LanceFly & the Backdoor

11128774860?profile=RESIZE_400xThe Lancefly advanced persistent threat (APT) group is using a custom-written backdoor in attacks targeting organizations in South and Southeast Asia, in activity that has been ongoing for several years.   Lancefly may have some links to previously known groups, but these are low confidence, which led researchers at Symantec, by Broadcom Software, to classify this activity under a new group name.

Lancefly’s custom malware, which we have dubbed Merdoor, is a powerful backdoor that appears to have existed since 2018.  Symantec researchers observed it being used in some activity in 2020 and 2021, as well as this more recent campaign, which continued into the first quarter of 2023.  The motivation behind both these campaigns is believed to be intelligence gathering.[1]

The backdoor is used very selectively, appearing on just a handful of networks and a small number of machines over the years, with its use appearing to be highly targeted.  The attackers in this campaign also have access to an updated version of the ZXShell rootkit.

The targets in this most recent activity, which began in mid-2022 and continued into 2023, are based in South and Southeast Asia, in sectors including government, aviation, education, and telecoms. Symantec researchers previously saw the Merdoor backdoor used in activity that targeted victims in the same geographies in the government, communications, and technology sectors in 2020 into 2021.  Like this recent activity, that activity also appeared to be highly targeted, with only a small number of machines infected.

Merdoor Backdoor - Merdoor is a fully-featured backdoor that appears to have been in existence since 2018.

The backdoor contains the following functionality:

Installing itself as a service with Keylogging

A variety of methods to communicate with its command-and-control (C&C) server (HTTP, HTTPS, DNS, UDP, TCP).  Ability to listen on a local port for commands

Instances of the Merdoor backdoor are usually identical with the exception of embedded and encrypted configuration, which determines:

  • C&C communication method
  • Service details
  • Installation directory

Typically, the backdoor is injected into the legitimate processes perfhost.exe or svchost.exe.

The Merdoor dropper is a self-extracting RAR (SFX) that contains three files:

  • A legitimate and signed binary vulnerable to DLL search-order hijacking
  • A malicious loader (Merdoor loader)
  • An encrypted file (.pak) containing final payload (Merdoor backdoor)

 

When opened, the dropper extracts embedded files and executes a legitimate binary in order to load the Merdoor loader.

Merdoor dropper variants have been found that abuse older versions of five different legitimate applications for the purpose of DLL sideloading:

Table 1. List of legitimate applications abused by Merdoor for DLL sideloading.

Legitimate binary

Version

Date signed

Loader (Merdoor loader)

Encrypted payload (Merdoor backdoor)

SiteAdv.exe (McAfee SiteAdvisor)

1.6.0.23

08/10/2006

SiteAdv.dll

SiteAdv.pak

ssr32.exe (Sophos SafeStore Restore)

1.3.0.1

11/17/2017

safestore32.dll

safestore.pak

chrome_frame_helper.exe (Google Chrome Frame)

27.0.1453.110

05/29/2013

chrome_frame_helper.dll

chrome_frame_helper.pak

wsc_proxy.exe (Avast wsc_proxy)

1.0.0.3

10/28/2019

wsc.dll

proxycfg.pak

coInst.exe (Norton Identity Safe)

2014.7.3.12

06/26/2014

msvcr100.dll

coinstcfg.dat

Attack Chain - Evidence from Lancefly’s earlier campaign that began in 2020 suggested that in that instance the group may have used a phishing email with a lure based on the 37th ASEAN Summit as an initial infection vector.

In this more recent activity, the initial infection vector was not entirely clear. We saw some indications of what the initial infection vector may have been in two victims, though this was not conclusive.  In one of the government sector victims, there were indications that the initial infection vector may have been SSH brute forcing. Multiple open-source sources associate one of the IP addresses used by the threat actors in this activity with SSH brute forcing, indicating that the initial infection vector was possibly SSH brute forcing.  In another victim, a file path (Csidl_program_files\loadbalancer\ibm\edge\lb\servers\bin) indicates a load balancer may have been exploited for access, indicating that the initial infection vector may have been an exposed public-facing server.  While evidence for any of these infection vectors is not definitive, it does appear to indicate that Lancefly is adaptable when it comes to the kind of infection vectors it uses.

Credential theft using non-malware techniques - In activity that also aligned with their earlier campaign in 2020/2021, the attackers used a number of non-malware techniques for credential theft on victim machines:

PowerShell was used to launch rundll32.exe in order to dump the memory of a process using the MiniDump function of comsvcs.dll. This technique is often used to dump LSASS memory.  Reg.exe was used to dump the SAM and SYSTEM registry hives.  A legitimate tool by Avast was installed by the attackers and used to dump LSASS memory.  The attackers also used a masqueraded version of the legitimate archiving tool WinRAR to stage and encrypt files before exfiltration.

