Been seeing some interesting traffic credited to Bugat/Feodo/Cridex.
Sadly
due a lack of packet data I cannot contribute more than IPs related to
CNC activity and the URL structure that was employed in the POSTs.
Reading
Kimberly and Andre's write-ups I wanted to contribute something to the
community that may possibly at least add something more to their
analysis.
The first interaction that I became aware of the CNC was observed with this interaction (Proxy log):
POST - http 68.178.206.179 8080 /mx5/B/in/ - - "Mozilla/5.0 (Windows; U; MSIE 7.0; Windows NT 6.0; en-US)"
One
of the points of data I have found useful in CNC activity is checking
out the User Agent String, this one being more complex than "Internet
Explorer" or "Mozilla / 4.0", etc.
The UAS is fairly rarely used, in my research I've seen it associated with real.com or Cridex.
Digging
through the last couple of months of traffic I observed the URI path
that stopmalvertising documented the URI Path: /zb/v_01_a/in/
/zb/v_01_b/in/. This was observed starting out on 6/5/12.
Here is the traffic observed in this earlier compromise:
POST
- http 41.168.5.140 8080 /zb/v_01_b/in/ - - "Mozilla/5.0 (Windows; U;
MSIE 7.0; Windows NT 6.0; en-US)" 10.17.10.59 4063 1710859
Here are the observed CNC IPs related to these compromises:
216.24.197.66
213.17.171.186
211.44.250.173
210.56.23.100
200.169.13.84
190.81.107.70
188.40.0.138
184.106.189.124
180.235.150.72
164.15.21.2
155.98.65.40
125.19.103.198
110.234.150.163
97.74.75.172
95.142.167.193
91.228.154.199
91.121.103.143
85.214.204.32
59.90.221.6
41.168.5.140
You've
probably noticed that my first example doesn't match the previously
documented structures, this is where the fun begins. (It's ok if you
didn't notice it, that's the purpose of the post is to bring that to
light (or attempt too)).
POST - http 68.178.206.179 8080 /mx5/B/in/ - - "Mozilla/5.0 (Windows; U; MSIE 7.0; Windows NT 6.0; en-US)"
They
are utilize the POST method, both run on port 8080 (at least that's all
I have observed), same UAS, but they varied up the URI path.
Here are the observed CNC IPs related to these compromises:
87.204.199.100
87.120.41.155
85.226.179.185
68.178.206.179
64.94.164.18
72.167.253.106
59.90.221.6
41.168.5.140
219.94.194.242
210.56.23.100
202.65.121.5
200.169.13.84
123.49.61.59
Without packet data and better visibility with the systems this is what I can find and document, I hope it helps.
-Demon117
@demon117 on twitter
*Warning*
Both sets of IPs may very well be still active and contain malicious
stuff on it, or not, either or... if you do anything them and stuff
happens for the bad, it's not my fault.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment