

Rewterz Threat Alert – Bitcoin Extortion Attempts Observed Through Social Engineering
June 11, 2019
Rewterz Threat Alert – DNS Compromise Attack Phishing Spam
June 11, 2019
Rewterz Threat Alert – Bitcoin Extortion Attempts Observed Through Social Engineering
June 11, 2019
Rewterz Threat Alert – DNS Compromise Attack Phishing Spam
June 11, 2019Severity
High
Analysis Summary
In one of the MuddyWater campaigns, spear-phishing emails that the group sent to a university in Jordan and the Turkish government. In both cases, the threat actor group did not spoof the said legitimate entities’ sender address to deceive email recipients, but instead used compromised legitimate accounts to trick users into installing malware.
The threat actor group deployed a new multi-stage PowerShell-based backdoor called POWERSTATS v3. The spear-phishing email that contains a document embedded with a malicious macro will drop a VBE file encoded with Microsoft Script Encoder. The VBE file, which holds a base64-encoded block of data containing obfuscated PowerShell script, will then execute. This block of data will be decoded and saved to the %PUBLIC% directory under various names ending with image file extensions such as .jpeg and .png. The PowerShell code will then use custom string obfuscation and lots of useless blocks of code to make it difficult to analyze.
The final backdoor code will be shown after the deobfuscation of all strings and removal of all unnecessary code. But first, the backdoor will acquire the operating system (OS) information and save the result to a log file.
This file will be uploaded later to the command and control (C&C) server. Each victim machine will generate a random GUID number, which will be used for machine identification. Later on, the malware variant will start the endless loop, querying for the GUID-named file in a certain folder on the C&C server. If the file is found, it will be downloaded and executed using the Powershell.exe process. The threat actor group can then proceed to a second stage attack by sending commands to a specific victim in an asynchronous way. In essence, they can download another backdoor payload from the C&C server and install it on their targets’ systems.
The group proceeded to launch a second stage attack. In this scenario, another backdoor was downloaded. The backdoor supports the following commands:
- Take screenshots
- Command execution via the cmd.exe binary
- If there’s no keyword, the malware variant assumes that the input is PowerShell code and executes it via the “Invoke-Expression” cmdlet.
The C&C communication is done using PHP scripts with a hardcoded token and a set of backend functions, e.g., sc (screenshot), res (result of executed command), reg (register new victim), and uDel (self-delete after an error).
Indicators of Compromise
IP(s) / Hostname(s)
- 103[.]13[.]67[.]4
- 80[.]80[.]163[.]182
- 80[.]90[.]87[.]201
- 91[.]187[.]114[.]210
- 78[.]129[.]139[.]131
- 103[.]13[.]67[.]4
- 80[.]80[.]163[.]182
- 80[.]90[.]87[.]201
- 91[.]187[.]114[.]210
- 78[.]129[.]139[.]131
- 192[.]168[.]1[.]104:54863
- 163[.]172[.]147[.]222:4555
URLs
- hxxp://78[.]129[.]139[.]148
- hxxp://31[.]171[.]154[.]67
- hxxp://79[.]106[.]224[.]203
- hxxp://185[.]34[.]16[.]82
- hxxp://104[.]237[.]233[.]17
- hxxp://46[.]99[.]148[.]96
- hxxp://134[.]19[.]215[.]3:443
- hxxp://gladiyator[.]tk
- hxxp://51[.]77[.]97[.]65
- hxxp://31[.]171[.]154[.]67
- hxxp://79[.]106[.]224[.]203
- hxxp://185[.]14[.]248[.]26
- hxxp://185[.]162[.]235[.]182
- hxxp://185[.]117[.]75[.]116/tmp[.]php
- hxxp://38[.]132[.]99[.]167/crf[.]txt
- hxxp://185[.]244[.]149[.]218/JpeGDownload/[.]jpeg
- hxxp://185[.]185[.]25[.]175/ref45[.]php
- hxxp://185[.]185[.]25[.]175/sDownloads/[.]jpeg
- hxxp://82[.]102[.]8[.]101/bcerrxy[.]php
- amazo0n[.]serveftp[.]com/Data
- zstoreshoping[.]ddns[.]net/Data/
- hxxp://zstoreshoping[.]ddns[.]net/users[.]php?tname=
- shopcloths[.]ddns[.]net
- getgooogle[.]hopto[.]org
- hxxp://gladiyator[.]tk
- googleads[.]hopto[.]org
- hxxp://www[.]shareliverpoolfc[.]co[.]uk/js/main.php
- hxxp://valis-ti[.]cl/assets/main[.]php
- hxxp://www[.]latvia-usa[.]org/wpincludes/customize/main.php
- hxxp://www[.]shareliverpoolfc[.]co[.]uk/js/main[.]php
- hxxp://valis-ti[.]cl/assets/main[.]php
- hxxp://www[.]latvia-usa[.]org/wpincludes/customize/main[.]php
- hxxp://googleads[.]hopto[.]org/data/ce28e899a8d3d00a.]dat
- hxxp://ciscoupdate2019[.]gotdns[.]ch/users[.]php?
