micro Inc49

Infrastructure

bull Multiple ldquoclustersrdquo of domain names

bull Infrastructure overlap

bull Clusters were usually bound to a specific malware family

copy 2019 Trend Micro Inc50

Infrastructure

bull From March to August 2020

bull 49 domains resolving to an IP address

bull Of which 38 dynamic domain names

bull 46 different IP addresses

copy 2019 Trend Micro Inc51

Infrastructure ndash attackerrsquos mistakes

bull Attacker misconfigured some CampC servers

bull We could find some new malware samples and families as well as victims

copy 2019 Trend Micro Inc52

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc53

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc54

Custom backdoors ndash attackerrsquos mistakes

bull Files with list of victims

copy 2019 Trend Micro Inc55

Targets

copy 2019 Trend Micro Inc56

Targets

bull 61 targets in 19 different countries from January to July 2020

bull Taiwan is the most targeted country followed by India and Russia

bull Technology and manufacturing industries were the most targeted followed by education and healthcare

copy 2019 Trend Micro Inc57

Targets ndash industries

Technology213

Manufacturing180

Education164

Healthcare131

Government82

Others230

copy 2019 Trend Micro Inc58

Targets ndash countries

Taiwan213

India131

Russia115

Germany66

Canada66

Australia66

Thailand66

Others277

copy 2019 Trend Micro Inc59

Links to other threat actors

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 21: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc21

Custom backdoors ndash commands

bull All of them

bull Process enumeration download and file execution interactive shell

bull Most of them

bull File upload and deletion terminate process

bull Some of them

bull OS information collection uninstall wipe

copy 2019 Trend Micro Inc22

Custom backdoors ndash OS info

bull IP address

bull Code page

bull Time (tick count)

bull OS version token information

bull Computer name proxy information

bull Campaign ID presence of VM

copy 2019 Trend Micro Inc23

Custom backdoors ndash CampC encryption

bull No encryption

bull XOR used keys 0x15 0x1d 0x1f

bull RC4 hardcoded password 0x12345678

bull Custom use of atypical constants 0x58BF and 0x3193

copy 2019 Trend Micro Inc24

Custom backdoors ndash dexbia

bull Decryption steps

bull ELDLJFDRILGOEYFZGMCXDIHYGEDKAJIAFTFE

bull sYxef_xdbxaax80x9bxa8KVxcexa0Xtxd0x95x86

bull www[]riss[]ntdll[]net

copy 2019 Trend Micro Inc25

Custom backdoors ndash dexbia

bull Decryption steps

bull ELDLJFDRILGOEYFZGMCXDIHYGEDKAJIAFTFE

bull sYxef_xdbxaax80x9bxa8KVxcexa0Xtxd0x95x86

bull www[]riss[]ntdll[]net

copy 2019 Trend Micro Inc26

Custom backdoors ndash dexbia

bull Second loop with constants 0xCE6D (52845) =-0x3193 and 0x58BF (22719) can be also found in

Adobe Type 1 Font Format Specification

httpswwwadobecomcontentdamacomendevnetfontpdfsT1_SPECpdf

copy 2019 Trend Micro Inc27

Custom backdoors ndash network encryption

bull No encryption

bull Encodingcompress hex zlib base32 base64

bull XOR used keys 0x28 0x3f

bull RC4 hardcoded password 0x12345678

bull zlib + RC4

bull RC4 with 128-byte state vector

copy 2019 Trend Micro Inc28

Custom backdoors ndash network encryption

bull No encryption

bull Encodingcompress hex zlib base32 base64

bull XOR used keys 0x28 0x3f

bull RC4 hardcoded password 0x12345678

bull zlib + RC4

bull RC4 with 128-byte state vector

copy 2019 Trend Micro Inc29

Custom backdoors ndash network traffic

bull Example of Chimaera CampC communication

copy 2019 Trend Micro Inc30

Custom backdoors ndash VM check

bull Most of these families try to detect whether they are running inside a virtual machine

copy 2019 Trend Micro Inc31

Custom backdoors ndash sandbox evasion

bull Time delay

copy 2019 Trend Micro Inc32

Custom backdoors ndash sandbox evasion

bull Likely anti-sandbox trick

bull request for a non-existent website

bull prefix wwwgithub

bull httpswww[]github5o52d[]comDafpost[]asp

bull if this request fails the backdoor code flow continues as expected

copy 2019 Trend Micro Inc33

Custom backdoors - chimaera

bull Named after a caption

found in the control panel

copy 2019 Trend Micro Inc34

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc35

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc36

Custom backdoors - chimaera

bull Code similarity with old bisonal

bull Send machine info

bull Campaign ID

copy 2019 Trend Micro Inc37

Custom backdoors ndash campaign IDs

bull Some of these families have a campaign ID

416-J 0209J 0216jHC 228KJ 3sa new 711 Tranru Test DS MN1223 1228 dis ser mfa820 ser_ru rogx64 m0N~1 word0302 low_mn tnkk solr fvckrus ENERGY

copy 2019 Trend Micro Inc38

Shared backdoor - ShadowPad

bull Backdoor handling multiple plugins

bull Used in advanced supply chain attacks discovered in 2017 and 2018

bull Exclusive to WinntiAPT41 until 2019

copy 2019 Trend Micro Inc39

Shared backdoor - ShadowPad

bull Usually only 5 plugins are embeded

bull ldquoPluginsrdquo ldquoConfigrdquo ldquoInstallrdquo ldquoOnlinerdquo ldquoHTTPrdquo

bull In some cases ldquoTCPrdquo ldquoUDPrdquo

bull Loaded through DLL side-loading vulnerabilities in signed executables

bull Uses anti-disassembly techniques

bull Sometimes packed with VMProtect

copy 2019 Trend Micro Inc40

Shared backdoor - ShadowPad

bull New in 2020 sandbox evasion

bull if the loading DLL is not the expected one the program exits

It evades sandboxes that usually load DLLs with rundll32exe

copy 2019 Trend Micro Inc41

Shared backdoor - ShadowPad

bull Noticeable version tags

copy 2019 Trend Micro Inc42

Post-exploitation tools

copy 2019 Trend Micro Inc43

Post-exploitation tools - public

bull privilege escalation tools

bull CVE-2019-0803 and MS16-032 exploits

bull hash computational tools

bull credential dumpers

bull gsecdump v07

bull wdigest_extract

bull LaZagne

copy 2019 Trend Micro Inc44

Post-exploitation tools - public

bull Network shares enumeration

bull nbtscan 1035

bull Inbtscan (Python version of nbtscan)

bull Keyloggers

bull Keylogger1217

bull Lateral movement

bull Eternal Blue exploits

copy 2019 Trend Micro Inc45

Post-exploitation tools - private

bull Dumps information from the Domain Controller

bull Uses NetworkManagementAPIs

copy 2019 Trend Micro Inc46

Post-exploitation tools ndash hub relaying

Port 3925 Port 5688

CampC server

1 connects 2 sends traffic

3 forwards traffic

copy 2019 Trend Micro Inc47

Post-exploitation tools ndash hub relaying

bull Losing control of CampC does not expose the backend logic

bull CampC is simply a connection information forwarder

copy 2019 Trend Micro Inc48

Infrastructure

copy 2019 Trend Micro Inc49

Infrastructure

bull Multiple ldquoclustersrdquo of domain names

bull Infrastructure overlap

bull Clusters were usually bound to a specific malware family

copy 2019 Trend Micro Inc50

Infrastructure

bull From March to August 2020

bull 49 domains resolving to an IP address

bull Of which 38 dynamic domain names

bull 46 different IP addresses

copy 2019 Trend Micro Inc51

Infrastructure ndash attackerrsquos mistakes

bull Attacker misconfigured some CampC servers

bull We could find some new malware samples and families as well as victims

copy 2019 Trend Micro Inc52

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc53

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc54

Custom backdoors ndash attackerrsquos mistakes

bull Files with list of victims

copy 2019 Trend Micro Inc55

Targets

copy 2019 Trend Micro Inc56

Targets

bull 61 targets in 19 different countries from January to July 2020

bull Taiwan is the most targeted country followed by India and Russia

bull Technology and manufacturing industries were the most targeted followed by education and healthcare

copy 2019 Trend Micro Inc57

Targets ndash industries

Technology213

Manufacturing180

Education164

Healthcare131

Government82

Others230

copy 2019 Trend Micro Inc58

Targets ndash countries

Taiwan213

India131

Russia115

Germany66

Canada66

Australia66

Thailand66

Others277

copy 2019 Trend Micro Inc59

Links to other threat actors

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 22: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc22

Custom backdoors ndash OS info

bull IP address

bull Code page

bull Time (tick count)

bull OS version token information

bull Computer name proxy information

bull Campaign ID presence of VM

copy 2019 Trend Micro Inc23

Custom backdoors ndash CampC encryption

bull No encryption

bull XOR used keys 0x15 0x1d 0x1f

bull RC4 hardcoded password 0x12345678

bull Custom use of atypical constants 0x58BF and 0x3193

copy 2019 Trend Micro Inc24

Custom backdoors ndash dexbia

bull Decryption steps

bull ELDLJFDRILGOEYFZGMCXDIHYGEDKAJIAFTFE

bull sYxef_xdbxaax80x9bxa8KVxcexa0Xtxd0x95x86

bull www[]riss[]ntdll[]net

copy 2019 Trend Micro Inc25

Custom backdoors ndash dexbia

bull Decryption steps

bull ELDLJFDRILGOEYFZGMCXDIHYGEDKAJIAFTFE

bull sYxef_xdbxaax80x9bxa8KVxcexa0Xtxd0x95x86

bull www[]riss[]ntdll[]net

copy 2019 Trend Micro Inc26

Custom backdoors ndash dexbia

bull Second loop with constants 0xCE6D (52845) =-0x3193 and 0x58BF (22719) can be also found in

Adobe Type 1 Font Format Specification

httpswwwadobecomcontentdamacomendevnetfontpdfsT1_SPECpdf

copy 2019 Trend Micro Inc27

Custom backdoors ndash network encryption

bull No encryption

bull Encodingcompress hex zlib base32 base64

bull XOR used keys 0x28 0x3f

bull RC4 hardcoded password 0x12345678

bull zlib + RC4

bull RC4 with 128-byte state vector

copy 2019 Trend Micro Inc28

Custom backdoors ndash network encryption

bull No encryption

bull Encodingcompress hex zlib base32 base64

bull XOR used keys 0x28 0x3f

bull RC4 hardcoded password 0x12345678

bull zlib + RC4

bull RC4 with 128-byte state vector

copy 2019 Trend Micro Inc29

Custom backdoors ndash network traffic

bull Example of Chimaera CampC communication

copy 2019 Trend Micro Inc30

Custom backdoors ndash VM check

bull Most of these families try to detect whether they are running inside a virtual machine

copy 2019 Trend Micro Inc31

Custom backdoors ndash sandbox evasion

bull Time delay

copy 2019 Trend Micro Inc32

Custom backdoors ndash sandbox evasion

bull Likely anti-sandbox trick

bull request for a non-existent website

bull prefix wwwgithub

bull httpswww[]github5o52d[]comDafpost[]asp

bull if this request fails the backdoor code flow continues as expected

copy 2019 Trend Micro Inc33

Custom backdoors - chimaera

bull Named after a caption

found in the control panel

copy 2019 Trend Micro Inc34

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc35

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc36

Custom backdoors - chimaera

bull Code similarity with old bisonal

bull Send machine info

bull Campaign ID

copy 2019 Trend Micro Inc37

Custom backdoors ndash campaign IDs

bull Some of these families have a campaign ID

416-J 0209J 0216jHC 228KJ 3sa new 711 Tranru Test DS MN1223 1228 dis ser mfa820 ser_ru rogx64 m0N~1 word0302 low_mn tnkk solr fvckrus ENERGY

copy 2019 Trend Micro Inc38

Shared backdoor - ShadowPad

bull Backdoor handling multiple plugins

bull Used in advanced supply chain attacks discovered in 2017 and 2018

bull Exclusive to WinntiAPT41 until 2019

copy 2019 Trend Micro Inc39

Shared backdoor - ShadowPad

bull Usually only 5 plugins are embeded

bull ldquoPluginsrdquo ldquoConfigrdquo ldquoInstallrdquo ldquoOnlinerdquo ldquoHTTPrdquo

bull In some cases ldquoTCPrdquo ldquoUDPrdquo

bull Loaded through DLL side-loading vulnerabilities in signed executables

bull Uses anti-disassembly techniques

bull Sometimes packed with VMProtect

copy 2019 Trend Micro Inc40

Shared backdoor - ShadowPad

bull New in 2020 sandbox evasion

bull if the loading DLL is not the expected one the program exits

It evades sandboxes that usually load DLLs with rundll32exe

copy 2019 Trend Micro Inc41

Shared backdoor - ShadowPad

bull Noticeable version tags

copy 2019 Trend Micro Inc42

Post-exploitation tools

copy 2019 Trend Micro Inc43

Post-exploitation tools - public

bull privilege escalation tools

bull CVE-2019-0803 and MS16-032 exploits

bull hash computational tools

bull credential dumpers

bull gsecdump v07

bull wdigest_extract

bull LaZagne

copy 2019 Trend Micro Inc44

Post-exploitation tools - public

bull Network shares enumeration

bull nbtscan 1035

bull Inbtscan (Python version of nbtscan)

bull Keyloggers

bull Keylogger1217

bull Lateral movement

bull Eternal Blue exploits

copy 2019 Trend Micro Inc45

Post-exploitation tools - private

bull Dumps information from the Domain Controller

bull Uses NetworkManagementAPIs

copy 2019 Trend Micro Inc46

Post-exploitation tools ndash hub relaying

Port 3925 Port 5688

CampC server

1 connects 2 sends traffic

3 forwards traffic

copy 2019 Trend Micro Inc47

Post-exploitation tools ndash hub relaying

bull Losing control of CampC does not expose the backend logic

bull CampC is simply a connection information forwarder

copy 2019 Trend Micro Inc48

Infrastructure

copy 2019 Trend Micro Inc49

Infrastructure

bull Multiple ldquoclustersrdquo of domain names

bull Infrastructure overlap

bull Clusters were usually bound to a specific malware family

copy 2019 Trend Micro Inc50

Infrastructure

bull From March to August 2020

bull 49 domains resolving to an IP address

bull Of which 38 dynamic domain names

bull 46 different IP addresses

copy 2019 Trend Micro Inc51

Infrastructure ndash attackerrsquos mistakes

bull Attacker misconfigured some CampC servers

bull We could find some new malware samples and families as well as victims

copy 2019 Trend Micro Inc52

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc53

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc54

Custom backdoors ndash attackerrsquos mistakes

bull Files with list of victims

copy 2019 Trend Micro Inc55

Targets

copy 2019 Trend Micro Inc56

Targets

bull 61 targets in 19 different countries from January to July 2020

bull Taiwan is the most targeted country followed by India and Russia

bull Technology and manufacturing industries were the most targeted followed by education and healthcare

copy 2019 Trend Micro Inc57

Targets ndash industries

Technology213

Manufacturing180

Education164

Healthcare131

Government82

Others230

copy 2019 Trend Micro Inc58

Targets ndash countries

Taiwan213

India131

Russia115

Germany66

Canada66

Australia66

Thailand66

Others277

copy 2019 Trend Micro Inc59

Links to other threat actors

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 23: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc23

