• Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Alert – OUTLOOK VULNERABILITY Exploited by Threat Actors
July 4, 2019
Rewterz Threat Advisory – McAfee ePolicy Orchestrator Multiple Vulnerabilities
July 9, 2019

Rewterz Threat Alert – Godlua Backdoor abuses the DNS over HTTPS (DoH) protocol

July 5, 2019

Severity

Medium

Analysis Summary

Godlua is the first malware that abuses the DNS over HTTPS (DoH) protocol to protect its command and control infrastructure.

Godlua Backdoor has a redundant communication mechanism for C2 connection, a combination of hardcoded dns name, Pastebin.com, GitHub.com as well as DNS TXT are used to store the C2 address, “At the same time, it uses HTTPS to download Lua byte-code files, and uses DNS over HTTPS to get the C2 name to ensure secure communication between the bots, the Web Server and the C2.

Impact

DDoS

Indicators of Compromise

IP(s) / Hostname(s)

  • 198[.]204[.]231[.]250
  • 104[.]238[.]151[.]101
  • 43[.]224[.]225[.]220

URLs

  • https[:]//helegedada[.]github[.]io/test/test
  • https[:]//api[.]github[.]com/repos/helegedada/heihei
  • http[:]//198[.]204[.]231[.]250/linux-x64
  • http[:]//198[.]204[.]231[.]250/linux-x86
  • https[:]//dd[.]heheda[.]tk/i[.]jpg
  • https[:]//dd[.]heheda[.]tk/i[.]sh
  • https[:]//dd[.]heheda[.]tk/x86_64-static-linux-uclibc[.]jpg
  • https[:]//dd[.]heheda[.]tk/i686-static-linux-uclibc[.]jpg
  • https[:]//dd[.]cloudappconfig[.]com/i[.]jpg
  • https[:]//dd[.]cloudappconfig[.]com/i[.]sh
  • https[:]//dd[.]cloudappconfig[.]com/x86_64-static-linux-uclibc[.]jpg
  • https[:]//dd[.]cloudappconfig[.]com/arm-static-linux-uclibcgnueabi[.]jpg
  • https[:]//dd[.]cloudappconfig[.]com/i686-static-linux-uclibc[.]jpg
  • http[:]//d[.]cloudappconfig[.]com/i686-w64-mingw32/Satan[.]exe
  • http[:]//d[.]cloudappconfig[.]com/x86_64-static-linux-uclibc/Satan
  • http[:]//d[.]cloudappconfig[.]com/i686-static-linux-uclibc/Satan
  • http[:]//d[.]cloudappconfig[.]com/arm-static-linux-uclibcgnueabi/Satan
  • https[:]//d[.]cloudappconfig[.]com/mipsel-static-linux-uclibc/Satan

Malware Hash (MD5/SHA1/SH256)

  • 870319967dba4bd02c7a7f8be8ece94f
  • c9b712f6c347edde22836fb43b927633
  • 75902cf93397d2e2d1797cd115f8347a

Remediation

  • Block all threat indicators at your respective controls.
  • Keep updated patches on all critical and non-critical systems.
  • Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.