- hxxps://www[.]jsonstore[.]io/4de4d6d84d17638b3cd0eaf18857784aff27501be7d3dd89fad2b7ac2134f52e
- hxxps://www[.]jsonstore[.]io/ddf35a64bd5ad54f9de868a84cdb21299a33d126e307ec3a868f65372402816a
- hxxps://104[.]237[.]233[.]38:8080/YIZDGrM_4mRn_mb8PdhL_QfL2h49aAO0wfaxRxJAdq9pH2JeliMez10IwMk6PCnluziydTlV-/
- hxxps://104[.]237[.]255[.]212:443/GfaBcrPI14rArcGvmQT2g3sW3ZtmqL6IU0Vg5oy21aOK4gvmvYx_TCP_whhSnyQH7/
- hxxps://104[.]237[.]233[.]38:1022/aeacrE65xE9SdVN3CJwS9gbtNM84GL_ajl_AD2EoEOHrmbpQ5qC9J7GcSSZQ0JNBDnOulnMWgNy3FV2kcHRuM0u5NMo5Jv9Ks4zS5-pLkiYs4me/
- hxxps://104[.]237[.]233[.]38:8080/nud2WCL9WzTiAOMCuFMboA18GWsmrc8k6VqGrXXfqVghYktellhTS7_tg-D64spqdv4sOJ/
- hxxps://88[.]99[.]17[.]148:443/3gg7DuFHLwC8gPwW3z9rgnS1Is8F83B95PHYnVpk9219KbHn25IChwxSFR35a117i2Jz_OX9mUPAYRJw3NhMBxUVDp4iMOkzt/
- hxxps://104[.]237[.]233[.]40:8443/zi5w0iDM6aLEgcWDnumYywaHa33BIPzaylNUPUECcNCmfNNcxzv05flJoB3wvWqH6Uf01vI-1yKF96/
- hxxps://78[.]129[.]139[.]134:8864/lZkP68TtH_BpZGhmMwxNPwy0vjimgwDRfk01pV2Xu2FztbaevB6RzBUPRietWtBcuxru7tTsF3rZGFPbepd294BP2MGd/
Malware Hash (MD5/SHA1/SH256)
- 4d72dcd33379fe7a34f9618e692f659fa9d318ab623168cd351c18ca3a805af1
- 7e7b6923f3e2ee919d1ea1c8f8d9a915c52392bd6f9ab515e4eb95fa42355991
- 1dae45ea1f644c0a8e10c962d75fca1cedcfd39a88acef63869b7a5990c1c60b
- 3deaa4072da43185d4213a38403383b7cefe92524b69ce4e7884a3ddc0903f6b
- 36ccae4dffc70249c79cd3156de1cd238af8f7a3e47dc90a1c33476cf97a77b0
- 9389cf41e89a51860f918f29b55e34b5643264c990fe54273ffbbf5336a35a45
- dab2cd3ddfe29a89b3d80830c6a4950952a44b6c97a664f1e9c182318ae5f4da
- 200c3d027b2d348b0633f8debbbab9f3efc465617727df9e3fdfa6ceac7d191b
- 98f0f2c42f703bfbb96de87367866c3cced76d5a8812c4cbc18a2be3da382c95
- 20bf83bf516b12d991d38fdc014add8ad5db03907a55303f02d913db261393a9
- f5ef4a45e19da1b94c684a6c6d51b86aec622562c45d67cb5aab554f21eb9061
- ff349c8bf770ba09d3f9830e22ab6306c022f4bc1beb193b3b2cfe044f9d617b
- 95c650a540ed5385bd1caff45ba06ff90dc0773d744efc4c2e4b29dda102fcce
- 6be18e3afeec482c79c9dea119d11d9c1598f59a260156ee54f12c4d914aed8f
- 3c0c58d4b9eefea56e2f7be3f07cdb73e659b4db688bfbf9eacd96ba5ab2dfe5
- 745b0e0793fc507d9e1ad7155beb7ac48f8a556e6ef06e43888cbefec3083f2f
- 9580aaca2e0cd607eaf54c3eb933e41538dc10cd341d41e3daa9185b2a6341c4
- 0ae4ce8c511a22da99c6edc4be86af1c5d3a7d2baf1e862925a503d8baae9fd7
- c19095433ac4884d3205a59e61c90752ecb4e4fa6a84e21f49ed82d9ec48aa3c
- 264f2ea4a8fad97e66d5ad41a57517b4645fe4c4959d55370919379b844b0750
- 36be54812428b4967c3d25aafdc703567b42ad4536c089aefaef673ce36a958f
- 9112505ff574b43dd27efc8afcf029841e1ea5193db90424b8b8b6b0e53c3437
- d77d16c310cce09b872c91ca223b106f4b56572242ff5c4e756572070fac210f