Notable attack chain tools and TTPs - Impacket Atexec: A dual-use tool that can be used by malicious actors to create and run an immediate scheduled task on a remote target via SMB in order to execute commands on a target system. It is used by Lancefly for lateral movement across victim networks, also possibly for shellcode execution and evasion. It may have been used to delete cmdline output files. 

Suspicious SMB activity: Suspicious SMB activity is seen on numerous victim machines. This is likely related to the use of Impacket by the threat actors.

WinRAR: An archive manager that can be used to archive or zip files – for example, prior to exfiltration. It is not clear how the attackers exfiltrate the data from victim machines, but it is most likely via Merdoor.

LSSAS Dumper: Allows the attackers to swiftly steal credentials they can then use to gain further access across victim networks.

NBTScan: Open-source command-line NetBIOS scanner. This can be used to gather information on a network.

Blackloader and Prcloader: Loaders used by the group. These loaders were also both used in earlier Merdoor activity in 2020 and 2021. They have been linked to the delivery of PlugX. Both loaders appear to be sideloaded onto victim machines. It is not clear if these loaders are exclusively used by Lancefly or if their use is shared across multiple groups. 

A typical Merdoor attack chain, as seen in one of the victims, appears to be:

  • Merdoor injected into either perfhost.exe or svchost.exe.
  • Suspicious SMB activity is then normally observed, and the backdoor connects to its C&C server.

 

This is often followed by suspicious living-off-the-land activity, such as the execution of commands like mavinject.exe (which can be used for process injection) and createdump.exe (which can be used to dump a process e.g. LSASS).  A masqueraded WinRAR (wmiprvse.exe) file is then used to stage and encrypt files, presumably prior to exfiltration. We do not actually see the files being exfiltrated from victim networks, but we presume the Merdoor backdoor itself is used to exfiltrate them.

ZXShell Rootkit Technical Details - The ZXShell rootkit was first reported on by Cisco in 2014, but the version of the tool used by Lancefly is updated, indicating that it continues to be actively developed.  The source code of this rootkit is publicly available so it may be used by multiple different groups.  The new version of the rootkit used by Lancefly appears to be smaller in size, while it also has additional functions and targets additional antivirus software to disable. 

Loader - The loader for the rootkit is a 32-bit DLL with the export directory name "FormDll.dll" (SHA256: 1f09d177c99d429ae440393ac9835183d6fd1f1af596089cc01b68021e2e29a7).
It has the following exports:

  • "CallDriver"
  • "DoRVA"
  • "KillAvpProcess"
  • "LoadSys"
  • "ProtectDllFile"

 

Export "Loadsys"

Whenever the export "LoadSys" is executed, it drops one of the following files based on the processor architecture:

  • "[WindowsDirectory]\system32\drivers\TdiProxy.sys" 
  • "[WindowsDirectory]\system64\drivers\TdiProxy.sys" 

These files are a malicious Windows Kernel driver.  This is a variant of a driver that was first documented in an RSA blog several years ago.  It has the PDB filename: "c:\google\objchk_win7_amd64\amd64\Google.pdb"

The sample creates the device: "\Device\TdiProxy0".

It also creates the symbolic link "\DosDevices\TdiProxy0", so that it can be controlled using the pathname “\\.\TdiProxy0”.

After this, the loader timestamps the dropped file by copying the timestamps from the file "[WindowsDirectory]\system32\drivers\http.sys".

Then it creates a service with the following parameters:

  • ServiceName = "TdiProxy0"
  • DisplayName = "TdiProxy0" (later replaced with "TdiProxy")
  • BinaryPathName = "[WindowsDirectory]\system32\drivers\TdiProxy.sys"

 

Export "CallDriver"

"CallDriver" opens the following device, which was created by the \\.\TdiProxy0” malicious kernel driver.

It communicates with it using the DeviceIoControl API.

The export expects two arguments. The first argument determines the dwIoControlCode parameter to use when calling the DeviceIoControl API and it should be one of the following strings:

  • "-init",
  • "-file",
  • "-pack",
  • "-port",
  • "-removetcpview",
  • "-tcpview",
  • "-clearall",
  • "-clear",
  • "-transport",
  • "-waitport",
  • "-kill",
  • "-antiscan",
  • "-removeprocessnotify",
  • "-setprocessnotify",
  • "-antiantigp",
  • "-hideproc",
  • "-hidekey",
  • "-hidefile",
  • "-setprotect"

 

Any other values result in what looks like a buggy dwIoControlCode value.  The second argument is a string to pass as an lpInBuffer parameter when calling the DeviceIoControl API, after conversion using the MultiByteToWideChar API.

