Rewterz Threat Alert – OUTLOOK VULNERABILITY Exploited by Threat Actors
July 4, 2019Rewterz Threat Advisory – McAfee ePolicy Orchestrator Multiple Vulnerabilities
July 9, 2019Rewterz Threat Alert – OUTLOOK VULNERABILITY Exploited by Threat Actors
July 4, 2019Rewterz Threat Advisory – McAfee ePolicy Orchestrator Multiple Vulnerabilities
July 9, 2019Severity
Medium
Analysis Summary
Godlua is the first malware that abuses the DNS over HTTPS (DoH) protocol to protect its command and control infrastructure.
Godlua Backdoor has a redundant communication mechanism for C2 connection, a combination of hardcoded dns name, Pastebin.com, GitHub.com as well as DNS TXT are used to store the C2 address, “At the same time, it uses HTTPS to download Lua byte-code files, and uses DNS over HTTPS to get the C2 name to ensure secure communication between the bots, the Web Server and the C2.
Impact
DDoS
Indicators of Compromise
IP(s) / Hostname(s)
- 198[.]204[.]231[.]250
- 104[.]238[.]151[.]101
- 43[.]224[.]225[.]220
URLs
- https[:]//helegedada[.]github[.]io/test/test
- https[:]//api[.]github[.]com/repos/helegedada/heihei
- http[:]//198[.]204[.]231[.]250/linux-x64
- http[:]//198[.]204[.]231[.]250/linux-x86
- https[:]//dd[.]heheda[.]tk/i[.]jpg
- https[:]//dd[.]heheda[.]tk/i[.]sh
- https[:]//dd[.]heheda[.]tk/x86_64-static-linux-uclibc[.]jpg
- https[:]//dd[.]heheda[.]tk/i686-static-linux-uclibc[.]jpg
- https[:]//dd[.]cloudappconfig[.]com/i[.]jpg
- https[:]//dd[.]cloudappconfig[.]com/i[.]sh
- https[:]//dd[.]cloudappconfig[.]com/x86_64-static-linux-uclibc[.]jpg
- https[:]//dd[.]cloudappconfig[.]com/arm-static-linux-uclibcgnueabi[.]jpg
- https[:]//dd[.]cloudappconfig[.]com/i686-static-linux-uclibc[.]jpg
- http[:]//d[.]cloudappconfig[.]com/i686-w64-mingw32/Satan[.]exe
- http[:]//d[.]cloudappconfig[.]com/x86_64-static-linux-uclibc/Satan
- http[:]//d[.]cloudappconfig[.]com/i686-static-linux-uclibc/Satan
- http[:]//d[.]cloudappconfig[.]com/arm-static-linux-uclibcgnueabi/Satan
- https[:]//d[.]cloudappconfig[.]com/mipsel-static-linux-uclibc/Satan
Malware Hash (MD5/SHA1/SH256)
- 870319967dba4bd02c7a7f8be8ece94f
- c9b712f6c347edde22836fb43b927633
- 75902cf93397d2e2d1797cd115f8347a
Remediation
- Block all threat indicators at your respective controls.
- Keep updated patches on all critical and non-critical systems.