Custom backdoors ndash CampC encryption

bull No encryption

bull XOR used keys 0x15 0x1d 0x1f

bull RC4 hardcoded password 0x12345678

bull Custom use of atypical constants 0x58BF and 0x3193

copy 2019 Trend Micro Inc24

Custom backdoors ndash dexbia

bull Decryption steps

bull ELDLJFDRILGOEYFZGMCXDIHYGEDKAJIAFTFE

bull sYxef_xdbxaax80x9bxa8KVxcexa0Xtxd0x95x86

bull www[]riss[]ntdll[]net

copy 2019 Trend Micro Inc25

Custom backdoors ndash dexbia

bull Decryption steps

bull ELDLJFDRILGOEYFZGMCXDIHYGEDKAJIAFTFE

bull sYxef_xdbxaax80x9bxa8KVxcexa0Xtxd0x95x86

bull www[]riss[]ntdll[]net

copy 2019 Trend Micro Inc26

Custom backdoors ndash dexbia

bull Second loop with constants 0xCE6D (52845) =-0x3193 and 0x58BF (22719) can be also found in

Adobe Type 1 Font Format Specification

httpswwwadobecomcontentdamacomendevnetfontpdfsT1_SPECpdf

copy 2019 Trend Micro Inc27

Custom backdoors ndash network encryption

bull No encryption

bull Encodingcompress hex zlib base32 base64

bull XOR used keys 0x28 0x3f

bull RC4 hardcoded password 0x12345678

bull zlib + RC4

bull RC4 with 128-byte state vector

copy 2019 Trend Micro Inc28

Custom backdoors ndash network encryption

bull No encryption

bull Encodingcompress hex zlib base32 base64

bull XOR used keys 0x28 0x3f

bull RC4 hardcoded password 0x12345678

bull zlib + RC4

bull RC4 with 128-byte state vector

copy 2019 Trend Micro Inc29

Custom backdoors ndash network traffic

bull Example of Chimaera CampC communication

copy 2019 Trend Micro Inc30

Custom backdoors ndash VM check

bull Most of these families try to detect whether they are running inside a virtual machine

copy 2019 Trend Micro Inc31

Custom backdoors ndash sandbox evasion

bull Time delay

copy 2019 Trend Micro Inc32

Custom backdoors ndash sandbox evasion

bull Likely anti-sandbox trick

bull request for a non-existent website

bull prefix wwwgithub

bull httpswww[]github5o52d[]comDafpost[]asp

bull if this request fails the backdoor code flow continues as expected

copy 2019 Trend Micro Inc33

Custom backdoors - chimaera

bull Named after a caption

found in the control panel

copy 2019 Trend Micro Inc34

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc35

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc36

Custom backdoors - chimaera

bull Code similarity with old bisonal

bull Send machine info

bull Campaign ID

copy 2019 Trend Micro Inc37

Custom backdoors ndash campaign IDs

bull Some of these families have a campaign ID

416-J 0209J 0216jHC 228KJ 3sa new 711 Tranru Test DS MN1223 1228 dis ser mfa820 ser_ru rogx64 m0N~1 word0302 low_mn tnkk solr fvckrus ENERGY

copy 2019 Trend Micro Inc38

Shared backdoor - ShadowPad

bull Backdoor handling multiple plugins

bull Used in advanced supply chain attacks discovered in 2017 and 2018

bull Exclusive to WinntiAPT41 until 2019

copy 2019 Trend Micro Inc39

Shared backdoor - ShadowPad

bull Usually only 5 plugins are embeded

bull ldquoPluginsrdquo ldquoConfigrdquo ldquoInstallrdquo ldquoOnlinerdquo ldquoHTTPrdquo

bull In some cases ldquoTCPrdquo ldquoUDPrdquo

bull Loaded through DLL side-loading vulnerabilities in signed executables

bull Uses anti-disassembly techniques

bull Sometimes packed with VMProtect

copy 2019 Trend Micro Inc40

Shared backdoor - ShadowPad

bull New in 2020 sandbox evasion

bull if the loading DLL is not the expected one the program exits

It evades sandboxes that usually load DLLs with rundll32exe

copy 2019 Trend Micro Inc41

Shared backdoor - ShadowPad

bull Noticeable version tags

copy 2019 Trend Micro Inc42

Post-exploitation tools

copy 2019 Trend Micro Inc43

Post-exploitation tools - public

bull privilege escalation tools

bull CVE-2019-0803 and MS16-032 exploits

bull hash computational tools

bull credential dumpers

bull gsecdump v07

bull wdigest_extract

bull LaZagne

copy 2019 Trend Micro Inc44

Post-exploitation tools - public

bull Network shares enumeration

bull nbtscan 1035

bull Inbtscan (Python version of nbtscan)

bull Keyloggers

bull Keylogger1217

bull Lateral movement

bull Eternal Blue exploits

copy 2019 Trend Micro Inc45

Post-exploitation tools - private

bull Dumps information from the Domain Controller

bull Uses NetworkManagementAPIs

copy 2019 Trend Micro Inc46

Post-exploitation tools ndash hub relaying

Port 3925 Port 5688

CampC server

1 connects 2 sends traffic

3 forwards traffic

copy 2019 Trend Micro Inc47

Post-exploitation tools ndash hub relaying

bull Losing control of CampC does not expose the backend logic

bull CampC is simply a connection information forwarder

copy 2019 Trend Micro Inc48

Infrastructure

copy 2019 Trend Micro Inc49

Infrastructure

bull Multiple ldquoclustersrdquo of domain names

bull Infrastructure overlap

bull Clusters were usually bound to a specific malware family

copy 2019 Trend Micro Inc50

Infrastructure

bull From March to August 2020

bull 49 domains resolving to an IP address

bull Of which 38 dynamic domain names

bull 46 different IP addresses

copy 2019 Trend Micro Inc51

Infrastructure ndash attackerrsquos mistakes

bull Attacker misconfigured some CampC servers

bull We could find some new malware samples and families as well as victims

copy 2019 Trend Micro Inc52

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc53

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc54

Custom backdoors ndash attackerrsquos mistakes

bull Files with list of victims

copy 2019 Trend Micro Inc55

Targets

copy 2019 Trend Micro Inc56

Targets

bull 61 targets in 19 different countries from January to July 2020

bull Taiwan is the most targeted country followed by India and Russia

bull Technology and manufacturing industries were the most targeted followed by education and healthcare

copy 2019 Trend Micro Inc57

Targets ndash industries

Technology213

Manufacturing180

Education164

Healthcare131

Government82

Others230

copy 2019 Trend Micro Inc58

Targets ndash countries

Taiwan213

India131

Russia115

Germany66

Canada66

Australia66

Thailand66

Others277

copy 2019 Trend Micro Inc59

Links to other threat actors

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 24: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc24

Custom backdoors ndash dexbia

bull Decryption steps

bull ELDLJFDRILGOEYFZGMCXDIHYGEDKAJIAFTFE

bull sYxef_xdbxaax80x9bxa8KVxcexa0Xtxd0x95x86

bull www[]riss[]ntdll[]net

copy 2019 Trend Micro Inc25

Custom backdoors ndash dexbia

bull Decryption steps

bull ELDLJFDRILGOEYFZGMCXDIHYGEDKAJIAFTFE

bull sYxef_xdbxaax80x9bxa8KVxcexa0Xtxd0x95x86

bull www[]riss[]ntdll[]net

copy 2019 Trend Micro Inc26

Custom backdoors ndash dexbia

bull Second loop with constants 0xCE6D (52845) =-0x3193 and 0x58BF (22719) can be also found in

Adobe Type 1 Font Format Specification

httpswwwadobecomcontentdamacomendevnetfontpdfsT1_SPECpdf

copy 2019 Trend Micro Inc27

Custom backdoors ndash network encryption

bull No encryption

bull Encodingcompress hex zlib base32 base64

bull XOR used keys 0x28 0x3f

bull RC4 hardcoded password 0x12345678

bull zlib + RC4

bull RC4 with 128-byte state vector

copy 2019 Trend Micro Inc28

Custom backdoors ndash network encryption

bull No encryption

bull Encodingcompress hex zlib base32 base64

bull XOR used keys 0x28 0x3f

bull RC4 hardcoded password 0x12345678

bull zlib + RC4

bull RC4 with 128-byte state vector

copy 2019 Trend Micro Inc29

Custom backdoors ndash network traffic

bull Example of Chimaera CampC communication

copy 2019 Trend Micro Inc30

Custom backdoors ndash VM check

bull Most of these families try to detect whether they are running inside a virtual machine

copy 2019 Trend Micro Inc31

Custom backdoors ndash sandbox evasion

bull Time delay

copy 2019 Trend Micro Inc32

Custom backdoors ndash sandbox evasion

bull Likely anti-sandbox trick

bull request for a non-existent website

bull prefix wwwgithub

bull httpswww[]github5o52d[]comDafpost[]asp

bull if this request fails the backdoor code flow continues as expected

copy 2019 Trend Micro Inc33

Custom backdoors - chimaera

bull Named after a caption

found in the control panel

copy 2019 Trend Micro Inc34

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc35

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc36

Custom backdoors - chimaera

bull Code similarity with old bisonal

bull Send machine info

bull Campaign ID

copy 2019 Trend Micro Inc37

Custom backdoors ndash campaign IDs

bull Some of these families have a campaign ID

416-J 0209J 0216jHC 228KJ 3sa new 711 Tranru Test DS MN1223 1228 dis ser mfa820 ser_ru rogx64 m0N~1 word0302 low_mn tnkk solr fvckrus ENERGY

copy 2019 Trend Micro Inc38

Shared backdoor - ShadowPad

bull Backdoor handling multiple plugins

bull Used in advanced supply chain attacks discovered in 2017 and 2018

bull Exclusive to WinntiAPT41 until 2019

copy 2019 Trend Micro Inc39

Shared backdoor - ShadowPad

bull Usually only 5 plugins are embeded

bull ldquoPluginsrdquo ldquoConfigrdquo ldquoInstallrdquo ldquoOnlinerdquo ldquoHTTPrdquo

bull In some cases ldquoTCPrdquo ldquoUDPrdquo

bull Loaded through DLL side-loading vulnerabilities in signed executables

bull Uses anti-disassembly techniques

bull Sometimes packed with VMProtect

copy 2019 Trend Micro Inc40

Shared backdoor - ShadowPad

bull New in 2020 sandbox evasion

bull if the loading DLL is not the expected one the program exits

It evades sandboxes that usually load DLLs with rundll32exe

copy 2019 Trend Micro Inc41

Shared backdoor - ShadowPad

bull Noticeable version tags

copy 2019 Trend Micro Inc42

Post-exploitation tools

copy 2019 Trend Micro Inc43

Post-exploitation tools - public

bull privilege escalation tools

bull CVE-2019-0803 and MS16-032 exploits

bull hash computational tools

bull credential dumpers

bull gsecdump v07

bull wdigest_extract

bull LaZagne

copy 2019 Trend Micro Inc44

Post-exploitation tools - public

bull Network shares enumeration

bull nbtscan 1035

bull Inbtscan (Python version of nbtscan)

bull Keyloggers

bull Keylogger1217

bull Lateral movement

bull Eternal Blue exploits

copy 2019 Trend Micro Inc45

Post-exploitation tools - private

bull Dumps information from the Domain Controller

bull Uses NetworkManagementAPIs

copy 2019 Trend Micro Inc46

Post-exploitation tools ndash hub relaying

Port 3925 Port 5688

CampC server

1 connects 2 sends traffic

3 forwards traffic

copy 2019 Trend Micro Inc47

Post-exploitation tools ndash hub relaying

bull Losing control of CampC does not expose the backend logic

bull CampC is simply a connection information forwarder

copy 2019 Trend Micro Inc48

Infrastructure

copy 2019 Trend Micro Inc49

Infrastructure

bull Multiple ldquoclustersrdquo of domain names

bull Infrastructure overlap

bull Clusters were usually bound to a specific malware family

copy 2019 Trend Micro Inc50

Infrastructure

bull From March to August 2020

bull 49 domains resolving to an IP address

bull Of which 38 dynamic domain names

bull 46 different IP addresses

copy 2019 Trend Micro Inc51

Infrastructure ndash attackerrsquos mistakes

bull Attacker misconfigured some CampC servers

bull We could find some new malware samples and families as well as victims

copy 2019 Trend Micro Inc52

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc53

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc54

Custom backdoors ndash attackerrsquos mistakes

bull Files with list of victims

copy 2019 Trend Micro Inc55

Targets

copy 2019 Trend Micro Inc56

Targets

bull 61 targets in 19 different countries from January to July 2020

bull Taiwan is the most targeted country followed by India and Russia

bull Technology and manufacturing industries were the most targeted followed by education and healthcare

copy 2019 Trend Micro Inc57

Targets ndash industries

Technology213

Manufacturing180

Education164

Healthcare131

Government82

Others230

copy 2019 Trend Micro Inc58

Targets ndash countries

Taiwan213

India131

Russia115

Germany66

Canada66

Australia66

Thailand66

Others277

copy 2019 Trend Micro Inc59

Links to other threat actors

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 25: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc25

Custom backdoors ndash dexbia

bull Decryption steps

bull ELDLJFDRILGOEYFZGMCXDIHYGEDKAJIAFTFE

bull sYxef_xdbxaax80x9bxa8KVxcexa0Xtxd0x95x86

bull www[]riss[]ntdll[]net

copy 2019 Trend Micro Inc26

Custom backdoors ndash dexbia

bull Second loop with constants 0xCE6D (52845) =-0x3193 and 0x58BF (22719) can be also found in