Export "DoRVA" - Whenever the export "DoRVA" is executed, it reads the following file:

  • "[file_directory_of_the_DLL]\Form.hlp"

 

The file should start with the magic string "AP32" and contains shellcode to execute in compressed form.

Export "KillAvpProcess" - This enumerates running processes and for selected processes and calls its own export "CallDriver" with the following parameters:

  • first parameter: "-kill"
  • second parameter: "[ProcessID]"

 

The export expects a single string parameter to compare with the executable file of running processes for selection.

Export "ProtectDllFile" - This calls its own export "CallDriver" with the following parameters:

  • first parameter: "-file"
  • second parameter: "[file_path_of_the_DLL]"

Next, it sets the following registry value:

  • HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.ptdf\"ptdffile" = "[file_path_of_the_DLL]"

 

Loadpoint - This is a 32-bit executable with the PDB filename:

  • "M:\Project\database\10.0.18362\Form\Release\Form.pdb". (SHA256: 180970fce4a226de05df6d22339dd4ae03dfd5e451dcf2d464b663e86c824b8e)

 

Whenever the sample is executed, it loads the following DLL:

  • "[file_path_of_the_running_executable]\FormDll.dll"

 

It also calls its export: "DoRVA".

Installation and Update Utility –

The installation and update utility is a 32-bit PE executable (SHA256: a6020794bd6749e0765966cd65ca6d5511581f47cc2b38e41cb1e7fddaa0b221) that shares small but distinctive fragments of code with the Merdoor loader, which is what indicates they are part of the same toolset.

Whenever the sample is executed, it attempts to read and delete the following file containing its configuration data:

  • "[file_directory_of_running_executable]\res.ini"

 

Update functionality - Next, it checks that:

"\\.\TdiProxy0" device is available, and

That its own process was started with the command-line parameter "-up".

If both checks pass, the sample attempts to tamper with various antivirus products using the "\\.\TdiProxy0" device. For example, it may terminate the processes "egui.exe", "ekrn.exe", and "msmpeng.exe".

Next, it attempts to rename the file "[FILE_DIRECTORY_OF_RUNNING_EXECUTABLE]\res.dat" as one of the following (depending on the Windows version):

  • "[SystemDrive]\Users\All Users\Windows Defender\temp.temp"
  • "[WindowsDirectory]\temp.temp".

 

Based on the structure of the code, the above file should start with the magic string "AP32" and could contain a DLL file in compressed form. The sample then decompresses the renamed file "temp.temp". When decompressing, it may create the temporary file "temp.temp.pack" in the same folder.

Next, the sample appends a certain marker followed by the content of "[FILE_DIRECTORY_OF_RUNNING_EXECUTABLE]\res.ini" (partially transformed using the XOR algorithm with the byte key 0x12) at the end of the decompressed file.

Additionally, it also creates the following registry value:

  • HKEY_CLASSES_ROOT\.udf\"BINTYPE" = [content of "[file_directory_of_running_executable]\res.ini" (partially transformed using the XOR algorithm with the byte key 0x12)]

Then the sample checks if the following file exists:

"[SystemDrive]\Users\All Users\Windows Defender\DefenderSvc.dll"

If so, the sample renames the updated "temp.temp" file to replace it.
Otherwise, it checks the following registry value for the pathname to replace:

HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.ecdf\"ecdffile"

If that fails, it uses a default from configuration data.

Finally, it checks the following registry value for a service name:

  • HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.tudf\"tudffile"

It restarts the referred service.

Installation functionality - The sample attempts to decompress the following file:

  • "[FILE_DIRECTORY_OF_RUNNING_EXECUTABLE]\google64.p" (64-bit processor architecture), or
  • "[FILE_DIRECTORY_OF_RUNNING_EXECUTABLE]\google32.p" (32-bit processor architecture)
  • as:
  • "[WindowsDirectory]\Microsoft.NET\Framework64\iesockethlp.dll" (64-bit processor architecture), or
  • "[WindowsDirectory]\Microsoft.NET\Framework\iesockethlp.dll" (32-bit processor architecture)

Then it may modify one of the following registry values to hijack the corresponding service:

  • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\exfat\"ImagePath" = "\??\[PATHNAME_OF_FILE_DECOMPRESSED_ABOVE]", or
  • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RDPWD\"ImagePath" = "\??\[PATHNAME_OF_FILE_DECOMPRESSED_ABOVE]"

Next, it starts the corresponding service and then removes the registry value. It then attempts to tamper with various antivirus products using the "\\.\TdiProxy0" device.

