forked from splunk/security_content
-
Notifications
You must be signed in to change notification settings - Fork 1
Expand file tree
/
Copy pathmudcarp.yml
More file actions
109 lines (82 loc) · 3.72 KB
/
mudcarp.yml
File metadata and controls
109 lines (82 loc) · 3.72 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
category:
- Adversary Tactics
channel: ESCU channel
creation_date: '2018-07-24'
description: Monitor your environment for suspicious behaviors that resemble the techniques
employed by the MUDCARP threat group.
detections:
- detection_id: 9be56c82-b1cc-4318-87eb-q138afaaqa39
name: First time seen command line argument
type: splunk
- detection_id: f5f6af30-7aa7-4295-bfe9-07fe87c01a4b
name: Registry Keys Used For Persistence
type: splunk
- detection_id: ee18ed37-0802-4268-9435-b3b91aaa18db
name: Malicious PowerShell Process - Connect To Internet With Hidden Window
type: splunk
- detection_id: c77162d3-f93c-45cc-80c8-22f6a4264e7f
name: Unusually Long Command Line
type: splunk
- detection_id: 57edaefa-a73b-45e5-bbae-f39c1473f941
name: Unusually Long Command Line - MLTK
type: splunk
id: 988C59C5-0A1C-45B6-A555-0C62276E327E
maintainers:
- company: iDefense
email: iDefense.IntelOps@accenture.com
name: iDefense Cyber Espionage Team
modification_date: '2018-07-24'
name: Possible Backdoor Activity Associated With MUDCARP Espionage Campaigns
narrative: 'This story was created as a joint effort between iDefense and Splunk.\
iDefense analysts have recently discovered a Windows executable file that, upon
execution, spoofs a decryption tool and then drops a file that appears to be the
custom-built javascript backdoor, "Orz," which is associated with the threat actors
known as MUDCARP (as well as "temp.Periscope" and "Leviathan"). The file is executed
using Wscript.\
The MUDCARP techniques include the use of the compressed-folders module from Microsoft,
zipfldr.dll, with RouteTheCall export to run the malicious process or command. After
a successful reboot, the malware is made persistent by a manipulating `[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]''help''=''c:\\windows\\system32\\rundll32.exe
c:\\windows\\system32\\zipfldr.dll,RouteTheCall c:\\programdata\\winapp.exe''`.
Though this technique is not exclusive to MUDCARP, it has been spotted in the group''s
arsenal of advanced techniques seen in the wild.\
This Analytic Story searches for evidence of tactics, techniques, and procedures
(TTPs) that allow for the use of a endpoint detection-and-response (EDR) bypass
technique to mask the true parent of a malicious process. It can also be set as
a registry key for further sandbox evasion and to allow the malware to launch only
after reboot.\
If behavioral searches included in this story yield positive hits, iDefense recommends
conducting IOC searches for the following:\
\
1. www.chemscalere[.]com\
1. chemscalere[.]com\
1. about.chemscalere[.]com\
1. autoconfig.chemscalere[.]com\
1. autodiscover.chemscalere[.]com\
1. catalog.chemscalere[.]com\
1. cpanel.chemscalere[.]com\
1. db.chemscalere[.]com\
1. ftp.chemscalere[.]com\
1. mail.chemscalere[.]com\
1. news.chemscalere[.]com\
1. update.chemscalere[.]com\
1. webmail.chemscalere[.]com\
1. www.candlelightparty[.]org\
1. candlelightparty[.]org\
1. newapp.freshasianews[.]comIn addition, iDefense also recommends that organizations
review their environments for activity related to the following hashes:\
\
1. cd195ee448a3657b5c2c2d13e9c7a2e2\
1. b43ad826fe6928245d3c02b648296b43\
1. 889a9b52566448231f112a5ce9b5dfaf\
1. b8ec65dab97cdef3cd256cc4753f0c54\
1. 04d83cd3813698de28cfbba326d7647c'
original_authors:
- company: iDefense
email: iDefense.IntelOps@accenture.com
name: iDefense Cyber Espionage Team
references:
- https://www.infosecurity-magazine.com/news/scope-of-mudcarp-attacks-highlight-1/
- http://blog.amossys.fr/badflick-is-not-so-bad.html
spec_version: 2
usecase: Advanced Threat Detection
version: '1.0'