Adobe Type 1 Font Format Specification

httpswwwadobecomcontentdamacomendevnetfontpdfsT1_SPECpdf

copy 2019 Trend Micro Inc27

Custom backdoors ndash network encryption

bull No encryption

bull Encodingcompress hex zlib base32 base64

bull XOR used keys 0x28 0x3f

bull RC4 hardcoded password 0x12345678

bull zlib + RC4

bull RC4 with 128-byte state vector

copy 2019 Trend Micro Inc28

Custom backdoors ndash network encryption

bull No encryption

bull Encodingcompress hex zlib base32 base64

bull XOR used keys 0x28 0x3f

bull RC4 hardcoded password 0x12345678

bull zlib + RC4

bull RC4 with 128-byte state vector

copy 2019 Trend Micro Inc29

Custom backdoors ndash network traffic

bull Example of Chimaera CampC communication

copy 2019 Trend Micro Inc30

Custom backdoors ndash VM check

bull Most of these families try to detect whether they are running inside a virtual machine

copy 2019 Trend Micro Inc31

Custom backdoors ndash sandbox evasion

bull Time delay

copy 2019 Trend Micro Inc32

Custom backdoors ndash sandbox evasion

bull Likely anti-sandbox trick

bull request for a non-existent website

bull prefix wwwgithub

bull httpswww[]github5o52d[]comDafpost[]asp

bull if this request fails the backdoor code flow continues as expected

copy 2019 Trend Micro Inc33

Custom backdoors - chimaera

bull Named after a caption

found in the control panel

copy 2019 Trend Micro Inc34

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc35

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc36

Custom backdoors - chimaera

bull Code similarity with old bisonal

bull Send machine info

bull Campaign ID

copy 2019 Trend Micro Inc37

Custom backdoors ndash campaign IDs

bull Some of these families have a campaign ID

416-J 0209J 0216jHC 228KJ 3sa new 711 Tranru Test DS MN1223 1228 dis ser mfa820 ser_ru rogx64 m0N~1 word0302 low_mn tnkk solr fvckrus ENERGY

copy 2019 Trend Micro Inc38

Shared backdoor - ShadowPad

bull Backdoor handling multiple plugins

bull Used in advanced supply chain attacks discovered in 2017 and 2018

bull Exclusive to WinntiAPT41 until 2019

copy 2019 Trend Micro Inc39

Shared backdoor - ShadowPad

bull Usually only 5 plugins are embeded

bull ldquoPluginsrdquo ldquoConfigrdquo ldquoInstallrdquo ldquoOnlinerdquo ldquoHTTPrdquo

bull In some cases ldquoTCPrdquo ldquoUDPrdquo

bull Loaded through DLL side-loading vulnerabilities in signed executables

bull Uses anti-disassembly techniques

bull Sometimes packed with VMProtect

copy 2019 Trend Micro Inc40

Shared backdoor - ShadowPad

bull New in 2020 sandbox evasion

bull if the loading DLL is not the expected one the program exits

It evades sandboxes that usually load DLLs with rundll32exe

copy 2019 Trend Micro Inc41

Shared backdoor - ShadowPad

bull Noticeable version tags

copy 2019 Trend Micro Inc42

Post-exploitation tools

copy 2019 Trend Micro Inc43

Post-exploitation tools - public

bull privilege escalation tools

bull CVE-2019-0803 and MS16-032 exploits

bull hash computational tools

bull credential dumpers

bull gsecdump v07

bull wdigest_extract

bull LaZagne

copy 2019 Trend Micro Inc44

Post-exploitation tools - public

bull Network shares enumeration

bull nbtscan 1035

bull Inbtscan (Python version of nbtscan)

bull Keyloggers

bull Keylogger1217

bull Lateral movement

bull Eternal Blue exploits

copy 2019 Trend Micro Inc45

Post-exploitation tools - private

bull Dumps information from the Domain Controller

bull Uses NetworkManagementAPIs

copy 2019 Trend Micro Inc46

Post-exploitation tools ndash hub relaying

Port 3925 Port 5688

CampC server

1 connects 2 sends traffic

3 forwards traffic

copy 2019 Trend Micro Inc47

Post-exploitation tools ndash hub relaying

bull Losing control of CampC does not expose the backend logic

bull CampC is simply a connection information forwarder

copy 2019 Trend Micro Inc48

Infrastructure

copy 2019 Trend Micro Inc49

Infrastructure

bull Multiple ldquoclustersrdquo of domain names

bull Infrastructure overlap

bull Clusters were usually bound to a specific malware family

copy 2019 Trend Micro Inc50

Infrastructure

bull From March to August 2020

bull 49 domains resolving to an IP address

bull Of which 38 dynamic domain names

bull 46 different IP addresses

copy 2019 Trend Micro Inc51

Infrastructure ndash attackerrsquos mistakes

bull Attacker misconfigured some CampC servers

bull We could find some new malware samples and families as well as victims

copy 2019 Trend Micro Inc52

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc53

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc54

Custom backdoors ndash attackerrsquos mistakes

bull Files with list of victims

copy 2019 Trend Micro Inc55

Targets

copy 2019 Trend Micro Inc56

Targets

bull 61 targets in 19 different countries from January to July 2020

bull Taiwan is the most targeted country followed by India and Russia

bull Technology and manufacturing industries were the most targeted followed by education and healthcare

copy 2019 Trend Micro Inc57

Targets ndash industries

Technology213

Manufacturing180

Education164

Healthcare131

Government82

Others230

copy 2019 Trend Micro Inc58

Targets ndash countries

Taiwan213

India131

Russia115

Germany66

Canada66

Australia66

Thailand66

Others277

copy 2019 Trend Micro Inc59

Links to other threat actors

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 26: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc26

Custom backdoors ndash dexbia

bull Second loop with constants 0xCE6D (52845) =-0x3193 and 0x58BF (22719) can be also found in

Adobe Type 1 Font Format Specification

httpswwwadobecomcontentdamacomendevnetfontpdfsT1_SPECpdf

copy 2019 Trend Micro Inc27

Custom backdoors ndash network encryption

bull No encryption

bull Encodingcompress hex zlib base32 base64

bull XOR used keys 0x28 0x3f

bull RC4 hardcoded password 0x12345678

bull zlib + RC4

bull RC4 with 128-byte state vector

copy 2019 Trend Micro Inc28

Custom backdoors ndash network encryption

bull No encryption

bull Encodingcompress hex zlib base32 base64

bull XOR used keys 0x28 0x3f

bull RC4 hardcoded password 0x12345678

bull zlib + RC4

bull RC4 with 128-byte state vector

copy 2019 Trend Micro Inc29

Custom backdoors ndash network traffic

bull Example of Chimaera CampC communication

copy 2019 Trend Micro Inc30

Custom backdoors ndash VM check

bull Most of these families try to detect whether they are running inside a virtual machine

copy 2019 Trend Micro Inc31

Custom backdoors ndash sandbox evasion

bull Time delay

copy 2019 Trend Micro Inc32

Custom backdoors ndash sandbox evasion

bull Likely anti-sandbox trick

bull request for a non-existent website

bull prefix wwwgithub

bull httpswww[]github5o52d[]comDafpost[]asp

bull if this request fails the backdoor code flow continues as expected

copy 2019 Trend Micro Inc33

Custom backdoors - chimaera

bull Named after a caption

found in the control panel

copy 2019 Trend Micro Inc34

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc35

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc36

Custom backdoors - chimaera

bull Code similarity with old bisonal

bull Send machine info

bull Campaign ID

copy 2019 Trend Micro Inc37

Custom backdoors ndash campaign IDs

bull Some of these families have a campaign ID

416-J 0209J 0216jHC 228KJ 3sa new 711 Tranru Test DS MN1223 1228 dis ser mfa820 ser_ru rogx64 m0N~1 word0302 low_mn tnkk solr fvckrus ENERGY

copy 2019 Trend Micro Inc38

Shared backdoor - ShadowPad

bull Backdoor handling multiple plugins

bull Used in advanced supply chain attacks discovered in 2017 and 2018

bull Exclusive to WinntiAPT41 until 2019

copy 2019 Trend Micro Inc39

Shared backdoor - ShadowPad

bull Usually only 5 plugins are embeded

bull ldquoPluginsrdquo ldquoConfigrdquo ldquoInstallrdquo ldquoOnlinerdquo ldquoHTTPrdquo

bull In some cases ldquoTCPrdquo ldquoUDPrdquo

bull Loaded through DLL side-loading vulnerabilities in signed executables

bull Uses anti-disassembly techniques

bull Sometimes packed with VMProtect

copy 2019 Trend Micro Inc40

Shared backdoor - ShadowPad

bull New in 2020 sandbox evasion

bull if the loading DLL is not the expected one the program exits

It evades sandboxes that usually load DLLs with rundll32exe

copy 2019 Trend Micro Inc41

Shared backdoor - ShadowPad

bull Noticeable version tags

copy 2019 Trend Micro Inc42

Post-exploitation tools

copy 2019 Trend Micro Inc43

Post-exploitation tools - public

bull privilege escalation tools

bull CVE-2019-0803 and MS16-032 exploits

bull hash computational tools

bull credential dumpers

bull gsecdump v07

bull wdigest_extract

bull LaZagne

copy 2019 Trend Micro Inc44

Post-exploitation tools - public

bull Network shares enumeration

bull nbtscan 1035

bull Inbtscan (Python version of nbtscan)

bull Keyloggers

bull Keylogger1217

bull Lateral movement

bull Eternal Blue exploits

copy 2019 Trend Micro Inc45

Post-exploitation tools - private

bull Dumps information from the Domain Controller

bull Uses NetworkManagementAPIs

copy 2019 Trend Micro Inc46

Post-exploitation tools ndash hub relaying

Port 3925 Port 5688

CampC server

1 connects 2 sends traffic

3 forwards traffic

copy 2019 Trend Micro Inc47

Post-exploitation tools ndash hub relaying

bull Losing control of CampC does not expose the backend logic

bull CampC is simply a connection information forwarder

copy 2019 Trend Micro Inc48

Infrastructure

copy 2019 Trend Micro Inc49

Infrastructure

bull Multiple ldquoclustersrdquo of domain names

bull Infrastructure overlap

bull Clusters were usually bound to a specific malware family

copy 2019 Trend Micro Inc50

Infrastructure

bull From March to August 2020

bull 49 domains resolving to an IP address

bull Of which 38 dynamic domain names

bull 46 different IP addresses

copy 2019 Trend Micro Inc51

Infrastructure ndash attackerrsquos mistakes

bull Attacker misconfigured some CampC servers

bull We could find some new malware samples and families as well as victims

copy 2019 Trend Micro Inc52

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc53

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc54

Custom backdoors ndash attackerrsquos mistakes

bull Files with list of victims

copy 2019 Trend Micro Inc55

Targets

copy 2019 Trend Micro Inc56

Targets

bull 61 targets in 19 different countries from January to July 2020

bull Taiwan is the most targeted country followed by India and Russia

bull Technology and manufacturing industries were the most targeted followed by education and healthcare

copy 2019 Trend Micro Inc57

Targets ndash industries

Technology213

Manufacturing180

Education164

Healthcare131

Government82

Others230

copy 2019 Trend Micro Inc58

Targets ndash countries

Taiwan213

India131

Russia115

Germany66

Canada66

Australia66

Thailand66

Others277

copy 2019 Trend Micro Inc59

Links to other threat actors

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 27: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc27

Custom backdoors ndash network encryption

bull No encryption

bull Encodingcompress hex zlib base32 base64

bull XOR used keys 0x28 0x3f

bull RC4 hardcoded password 0x12345678

bull zlib + RC4

bull RC4 with 128-byte state vector

copy 2019 Trend Micro Inc28

Custom backdoors ndash network encryption

bull No encryption

bull Encodingcompress hex zlib base32 base64

bull XOR used keys 0x28 0x3f

bull RC4 hardcoded password 0x12345678

bull zlib + RC4

bull RC4 with 128-byte state vector

copy 2019 Trend Micro Inc29

Custom backdoors ndash network traffic

bull Example of Chimaera CampC communication

copy 2019 Trend Micro Inc30

Custom backdoors ndash VM check

bull Most of these families try to detect whether they are running inside a virtual machine

copy 2019 Trend Micro Inc31

Custom backdoors ndash sandbox evasion

bull Time delay

copy 2019 Trend Micro Inc32

Custom backdoors ndash sandbox evasion

bull Likely anti-sandbox trick

bull request for a non-existent website

bull prefix wwwgithub

bull httpswww[]github5o52d[]comDafpost[]asp

bull if this request fails the backdoor code flow continues as expected

copy 2019 Trend Micro Inc33

Custom backdoors - chimaera

bull Named after a caption

found in the control panel

copy 2019 Trend Micro Inc34

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc35

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc36

Custom backdoors - chimaera

bull Code similarity with old bisonal

bull Send machine info

bull Campaign ID

copy 2019 Trend Micro Inc37

Custom backdoors ndash campaign IDs

bull Some of these families have a campaign ID

416-J 0209J 0216jHC 228KJ 3sa new 711 Tranru Test DS MN1223 1228 dis ser mfa820 ser_ru rogx64 m0N~1 word0302 low_mn tnkk solr fvckrus ENERGY

copy 2019 Trend Micro Inc38

Shared backdoor - ShadowPad

bull Backdoor handling multiple plugins

bull Used in advanced supply chain attacks discovered in 2017 and 2018

bull Exclusive to WinntiAPT41 until 2019

copy 2019 Trend Micro Inc39

Shared backdoor - ShadowPad

bull Usually only 5 plugins are embeded

bull ldquoPluginsrdquo ldquoConfigrdquo ldquoInstallrdquo ldquoOnlinerdquo ldquoHTTPrdquo

bull In some cases ldquoTCPrdquo ldquoUDPrdquo

bull Loaded through DLL side-loading vulnerabilities in signed executables

bull Uses anti-disassembly techniques

bull Sometimes packed with VMProtect

copy 2019 Trend Micro Inc40

Shared backdoor - ShadowPad

bull New in 2020 sandbox evasion

bull if the loading DLL is not the expected one the program exits

It evades sandboxes that usually load DLLs with rundll32exe

copy 2019 Trend Micro Inc41

Shared backdoor - ShadowPad

bull Noticeable version tags

copy 2019 Trend Micro Inc42

Post-exploitation tools

copy 2019 Trend Micro Inc43

Post-exploitation tools - public

bull privilege escalation tools

bull CVE-2019-0803 and MS16-032 exploits

bull hash computational tools

bull credential dumpers

bull gsecdump v07

bull wdigest_extract

bull LaZagne

copy 2019 Trend Micro Inc44

Post-exploitation tools - public

bull Network shares enumeration

bull nbtscan 1035

bull Inbtscan (Python version of nbtscan)

bull Keyloggers

bull Keylogger1217

bull Lateral movement

bull Eternal Blue exploits

copy 2019 Trend Micro Inc45

Post-exploitation tools - private

bull Dumps information from the Domain Controller

bull Uses NetworkManagementAPIs

copy 2019 Trend Micro Inc46

Post-exploitation tools ndash hub relaying

Port 3925 Port 5688

CampC server

1 connects 2 sends traffic

3 forwards traffic

copy 2019 Trend Micro Inc47

Post-exploitation tools ndash hub relaying

bull Losing control of CampC does not expose the backend logic

bull CampC is simply a connection information forwarder

copy 2019 Trend Micro Inc48

Infrastructure

copy 2019 Trend Micro Inc49

Infrastructure

bull Multiple ldquoclustersrdquo of domain names

bull Infrastructure overlap

bull Clusters were usually bound to a specific malware family

copy 2019 Trend Micro Inc50

Infrastructure

bull From March to August 2020

bull 49 domains resolving to an IP address

bull Of which 38 dynamic domain names

bull 46 different IP addresses

copy 2019 Trend Micro Inc51

Infrastructure ndash attackerrsquos mistakes

bull Attacker misconfigured some CampC servers

bull We could find some new malware samples and families as well as victims

copy 2019 Trend Micro Inc52

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc53

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc54

Custom backdoors ndash attackerrsquos mistakes

bull Files with list of victims

copy 2019 Trend Micro Inc55

Targets

copy 2019 Trend Micro Inc56

Targets

bull 61 targets in 19 different countries from January to July 2020

bull Taiwan is the most targeted country followed by India and Russia

bull Technology and manufacturing industries were the most targeted followed by education and healthcare

copy 2019 Trend Micro Inc57

Targets ndash industries

Technology213

Manufacturing180

Education164

Healthcare131

Government82

Others230

copy 2019 Trend Micro Inc58

Targets ndash countries

Taiwan213

India131

Russia115

Germany66

Canada66

Australia66

Thailand66

Others277

copy 2019 Trend Micro Inc59

Links to other threat actors

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 28: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc28