It then creates a service with the following parameters:

  • ServiceName: "[PER CONFIGURATION DATA]"
  • ImagePath:
  • "%SystemRoot%\System32\svchost.exe -k netsvcs", or
  • "%SystemRoot%\System32\svchost.exe -k ntmssvcs"

 

Parameters:

ServiceDll:

  • "C:\WINDOWS\Microsoft.NET\Framework64\[PER CONFIGURATION DATA]", or
  • "C:\WINDOWS\Microsoft.NET\Framework\[PER CONFIGURATION DATA]"

 

Then it creates the following registry value:

HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.tudf\"tudffile" = [NAME OF CREATED SERVICE]

It then deletes the following registry values:

  • HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.ptdf\"ptdffile"
  • HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.ecdf\"ecdffile"

Next, it renames the following file:

  • "[FILE_DIRECTORY_OF_RUNNING_EXECUTABLE]\res.dat"
  • as:
  • "[WindowsDirectory]\Microsoft.NET\Framework64\[PER CONFIGURATION DATA].back" (64-bit processor architecture), or
  • "[WindowsDirectory]\Microsoft.NET\Framework\[PER CONFIGURATION DATA].back" (32-bit processor architecture)

 

Based on the structure of the code, the above file should start with the magic string "AP32" and could contain a DLL file in compressed form (using aPLib for compression).

The sample then decompresses the renamed "[PER CONFIGURATION DATA].back" as "[PER CONFIGURATION DATA]".

Next, the sample appends a certain marker followed by the content of "[FILE_DIRECTORY_OF_RUNNING_EXECUTABLE]\res.ini" (partially transformed using the XOR algorithm with the byte key 0x12) at the end of the decompressed file.

Additionally, it also creates the following registry value:

  • HKEY_CLASSES_ROOT\.udf\"BINTYPE" = [content of "[FILE_DIRECTORY_OF_RUNNING_EXECUTABLE]\res.ini" (partially transformed using the XOR algorithm with the byte key 0x12)]

inally, when the configuration data includes the option "OneSelfKey", it makes a compressed copy of its own executable as (using aPLib for compression):

  • "[WindowsDirectory]\SysWOW64\nethlp.hlp" (64-bit processor architecture), or
  • "[WindowsDirectory]\system32\nethlp.hlp" (32-bit processor architecture).

 

Some samples include an embedded archive with the final payload:

  • "Msrpcsvc.dll"
  • This is a variant of the ZXShell backdoor (SHA256: d5df686bb202279ab56295252650b2c7c24f350d1a87a8a699f6034a8c0dd849).

 

Possible Links to Other Groups - The ZXShell rootkit used by Lancefly is signed by the certificate "Wemade Entertainment Co. Ltd", which was previously reported to be associated with APT41 (aka Blackfly/Grayfly).  However, it is known that Chinese APT groups, such as APT41, often share certificates with other APT groups.  The ZXShell backdoor has also previously been used by the HiddenLynx/APT17 group, but as the source code of ZXShell is now publicly available this does not provide a definitive link between these two groups.

Also notable is that the ZXShell rootkit loader component has the name "formdll.dll" and it has the ability to read the file "Form.hlp" and execute its contents as shellcode.  Those same files were mentioned as being used in a previous report detailing activity by the Iron Tiger (aka Budworm/APT27) group.  In that case, the attackers used these filenames when loading the PlugX backdoor onto victim machines. The prevalence of such files is very low, which may indicate a potential link between that campaign and this more recent activity.

PlugX is also seen being used by Lancefly. PlugX is a remote access Trojan (RAT) with multiple functionalities including backdoor access and data exfiltration.  PlugX has existed for well over a decade.  It was originally used by Chinese APT groups, but its use is now very widespread, meaning it is difficult to use it as a way of attributing activity.

ShadowPad is also used by these attackers. ShadowPad is a modular RAT believed to be exclusively used by Chinese APT groups.  Its capabilities are similar to PlugX, and it is often referred to as a successor to that malware.

While these overlaps and shared tools may indicate some links between Lancefly activity and activity by other APT groups, none of the overlaps are strong enough to attribute this activity and the development of the Merdoor backdoor to an already-known attack group.

Noteworthy Backdoor, Targeted Activity - This recent Lancefly activity is of note due to its use of the Merdoor backdoor, but also the low prevalence of this backdoor and the seemingly highly targeted nature of these attacks.  While the Merdoor backdoor appears to have been in existence for several years, it appears to only have been used in a small number of attacks in that time period.  This prudent use of the tool may indicate a desire by Lancefly to keep its activity under the radar.

The tools used and sectors targeted all point to the motivations of this attack campaign being intelligence gathering.  The similarities between this recent activity and earlier activity by Lancefly indicate that the group perhaps did not realize the earlier activity had been discovered, so it was not concerned about links being made between the two. Whether or not the exposure of this activity will lead to any alteration in how the group carries out its activity remains to be seen.

Protection -For the latest protection updates, please visit the Symantec Protection Bulletin.

