Chasing BlackTech Domain Abuse: Open sourced wayis amazing!
2024-2-2 12:19:56 Author: infosecwriteups.com(查看原文) 阅读量:13 收藏

morimolymoly

InfoSec Write-ups

Hello, I am morimolymoly.

I analyzed domain abuse by BlackTech which actively attacking Japan, Taiwan, US, Singapore, Hong Kong.

I read TrendMicro’s article about BlackTech.

BlackTech used itaiwans[.]com for C2.

I searched this domain on VirusTotal and got result.

sub domains

I could obtain some subdomains.

Domains which marked malicious is well-known and not interested for me so I looked at library[.]itaiwans[.]com and got result.

suspicious urls

As we can see, hxxp://library[.]itaiwans[.]com/logo[.]png seems really good and BlackTech is reusing this domain for years!

malware?

And I could also got one Malware sample(47ec90f43990c19c62317839168e34637be57d77bcd8d4adadf02963a93b5808).

IconDown

Yeah, it is IconDown!

DIE
stackstrings

IconDown fetches encrypted file from C2 server, and use RC4 to decrypt payload and deploy it into %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\slui.exe

encrypted payload is embedded
deploy
cmd.exe /c to execute
IconDown’s main routine

文章来源: https://infosecwriteups.com/chasing-blacktech-domain-abuse-open-sourced-wayis-amazing-c524b9228497?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh