Free Trial
Schedule Demo
The Fidelis Threat Research team is comprised of expert security researchers whose sole focus is generating accurate and actionable intelligence to better secure customers. Together, they represent over... Read More
Comments
To follow up on the March report on the discovery of a 64-bit Linux variant of Derusbi used in the Turbo campaign, this post covers our analysis of two unique Windows variants of the Derusbi PGV_PVID malware. Derusbi has been widely covered and associated with numerous Chinese cyber espionage actors, including the group known as C0d0s0 Team (aka Sunshop Group) and its watering-hole attacks using Forbes[.]com in 2014.
What made these two variants of interest is that, as of April 28, 2016, there are zero (0) antivirus detections of these variants at VirusTotal. On April 29, our team also scanned these variants with two different local antivirus tools running the latest virus signatures and the APT malware was still undetected. Based on compile times in the variants analyzed, it appears that this variant has been around since at least 2013.
Some of the strings in these variants have also been observed in variants of the Bergard APT malware. The Derusbi variants were identified and named by Proofpoint earlier this year.
Our Yara hunting rule that detected these two Derusbi PGV_PVID variants with zero antivirus detections also detected two other variants that are detected by AVs as “Derusbi”. One of the Derusbi PGV_PVID samples that we analyzed shares its command-and-control server with a Rekaf sample identified by Proofpoint, furthering the connection between these families that they established in their post.
Interestingly, at least one of the domains used here is currently registered with the China-based domain broker we identified in the Turbo campaign report. After doing some pivots involving the IP addresses observed in our analysis, we have a trove of very interesting domains, all listed at the bottom of this report. These domains include ones that might purport to represent prominent U.S. defense contractors, media outlets, etc. It has to be noted that we have not identified malware or a campaign that uses these domains, but in our observation, the purpose of registering these domains would be to launch a targeted campaign against the named organization or others that trust them, such as partners and customers. These techniques were widely observed in 2015, in events involving U.S. OPM, Anthem Healthcare, etc.
These domain pivots have also shown us further connections between these PGV_PVID, Rekaf and Bergard variants of Derusbi. The specific indicators are provided later in this post, but the relationship is illustrated with these tables. The dates on these records is worth noting, since it could potentially indicate campaign periods.
Passive DNS relationship
Domain | google-dash[.]com | office365e[.]com |
Record Type |
A |
A |
Time | first seen 04-09-2016
last seen 04-19-2016 |
first seen 04-25-2016
last seen 04-29-2016 |
* Source DomainTools/Farsight DNSDB
Passive DNS relationship from 121.54.168[.]216
Domain | google-dash[.]com | ukoffering[.]com | microsoft-cache[.]com |
Record Type | A | A | A |
Time | first seen 01-14-2016
last seen 04-02-2016 |
first seen 01-29-2016
last seen 02-02-2016 |
first seen 01-03-2016
last seen 01-23-2016 |
* Source DomainTools/Farsight DNSDB
In this vein, there’s a clear preponderance of popular online services and technologies – variants of Google, Office 365, Virtualbox and VMtools feature in this domain set. It has to be noted that these are technologies that are very popular across a broad set of enterprises and offer a very broad set of opportunities.
All four variants perform an HTTP request that is almost identical, with the exception of the Command & Control server and a small variant in one of the “Referrer” values. Even a 16-digit value in the URL and Cookie was the same. This beacon format and 16-digit value was also observed in the PGV_PVID variants analyzed earlier this year by Proofpoint.
Three of the samples contained the following string of interest: “payload_service_x64.dll”.
These PGV_PVID variants were observed encoding some of its configuration, APIs and other strings with a single-byte XOR key. Some of the keys used are: 0x90, 0xEB and 0x57.
It was also interesting to see how these samples were trying to disguise themselves during entrenchment as valid services in the system to try to confuse incident responders, computer forensics investigators and network administrators. The following screenshots show the Microsoft service management console with the legit and malicious service (malicious service highlighted):
The following is a list of the malware samples analyzed:
MD5 | CnC | AV detections | Compiled Date | Imphash |
3e4fbb9190227848af32dacb17e9fd17 | google-dash[dot]com | 0 | 12/4/14 | 86fafe21566d0906fecc5dfd939f3e45 |
b93197e2aa147fe6b70695ae7bb298b0 | office365e[dot]com | 0 | 12/4/14 | 86fafe21566d0906fecc5dfd939f3e45 |
4979e819d3ffbea81c7111fb515c1c7 | web01.kruul[dot]com | 22 | 4/11/13 | 711a1d4aef8414cf1db45a6945ba3d84 |
791295ef196cf8c20913b3cce76af29a | google-dash[dot]com | 16 | 12/4/14 | 6752d45fd952c97c969939600acc5748 |
Two samples of the network traffic format associated with this threat:
GET /pki/nss/init?0220372661170240 HTTP/1.1
Referer: https://www.microsoft.com/ Accept: */* Accept-Language: en-us Accept-Encoding: gzip, deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Win32) Host: office365e[dot]com:80 Cache-Control: no-cache Connection: Keep-Alive Cookie: pgv_pvid=0220372661170240 |
GET /pki/nss/init?0220372661170240 HTTP/1.1
Referer: https://www.google.com/ Accept: */* Accept-Language: en-us Accept-Encoding: gzip, deflate User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Win32) Host: www.google-dash[dot]com:80 Cache-Control: no-cache Connection: Keep-Alive Cookie: pgv_pvid=0220372661170240 |
Antivirus detection for two of the samples:
1. 3e4fbb9190227848af32dacb17e9fd17
2. b93197e2aa147fe6b70695ae7bb298b0
Registry Entrenchment
Service Information
Mutex
Command & Control Servers
URLs
The following Yara rule was created to detect these samples:
rule apt_win32_dll_bergard_pgv_pvid_variant
{ meta: copyright = “Fidelis Cybersecurity” strings: $ = “Accept:” $ = “User-Agent: %s” $ = “Host: %s:%d” $ = “Cache-Control: no-cache” $ = “Connection: Keep-Alive” $ = “Cookie: pgv_pvid=” $ = “Content-Type: application/x-octet-stream” $ = “User-Agent: %s” $ = “Host: %s:%d” $ = “Pragma: no-cache” $ = “Connection: Keep-Alive” $ = “HTTP/1.0” condition: (uint16(0) == 0x5A4D) and (all of them) } |
asixgroupincmeer[.]biz
attrcorp[.]com
smtp.attrcorp[.]com
office365e[.]com
office365e[.]com
usapappers[.]com
e.usapappers[.]com
bee.usapappers[.]com
ftp.usapappers[.]com
sun.usapappers[.]com
wow.usapappers[.]com
shot.usapappers[.]com
email.usapappers[.]com
dijlacultus[.]com
bbs.dijlacultus[.]com
fok.dijlacultus[.]com
back.dijlacultus[.]com
info.dijlacultus[.]com
live.dijlacultus[.]com
mail.dijlacultus[.]com
news.dijlacultus[.]com
serv.dijlacultus[.]com
tele.dijlacultus[.]com
thec.dijlacultus[.]com
zero.dijlacultus[.]com
swiss.dijlacultus[.]com
living.dijlacultus[.]com
mailsrv.dijlacultus[.]com
google-dash[.]com
virtualboxs[.]com
steletracker[.]com
vmtools[.]net
pwc.vmtools[.]net
win.winlogon[.]net
asia.winlogon[.]net
winner.winlogon[.]net
hawkthorn[.]net
strightspunddeals[.]net
northropgruman[.]org
owa.northropgruman[.]org
vpn.northropgruman[.]org
soft.northropgruman[.]org
update.northropgruman[.]org
software.northropgruman[.]org
cegauoqsykgqecqc[.]org
eimqqakugeccgwak[.]org
uogwoigiuweyccsw[.]org
soyy[.]info
haha[.]school
ns1.krimeware[.]com
ns2.krimeware[.]com
tianzhen[.]co
www[.]tianzhen[.]co
monsterlegendsvn[.]biz
www[.]monsterlegendsvn[.]biz
nickytoh[.]com
www[.]nickytoh[.]com
seratjati[.]com
aiselamodefactory[.]com
tasty-and-healthy[.]com
nickytoh[.]net
www[.]nickytoh[.]net
animationmyth[.]net
www[.]animationmyth[.]net
petersenstore[.]org
www[.]petersenstore[.]org
forum.haha[.]school
musicis[.]science
-The Fidelis Threat Research Team