Indicators of Compromise (IOCs)

Merdoor Backdoor -SHA256             Filename           Description

  • 13df2d19f6d2719beeff3b882df1d3c9131a292cf097b27a0ffca5f45e139581 – a.exe – Merdoor Dropper
  • 8f64c25ba85f8b77cfba3701bebde119f610afef6d9a5965a3ed51a4a4b9dead – chrome_frame_helper.exe – Merdoor Dropper
  • 8e98eed2ec14621feda75e07379650c05ce509113ea8d949b7367ce00fc7cd38 – siteadv.exe – Merdoor Dropper
  • 89e503c2db245a3db713661d491807aab3d7621c6aff00766bc6add892411ddc – siteadv.exe – Merdoor Dropper
  • c840e3cae2d280ff0b36eec2bf86ad35051906e484904136f0e478aa423d7744 –siteadv.exe –Merdoor Dropper
  • 5f16633dbf4e6ccf0b1d844b8ddfd56258dd6a2d1e4fb4641e2aa508d12a5075 –chrome_frame_helper.dll – Merdoor Loader
  • ff4c2a91a97859de316b434c8d0cd5a31acb82be8c62b2df6e78c47f85e57740 –chrome_frame_helper.dll – Merdoor Loader
  • 14edb3de511a6dc896181d3a1bc87d1b5c443e6aea9eeae70dbca042a426fcf3 –chrome_frame_helper.dll – Merdoor Loader
  • db5deded638829654fc1595327400ed2379c4a43e171870cfc0b5f015fad3a03 –chrome_frame_helper.dll – Merdoor Loader
  • e244d1ef975fcebb529f0590acf4e7a0a91e7958722a9f2f5c5c05a23dda1d2c –chrome_frame_helper.dll – Merdoor Loader
  • f76e001a7ccf30af0706c9639ad3522fd8344ffbdf324307d8e82c5d52d350f2 –chrome_frame_helper.dll – Merdoor Loader
  • dc182a0f39c5bb1c3a7ae259f06f338bb3d51a03e5b42903854cdc51d06fced6 – smadhook64c.dll – Merdoor Loader
  • fa5f32457d0ac4ec0a7e69464b57144c257a55e6367ff9410cf7d77ac5b20949 – SiteAdv.dll, chrome_frame_helper.dll –Merdoor Loader
  • fe7a6954e18feddeeb6fcdaaa8ac9248c8185703c2505d7f249b03d8d8897104 – siteadv.dll – Merdoor Loader
  • 341d8274cc1c53191458c8bbc746f428856295f86a61ab96c56cd97ee8736200 – siteadv.dll – Merdoor Loader
  • f3478ccd0e417f0dc3ba1d7d448be8725193a1e69f884a36a8c97006bf0aa0f4 – siteadv.dll – Merdoor Loader
  • 750b541a5f43b0332ac32ec04329156157bf920f6a992113a140baab15fa4bd3 – mojo_core.dll – Merdoor Loader
  • 9f00cee1360a2035133e5b4568e890642eb556edd7c2e2f5600cf6e0bdcd5774 – libmupdf.dll – Merdoor Loader
  • a9051dc5e6c06a8904bd8c82cdd6e6bd300994544af2eed72fe82df5f3336fc0 – chrome_frame_helper.dll – Merdoor Loader
  • d62596889938442c34f9132c9587d1f35329925e011465c48c94aa4657c056c7 – smadhook64c.dll – Merdoor Loader
  • f0003e08c34f4f419c3304a2f87f10c514c2ade2c90a830b12fdf31d81b0af57 – SiteAdv.pak – Merdoor encoded payload
  • 139c39e0dc8f8f4eb9b25b20669b4f30ffcbe2197e3a9f69d0043107d06a2cb4 – SiteAdv.pak – Merdoor encoded payload
  • 11bb47cb7e51f5b7c42ce26cbff25c2728fa1163420f308a8b2045103978caf5 – SiteAdv.pak – Merdoor encoded payload
  • 0abc1d12ef612490e37eedb1dd1833450b383349f13ddd3380b45f7aaabc8a75 – SiteAdv.pak – Merdoor encoded payload
  • eb3b4e82ddfdb118d700a853587c9589c93879f62f576e104a62bdaa5a338d7b –SiteAdv.exe – Legit McAfee executable
  • 1ab4f52ff4e4f3aa992a77d0d36d52e796999d6fc1a109b9ae092a5d7492b7dd – chrome_frame_helper.exe – Legit Google executable
  • fae713e25b667f1c42ebbea239f7b1e13ba5dc99b225251a82e65608b3710be7 – SmadavProtect64.exe – Legit SmadAV executable

 

ZXShell Rootkit

SHA256

Filename

Description

 

1f09d177c99d429ae440393ac9835183d6fd1f1af596089cc01b68021e2e29a7

formdll.dll

Kernel driver loader

 