Custom backdoors ndash network encryption

bull No encryption

bull Encodingcompress hex zlib base32 base64

bull XOR used keys 0x28 0x3f

bull RC4 hardcoded password 0x12345678

bull zlib + RC4

bull RC4 with 128-byte state vector

copy 2019 Trend Micro Inc29

Custom backdoors ndash network traffic

bull Example of Chimaera CampC communication

copy 2019 Trend Micro Inc30

Custom backdoors ndash VM check

bull Most of these families try to detect whether they are running inside a virtual machine

copy 2019 Trend Micro Inc31

Custom backdoors ndash sandbox evasion

bull Time delay

copy 2019 Trend Micro Inc32

Custom backdoors ndash sandbox evasion

bull Likely anti-sandbox trick

bull request for a non-existent website

bull prefix wwwgithub

bull httpswww[]github5o52d[]comDafpost[]asp

bull if this request fails the backdoor code flow continues as expected

copy 2019 Trend Micro Inc33

Custom backdoors - chimaera

bull Named after a caption

found in the control panel

copy 2019 Trend Micro Inc34

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc35

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc36

Custom backdoors - chimaera

bull Code similarity with old bisonal

bull Send machine info

bull Campaign ID

copy 2019 Trend Micro Inc37

Custom backdoors ndash campaign IDs

bull Some of these families have a campaign ID

416-J 0209J 0216jHC 228KJ 3sa new 711 Tranru Test DS MN1223 1228 dis ser mfa820 ser_ru rogx64 m0N~1 word0302 low_mn tnkk solr fvckrus ENERGY

copy 2019 Trend Micro Inc38

Shared backdoor - ShadowPad

bull Backdoor handling multiple plugins

bull Used in advanced supply chain attacks discovered in 2017 and 2018

bull Exclusive to WinntiAPT41 until 2019

copy 2019 Trend Micro Inc39

Shared backdoor - ShadowPad

bull Usually only 5 plugins are embeded

bull ldquoPluginsrdquo ldquoConfigrdquo ldquoInstallrdquo ldquoOnlinerdquo ldquoHTTPrdquo

bull In some cases ldquoTCPrdquo ldquoUDPrdquo

bull Loaded through DLL side-loading vulnerabilities in signed executables

bull Uses anti-disassembly techniques

bull Sometimes packed with VMProtect

copy 2019 Trend Micro Inc40

Shared backdoor - ShadowPad

bull New in 2020 sandbox evasion

bull if the loading DLL is not the expected one the program exits

It evades sandboxes that usually load DLLs with rundll32exe

copy 2019 Trend Micro Inc41

Shared backdoor - ShadowPad

bull Noticeable version tags

copy 2019 Trend Micro Inc42

Post-exploitation tools

copy 2019 Trend Micro Inc43

Post-exploitation tools - public

bull privilege escalation tools

bull CVE-2019-0803 and MS16-032 exploits

bull hash computational tools

bull credential dumpers

bull gsecdump v07

bull wdigest_extract

bull LaZagne

copy 2019 Trend Micro Inc44

Post-exploitation tools - public

bull Network shares enumeration

bull nbtscan 1035

bull Inbtscan (Python version of nbtscan)

bull Keyloggers

bull Keylogger1217

bull Lateral movement

bull Eternal Blue exploits

copy 2019 Trend Micro Inc45

Post-exploitation tools - private

bull Dumps information from the Domain Controller

bull Uses NetworkManagementAPIs

copy 2019 Trend Micro Inc46

Post-exploitation tools ndash hub relaying

Port 3925 Port 5688

CampC server

1 connects 2 sends traffic

3 forwards traffic

copy 2019 Trend Micro Inc47

Post-exploitation tools ndash hub relaying

bull Losing control of CampC does not expose the backend logic

bull CampC is simply a connection information forwarder

copy 2019 Trend Micro Inc48

Infrastructure

copy 2019 Trend Micro Inc49

Infrastructure

bull Multiple ldquoclustersrdquo of domain names

bull Infrastructure overlap

bull Clusters were usually bound to a specific malware family

copy 2019 Trend Micro Inc50

Infrastructure

bull From March to August 2020

bull 49 domains resolving to an IP address

bull Of which 38 dynamic domain names

bull 46 different IP addresses

copy 2019 Trend Micro Inc51

Infrastructure ndash attackerrsquos mistakes

bull Attacker misconfigured some CampC servers

bull We could find some new malware samples and families as well as victims

copy 2019 Trend Micro Inc52

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc53

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc54

Custom backdoors ndash attackerrsquos mistakes

bull Files with list of victims

copy 2019 Trend Micro Inc55

Targets

copy 2019 Trend Micro Inc56

Targets

bull 61 targets in 19 different countries from January to July 2020

bull Taiwan is the most targeted country followed by India and Russia

bull Technology and manufacturing industries were the most targeted followed by education and healthcare

copy 2019 Trend Micro Inc57

Targets ndash industries

Technology213

Manufacturing180

Education164

Healthcare131

Government82

Others230

copy 2019 Trend Micro Inc58

Targets ndash countries

Taiwan213

India131

Russia115

Germany66

Canada66

Australia66

Thailand66

Others277

copy 2019 Trend Micro Inc59

Links to other threat actors

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 29: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc29

Custom backdoors ndash network traffic

bull Example of Chimaera CampC communication

copy 2019 Trend Micro Inc30

Custom backdoors ndash VM check

bull Most of these families try to detect whether they are running inside a virtual machine

copy 2019 Trend Micro Inc31

Custom backdoors ndash sandbox evasion

bull Time delay

copy 2019 Trend Micro Inc32

Custom backdoors ndash sandbox evasion

bull Likely anti-sandbox trick

bull request for a non-existent website

bull prefix wwwgithub

bull httpswww[]github5o52d[]comDafpost[]asp

bull if this request fails the backdoor code flow continues as expected

copy 2019 Trend Micro Inc33

Custom backdoors - chimaera

bull Named after a caption

found in the control panel

copy 2019 Trend Micro Inc34

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc35

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc36

Custom backdoors - chimaera

bull Code similarity with old bisonal

bull Send machine info

bull Campaign ID

copy 2019 Trend Micro Inc37

Custom backdoors ndash campaign IDs

bull Some of these families have a campaign ID

416-J 0209J 0216jHC 228KJ 3sa new 711 Tranru Test DS MN1223 1228 dis ser mfa820 ser_ru rogx64 m0N~1 word0302 low_mn tnkk solr fvckrus ENERGY

copy 2019 Trend Micro Inc38

Shared backdoor - ShadowPad

bull Backdoor handling multiple plugins

bull Used in advanced supply chain attacks discovered in 2017 and 2018

bull Exclusive to WinntiAPT41 until 2019

copy 2019 Trend Micro Inc39

Shared backdoor - ShadowPad

bull Usually only 5 plugins are embeded

bull ldquoPluginsrdquo ldquoConfigrdquo ldquoInstallrdquo ldquoOnlinerdquo ldquoHTTPrdquo

bull In some cases ldquoTCPrdquo ldquoUDPrdquo

bull Loaded through DLL side-loading vulnerabilities in signed executables

bull Uses anti-disassembly techniques

bull Sometimes packed with VMProtect

copy 2019 Trend Micro Inc40

Shared backdoor - ShadowPad

bull New in 2020 sandbox evasion

bull if the loading DLL is not the expected one the program exits

It evades sandboxes that usually load DLLs with rundll32exe

copy 2019 Trend Micro Inc41

Shared backdoor - ShadowPad

bull Noticeable version tags

copy 2019 Trend Micro Inc42

Post-exploitation tools

copy 2019 Trend Micro Inc43

Post-exploitation tools - public

bull privilege escalation tools

bull CVE-2019-0803 and MS16-032 exploits

bull hash computational tools

bull credential dumpers

bull gsecdump v07

bull wdigest_extract

bull LaZagne

copy 2019 Trend Micro Inc44

Post-exploitation tools - public

bull Network shares enumeration

bull nbtscan 1035

bull Inbtscan (Python version of nbtscan)

bull Keyloggers

bull Keylogger1217

bull Lateral movement

bull Eternal Blue exploits

copy 2019 Trend Micro Inc45

Post-exploitation tools - private

bull Dumps information from the Domain Controller

bull Uses NetworkManagementAPIs

copy 2019 Trend Micro Inc46

Post-exploitation tools ndash hub relaying

Port 3925 Port 5688

CampC server

1 connects 2 sends traffic

3 forwards traffic

copy 2019 Trend Micro Inc47

Post-exploitation tools ndash hub relaying

bull Losing control of CampC does not expose the backend logic

bull CampC is simply a connection information forwarder

copy 2019 Trend Micro Inc48

Infrastructure

copy 2019 Trend Micro Inc49

Infrastructure

bull Multiple ldquoclustersrdquo of domain names

bull Infrastructure overlap

bull Clusters were usually bound to a specific malware family

copy 2019 Trend Micro Inc50

Infrastructure

bull From March to August 2020

bull 49 domains resolving to an IP address

bull Of which 38 dynamic domain names

bull 46 different IP addresses

copy 2019 Trend Micro Inc51

Infrastructure ndash attackerrsquos mistakes

bull Attacker misconfigured some CampC servers

bull We could find some new malware samples and families as well as victims

copy 2019 Trend Micro Inc52

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc53

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc54

Custom backdoors ndash attackerrsquos mistakes

bull Files with list of victims

copy 2019 Trend Micro Inc55

Targets

copy 2019 Trend Micro Inc56

Targets

bull 61 targets in 19 different countries from January to July 2020

bull Taiwan is the most targeted country followed by India and Russia

bull Technology and manufacturing industries were the most targeted followed by education and healthcare

copy 2019 Trend Micro Inc57

Targets ndash industries

Technology213

Manufacturing180

Education164

Healthcare131

Government82

Others230

copy 2019 Trend Micro Inc58

Targets ndash countries

Taiwan213

India131

Russia115

Germany66

Canada66

Australia66

Thailand66

Others277

copy 2019 Trend Micro Inc59

Links to other threat actors

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 30: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc30

Custom backdoors ndash VM check

bull Most of these families try to detect whether they are running inside a virtual machine

copy 2019 Trend Micro Inc31

Custom backdoors ndash sandbox evasion

bull Time delay

copy 2019 Trend Micro Inc32

Custom backdoors ndash sandbox evasion

bull Likely anti-sandbox trick

bull request for a non-existent website

bull prefix wwwgithub

bull httpswww[]github5o52d[]comDafpost[]asp

bull if this request fails the backdoor code flow continues as expected

copy 2019 Trend Micro Inc33

Custom backdoors - chimaera

bull Named after a caption

found in the control panel

copy 2019 Trend Micro Inc34

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc35

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc36

Custom backdoors - chimaera

bull Code similarity with old bisonal

bull Send machine info

bull Campaign ID

copy 2019 Trend Micro Inc37

Custom backdoors ndash campaign IDs

bull Some of these families have a campaign ID

416-J 0209J 0216jHC 228KJ 3sa new 711 Tranru Test DS MN1223 1228 dis ser mfa820 ser_ru rogx64 m0N~1 word0302 low_mn tnkk solr fvckrus ENERGY

copy 2019 Trend Micro Inc38

Shared backdoor - ShadowPad

bull Backdoor handling multiple plugins

bull Used in advanced supply chain attacks discovered in 2017 and 2018

bull Exclusive to WinntiAPT41 until 2019

copy 2019 Trend Micro Inc39

Shared backdoor - ShadowPad

bull Usually only 5 plugins are embeded

bull ldquoPluginsrdquo ldquoConfigrdquo ldquoInstallrdquo ldquoOnlinerdquo ldquoHTTPrdquo

bull In some cases ldquoTCPrdquo ldquoUDPrdquo

bull Loaded through DLL side-loading vulnerabilities in signed executables

bull Uses anti-disassembly techniques

bull Sometimes packed with VMProtect

copy 2019 Trend Micro Inc40

Shared backdoor - ShadowPad

bull New in 2020 sandbox evasion

bull if the loading DLL is not the expected one the program exits

It evades sandboxes that usually load DLLs with rundll32exe

copy 2019 Trend Micro Inc41

Shared backdoor - ShadowPad

bull Noticeable version tags

copy 2019 Trend Micro Inc42

Post-exploitation tools

copy 2019 Trend Micro Inc43

Post-exploitation tools - public

bull privilege escalation tools

bull CVE-2019-0803 and MS16-032 exploits

bull hash computational tools

bull credential dumpers

bull gsecdump v07

bull wdigest_extract

bull LaZagne

copy 2019 Trend Micro Inc44

Post-exploitation tools - public

bull Network shares enumeration

bull nbtscan 1035

bull Inbtscan (Python version of nbtscan)

bull Keyloggers

bull Keylogger1217

bull Lateral movement

bull Eternal Blue exploits

copy 2019 Trend Micro Inc45

Post-exploitation tools - private

bull Dumps information from the Domain Controller

bull Uses NetworkManagementAPIs

copy 2019 Trend Micro Inc46

Post-exploitation tools ndash hub relaying

Port 3925 Port 5688

CampC server

1 connects 2 sends traffic

3 forwards traffic

copy 2019 Trend Micro Inc47

Post-exploitation tools ndash hub relaying

bull Losing control of CampC does not expose the backend logic

bull CampC is simply a connection information forwarder

copy 2019 Trend Micro Inc48

Infrastructure

copy 2019 Trend Micro Inc49

Infrastructure

bull Multiple ldquoclustersrdquo of domain names

bull Infrastructure overlap

bull Clusters were usually bound to a specific malware family

copy 2019 Trend Micro Inc50

Infrastructure

bull From March to August 2020

bull 49 domains resolving to an IP address

bull Of which 38 dynamic domain names

bull 46 different IP addresses

copy 2019 Trend Micro Inc51

Infrastructure ndash attackerrsquos mistakes

bull Attacker misconfigured some CampC servers

bull We could find some new malware samples and families as well as victims

copy 2019 Trend Micro Inc52

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc53

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc54

Custom backdoors ndash attackerrsquos mistakes

bull Files with list of victims

copy 2019 Trend Micro Inc55

Targets

copy 2019 Trend Micro Inc56

Targets

bull 61 targets in 19 different countries from January to July 2020

bull Taiwan is the most targeted country followed by India and Russia

bull Technology and manufacturing industries were the most targeted followed by education and healthcare

copy 2019 Trend Micro Inc57

Targets ndash industries

Technology213

Manufacturing180

Education164

Healthcare131

Government82

Others230

copy 2019 Trend Micro Inc58

Targets ndash countries

Taiwan213

India131

Russia115

Germany66

Canada66

Australia66

Thailand66

Others277

copy 2019 Trend Micro Inc59

Links to other threat actors

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 31: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc31