- d5b7a5ae4156676b37543a3183df497367429ae2d01ef33ebc357c4bdd9864c3
- c63f1d364b9fa2c1023ce5a1b5fed12e1eba780c64276811c4b47743dfcbadbd
- 0e7e3c2c7fe34afc02c6e672ae00bc4e432b300ec184dec08440fba91b664999
- 88e02850c575504bb4476f0d519cec8e6a562b72d17ed50b9d465d8e0de50093
- 67c3c5af27d19f25bc55c8e36ef19b57c03b211ce0637055721ae4b0e57011a7
- 5194f84cc52093bb4978167a9f2d5c0903e9de0b81ca20f492e4fc78b6a77655
- 3e6d39886d76ab3c08b26feae075e01e9fb3c90795fa52dd6c74e4ef8b590fe8
- 525ba2c8d35f6972ac8fcec8081ae35f6fe8119500be20a4113900fe57d6a0de
- 5d3d5fa9c6ffa64b2af0c5ce357cb6a16085280d32eb321d679b57472ffb1019
- 6ccb3882c516fafc54444e09f5c60738831292be0231939bec9168a0203e01bb
- c175b2e9f0d73db293ca061ce95cdd92a423348aa162b14c158d97e9e7c3ff10
- 66733fe27591347f6b28bc7750ba1b47b2853f711adcdb1270951c6b92e795d6
- fbd63941a25253f5bafe69c9cc86c7effc6ff14b9adddd6f69e2f26ed39a77a4
- 2ba871586176522fe75333e834c16025b01e1771e4c07bc13995adbfa77c45f5
- 6a441b2303aeb38309bf2cb70f1c97213b0fa2cf7a0f0f8251fe6dc9965ada3b
- d698c1d492332f312487e027d0665970b0462aceeeba3c91e762cff8579e7f72
- 99e9a816e6b3fe7868b9c535ed13028f41089e0275eba1ba46ae7a62a7e47668
- 6a441b2303aeb38309bf2cb70f1c97213b0fa2cf7a0f0f8251fe6dc9965ada3b
- d698c1d492332f312487e027d0665970b0462aceeeba3c91e762cff8579e7f72
- df1bd693c11893c5259c591dceef707aa0480ef5626529f8a5b0ef826e5c0dec
- 4ba618c04cbdc47de2ab5f2c91f466bc42163fd541de80ab8b5e50f687bbb91c
- e241b152e3f672434636c527ae0ebbd08c777f488020c98efce8b324486335c5
- df1bd693c11893c5259c591dceef707aa0480ef5626529f8a5b0ef826e5c0dec
- 6b4d271a48d118843aee3dee4481fa2930732ed7075db3241a8991418f00d92b
- 02f54da6c6f2f87ff7b713d46e058dedac1cedabd693643bb7f6dfe994b2105d
- 9af8a93519d22ed04ffb9ccf6861c9df1b77dc5d22e0aeaff4a582dbf8660ba6
- dff2e39b2e008ea89a3d6b36dcd9b8c927fb501d60c1ad5a52ed1ffe225da2e2
- 26de4265303491bed1424d85b263481ac153c2b3513f9ee48ffb42c12312ac43
- 3bfec096c4837d1e6485fe0ae0ea6f1c0b44edc611d4f2204cc9cf73c985cbc2
- 5dbf6e347164d580665208b2bc04756857529121fd1c7861e84f18e8a6027924
- e9617764411603ddd4e7f39603a4bdaf602e20126608b3717b1f6fcae60981f2
- be9fb556a3c7aef0329e768d7f903e7dd42a821abc663e11fb637ce33b007087
- de4a1622b498c1cc989be1a1480a23f4c4e9cd25e729a329cfadb7594c714358
- c2c2adecff2e517395571f4f9bee3b8cffed4521a8e1a3e3b363fd5e635f2eee
- b2242bc51ebe2c3abc5a8691546827070540db43843b8328bdb81f450cd1254b
- a4f9509e865d0a387cb8f0367e35ffd259b193f5270aacb67cb99942071c60cc
- 484f78eb4a3bb69d62491fdb84f2c81b7ae131ec8452a04d6018a634e961cd6a
- a35406d9ef82a68fbabb3c1e19911c9ed41bed335ef44a15037d1580c2b9dd12
- efdec1ad0830359632141186917fd32809360894e8c0a28c28d3d0a71f48ec2f
- f1a69e2041ab8ab190d029d0e061f107ef1223b553e97c302e973a3b3c80f83e