180970fce4a226de05df6d22339dd4ae03dfd5e451dcf2d464b663e86c824b8e

form.exe

Kernel driver loadpoint

 

a6020794bd6749e0765966cd65ca6d5511581f47cc2b38e41cb1e7fddaa0b221

update.exe

Kernel driver installation and update utility

 

592e237925243cf65d30a0c95c91733db593da64c96281b70917a038da9156ae

update.exe

Kernel driver installation and update utility

 

929b771eabef5aa9e3fba8b6249a8796146a3a4febfd4e992d99327e533f9798

formdll.dll

Kernel driver loader

 

009d8d1594e9c8bc40a95590287f373776a62dad213963662da8c859a10ef3b4

tdiproip.sys

Kernel driver x64

 

ef08f376128b7afcd7912f67e2a90513626e2081fe9f93146983eb913c50c3a8

tdiproip.sys

Kernel driver x32

 

ee486e93f091a7ef98ee7e19562838565f3358caeff8f7d99c29a7e8c0286b28

iehlpsrv.dll

Kernel driver x64 old

 

32d837a4a32618cc9fc1386f0f74ecf526b16b6d9ab6c5f90fb5158012fe2f8c

USBHPMS.sys

Kernel driver x32 old

 

d5df686bb202279ab56295252650b2c7c24f350d1a87a8a699f6034a8c0dd849

 

ZXShell

 

     

 

     

 

     

 

     

 

