{"id":730,"date":"2020-01-15T11:39:17","date_gmt":"2020-01-15T10:39:17","guid":{"rendered":"https:\/\/lab52.io\/blog\/?p=730"},"modified":"2020-01-15T11:39:18","modified_gmt":"2020-01-15T10:39:18","slug":"apt-c-36-recent-activity-analysis","status":"publish","type":"post","link":"https:\/\/lab52.io\/blog\/apt-c-36-recent-activity-analysis\/","title":{"rendered":"APT-C-36 recent activity analysis"},"content":{"rendered":"\n<p>\nFrom Lab52 we have been tracking during the last\nmonths the activity of the group APT-C-36. This group was named and\npublicly introduced by the Company 360 [1] last year. In this article\nis highlighted as the main objective of the group, the companies\nlocated in Colombia. If you don\u2019t know APT-C-36, we recommend the\narticle mentioned [1] for more information.<\/p>\n\n\n\n<p>In\nJuly 2019 the company TrendMicro published an article related to\nanother group [2] that also seems to be focused on Colombia and some\n<strong>TTPs <\/strong>(<strong>T<\/strong>actics,\n<strong>T<\/strong>echniques\nand <strong>P<\/strong>rocedures)\noverlap with APT-C-36 although TrendMicro indicates that they don\u2019t\nconsider this group as an advanced.<\/p>\n\n\n\n<p>Lab52 has had access to different very recent spear-phishings and the following summary information has been obtained from the analysis of these mails:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li> This is a group that, as already mentioned in the articles [1] and [2], knows well the Spanish language. <\/li><li> They usually use different types of url shorteners in their mailings. The case of \u201ccort.as\u201d shortenner has caught our attention since it is a shortener from the Spanish newspaper &#8220;El Pais&#8221; that belongs to the \u201cPrisa Group\u201d very spread in Latin America. <\/li><li> We have also seen links to docs.google.com, mediafire and onedrive to download the samples inside some malspam emails. <\/li><li> Their most popular malware is LimeRAT, although many others have been found as indicated in the reports. VJWorm has also been seen recently with different techniques for exfiltration. <\/li><li> It has also been observed from some spear-phishings the exfiltration by Yopmail&#8217;s HTTPS webmail service. This coincides with the indications of TrendMicro <\/li><li> The most common dynamic domains seen are: <ol type=\"a\"><li> duckdns.]org <\/li><li> publicvm.]com <\/li><li> linkpc.]net  <\/li><\/ol><\/li><\/ul>\n\n\n\n<p>Since\nLab52 does not have enough information to be able to say that\neverything analyzed is a single group, it can only be said that these\nare different techniques used to attack a country.<\/p>\n\n\n\n<p>From this information, the infrastructure used by the attackers as command and control servers when executing the malware has been analyzed and the following graph has been obtained:<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"568\" height=\"575\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2020\/01\/image1.png\" alt=\"\" class=\"wp-image-731\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2020\/01\/image1.png 568w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2020\/01\/image1-296x300.png 296w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2020\/01\/image1-75x75.png 75w\" sizes=\"(max-width: 568px) 100vw, 568px\" \/><\/figure><\/div>\n\n\n\n<p>Three\nsets (clusters) of ip addresses have been identified and each one has\nsome characteristics:<\/p>\n\n\n\n<p><em><strong>Cluster\nA<\/strong><\/em> has the following\ncharacteristics:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>\nAll\n\tits infrastructure is geolocated in Colombia. All the IPs correspond\n\tto Colombian ISPs&#8217; IPs. This is perhaps one of the most outstanding\n\taspects.\n\t<\/li><li>\nDomains\n\tare reused and the ip to which it points is changed.\n\t<\/li><li>\nThis\n\tcluster only uses free \u201cduckdns.org\u201d domains.\n<\/li><\/ul>\n\n\n\n<p><em><strong>Cluster\nB<\/strong><\/em> has the following\ncharacteristics:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>\nIts\n\tinfrastructure is located in Colombia, Costa Rica and Panama. The\n\tgeolocated ip&#8217;s in the United States correspond to domains that have\n\tbeen &#8220;sinkholed&#8221;. By obtaining more information about the\n\tIPs, it can be seen how they are using a VPN service that allows\n\thaving geolocalized IPs in Colombia, Costa Rica and Panama. The\n\tservice is called &#8220;Powerhouse Management&#8221; (phmgmt[.]com).\n\tTherefore this cluster is not compromising infrastructure of\n\tColombian ISP clients, but is using this VPN service.\n\t<\/li><li>\nThis\n\tcluster is reusing domains and changing ip addresses a lot. They\n\thave a very short duration.\n\t<\/li><li>\nThis\n\tcluster uses as SLD linkpc.net and publicvm.com.\n\t<\/li><li>\nThis\n\tcluster coincides with part of the domains registered in the report\n\tof the Chinese company 360 on APT-C-36.