Custom backdoors ndash sandbox evasion

bull Time delay

copy 2019 Trend Micro Inc32

Custom backdoors ndash sandbox evasion

bull Likely anti-sandbox trick

bull request for a non-existent website

bull prefix wwwgithub

bull httpswww[]github5o52d[]comDafpost[]asp

bull if this request fails the backdoor code flow continues as expected

copy 2019 Trend Micro Inc33

Custom backdoors - chimaera

bull Named after a caption

found in the control panel

copy 2019 Trend Micro Inc34

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc35

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc36

Custom backdoors - chimaera

bull Code similarity with old bisonal

bull Send machine info

bull Campaign ID

copy 2019 Trend Micro Inc37

Custom backdoors ndash campaign IDs

bull Some of these families have a campaign ID

416-J 0209J 0216jHC 228KJ 3sa new 711 Tranru Test DS MN1223 1228 dis ser mfa820 ser_ru rogx64 m0N~1 word0302 low_mn tnkk solr fvckrus ENERGY

copy 2019 Trend Micro Inc38

Shared backdoor - ShadowPad

bull Backdoor handling multiple plugins

bull Used in advanced supply chain attacks discovered in 2017 and 2018

bull Exclusive to WinntiAPT41 until 2019

copy 2019 Trend Micro Inc39

Shared backdoor - ShadowPad

bull Usually only 5 plugins are embeded

bull ldquoPluginsrdquo ldquoConfigrdquo ldquoInstallrdquo ldquoOnlinerdquo ldquoHTTPrdquo

bull In some cases ldquoTCPrdquo ldquoUDPrdquo

bull Loaded through DLL side-loading vulnerabilities in signed executables

bull Uses anti-disassembly techniques

bull Sometimes packed with VMProtect

copy 2019 Trend Micro Inc40

Shared backdoor - ShadowPad

bull New in 2020 sandbox evasion

bull if the loading DLL is not the expected one the program exits

It evades sandboxes that usually load DLLs with rundll32exe

copy 2019 Trend Micro Inc41

Shared backdoor - ShadowPad

bull Noticeable version tags

copy 2019 Trend Micro Inc42

Post-exploitation tools

copy 2019 Trend Micro Inc43

Post-exploitation tools - public

bull privilege escalation tools

bull CVE-2019-0803 and MS16-032 exploits

bull hash computational tools

bull credential dumpers

bull gsecdump v07

bull wdigest_extract

bull LaZagne

copy 2019 Trend Micro Inc44

Post-exploitation tools - public

bull Network shares enumeration

bull nbtscan 1035

bull Inbtscan (Python version of nbtscan)

bull Keyloggers

bull Keylogger1217

bull Lateral movement

bull Eternal Blue exploits

copy 2019 Trend Micro Inc45

Post-exploitation tools - private

bull Dumps information from the Domain Controller

bull Uses NetworkManagementAPIs

copy 2019 Trend Micro Inc46

Post-exploitation tools ndash hub relaying

Port 3925 Port 5688

CampC server

1 connects 2 sends traffic

3 forwards traffic

copy 2019 Trend Micro Inc47

Post-exploitation tools ndash hub relaying

bull Losing control of CampC does not expose the backend logic

bull CampC is simply a connection information forwarder

copy 2019 Trend Micro Inc48

Infrastructure

copy 2019 Trend Micro Inc49

Infrastructure

bull Multiple ldquoclustersrdquo of domain names

bull Infrastructure overlap

bull Clusters were usually bound to a specific malware family

copy 2019 Trend Micro Inc50

Infrastructure

bull From March to August 2020

bull 49 domains resolving to an IP address

bull Of which 38 dynamic domain names

bull 46 different IP addresses

copy 2019 Trend Micro Inc51

Infrastructure ndash attackerrsquos mistakes

bull Attacker misconfigured some CampC servers

bull We could find some new malware samples and families as well as victims

copy 2019 Trend Micro Inc52

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc53

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc54

Custom backdoors ndash attackerrsquos mistakes

bull Files with list of victims

copy 2019 Trend Micro Inc55

Targets

copy 2019 Trend Micro Inc56

Targets

bull 61 targets in 19 different countries from January to July 2020

bull Taiwan is the most targeted country followed by India and Russia

bull Technology and manufacturing industries were the most targeted followed by education and healthcare

copy 2019 Trend Micro Inc57

Targets ndash industries

Technology213

Manufacturing180

Education164

Healthcare131

Government82

Others230

copy 2019 Trend Micro Inc58

Targets ndash countries

Taiwan213

India131

Russia115

Germany66

Canada66

Australia66

Thailand66

Others277

copy 2019 Trend Micro Inc59

Links to other threat actors

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 32: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc32

Custom backdoors ndash sandbox evasion

bull Likely anti-sandbox trick

bull request for a non-existent website

bull prefix wwwgithub

bull httpswww[]github5o52d[]comDafpost[]asp

bull if this request fails the backdoor code flow continues as expected

copy 2019 Trend Micro Inc33

Custom backdoors - chimaera

bull Named after a caption

found in the control panel

copy 2019 Trend Micro Inc34

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc35

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc36

Custom backdoors - chimaera

bull Code similarity with old bisonal

bull Send machine info

bull Campaign ID

copy 2019 Trend Micro Inc37

Custom backdoors ndash campaign IDs

bull Some of these families have a campaign ID

416-J 0209J 0216jHC 228KJ 3sa new 711 Tranru Test DS MN1223 1228 dis ser mfa820 ser_ru rogx64 m0N~1 word0302 low_mn tnkk solr fvckrus ENERGY

copy 2019 Trend Micro Inc38

Shared backdoor - ShadowPad

bull Backdoor handling multiple plugins

bull Used in advanced supply chain attacks discovered in 2017 and 2018

bull Exclusive to WinntiAPT41 until 2019

copy 2019 Trend Micro Inc39

Shared backdoor - ShadowPad

bull Usually only 5 plugins are embeded

bull ldquoPluginsrdquo ldquoConfigrdquo ldquoInstallrdquo ldquoOnlinerdquo ldquoHTTPrdquo

bull In some cases ldquoTCPrdquo ldquoUDPrdquo

bull Loaded through DLL side-loading vulnerabilities in signed executables

bull Uses anti-disassembly techniques

bull Sometimes packed with VMProtect

copy 2019 Trend Micro Inc40

Shared backdoor - ShadowPad

bull New in 2020 sandbox evasion

bull if the loading DLL is not the expected one the program exits

It evades sandboxes that usually load DLLs with rundll32exe

copy 2019 Trend Micro Inc41

Shared backdoor - ShadowPad

bull Noticeable version tags

copy 2019 Trend Micro Inc42

Post-exploitation tools

copy 2019 Trend Micro Inc43

Post-exploitation tools - public

bull privilege escalation tools

bull CVE-2019-0803 and MS16-032 exploits

bull hash computational tools

bull credential dumpers

bull gsecdump v07

bull wdigest_extract

bull LaZagne

copy 2019 Trend Micro Inc44

Post-exploitation tools - public

bull Network shares enumeration

bull nbtscan 1035

bull Inbtscan (Python version of nbtscan)

bull Keyloggers

bull Keylogger1217

bull Lateral movement

bull Eternal Blue exploits

copy 2019 Trend Micro Inc45

Post-exploitation tools - private

bull Dumps information from the Domain Controller

bull Uses NetworkManagementAPIs

copy 2019 Trend Micro Inc46

Post-exploitation tools ndash hub relaying

Port 3925 Port 5688

CampC server

1 connects 2 sends traffic

3 forwards traffic

copy 2019 Trend Micro Inc47

Post-exploitation tools ndash hub relaying

bull Losing control of CampC does not expose the backend logic

bull CampC is simply a connection information forwarder

copy 2019 Trend Micro Inc48

Infrastructure

copy 2019 Trend Micro Inc49

Infrastructure

bull Multiple ldquoclustersrdquo of domain names

bull Infrastructure overlap

bull Clusters were usually bound to a specific malware family

copy 2019 Trend Micro Inc50

Infrastructure

bull From March to August 2020

bull 49 domains resolving to an IP address

bull Of which 38 dynamic domain names

bull 46 different IP addresses

copy 2019 Trend Micro Inc51

Infrastructure ndash attackerrsquos mistakes

bull Attacker misconfigured some CampC servers

bull We could find some new malware samples and families as well as victims

copy 2019 Trend Micro Inc52

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc53

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc54

Custom backdoors ndash attackerrsquos mistakes

bull Files with list of victims

copy 2019 Trend Micro Inc55

Targets

copy 2019 Trend Micro Inc56

Targets

bull 61 targets in 19 different countries from January to July 2020

bull Taiwan is the most targeted country followed by India and Russia

bull Technology and manufacturing industries were the most targeted followed by education and healthcare

copy 2019 Trend Micro Inc57

Targets ndash industries

Technology213

Manufacturing180

Education164

Healthcare131

Government82

Others230

copy 2019 Trend Micro Inc58

Targets ndash countries

Taiwan213

India131

Russia115

Germany66

Canada66

Australia66

Thailand66

Others277

copy 2019 Trend Micro Inc59

Links to other threat actors

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 33: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc33

Custom backdoors - chimaera

bull Named after a caption

found in the control panel

copy 2019 Trend Micro Inc34

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc35

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc36

Custom backdoors - chimaera

bull Code similarity with old bisonal

bull Send machine info

bull Campaign ID

copy 2019 Trend Micro Inc37

Custom backdoors ndash campaign IDs

bull Some of these families have a campaign ID

416-J 0209J 0216jHC 228KJ 3sa new 711 Tranru Test DS MN1223 1228 dis ser mfa820 ser_ru rogx64 m0N~1 word0302 low_mn tnkk solr fvckrus ENERGY

copy 2019 Trend Micro Inc38

Shared backdoor - ShadowPad

bull Backdoor handling multiple plugins

bull Used in advanced supply chain attacks discovered in 2017 and 2018

bull Exclusive to WinntiAPT41 until 2019

copy 2019 Trend Micro Inc39

Shared backdoor - ShadowPad

bull Usually only 5 plugins are embeded

bull ldquoPluginsrdquo ldquoConfigrdquo ldquoInstallrdquo ldquoOnlinerdquo ldquoHTTPrdquo

bull In some cases ldquoTCPrdquo ldquoUDPrdquo

bull Loaded through DLL side-loading vulnerabilities in signed executables

bull Uses anti-disassembly techniques

bull Sometimes packed with VMProtect

copy 2019 Trend Micro Inc40

Shared backdoor - ShadowPad

bull New in 2020 sandbox evasion

bull if the loading DLL is not the expected one the program exits

It evades sandboxes that usually load DLLs with rundll32exe

copy 2019 Trend Micro Inc41

Shared backdoor - ShadowPad

bull Noticeable version tags

copy 2019 Trend Micro Inc42

Post-exploitation tools

copy 2019 Trend Micro Inc43

Post-exploitation tools - public

bull privilege escalation tools

bull CVE-2019-0803 and MS16-032 exploits

bull hash computational tools

bull credential dumpers

bull gsecdump v07

bull wdigest_extract

bull LaZagne

copy 2019 Trend Micro Inc44

Post-exploitation tools - public

bull Network shares enumeration

bull nbtscan 1035

bull Inbtscan (Python version of nbtscan)

bull Keyloggers

bull Keylogger1217

bull Lateral movement

bull Eternal Blue exploits

copy 2019 Trend Micro Inc45

Post-exploitation tools - private

bull Dumps information from the Domain Controller

bull Uses NetworkManagementAPIs

copy 2019 Trend Micro Inc46

Post-exploitation tools ndash hub relaying

Port 3925 Port 5688

CampC server

1 connects 2 sends traffic

3 forwards traffic

copy 2019 Trend Micro Inc47

Post-exploitation tools ndash hub relaying

bull Losing control of CampC does not expose the backend logic

bull CampC is simply a connection information forwarder

copy 2019 Trend Micro Inc48

Infrastructure

copy 2019 Trend Micro Inc49

Infrastructure

bull Multiple ldquoclustersrdquo of domain names

bull Infrastructure overlap

bull Clusters were usually bound to a specific malware family

copy 2019 Trend Micro Inc50

Infrastructure

bull From March to August 2020

bull 49 domains resolving to an IP address

bull Of which 38 dynamic domain names

bull 46 different IP addresses

copy 2019 Trend Micro Inc51

Infrastructure ndash attackerrsquos mistakes

bull Attacker misconfigured some CampC servers

bull We could find some new malware samples and families as well as victims

copy 2019 Trend Micro Inc52

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc53

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc54

Custom backdoors ndash attackerrsquos mistakes

bull Files with list of victims

copy 2019 Trend Micro Inc55

Targets

copy 2019 Trend Micro Inc56

Targets

bull 61 targets in 19 different countries from January to July 2020

bull Taiwan is the most targeted country followed by India and Russia

bull Technology and manufacturing industries were the most targeted followed by education and healthcare

copy 2019 Trend Micro Inc57

Targets ndash industries

Technology213

Manufacturing180

Education164

Healthcare131

Government82

Others230

copy 2019 Trend Micro Inc58

Targets ndash countries

Taiwan213

India131

Russia115

Germany66

Canada66

Australia66

Thailand66

Others277

copy 2019 Trend Micro Inc59

Links to other threat actors

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 34: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc34

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc35

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc36

Custom backdoors - chimaera

bull Code similarity with old bisonal

bull Send machine info

bull Campaign ID

copy 2019 Trend Micro Inc37

Custom backdoors ndash campaign IDs

bull Some of these families have a campaign ID

416-J 0209J 0216jHC 228KJ 3sa new 711 Tranru Test DS MN1223 1228 dis ser mfa820 ser_ru rogx64 m0N~1 word0302 low_mn tnkk solr fvckrus ENERGY

copy 2019 Trend Micro Inc38

Shared backdoor - ShadowPad

bull Backdoor handling multiple plugins

bull Used in advanced supply chain attacks discovered in 2017 and 2018

bull Exclusive to WinntiAPT41 until 2019

copy 2019 Trend Micro Inc39

Shared backdoor - ShadowPad

bull Usually only 5 plugins are embeded

bull ldquoPluginsrdquo ldquoConfigrdquo ldquoInstallrdquo ldquoOnlinerdquo ldquoHTTPrdquo

bull In some cases ldquoTCPrdquo ldquoUDPrdquo

bull Loaded through DLL side-loading vulnerabilities in signed executables

bull Uses anti-disassembly techniques

bull Sometimes packed with VMProtect

copy 2019 Trend Micro Inc40

Shared backdoor - ShadowPad

bull New in 2020 sandbox evasion

bull if the loading DLL is not the expected one the program exits

It evades sandboxes that usually load DLLs with rundll32exe

copy 2019 Trend Micro Inc41

Shared backdoor - ShadowPad

bull Noticeable version tags

copy 2019 Trend Micro Inc42

Post-exploitation tools

copy 2019 Trend Micro Inc43

Post-exploitation tools - public

bull privilege escalation tools

bull CVE-2019-0803 and MS16-032 exploits

bull hash computational tools

bull credential dumpers

bull gsecdump v07

bull wdigest_extract

bull LaZagne

copy 2019 Trend Micro Inc44

Post-exploitation tools - public

bull Network shares enumeration

bull nbtscan 1035

bull Inbtscan (Python version of nbtscan)

bull Keyloggers

bull Keylogger1217

bull Lateral movement

bull Eternal Blue exploits

copy 2019 Trend Micro Inc45

Post-exploitation tools - private

bull Dumps information from the Domain Controller

bull Uses NetworkManagementAPIs

copy 2019 Trend Micro Inc46

Post-exploitation tools ndash hub relaying

Port 3925 Port 5688

CampC server

1 connects 2 sends traffic

3 forwards traffic

copy 2019 Trend Micro Inc47

Post-exploitation tools ndash hub relaying

bull Losing control of CampC does not expose the backend logic

bull CampC is simply a connection information forwarder

copy 2019 Trend Micro Inc48

Infrastructure

copy 2019 Trend Micro Inc49

Infrastructure

bull Multiple ldquoclustersrdquo of domain names

bull Infrastructure overlap

bull Clusters were usually bound to a specific malware family

copy 2019 Trend Micro Inc50

Infrastructure

bull From March to August 2020

bull 49 domains resolving to an IP address

bull Of which 38 dynamic domain names

bull 46 different IP addresses

copy 2019 Trend Micro Inc51

Infrastructure ndash attackerrsquos mistakes

bull Attacker misconfigured some CampC servers

bull We could find some new malware samples and families as well as victims

copy 2019 Trend Micro Inc52

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc53

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc54

Custom backdoors ndash attackerrsquos mistakes

bull Files with list of victims

copy 2019 Trend Micro Inc55

Targets

copy 2019 Trend Micro Inc56

Targets

bull 61 targets in 19 different countries from January to July 2020

bull Taiwan is the most targeted country followed by India and Russia

bull Technology and manufacturing industries were the most targeted followed by education and healthcare

copy 2019 Trend Micro Inc57

Targets ndash industries

Technology213

Manufacturing180

Education164

Healthcare131

Government82

Others230

copy 2019 Trend Micro Inc58

Targets ndash countries

Taiwan213

India131

Russia115

Germany66

Canada66

Australia66

Thailand66

Others277

copy 2019 Trend Micro Inc59

Links to other threat actors

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 35: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc35