Other Files - SHA256

Filename

Description

a1f9b76ddfdafc47d4a63a04313c577c0c2ffc6202083422b52a00803fd8193d

ssmuidll.dll

Possible PlugX DLL loader

3ce38a2fc896b75c2f605c135297c4e0cddc9d93fc5b53fe0b92360781b5b94e

tosbtkbd.dll

Possible ShadowPad loader

210934a2cc59e1f5af39aa5a18aae1d8c5da95d1a8f34c9cfc3ab42ecd37ac92

klcsstd2.dll

Possible ShadowPad loader

530c7d705d426ed61c6be85a3b2b49fd7b839e27f3af60eb16c5616827a2a436

comhlpsvc.dll

Client to interact with driver

5018fe25b7eac7dd7bc30c7747820e3c1649b537f11dbaa9ce6b788b361133bf

comhlpsvc.dll

Client to interact with driver

efa9e9e5da6fba14cb60cba5dbd3f180cb8f2bd153ca78bbacd03c270aefd894

searchsrvc.exe

Client to interact with driver

a5a4dacddfc07ec9051fb7914a19f65c58aad44bbd3740d7b2b995262bd0c09e

comhlpsvc32.dll

Client to interact with driver

10b96290a17511ee7a772fcc254077f62a8045753129d73f0804f3da577d2793

a.exe

LDAP enumerator tool

0dcfcdf92e85191de192b4478aba039cb1e1041b1ae7764555307e257aa566a7

intel.exe

Mimikatz

415f9dc11fe242b7a548be09a51a42a4b5c0f9bc5c32aeffe7a98940b9c7fc04

tfc_windows_amd64.exe

GO Socks5 client

947f7355aa6068ae38df876b2847d99a6ca458d67652e3f1486b6233db336088

deliver.exe

Hacktool - CMD.exe injector

8d77fe4370c864167c1a712d0cc8fe124b10bd9d157ea59db58b42dea5007b63

tool.exe

Hacktool - webshell encoder

d8cc2dc0a96126d71ed1fce73017d5b7c91465ccd4cdcff71712381af788c16d

browser.exe

Infostealer

e94a5bd23da1c6b4b8aec43314d4e5346178abe0584a43fa4a204f4a3f7464b9

python27.dll

Recon DLL

5655a2981fa4821fe09c997c84839c16d582d65243c782f45e14c96a977c594e

frpc.exe

FRPC

19ec3f16a42ae58ab6feddc66d7eeecf91d7c61a0ac9cdc231da479088486169

ssf.exe

SSF

41d174514ed71267aaff578340ff83ef00dbb07cb644d2b1302a18aa1ca5d2d0

intel_drive.exe

LSASS dumping tool

67ebc03e4fbf1854a403ea1a3c6d9b19fd9dc2ae24c7048aafbbff76f1bea675

wsc.dll

BlackLoader

f92cac1121271c2e55b34d4e493cb64cdb0d4626ee30dc77016eb7021bf63414

wsc.dll

BlackLoader

859e76b6cda203e84a7b234c5cba169a7a02bf028a5b75e2ca8f1a35c4884065

smbver.exe

SMB enumeration Tool

fcdec9d9b195b8ed827fb46f1530502816fe6a04b1f5e740fda2b126df2d9fd5

smb2os.exe

SMB enumeration Tool

9584df964369c1141f9fc234c64253d8baeb9d7e3739b157db5f3607292787f2

ntmsvc.dll

PrcLoader

711a347708e6d94da01e4ee3b6cdb9bcc96ebd8d95f35a14e1b67def2271b2e9

ntmsvc.dll

PrcLoader

f040a173b954cdeadede3203a2021093b0458ed23727f849fc4c2676c67e25db

ntmsvc.dll

PrcLoader

90edb2c7c3ba86fecc90e80ac339a42bd89fbaa3f07d96d68835725b2e9de3ba

ntmsvc.dll

PrcLoader

b0d25b06e59b4cca93e40992fa0c0f36576364fcf1aca99160fd2a1faa5677a2

lsassunhooker.exe

LsassUnhooker

4c55f48b37f3e4b83b6757109b6ee0a661876b41428345239007882993127397

ladon.exe

Ladon

3e1c8d982b1257471ab1660b40112adf54f762c570091496b8623b0082840e9f

nbt.exe

NBTScan

9830f6abec64b276c9f327cf7c6817ad474b66ea61e4adcb8f914b324da46627

pot.exe

PortScan

79ae300ac4f1bc7636fe44ce2faa7e5556493f7013fc5c0a3863f28df86a2060

rubes.e

Rubeus

           