\n<\/li><\/ul>\n\n\n\n<p><strong>Cluster\nC<\/strong> has the following\ncharacteristics:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>\nAll\n\tits infrastructure is geolocated in Colombia. All the IPs correspond\n\tto Colombian ISPs&#8217; IPs.\n\t<\/li><li>\nIn\n\tthis case many domains are used and few ip addresses. \n\t\n\t<\/li><li>\nThis\n\tcluster uses free domains duckdns.org.\n<\/li><\/ul>\n\n\n\n<p>Among\nthe domains used by these group\/s we highlight the domain:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>\n<strong>cobroserfinansa[.]com<\/strong>:\n\tThis domain has solved more than 150 different ip&#8217;s (157 exactly\n\twhen this report was made) where all of them have been located in\n\tColombia.\n<\/li><\/ul>\n\n\n\n<p>Another outstanding aspect from the infrastructure point of view is that the ip&#8217;s located in Colombia correspond with a high probability to ip&#8217;s of routers compromised by the attackers. Lab52 hypothesis is that attackers compromise routers with default credentials and use them as a frontend for their real command and control server. This fact has not been verified by Lab52, but has been observed as a common TTP for other groups. The routers seen, allow the use of the iptables command so automation by attackers for redirection is simple.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusions<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li> The attackers know well the language of the attacked country, Spanish, so it could be considered Spanish-speaking countries as the main options of attacking countries. This aspect has already been indicated in the other reports. From Lab52 we would reinforce this hypothesis by the use of a shortener \u201ccort.as\u201d. <\/li><li> The emails are well written and are almost always related to financial matters, specifically related to debt. <\/li><li> Currently, the attackers are not using malware developed by themselves and are using public malware projects such as LimeRAT. <\/li><li> Attackers are using high ports to communicate with command and control servers.  <\/li><li> Attackers are probably using multi-level command and control architectures to hide the main command and control server. As a first level, they have used until the moment: <ul><li> VPN services where Colombia, Panama and Costa Rica exist as an outgoing ip <\/li><li> Routers from ISP clients with default credentials or vulnerabilities. All these ISPs belong to Colombia.  <\/li><\/ul><\/li><li> Attackers use shorteners for links in emails. It is advisable to watch out for shortcuts belonging to the newspaper \u201cEl Pais\u201d. <\/li><li> Another option to the shorteners are links to file hosting services (google, mediafire, dropbox, etc.) <\/li><\/ul>\n\n\n\n<p> [1]\n<a href=\"https:\/\/ti.360.net\/blog\/articles\/apt-c-36-continuous-attacks-targeting-colombian-government-institutions-and-corporations-en\/\">https:\/\/ti.360.net\/blog\/articles\/apt-c-36-continuous-attacks-targeting-colombian-government-institutions-and-corporations-en\/<\/a><\/p>\n\n\n\n<p>[2]\n<a href=\"http:\/\/blog.la.trendmicro.com\/proyecto-rat-una-campana-de-spam-dirigida-a-entidades-colombianas-a-traves-del-servicio-de-correo-electronico-yopmail\/\">http:\/\/blog.la.trendmicro.com\/proyecto-rat-una-campana-de-spam-dirigida-a-entidades-colombianas-a-traves-del-servicio-de-correo-electronico-yopmail\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>From Lab52 we have been tracking during the last months the activity of the group APT-C-36. This group was named and publicly introduced by the Company 360 [1] last year. In this article is highlighted as the main objective of the group, the companies located in Colombia. If you don\u2019t know APT-C-36, we recommend the [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":735,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-730","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-uncategorised","8":"entry"},"featured_image_src":"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2020\/01\/lime.png","featured_image_src_square":"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2020\/01\/lime.png","author_info":{"display_name":"ml10","author_link":"https:\/\/lab52.io\/blog\/author\/ml10\/"},"_links":{"self":[{"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/posts\/730"}],"collection":[{"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/comments?post=730"}],"version-history":[{"count":3,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/posts\/730\/revisions"}],"predecessor-version":[{"id":736,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/posts\/730\/revisions\/736"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/media\/735"}],"wp:attachment":[{"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/media?parent=730"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/categories?post=730"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/tags?post=730"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}