- 31cf13e8579f0589424631c6be659480f9a204a50a54073e7d7fe6c9c81fa0db
- 6ee79815f71e2eb4094455993472c7fb185cde484c8b5326e4754adcb1faf78e
- 81c7787040ed5ecf21b6f80dc84bc147cec518986bf25aa933dd44c414b5f498
- 999e4753749228a60d4d20cc5c5e27ca4275fe63e6083053a5b01b5225c8d53a
- 8501c4df5995fd283e733ab00492f35aecb6ea2315b44e85abb90b3f067ccb64
- 4bd93e4a9826a65ade60117f6136cb4ed0e17beae8668a7c7981d15c0bed705a
- 503b2b01bb58fc433774e41a539ae9b06004c7557ac60e7d8a6823f5da428eb8
- 04acd5721ad37ac5aa84e7f7e20986de0a532fb625a8bc75302a0f38c171cee3
- 8ea17ed2cb662118937ed6fe189582cc11b2b73bb27a223d0468881ac5fcc08e
- e2f82b074074955eeca3b0dd7b2831192bee49de329d5d4b36742c9721c8ad94
- 503b2b01bb58fc433774e41a539ae9b06004c7557ac60e7d8a6823f5da428eb8
- 121adcf3a52cafd0204ca4d4a42a9a09d6c9f559bcb997e51dba79c6a5a04efd
- edde2eb39ed2f145c41e53e87d43add8de336d3e4d5c8d261f471d35edf3ed47
- e60c802b692a503f4f91e8809bb961b5423c602f6fb374de1af4d983415de3f1
- c84a61ba8c84ca1e879c4d8ac802ec260a8c426d89a09d8627a8c08ff6d88faf
- 78da47f5a341909d1e6f50f8d39fdde8129ede86f04f3e88b2278e16c72e2461
- 4e2cdfed691d6debab01c1733135b146817c94024177f9ef4b22726fac84322f
- 3fee29fefe4aa9386a11a7a615dd052ff89e21d87eee0fff5d6f933d9384ede2
- 3c75c2f7b299d9cc03a7ff91c568defaa39b4be02d58a75a85930ab23d2a2cff
- 276a765a10f98cda1a38d3a31e7483585ca3722ecad19d784441293acf1b7beb
- 818253f297fea7d8a2324ee1a233aabbaf3b0b4b9cdaa1ebd676fe00f2247388
- f6707b5f41192353be3311fc7f48ee30465038366386b909e6cefaade70c91bc
- de7b77f9c456d26e369263b6e1d001279b69e687b2d3029803ede21417d4f5fa
- cc685f30e2f6039d12b4cbc92e38f1d64ba75ac12cb86afce5261a11cf4931de
- 0faa2bb90de44ef87c7ee11165f7c702211dd603bdaea94af09cfecc3f525138
- e6812fa0e12cc1913bfc7eb6dceb638429048e3cc59ce576c012a1d27fa20959
- fb773f7324fdca584fff7da490820c7243a10555c8ff717d21c039a5ba337a43
- 11761d6cf365932540ccb95b6f20aa45379736cfde33742a004fc8ceccad7daf
- b9d4752b892759bb0cb166ab565f050f4b6385dd67f4288ff2231c69ab984a26
- 604e09e01e2bfbc8f3680abd8005906e3fbcd2f4edaf24d80cd7105ec6f991b1
- f2b8d7ce968ed8d6c33116bcfb8aeed97d89ec1ebf4f505c891020dc79d0ddd3
- 336237b1ed2c99c0fef4c954490bd8282d6e46941d2ac2b6c9294a1aa9a254ed
- 28a0131a9fda9fe2f2272c5091c77dc750da93d4a070dbd817af38723ea18f02
- d320286e80d5785bbd14b10c00f5c9d38d9a781075d7d6ed4eb27c07d4788dbf
- 24878dbde796c471a9d028f65421017afc087c958fb54c4b6c3cc7aeabbc1119
- 57a9e2e6e715455827faefa982b4312b203189950fe285f1413174f5e812e408
- 92bb4432cc9d2988ee4043e420a4df9c8caec4cd93ab258e07546781daa37086
Remediation
- Search for these IOCs in your respective environments.
- Block all threat indicators at your respective controls.