Custom backdoors - chimaera

bull Control panel

copy 2019 Trend Micro Inc36

Custom backdoors - chimaera

bull Code similarity with old bisonal

bull Send machine info

bull Campaign ID

copy 2019 Trend Micro Inc37

Custom backdoors ndash campaign IDs

bull Some of these families have a campaign ID

416-J 0209J 0216jHC 228KJ 3sa new 711 Tranru Test DS MN1223 1228 dis ser mfa820 ser_ru rogx64 m0N~1 word0302 low_mn tnkk solr fvckrus ENERGY

copy 2019 Trend Micro Inc38

Shared backdoor - ShadowPad

bull Backdoor handling multiple plugins

bull Used in advanced supply chain attacks discovered in 2017 and 2018

bull Exclusive to WinntiAPT41 until 2019

copy 2019 Trend Micro Inc39

Shared backdoor - ShadowPad

bull Usually only 5 plugins are embeded

bull ldquoPluginsrdquo ldquoConfigrdquo ldquoInstallrdquo ldquoOnlinerdquo ldquoHTTPrdquo

bull In some cases ldquoTCPrdquo ldquoUDPrdquo

bull Loaded through DLL side-loading vulnerabilities in signed executables

bull Uses anti-disassembly techniques

bull Sometimes packed with VMProtect

copy 2019 Trend Micro Inc40

Shared backdoor - ShadowPad

bull New in 2020 sandbox evasion

bull if the loading DLL is not the expected one the program exits

It evades sandboxes that usually load DLLs with rundll32exe

copy 2019 Trend Micro Inc41

Shared backdoor - ShadowPad

bull Noticeable version tags

copy 2019 Trend Micro Inc42

Post-exploitation tools

copy 2019 Trend Micro Inc43

Post-exploitation tools - public

bull privilege escalation tools

bull CVE-2019-0803 and MS16-032 exploits

bull hash computational tools

bull credential dumpers

bull gsecdump v07

bull wdigest_extract

bull LaZagne

copy 2019 Trend Micro Inc44

Post-exploitation tools - public

bull Network shares enumeration

bull nbtscan 1035

bull Inbtscan (Python version of nbtscan)

bull Keyloggers

bull Keylogger1217

bull Lateral movement

bull Eternal Blue exploits

copy 2019 Trend Micro Inc45

Post-exploitation tools - private

bull Dumps information from the Domain Controller

bull Uses NetworkManagementAPIs

copy 2019 Trend Micro Inc46

Post-exploitation tools ndash hub relaying

Port 3925 Port 5688

CampC server

1 connects 2 sends traffic

3 forwards traffic

copy 2019 Trend Micro Inc47

Post-exploitation tools ndash hub relaying

bull Losing control of CampC does not expose the backend logic

bull CampC is simply a connection information forwarder

copy 2019 Trend Micro Inc48

Infrastructure

copy 2019 Trend Micro Inc49

Infrastructure

bull Multiple ldquoclustersrdquo of domain names

bull Infrastructure overlap

bull Clusters were usually bound to a specific malware family

copy 2019 Trend Micro Inc50

Infrastructure

bull From March to August 2020

bull 49 domains resolving to an IP address

bull Of which 38 dynamic domain names

bull 46 different IP addresses

copy 2019 Trend Micro Inc51

Infrastructure ndash attackerrsquos mistakes

bull Attacker misconfigured some CampC servers

bull We could find some new malware samples and families as well as victims

copy 2019 Trend Micro Inc52

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc53

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc54

Custom backdoors ndash attackerrsquos mistakes

bull Files with list of victims

copy 2019 Trend Micro Inc55

Targets

copy 2019 Trend Micro Inc56

Targets

bull 61 targets in 19 different countries from January to July 2020

bull Taiwan is the most targeted country followed by India and Russia

bull Technology and manufacturing industries were the most targeted followed by education and healthcare

copy 2019 Trend Micro Inc57

Targets ndash industries

Technology213

Manufacturing180

Education164

Healthcare131

Government82

Others230

copy 2019 Trend Micro Inc58

Targets ndash countries

Taiwan213

India131

Russia115

Germany66

Canada66

Australia66

Thailand66

Others277

copy 2019 Trend Micro Inc59

Links to other threat actors

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 36: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc36

Custom backdoors - chimaera

bull Code similarity with old bisonal

bull Send machine info

bull Campaign ID

copy 2019 Trend Micro Inc37

Custom backdoors ndash campaign IDs

bull Some of these families have a campaign ID

416-J 0209J 0216jHC 228KJ 3sa new 711 Tranru Test DS MN1223 1228 dis ser mfa820 ser_ru rogx64 m0N~1 word0302 low_mn tnkk solr fvckrus ENERGY

copy 2019 Trend Micro Inc38

Shared backdoor - ShadowPad

bull Backdoor handling multiple plugins

bull Used in advanced supply chain attacks discovered in 2017 and 2018

bull Exclusive to WinntiAPT41 until 2019

copy 2019 Trend Micro Inc39

Shared backdoor - ShadowPad

bull Usually only 5 plugins are embeded

bull ldquoPluginsrdquo ldquoConfigrdquo ldquoInstallrdquo ldquoOnlinerdquo ldquoHTTPrdquo

bull In some cases ldquoTCPrdquo ldquoUDPrdquo

bull Loaded through DLL side-loading vulnerabilities in signed executables

bull Uses anti-disassembly techniques

bull Sometimes packed with VMProtect

copy 2019 Trend Micro Inc40

Shared backdoor - ShadowPad

bull New in 2020 sandbox evasion

bull if the loading DLL is not the expected one the program exits

It evades sandboxes that usually load DLLs with rundll32exe

copy 2019 Trend Micro Inc41

Shared backdoor - ShadowPad

bull Noticeable version tags

copy 2019 Trend Micro Inc42

Post-exploitation tools

copy 2019 Trend Micro Inc43

Post-exploitation tools - public

bull privilege escalation tools

bull CVE-2019-0803 and MS16-032 exploits

bull hash computational tools

bull credential dumpers

bull gsecdump v07

bull wdigest_extract

bull LaZagne

copy 2019 Trend Micro Inc44

Post-exploitation tools - public

bull Network shares enumeration

bull nbtscan 1035

bull Inbtscan (Python version of nbtscan)

bull Keyloggers

bull Keylogger1217

bull Lateral movement

bull Eternal Blue exploits

copy 2019 Trend Micro Inc45

Post-exploitation tools - private

bull Dumps information from the Domain Controller

bull Uses NetworkManagementAPIs

copy 2019 Trend Micro Inc46

Post-exploitation tools ndash hub relaying

Port 3925 Port 5688

CampC server

1 connects 2 sends traffic

3 forwards traffic

copy 2019 Trend Micro Inc47

Post-exploitation tools ndash hub relaying

bull Losing control of CampC does not expose the backend logic

bull CampC is simply a connection information forwarder

copy 2019 Trend Micro Inc48

Infrastructure

copy 2019 Trend Micro Inc49

Infrastructure

bull Multiple ldquoclustersrdquo of domain names

bull Infrastructure overlap

bull Clusters were usually bound to a specific malware family

copy 2019 Trend Micro Inc50

Infrastructure

bull From March to August 2020

bull 49 domains resolving to an IP address

bull Of which 38 dynamic domain names

bull 46 different IP addresses

copy 2019 Trend Micro Inc51

Infrastructure ndash attackerrsquos mistakes

bull Attacker misconfigured some CampC servers

bull We could find some new malware samples and families as well as victims

copy 2019 Trend Micro Inc52

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc53

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc54

Custom backdoors ndash attackerrsquos mistakes

bull Files with list of victims

copy 2019 Trend Micro Inc55

Targets

copy 2019 Trend Micro Inc56

Targets

bull 61 targets in 19 different countries from January to July 2020

bull Taiwan is the most targeted country followed by India and Russia

bull Technology and manufacturing industries were the most targeted followed by education and healthcare

copy 2019 Trend Micro Inc57

Targets ndash industries

Technology213

Manufacturing180

Education164

Healthcare131

Government82

Others230

copy 2019 Trend Micro Inc58

Targets ndash countries

Taiwan213

India131

Russia115

Germany66

Canada66

Australia66

Thailand66

Others277

copy 2019 Trend Micro Inc59

Links to other threat actors

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 37: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc37

Custom backdoors ndash campaign IDs

bull Some of these families have a campaign ID

416-J 0209J 0216jHC 228KJ 3sa new 711 Tranru Test DS MN1223 1228 dis ser mfa820 ser_ru rogx64 m0N~1 word0302 low_mn tnkk solr fvckrus ENERGY

copy 2019 Trend Micro Inc38

Shared backdoor - ShadowPad

bull Backdoor handling multiple plugins

bull Used in advanced supply chain attacks discovered in 2017 and 2018

bull Exclusive to WinntiAPT41 until 2019

copy 2019 Trend Micro Inc39

Shared backdoor - ShadowPad

bull Usually only 5 plugins are embeded

bull ldquoPluginsrdquo ldquoConfigrdquo ldquoInstallrdquo ldquoOnlinerdquo ldquoHTTPrdquo

bull In some cases ldquoTCPrdquo ldquoUDPrdquo

bull Loaded through DLL side-loading vulnerabilities in signed executables

bull Uses anti-disassembly techniques

bull Sometimes packed with VMProtect

copy 2019 Trend Micro Inc40

Shared backdoor - ShadowPad

bull New in 2020 sandbox evasion

bull if the loading DLL is not the expected one the program exits

It evades sandboxes that usually load DLLs with rundll32exe

copy 2019 Trend Micro Inc41

Shared backdoor - ShadowPad

bull Noticeable version tags

copy 2019 Trend Micro Inc42

Post-exploitation tools

copy 2019 Trend Micro Inc43

Post-exploitation tools - public

bull privilege escalation tools

bull CVE-2019-0803 and MS16-032 exploits

bull hash computational tools

bull credential dumpers

bull gsecdump v07

bull wdigest_extract

bull LaZagne

copy 2019 Trend Micro Inc44

Post-exploitation tools - public

bull Network shares enumeration

bull nbtscan 1035

bull Inbtscan (Python version of nbtscan)

bull Keyloggers

bull Keylogger1217

bull Lateral movement

bull Eternal Blue exploits

copy 2019 Trend Micro Inc45

Post-exploitation tools - private

bull Dumps information from the Domain Controller

bull Uses NetworkManagementAPIs

copy 2019 Trend Micro Inc46

Post-exploitation tools ndash hub relaying

Port 3925 Port 5688

CampC server

1 connects 2 sends traffic

3 forwards traffic

copy 2019 Trend Micro Inc47

Post-exploitation tools ndash hub relaying

bull Losing control of CampC does not expose the backend logic

bull CampC is simply a connection information forwarder

copy 2019 Trend Micro Inc48

Infrastructure

copy 2019 Trend Micro Inc49

Infrastructure

bull Multiple ldquoclustersrdquo of domain names

bull Infrastructure overlap

bull Clusters were usually bound to a specific malware family

copy 2019 Trend Micro Inc50

Infrastructure

bull From March to August 2020

bull 49 domains resolving to an IP address

bull Of which 38 dynamic domain names

bull 46 different IP addresses

copy 2019 Trend Micro Inc51

Infrastructure ndash attackerrsquos mistakes

bull Attacker misconfigured some CampC servers

bull We could find some new malware samples and families as well as victims

copy 2019 Trend Micro Inc52

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc53

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc54

Custom backdoors ndash attackerrsquos mistakes

bull Files with list of victims

copy 2019 Trend Micro Inc55

Targets

copy 2019 Trend Micro Inc56

Targets

bull 61 targets in 19 different countries from January to July 2020

bull Taiwan is the most targeted country followed by India and Russia

bull Technology and manufacturing industries were the most targeted followed by education and healthcare

copy 2019 Trend Micro Inc57

Targets ndash industries

Technology213

Manufacturing180

Education164

Healthcare131

Government82

Others230

copy 2019 Trend Micro Inc58

Targets ndash countries

Taiwan213

India131

Russia115

Germany66

Canada66

Australia66

Thailand66

Others277

copy 2019 Trend Micro Inc59

Links to other threat actors

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 38: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc38

Shared backdoor - ShadowPad

bull Backdoor handling multiple plugins

bull Used in advanced supply chain attacks discovered in 2017 and 2018

bull Exclusive to WinntiAPT41 until 2019

copy 2019 Trend Micro Inc39

Shared backdoor - ShadowPad

bull Usually only 5 plugins are embeded

bull ldquoPluginsrdquo ldquoConfigrdquo ldquoInstallrdquo ldquoOnlinerdquo ldquoHTTPrdquo

bull In some cases ldquoTCPrdquo ldquoUDPrdquo

bull Loaded through DLL side-loading vulnerabilities in signed executables

bull Uses anti-disassembly techniques

bull Sometimes packed with VMProtect

copy 2019 Trend Micro Inc40

Shared backdoor - ShadowPad

bull New in 2020 sandbox evasion

bull if the loading DLL is not the expected one the program exits

It evades sandboxes that usually load DLLs with rundll32exe

copy 2019 Trend Micro Inc41

Shared backdoor - ShadowPad

bull Noticeable version tags

copy 2019 Trend Micro Inc42

Post-exploitation tools

copy 2019 Trend Micro Inc43

Post-exploitation tools - public

bull privilege escalation tools

bull CVE-2019-0803 and MS16-032 exploits

bull hash computational tools

bull credential dumpers

bull gsecdump v07

bull wdigest_extract

bull LaZagne

copy 2019 Trend Micro Inc44

Post-exploitation tools - public

bull Network shares enumeration

bull nbtscan 1035

bull Inbtscan (Python version of nbtscan)

bull Keyloggers

bull Keylogger1217

bull Lateral movement

bull Eternal Blue exploits

copy 2019 Trend Micro Inc45

Post-exploitation tools - private

bull Dumps information from the Domain Controller

bull Uses NetworkManagementAPIs

copy 2019 Trend Micro Inc46

Post-exploitation tools ndash hub relaying

Port 3925 Port 5688

CampC server

1 connects 2 sends traffic

3 forwards traffic

copy 2019 Trend Micro Inc47

Post-exploitation tools ndash hub relaying

bull Losing control of CampC does not expose the backend logic

bull CampC is simply a connection information forwarder

copy 2019 Trend Micro Inc48

Infrastructure

copy 2019 Trend Micro Inc49

Infrastructure

bull Multiple ldquoclustersrdquo of domain names

bull Infrastructure overlap

bull Clusters were usually bound to a specific malware family

copy 2019 Trend Micro Inc50

Infrastructure

bull From March to August 2020

bull 49 domains resolving to an IP address

bull Of which 38 dynamic domain names

bull 46 different IP addresses

copy 2019 Trend Micro Inc51

Infrastructure ndash attackerrsquos mistakes

bull Attacker misconfigured some CampC servers

bull We could find some new malware samples and families as well as victims

copy 2019 Trend Micro Inc52

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc53

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc54

Custom backdoors ndash attackerrsquos mistakes

bull Files with list of victims

copy 2019 Trend Micro Inc55

Targets

copy 2019 Trend Micro Inc56

Targets

bull 61 targets in 19 different countries from January to July 2020

bull Taiwan is the most targeted country followed by India and Russia

bull Technology and manufacturing industries were the most targeted followed by education and healthcare

copy 2019 Trend Micro Inc57

Targets ndash industries

Technology213

Manufacturing180

Education164

Healthcare131

Government82

Others230

copy 2019 Trend Micro Inc58

Targets ndash countries

Taiwan213

India131

Russia115

Germany66

Canada66

Australia66

Thailand66

Others277

copy 2019 Trend Micro Inc59

Links to other threat actors

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 39: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc39

Shared backdoor - ShadowPad

bull Usually only 5 plugins are embeded

bull ldquoPluginsrdquo ldquoConfigrdquo ldquoInstallrdquo ldquoOnlinerdquo ldquoHTTPrdquo

bull In some cases ldquoTCPrdquo ldquoUDPrdquo

bull Loaded through DLL side-loading vulnerabilities in signed executables

bull Uses anti-disassembly techniques

bull Sometimes packed with VMProtect

copy 2019 Trend Micro Inc40

Shared backdoor - ShadowPad

bull New in 2020 sandbox evasion

bull if the loading DLL is not the expected one the program exits

It evades sandboxes that usually load DLLs with rundll32exe

copy 2019 Trend Micro Inc41

Shared backdoor - ShadowPad

bull Noticeable version tags

copy 2019 Trend Micro Inc42

Post-exploitation tools

copy 2019 Trend Micro Inc43

Post-exploitation tools - public

bull privilege escalation tools

bull CVE-2019-0803 and MS16-032 exploits

bull hash computational tools

bull credential dumpers

bull gsecdump v07

bull wdigest_extract

bull LaZagne

copy 2019 Trend Micro Inc44

Post-exploitation tools - public

bull Network shares enumeration

bull nbtscan 1035

bull Inbtscan (Python version of nbtscan)

bull Keyloggers

bull Keylogger1217

bull Lateral movement

bull Eternal Blue exploits

copy 2019 Trend Micro Inc45

Post-exploitation tools - private

bull Dumps information from the Domain Controller

bull Uses NetworkManagementAPIs

copy 2019 Trend Micro Inc46

Post-exploitation tools ndash hub relaying

Port 3925 Port 5688

CampC server

1 connects 2 sends traffic

3 forwards traffic

copy 2019 Trend Micro Inc47

Post-exploitation tools ndash hub relaying

bull Losing control of CampC does not expose the backend logic

bull CampC is simply a connection information forwarder

copy 2019 Trend Micro Inc48

Infrastructure

copy 2019 Trend Micro Inc49

Infrastructure

bull Multiple ldquoclustersrdquo of domain names

bull Infrastructure overlap

bull Clusters were usually bound to a specific malware family

copy 2019 Trend Micro Inc50

Infrastructure

bull From March to August 2020

bull 49 domains resolving to an IP address

bull Of which 38 dynamic domain names

bull 46 different IP addresses

copy 2019 Trend Micro Inc51

Infrastructure ndash attackerrsquos mistakes

bull Attacker misconfigured some CampC servers

bull We could find some new malware samples and families as well as victims

copy 2019 Trend Micro Inc52

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc53

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc54

Custom backdoors ndash attackerrsquos mistakes

bull Files with list of victims

copy 2019 Trend Micro Inc55

Targets

copy 2019 Trend Micro Inc56

Targets

bull 61 targets in 19 different countries from January to July 2020

bull Taiwan is the most targeted country followed by India and Russia

bull Technology and manufacturing industries were the most targeted followed by education and healthcare

copy 2019 Trend Micro Inc57

Targets ndash industries

Technology213

Manufacturing180

Education164

Healthcare131

Government82

Others230

copy 2019 Trend Micro Inc58

Targets ndash countries

Taiwan213

India131

Russia115

Germany66

Canada66

Australia66

Thailand66

Others277

copy 2019 Trend Micro Inc59

Links to other threat actors

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 40: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc40

Shared backdoor - ShadowPad

bull New in 2020 sandbox evasion

bull if the loading DLL is not the expected one the program exits

It evades sandboxes that usually load DLLs with rundll32exe

copy 2019 Trend Micro Inc41

Shared backdoor - ShadowPad

bull Noticeable version tags

copy 2019 Trend Micro Inc42

Post-exploitation tools

copy 2019 Trend Micro Inc43

Post-exploitation tools - public

bull privilege escalation tools

bull CVE-2019-0803 and MS16-032 exploits

bull hash computational tools

bull credential dumpers

bull gsecdump v07

bull wdigest_extract

bull LaZagne

copy 2019 Trend Micro Inc44

Post-exploitation tools - public

bull Network shares enumeration

bull nbtscan 1035

bull Inbtscan (Python version of nbtscan)

bull Keyloggers

bull Keylogger1217

bull Lateral movement

bull Eternal Blue exploits

copy 2019 Trend Micro Inc45

Post-exploitation tools - private

bull Dumps information from the Domain Controller

bull Uses NetworkManagementAPIs

copy 2019 Trend Micro Inc46

Post-exploitation tools ndash hub relaying

Port 3925 Port 5688

CampC server

1 connects 2 sends traffic

3 forwards traffic

copy 2019 Trend Micro Inc47

Post-exploitation tools ndash hub relaying

bull Losing control of CampC does not expose the backend logic

bull CampC is simply a connection information forwarder

copy 2019 Trend Micro Inc48

Infrastructure

copy 2019 Trend Micro Inc49

Infrastructure

bull Multiple ldquoclustersrdquo of domain names

bull Infrastructure overlap

bull Clusters were usually bound to a specific malware family

copy 2019 Trend Micro Inc50

Infrastructure

bull From March to August 2020

bull 49 domains resolving to an IP address

bull Of which 38 dynamic domain names

bull 46 different IP addresses

copy 2019 Trend Micro Inc51

Infrastructure ndash attackerrsquos mistakes

bull Attacker misconfigured some CampC servers

bull We could find some new malware samples and families as well as victims

copy 2019 Trend Micro Inc52

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc53

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc54

Custom backdoors ndash attackerrsquos mistakes

bull Files with list of victims

copy 2019 Trend Micro Inc55

Targets

copy 2019 Trend Micro Inc56

Targets

bull 61 targets in 19 different countries from January to July 2020

bull Taiwan is the most targeted country followed by India and Russia

bull Technology and manufacturing industries were the most targeted followed by education and healthcare

copy 2019 Trend Micro Inc57

Targets ndash industries

Technology213

Manufacturing180

Education164

Healthcare131

Government82

Others230

copy 2019 Trend Micro Inc58

Targets ndash countries

Taiwan213

India131

Russia115

Germany66

Canada66

Australia66

Thailand66

Others277

copy 2019 Trend Micro Inc59

Links to other threat actors

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 41: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc41

Shared backdoor - ShadowPad

bull Noticeable version tags

copy 2019 Trend Micro Inc42

Post-exploitation tools

copy 2019 Trend Micro Inc43

Post-exploitation tools - public

bull privilege escalation tools

bull CVE-2019-0803 and MS16-032 exploits

bull hash computational tools

bull credential dumpers

bull gsecdump v07

bull wdigest_extract

bull LaZagne

copy 2019 Trend Micro Inc44

Post-exploitation tools - public

bull Network shares enumeration

bull nbtscan 1035

bull Inbtscan (Python version of nbtscan)

bull Keyloggers

bull Keylogger1217

bull Lateral movement

bull Eternal Blue exploits

copy 2019 Trend Micro Inc45

Post-exploitation tools - private

bull Dumps information from the Domain Controller

bull Uses NetworkManagementAPIs

copy 2019 Trend Micro Inc46

Post-exploitation tools ndash hub relaying

Port 3925 Port 5688

CampC server

1 connects 2 sends traffic

3 forwards traffic

copy 2019 Trend Micro Inc47

Post-exploitation tools ndash hub relaying

bull Losing control of CampC does not expose the backend logic

bull CampC is simply a connection information forwarder

copy 2019 Trend Micro Inc48

Infrastructure

copy 2019 Trend Micro Inc49

Infrastructure

bull Multiple ldquoclustersrdquo of domain names

bull Infrastructure overlap

bull Clusters were usually bound to a specific malware family

copy 2019 Trend Micro Inc50

Infrastructure

bull From March to August 2020

bull 49 domains resolving to an IP address

bull Of which 38 dynamic domain names

bull 46 different IP addresses

copy 2019 Trend Micro Inc51

Infrastructure ndash attackerrsquos mistakes

bull Attacker misconfigured some CampC servers

bull We could find some new malware samples and families as well as victims

copy 2019 Trend Micro Inc52

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc53

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc54

Custom backdoors ndash attackerrsquos mistakes

bull Files with list of victims

copy 2019 Trend Micro Inc55

Targets

copy 2019 Trend Micro Inc56

Targets

bull 61 targets in 19 different countries from January to July 2020

bull Taiwan is the most targeted country followed by India and Russia

bull Technology and manufacturing industries were the most targeted followed by education and healthcare

copy 2019 Trend Micro Inc57

Targets ndash industries

Technology213

Manufacturing180

Education164

Healthcare131

Government82

Others230

copy 2019 Trend Micro Inc58

Targets ndash countries

Taiwan213

India131

Russia115

Germany66

Canada66

Australia66

Thailand66

Others277

copy 2019 Trend Micro Inc59

Links to other threat actors

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 42: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc42

Post-exploitation tools

copy 2019 Trend Micro Inc43

Post-exploitation tools - public

bull privilege escalation tools

bull CVE-2019-0803 and MS16-032 exploits

bull hash computational tools

bull credential dumpers

bull gsecdump v07

bull wdigest_extract

bull LaZagne

copy 2019 Trend Micro Inc44

Post-exploitation tools - public

bull Network shares enumeration

bull nbtscan 1035

bull Inbtscan (Python version of nbtscan)

bull Keyloggers

bull Keylogger1217

bull Lateral movement

bull Eternal Blue exploits

copy 2019 Trend Micro Inc45

Post-exploitation tools - private

bull Dumps information from the Domain Controller

bull Uses NetworkManagementAPIs

copy 2019 Trend Micro Inc46

Post-exploitation tools ndash hub relaying

Port 3925 Port 5688

CampC server

1 connects 2 sends traffic

3 forwards traffic

copy 2019 Trend Micro Inc47

Post-exploitation tools ndash hub relaying

bull Losing control of CampC does not expose the backend logic

bull CampC is simply a connection information forwarder

copy 2019 Trend Micro Inc48

Infrastructure

copy 2019 Trend Micro Inc49

Infrastructure

bull Multiple ldquoclustersrdquo of domain names

bull Infrastructure overlap

bull Clusters were usually bound to a specific malware family

copy 2019 Trend Micro Inc50

Infrastructure

bull From March to August 2020

bull 49 domains resolving to an IP address

bull Of which 38 dynamic domain names

bull 46 different IP addresses

copy 2019 Trend Micro Inc51

Infrastructure ndash attackerrsquos mistakes

bull Attacker misconfigured some CampC servers

bull We could find some new malware samples and families as well as victims

copy 2019 Trend Micro Inc52

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc53

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc54

Custom backdoors ndash attackerrsquos mistakes

bull Files with list of victims

copy 2019 Trend Micro Inc55

Targets

copy 2019 Trend Micro Inc56

Targets

bull 61 targets in 19 different countries from January to July 2020

bull Taiwan is the most targeted country followed by India and Russia

bull Technology and manufacturing industries were the most targeted followed by education and healthcare

copy 2019 Trend Micro Inc57

Targets ndash industries

Technology213

Manufacturing180

Education164

Healthcare131

Government82

Others230

copy 2019 Trend Micro Inc58

Targets ndash countries

Taiwan213

India131

Russia115

Germany66

Canada66

Australia66

Thailand66

Others277

copy 2019 Trend Micro Inc59

Links to other threat actors

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 43: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc43

Post-exploitation tools - public

bull privilege escalation tools

bull CVE-2019-0803 and MS16-032 exploits

bull hash computational tools

bull credential dumpers

bull gsecdump v07

bull wdigest_extract

bull LaZagne

copy 2019 Trend Micro Inc44

Post-exploitation tools - public

bull Network shares enumeration

bull nbtscan 1035

bull Inbtscan (Python version of nbtscan)

bull Keyloggers

bull Keylogger1217

bull Lateral movement

bull Eternal Blue exploits

copy 2019 Trend Micro Inc45

Post-exploitation tools - private

bull Dumps information from the Domain Controller

bull Uses NetworkManagementAPIs

copy 2019 Trend Micro Inc46

Post-exploitation tools ndash hub relaying

Port 3925 Port 5688

CampC server

1 connects 2 sends traffic

3 forwards traffic

copy 2019 Trend Micro Inc47

Post-exploitation tools ndash hub relaying

bull Losing control of CampC does not expose the backend logic

bull CampC is simply a connection information forwarder

copy 2019 Trend Micro Inc48

Infrastructure

copy 2019 Trend Micro Inc49

Infrastructure

bull Multiple ldquoclustersrdquo of domain names

bull Infrastructure overlap

bull Clusters were usually bound to a specific malware family

copy 2019 Trend Micro Inc50

Infrastructure

bull From March to August 2020

bull 49 domains resolving to an IP address

bull Of which 38 dynamic domain names

bull 46 different IP addresses

copy 2019 Trend Micro Inc51

Infrastructure ndash attackerrsquos mistakes

bull Attacker misconfigured some CampC servers

bull We could find some new malware samples and families as well as victims

copy 2019 Trend Micro Inc52

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc53

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc54

Custom backdoors ndash attackerrsquos mistakes

bull Files with list of victims

copy 2019 Trend Micro Inc55

Targets

copy 2019 Trend Micro Inc56

Targets

bull 61 targets in 19 different countries from January to July 2020

bull Taiwan is the most targeted country followed by India and Russia

bull Technology and manufacturing industries were the most targeted followed by education and healthcare

copy 2019 Trend Micro Inc57

Targets ndash industries

Technology213

Manufacturing180

Education164

Healthcare131

Government82

Others230

copy 2019 Trend Micro Inc58

Targets ndash countries

Taiwan213

India131

Russia115

Germany66

Canada66

Australia66

Thailand66

Others277

copy 2019 Trend Micro Inc59

Links to other threat actors

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 44: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc44

Post-exploitation tools - public

bull Network shares enumeration

bull nbtscan 1035

bull Inbtscan (Python version of nbtscan)

bull Keyloggers

bull Keylogger1217

bull Lateral movement

bull Eternal Blue exploits

copy 2019 Trend Micro Inc45

Post-exploitation tools - private

bull Dumps information from the Domain Controller

bull Uses NetworkManagementAPIs

copy 2019 Trend Micro Inc46

Post-exploitation tools ndash hub relaying

Port 3925 Port 5688

CampC server

1 connects 2 sends traffic

3 forwards traffic

copy 2019 Trend Micro Inc47

Post-exploitation tools ndash hub relaying

bull Losing control of CampC does not expose the backend logic

bull CampC is simply a connection information forwarder

copy 2019 Trend Micro Inc48

Infrastructure

copy 2019 Trend Micro Inc49

Infrastructure

bull Multiple ldquoclustersrdquo of domain names

bull Infrastructure overlap

bull Clusters were usually bound to a specific malware family

copy 2019 Trend Micro Inc50

Infrastructure

bull From March to August 2020

bull 49 domains resolving to an IP address

bull Of which 38 dynamic domain names

bull 46 different IP addresses

copy 2019 Trend Micro Inc51

Infrastructure ndash attackerrsquos mistakes

bull Attacker misconfigured some CampC servers

bull We could find some new malware samples and families as well as victims

copy 2019 Trend Micro Inc52

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc53

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc54

Custom backdoors ndash attackerrsquos mistakes

bull Files with list of victims

copy 2019 Trend Micro Inc55

Targets

copy 2019 Trend Micro Inc56

Targets

bull 61 targets in 19 different countries from January to July 2020

bull Taiwan is the most targeted country followed by India and Russia

bull Technology and manufacturing industries were the most targeted followed by education and healthcare

copy 2019 Trend Micro Inc57

Targets ndash industries

Technology213

Manufacturing180

Education164

Healthcare131

Government82

Others230

copy 2019 Trend Micro Inc58

Targets ndash countries

Taiwan213

India131

Russia115

Germany66

Canada66

Australia66

Thailand66

Others277

copy 2019 Trend Micro Inc59

Links to other threat actors

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 45: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc45

