• Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Alert – PayPal Phishing Attacks
December 23, 2019
Rewterz Threat Alert – Maze ransomware – IOCs
December 23, 2019

Rewterz Threat Alert – Dacls, the Dual platform RAT

December 23, 2019

Severity

High

Analysis Summary

Dacls is a new type of remote-control software targeting both Windows and Linux environment. Its functions are modular, the C2 protocol uses TLS and RC4 double-layer encryption, the configuration file uses AES encryption and supports C2 instruction dynamic update. The Win32.Dacls plug-in module is dynamically loaded through a remote URL, and the Linux version of the plug-in is compiled directly in the Bot program.

dacls_graph.png

Impact

Exposure of sensitive information

Indicators of Compromise

IP

  • 23[.]81[.]246[.]179
  • 23[.]254[.]119[.]12
  • 23[.]227[.]196[.]116
  • 37[.]72[.]175[.]179
  • 23[.]227[.]199[.]53
  • 107[.]172[.]197[.]175
  • 172[.]93[.]201[.]219
  • 64[.]188[.]19[.]117
  • 74[.]121[.]190[.]121
  • 192[.]210[.]213[.]178
  • 209[.]90[.]234[.]34
  • 198[.]180[.]198[.]6

MD5

  • 6de65fc57a4428ad7e262e980a7f6cc7
  • 80c0efb9e129f7f9b05a783df6959812
  • 982bf527b9fe16205fea606d1beed7fa
  • 8910bdaaa6d3d40e9f60523d3a34f914
  • a99b7ef095f44cf35453465c64f0c70c
  • bea49839390e4f1eb3cb38d0fcaf897e
  • cef99063e85af8b065de0ffa9d26cb03
  • e883bf5fd22eb6237eb84d80bbcf2ac9

URL

  • http[:]//www[.]areac-agr[.]com/cms/wp-content/uploads/2015/12/check[.]vm
  • http[:]//www[.]areac-agr[.]com/cms/wp-content/uploads/2015/12/hdata[.]dat
  • http[:]//www[.]areac-agr[.]com/cms/wp-content/uploads/2015/12/ldata[.]dat
  • http[:]//www[.]areac-agr[.]com/cms/wp-content/uploads/2015/12/mdata[.]dat
  • http[:]//www[.]areac-agr[.]com/cms/wp-content/uploads/2015/12/r[.]vm
  • http[:]//www[.]areac-agr[.]com/cms/wp-content/uploads/2015/12/rdata[.]dat
  • http[:]//www[.]areac-agr[.]com/cms/wp-content/uploads/2015/12/sdata[.]dat

Remediation

  • Block all threat indicators at your respective controls.
  • Always be suspicious about emails sent by unknown senders.
  • Never click on the links/attachments sent by unknown senders.
  • Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.