File hashes, simplified list

  • 13df2d19f6d2719beeff3b882df1d3c9131a292cf097b27a0ffca5f45e139581
  • 8f64c25ba85f8b77cfba3701bebde119f610afef6d9a5965a3ed51a4a4b9dead
  • 8e98eed2ec14621feda75e07379650c05ce509113ea8d949b7367ce00fc7cd38
  • 89e503c2db245a3db713661d491807aab3d7621c6aff00766bc6add892411ddc
  • c840e3cae2d280ff0b36eec2bf86ad35051906e484904136f0e478aa423d7744
  • 5f16633dbf4e6ccf0b1d844b8ddfd56258dd6a2d1e4fb4641e2aa508d12a5075
  • ff4c2a91a97859de316b434c8d0cd5a31acb82be8c62b2df6e78c47f85e57740
  • 14edb3de511a6dc896181d3a1bc87d1b5c443e6aea9eeae70dbca042a426fcf3
  • db5deded638829654fc1595327400ed2379c4a43e171870cfc0b5f015fad3a03
  • e244d1ef975fcebb529f0590acf4e7a0a91e7958722a9f2f5c5c05a23dda1d2c
  • f76e001a7ccf30af0706c9639ad3522fd8344ffbdf324307d8e82c5d52d350f2
  • dc182a0f39c5bb1c3a7ae259f06f338bb3d51a03e5b42903854cdc51d06fced6
  • fa5f32457d0ac4ec0a7e69464b57144c257a55e6367ff9410cf7d77ac5b20949
  • fe7a6954e18feddeeb6fcdaaa8ac9248c8185703c2505d7f249b03d8d8897104
  • 341d8274cc1c53191458c8bbc746f428856295f86a61ab96c56cd97ee8736200
  • f3478ccd0e417f0dc3ba1d7d448be8725193a1e69f884a36a8c97006bf0aa0f4
  • 750b541a5f43b0332ac32ec04329156157bf920f6a992113a140baab15fa4bd3
  • 9f00cee1360a2035133e5b4568e890642eb556edd7c2e2f5600cf6e0bdcd5774
  • a9051dc5e6c06a8904bd8c82cdd6e6bd300994544af2eed72fe82df5f3336fc0
  • d62596889938442c34f9132c9587d1f35329925e011465c48c94aa4657c056c7
  • f0003e08c34f4f419c3304a2f87f10c514c2ade2c90a830b12fdf31d81b0af57
  • 139c39e0dc8f8f4eb9b25b20669b4f30ffcbe2197e3a9f69d0043107d06a2cb4
  • 11bb47cb7e51f5b7c42ce26cbff25c2728fa1163420f308a8b2045103978caf5
  • 0abc1d12ef612490e37eedb1dd1833450b383349f13ddd3380b45f7aaabc8a75
  • eb3b4e82ddfdb118d700a853587c9589c93879f62f576e104a62bdaa5a338d7b
  • 1ab4f52ff4e4f3aa992a77d0d36d52e796999d6fc1a109b9ae092a5d7492b7dd
  • fae713e25b667f1c42ebbea239f7b1e13ba5dc99b225251a82e65608b3710be7
  • 1f09d177c99d429ae440393ac9835183d6fd1f1af596089cc01b68021e2e29a7
  • 180970fce4a226de05df6d22339dd4ae03dfd5e451dcf2d464b663e86c824b8e
  • a6020794bd6749e0765966cd65ca6d5511581f47cc2b38e41cb1e7fddaa0b221
  • 592e237925243cf65d30a0c95c91733db593da64c96281b70917a038da9156ae
  • 929b771eabef5aa9e3fba8b6249a8796146a3a4febfd4e992d99327e533f9798
  • 009d8d1594e9c8bc40a95590287f373776a62dad213963662da8c859a10ef3b4
  • ef08f376128b7afcd7912f67e2a90513626e2081fe9f93146983eb913c50c3a8
  • ee486e93f091a7ef98ee7e19562838565f3358caeff8f7d99c29a7e8c0286b28
  • 32d837a4a32618cc9fc1386f0f74ecf526b16b6d9ab6c5f90fb5158012fe2f8c
  • d5df686bb202279ab56295252650b2c7c24f350d1a87a8a699f6034a8c0dd849
  • a1f9b76ddfdafc47d4a63a04313c577c0c2ffc6202083422b52a00803fd8193d
  • 3ce38a2fc896b75c2f605c135297c4e0cddc9d93fc5b53fe0b92360781b5b94e
  • 210934a2cc59e1f5af39aa5a18aae1d8c5da95d1a8f34c9cfc3ab42ecd37ac92
  • 530c7d705d426ed61c6be85a3b2b49fd7b839e27f3af60eb16c5616827a2a436
  • 5018fe25b7eac7dd7bc30c7747820e3c1649b537f11dbaa9ce6b788b361133bf
  • efa9e9e5da6fba14cb60cba5dbd3f180cb8f2bd153ca78bbacd03c270aefd894
  • a5a4dacddfc07ec9051fb7914a19f65c58aad44bbd3740d7b2b995262bd0c09e
  • 10b96290a17511ee7a772fcc254077f62a8045753129d73f0804f3da577d2793
  • 0dcfcdf92e85191de192b4478aba039cb1e1041b1ae7764555307e257aa566a7
  • 415f9dc11fe242b7a548be09a51a42a4b5c0f9bc5c32aeffe7a98940b9c7fc04
  • 947f7355aa6068ae38df876b2847d99a6ca458d67652e3f1486b6233db336088
  • 8d77fe4370c864167c1a712d0cc8fe124b10bd9d157ea59db58b42dea5007b63
  • d8cc2dc0a96126d71ed1fce73017d5b7c91465ccd4cdcff71712381af788c16d
  • e94a5bd23da1c6b4b8aec43314d4e5346178abe0584a43fa4a204f4a3f7464b9
  • 5655a2981fa4821fe09c997c84839c16d582d65243c782f45e14c96a977c594e
  • 19ec3f16a42ae58ab6feddc66d7eeecf91d7c61a0ac9cdc231da479088486169
  • 41d174514ed71267aaff578340ff83ef00dbb07cb644d2b1302a18aa1ca5d2d0
  • 67ebc03e4fbf1854a403ea1a3c6d9b19fd9dc2ae24c7048aafbbff76f1bea675
  • f92cac1121271c2e55b34d4e493cb64cdb0d4626ee30dc77016eb7021bf63414
  • 859e76b6cda203e84a7b234c5cba169a7a02bf028a5b75e2ca8f1a35c4884065
  • fcdec9d9b195b8ed827fb46f1530502816fe6a04b1f5e740fda2b126df2d9fd5
  • 9584df964369c1141f9fc234c64253d8baeb9d7e3739b157db5f3607292787f2
  • 711a347708e6d94da01e4ee3b6cdb9bcc96ebd8d95f35a14e1b67def2271b2e9
  • f040a173b954cdeadede3203a2021093b0458ed23727f849fc4c2676c67e25db
  • 90edb2c7c3ba86fecc90e80ac339a42bd89fbaa3f07d96d68835725b2e9de3ba
  • b0d25b06e59b4cca93e40992fa0c0f36576364fcf1aca99160fd2a1faa5677a2
  • 4c55f48b37f3e4b83b6757109b6ee0a661876b41428345239007882993127397
  • 3e1c8d982b1257471ab1660b40112adf54f762c570091496b8623b0082840e9f
  • 9830f6abec64b276c9f327cf7c6817ad474b66ea61e4adcb8f914b324da46627
  • 79ae300ac4f1bc7636fe44ce2faa7e5556493f7013fc5c0a3863f28df86a2060

Red Sky Alliance is a Cyber Threat Analysis and Intelligence Service organization.  For questions, comments, or assistance, please get in touch with the office directly at 1-844-492-7225, or feedback@redskyalliance.com

Weekly Cyber Intelligence Briefings:

Weekly Cyber Intelligence Briefings:

REDSHORTS - Weekly Cyber Intelligence Briefings

https://attendee.gotowebinar.com/register/5504229295967742989

[1] https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/lancefly-merdoor-zxshell-custom-backdoor/

E-mail me when people leave their comments –

You need to be a member of Red Sky Alliance to add comments!