Post-exploitation tools - private

bull Dumps information from the Domain Controller

bull Uses NetworkManagementAPIs

copy 2019 Trend Micro Inc46

Post-exploitation tools ndash hub relaying

Port 3925 Port 5688

CampC server

1 connects 2 sends traffic

3 forwards traffic

copy 2019 Trend Micro Inc47

Post-exploitation tools ndash hub relaying

bull Losing control of CampC does not expose the backend logic

bull CampC is simply a connection information forwarder

copy 2019 Trend Micro Inc48

Infrastructure

copy 2019 Trend Micro Inc49

Infrastructure

bull Multiple ldquoclustersrdquo of domain names

bull Infrastructure overlap

bull Clusters were usually bound to a specific malware family

copy 2019 Trend Micro Inc50

Infrastructure

bull From March to August 2020

bull 49 domains resolving to an IP address

bull Of which 38 dynamic domain names

bull 46 different IP addresses

copy 2019 Trend Micro Inc51

Infrastructure ndash attackerrsquos mistakes

bull Attacker misconfigured some CampC servers

bull We could find some new malware samples and families as well as victims

copy 2019 Trend Micro Inc52

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc53

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc54

Custom backdoors ndash attackerrsquos mistakes

bull Files with list of victims

copy 2019 Trend Micro Inc55

Targets

copy 2019 Trend Micro Inc56

Targets

bull 61 targets in 19 different countries from January to July 2020

bull Taiwan is the most targeted country followed by India and Russia

bull Technology and manufacturing industries were the most targeted followed by education and healthcare

copy 2019 Trend Micro Inc57

Targets ndash industries

Technology213

Manufacturing180

Education164

Healthcare131

Government82

Others230

copy 2019 Trend Micro Inc58

Targets ndash countries

Taiwan213

India131

Russia115

Germany66

Canada66

Australia66

Thailand66

Others277

copy 2019 Trend Micro Inc59

Links to other threat actors

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 46: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc46

Post-exploitation tools ndash hub relaying

Port 3925 Port 5688

CampC server

1 connects 2 sends traffic

3 forwards traffic

copy 2019 Trend Micro Inc47

Post-exploitation tools ndash hub relaying

bull Losing control of CampC does not expose the backend logic

bull CampC is simply a connection information forwarder

copy 2019 Trend Micro Inc48

Infrastructure

copy 2019 Trend Micro Inc49

Infrastructure

bull Multiple ldquoclustersrdquo of domain names

bull Infrastructure overlap

bull Clusters were usually bound to a specific malware family

copy 2019 Trend Micro Inc50

Infrastructure

bull From March to August 2020

bull 49 domains resolving to an IP address

bull Of which 38 dynamic domain names

bull 46 different IP addresses

copy 2019 Trend Micro Inc51

Infrastructure ndash attackerrsquos mistakes

bull Attacker misconfigured some CampC servers

bull We could find some new malware samples and families as well as victims

copy 2019 Trend Micro Inc52

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc53

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc54

Custom backdoors ndash attackerrsquos mistakes

bull Files with list of victims

copy 2019 Trend Micro Inc55

Targets

copy 2019 Trend Micro Inc56

Targets

bull 61 targets in 19 different countries from January to July 2020

bull Taiwan is the most targeted country followed by India and Russia

bull Technology and manufacturing industries were the most targeted followed by education and healthcare

copy 2019 Trend Micro Inc57

Targets ndash industries

Technology213

Manufacturing180

Education164

Healthcare131

Government82

Others230

copy 2019 Trend Micro Inc58

Targets ndash countries

Taiwan213

India131

Russia115

Germany66

Canada66

Australia66

Thailand66

Others277

copy 2019 Trend Micro Inc59

Links to other threat actors

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 47: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc47

Post-exploitation tools ndash hub relaying

bull Losing control of CampC does not expose the backend logic

bull CampC is simply a connection information forwarder

copy 2019 Trend Micro Inc48

Infrastructure

copy 2019 Trend Micro Inc49

Infrastructure

bull Multiple ldquoclustersrdquo of domain names

bull Infrastructure overlap

bull Clusters were usually bound to a specific malware family

copy 2019 Trend Micro Inc50

Infrastructure

bull From March to August 2020

bull 49 domains resolving to an IP address

bull Of which 38 dynamic domain names

bull 46 different IP addresses

copy 2019 Trend Micro Inc51

Infrastructure ndash attackerrsquos mistakes

bull Attacker misconfigured some CampC servers

bull We could find some new malware samples and families as well as victims

copy 2019 Trend Micro Inc52

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc53

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc54

Custom backdoors ndash attackerrsquos mistakes

bull Files with list of victims

copy 2019 Trend Micro Inc55

Targets

copy 2019 Trend Micro Inc56

Targets

bull 61 targets in 19 different countries from January to July 2020

bull Taiwan is the most targeted country followed by India and Russia

bull Technology and manufacturing industries were the most targeted followed by education and healthcare

copy 2019 Trend Micro Inc57

Targets ndash industries

Technology213

Manufacturing180

Education164

Healthcare131

Government82

Others230

copy 2019 Trend Micro Inc58

Targets ndash countries

Taiwan213

India131

Russia115

Germany66

Canada66

Australia66

Thailand66

Others277

copy 2019 Trend Micro Inc59

Links to other threat actors

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 48: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc48

Infrastructure

copy 2019 Trend Micro Inc49

Infrastructure

bull Multiple ldquoclustersrdquo of domain names

bull Infrastructure overlap

bull Clusters were usually bound to a specific malware family

copy 2019 Trend Micro Inc50

Infrastructure

bull From March to August 2020

bull 49 domains resolving to an IP address

bull Of which 38 dynamic domain names

bull 46 different IP addresses

copy 2019 Trend Micro Inc51

Infrastructure ndash attackerrsquos mistakes

bull Attacker misconfigured some CampC servers

bull We could find some new malware samples and families as well as victims

copy 2019 Trend Micro Inc52

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc53

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc54

Custom backdoors ndash attackerrsquos mistakes

bull Files with list of victims

copy 2019 Trend Micro Inc55

Targets

copy 2019 Trend Micro Inc56

Targets

bull 61 targets in 19 different countries from January to July 2020

bull Taiwan is the most targeted country followed by India and Russia

bull Technology and manufacturing industries were the most targeted followed by education and healthcare

copy 2019 Trend Micro Inc57

Targets ndash industries

Technology213

Manufacturing180

Education164

Healthcare131

Government82

Others230

copy 2019 Trend Micro Inc58

Targets ndash countries

Taiwan213

India131

Russia115

Germany66

Canada66

Australia66

Thailand66

Others277

copy 2019 Trend Micro Inc59

Links to other threat actors

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 49: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc49

Infrastructure

bull Multiple ldquoclustersrdquo of domain names

bull Infrastructure overlap

bull Clusters were usually bound to a specific malware family

copy 2019 Trend Micro Inc50

Infrastructure

bull From March to August 2020

bull 49 domains resolving to an IP address

bull Of which 38 dynamic domain names

bull 46 different IP addresses

copy 2019 Trend Micro Inc51

Infrastructure ndash attackerrsquos mistakes

bull Attacker misconfigured some CampC servers

bull We could find some new malware samples and families as well as victims

copy 2019 Trend Micro Inc52

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc53

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc54

Custom backdoors ndash attackerrsquos mistakes

bull Files with list of victims

copy 2019 Trend Micro Inc55

Targets

copy 2019 Trend Micro Inc56

Targets

bull 61 targets in 19 different countries from January to July 2020

bull Taiwan is the most targeted country followed by India and Russia

bull Technology and manufacturing industries were the most targeted followed by education and healthcare

copy 2019 Trend Micro Inc57

Targets ndash industries

Technology213

Manufacturing180

Education164

Healthcare131

Government82

Others230

copy 2019 Trend Micro Inc58

Targets ndash countries

Taiwan213

India131

Russia115

Germany66

Canada66

Australia66

Thailand66

Others277

copy 2019 Trend Micro Inc59

Links to other threat actors

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 50: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc50

Infrastructure

bull From March to August 2020

bull 49 domains resolving to an IP address

bull Of which 38 dynamic domain names

bull 46 different IP addresses

copy 2019 Trend Micro Inc51

Infrastructure ndash attackerrsquos mistakes

bull Attacker misconfigured some CampC servers

bull We could find some new malware samples and families as well as victims

copy 2019 Trend Micro Inc52

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc53

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc54

Custom backdoors ndash attackerrsquos mistakes

bull Files with list of victims

copy 2019 Trend Micro Inc55

Targets

copy 2019 Trend Micro Inc56

Targets

bull 61 targets in 19 different countries from January to July 2020

bull Taiwan is the most targeted country followed by India and Russia

bull Technology and manufacturing industries were the most targeted followed by education and healthcare

copy 2019 Trend Micro Inc57

Targets ndash industries

Technology213

Manufacturing180

Education164

Healthcare131

Government82

Others230

copy 2019 Trend Micro Inc58

Targets ndash countries

Taiwan213

India131

Russia115

Germany66

Canada66

Australia66

Thailand66

Others277

copy 2019 Trend Micro Inc59

Links to other threat actors

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 51: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc51

Infrastructure ndash attackerrsquos mistakes

bull Attacker misconfigured some CampC servers

bull We could find some new malware samples and families as well as victims

copy 2019 Trend Micro Inc52

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc53

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc54

Custom backdoors ndash attackerrsquos mistakes

bull Files with list of victims

copy 2019 Trend Micro Inc55

Targets

copy 2019 Trend Micro Inc56

Targets

bull 61 targets in 19 different countries from January to July 2020

bull Taiwan is the most targeted country followed by India and Russia

bull Technology and manufacturing industries were the most targeted followed by education and healthcare

copy 2019 Trend Micro Inc57

Targets ndash industries

Technology213

Manufacturing180

Education164

Healthcare131

Government82

Others230

copy 2019 Trend Micro Inc58

Targets ndash countries

Taiwan213

India131

Russia115

Germany66

Canada66

Australia66

Thailand66

Others277

copy 2019 Trend Micro Inc59

Links to other threat actors

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 52: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc52

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc53

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc54

Custom backdoors ndash attackerrsquos mistakes

bull Files with list of victims

copy 2019 Trend Micro Inc55

Targets

copy 2019 Trend Micro Inc56

Targets

bull 61 targets in 19 different countries from January to July 2020

bull Taiwan is the most targeted country followed by India and Russia

bull Technology and manufacturing industries were the most targeted followed by education and healthcare

copy 2019 Trend Micro Inc57

Targets ndash industries

Technology213

Manufacturing180

Education164

Healthcare131

Government82

Others230

copy 2019 Trend Micro Inc58

Targets ndash countries

Taiwan213

India131

Russia115

Germany66

Canada66

Australia66

Thailand66

Others277

copy 2019 Trend Micro Inc59

Links to other threat actors

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 53: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc53

Custom backdoors ndash attackerrsquos mistakes

copy 2019 Trend Micro Inc54

Custom backdoors ndash attackerrsquos mistakes

bull Files with list of victims

copy 2019 Trend Micro Inc55

Targets

copy 2019 Trend Micro Inc56

Targets

bull 61 targets in 19 different countries from January to July 2020

bull Taiwan is the most targeted country followed by India and Russia

bull Technology and manufacturing industries were the most targeted followed by education and healthcare

copy 2019 Trend Micro Inc57

Targets ndash industries

Technology213

Manufacturing180

Education164

Healthcare131

Government82

Others230

copy 2019 Trend Micro Inc58

Targets ndash countries

Taiwan213

India131

Russia115

Germany66

Canada66

Australia66

Thailand66

Others277

copy 2019 Trend Micro Inc59

Links to other threat actors

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 54: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc54

Custom backdoors ndash attackerrsquos mistakes

bull Files with list of victims

copy 2019 Trend Micro Inc55

Targets

copy 2019 Trend Micro Inc56

Targets

bull 61 targets in 19 different countries from January to July 2020

bull Taiwan is the most targeted country followed by India and Russia

bull Technology and manufacturing industries were the most targeted followed by education and healthcare

copy 2019 Trend Micro Inc57

Targets ndash industries

Technology213

Manufacturing180

Education164

Healthcare131

Government82

Others230

copy 2019 Trend Micro Inc58

Targets ndash countries

Taiwan213

India131

Russia115

Germany66

Canada66

Australia66

Thailand66

Others277

copy 2019 Trend Micro Inc59

Links to other threat actors

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 55: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc55

Targets

copy 2019 Trend Micro Inc56

Targets

bull 61 targets in 19 different countries from January to July 2020

bull Taiwan is the most targeted country followed by India and Russia

bull Technology and manufacturing industries were the most targeted followed by education and healthcare

copy 2019 Trend Micro Inc57

Targets ndash industries

Technology213

Manufacturing180

Education164

Healthcare131

Government82

Others230

copy 2019 Trend Micro Inc58

Targets ndash countries

Taiwan213

India131

Russia115

Germany66

Canada66

Australia66

Thailand66

Others277

copy 2019 Trend Micro Inc59

Links to other threat actors

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 56: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc56

Targets

bull 61 targets in 19 different countries from January to July 2020

bull Taiwan is the most targeted country followed by India and Russia

bull Technology and manufacturing industries were the most targeted followed by education and healthcare

copy 2019 Trend Micro Inc57

Targets ndash industries

Technology213

Manufacturing180

Education164

Healthcare131

Government82

Others230

copy 2019 Trend Micro Inc58

Targets ndash countries

Taiwan213

India131

Russia115

Germany66

Canada66

Australia66

Thailand66

Others277

copy 2019 Trend Micro Inc59

Links to other threat actors

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 57: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc57

Targets ndash industries

Technology213

Manufacturing180

Education164

Healthcare131

Government82

Others230

copy 2019 Trend Micro Inc58

Targets ndash countries

Taiwan213

India131

Russia115

Germany66

Canada66

Australia66

Thailand66

Others277

copy 2019 Trend Micro Inc59

Links to other threat actors

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 58: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc58

Targets ndash countries

Taiwan213

India131

Russia115

Germany66

Canada66

Australia66

Thailand66

Others277

copy 2019 Trend Micro Inc59

Links to other threat actors

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 59: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc59

Links to other threat actors

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 60: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc60

Links to TICK threat actor

bull We found Shadowpad samples sharing encryption algorithms with samples from TICK (Operation Endtrade)

bull This suggests they share a builder

bull Shadowpad delivery mechanism is different for TICK they use a dropper named CASPER

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 61: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc61

Conclusion

bull Earth Akhlut is an advanced threat actor with big operational and offensive capabilities

bull Patches need to be applied to security solutions

bull Public Internet access to management servers should be avoided unless necessary

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 62: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

copy 2019 Trend Micro Inc62

Referencesbull httpswwwtrendmicrodecloud-contentuspdfssecurity-intelligencewhite-

paperswp_the-heartbeat-apt-campaignpdf

bull httpsunit42paloaltonetworkscomunit42-bisonal-malware-used-attacks-russia-south-korea

bull httpsglobalahnlabcomglobaluploaddownloadasecreportASEC20REPORT_vol93_ENGpdf

bull httpsblogtalosintelligencecom202003bisonal-10-years-of-playhtml

bull httpssuccesstrendmicrocomsolution1122250

bull httpssuccesstrendmicrocomsolution000245571

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp

Page 63: Tonto Team: Exploring the TTPs of an advanced operating a ... · Tonto Team: Exploring the TTPs of an advanced threat actor operating a large infrastructure Daniel Lunghi (@thehellu),

Threats detected and blocked globally by Trend Micro in 2018 Created with real data by artist Daniel Beauchamp