{"id":9526,"date":"2019-11-09T01:08:39","date_gmt":"2019-11-09T01:08:39","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=9526"},"modified":"2026-04-17T18:07:51","modified_gmt":"2026-04-17T18:07:51","slug":"apt34-event-analysis-report","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/apt34-event-analysis-report\/","title":{"rendered":"APT34 Event Analysis Report"},"content":{"rendered":"<p><!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\"><br \/>\n<html><body><\/p>\n<h2><strong><a name=\"_Toc130115382\"><\/a><a name=\"_Toc6669485\"><\/a>1 Overview<\/strong><\/h2>\n<p>On April 18, 2019 a hacker\/hacker organization sold a toolkit of the APT34 group, under the false name of Lab Dookhtegan, on a Telegram channel. The organization also posted screenshots of the tool&#8217;s backend panels, where victim data had been collected. Early in the middle of March 2019, this hacker\/hacker organization had released and sold this toolkit on the Internet. Interestingly, the CEO of a security company in Kuwait took to Twitter to stress in particular the authenticity of this post.<!--more--><\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-1.jpg\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full wp-image-9527\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"534\" height=\"271\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-1.jpg 534w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-1-300x152.jpg 300w\" sizes=\"(max-width: 534px) 100vw, 534px\" \/><\/a><\/p>\n<p>Tools included in the leaked toolkit are listed as follows:<\/p>\n<ul>\n<li>Glimpse: a new trojan based on PowerShell, dubbed BondUpdater by Palo Alto Networks<\/li>\n<li>PoisonFrog: an old version of BondUpdater<\/li>\n<li>HyperShell<\/li>\n<li>HighShell: dubbed TwoFace by Palo Alto Networks<\/li>\n<li>MinionProject: Fox management interface with the HighShell module loaded<\/li>\n<li>Webmask: HTTP proxy hijacking tool, the main tool behind DNSpionage, used for DNS tunneling<\/li>\n<\/ul>\n<p>NSFOCUS Security Labs and NSFOCUS M01N Security Research Team made an analysis of this toolkit together and found that tools included in the leaked toolkit differed from the previously released attacks tools of the APT34 group. In this report, we have made a detailed analysis of the leaked tools from the perspectives of tactics, techniques and procedures (TTPs).<\/p>\n<h3><strong><a name=\"_Toc6669486\"><\/a>1.1 Distribution of Attack Targets by Industry<\/strong><\/h3>\n<p>In addition to countries in the Middle East, APT34 has also hit China Mainland, &Acirc;&nbsp;China Taiwan, Turkey, Albania, and other countries and regions. China Mainland and China Taiwan both received a large proportion of attacks.<\/p>\n<p>Through analysis, we have found 12 malicious WebShell files used to target China Energy Conservation and Environmental Protection Group, China Railway Construction Corporation, and Western Securities Co., Ltd. among other Chinese companies, as well as six such files used to be against companies in Hong Kong, Macao, and Taiwan.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-2.jpg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-9528\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-2.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"794\" height=\"195\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-2.jpg 794w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-2-300x74.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-2-768x189.jpg 768w\" sizes=\"(max-width: 794px) 100vw, 794px\" \/><\/a><\/p>\n<p>The released toolkit also contains a lot of passwords which are packaged and released in different archives according to information sources.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-3.jpg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-9529\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-3.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"697\" height=\"403\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-3.jpg 697w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-3-300x173.jpg 300w\" sizes=\"(max-width: 697px) 100vw, 697px\" \/><\/a><\/p>\n<p>From the above figure, we can see that the archive names contain airport names and oil company names. More than 12,000 weak passwords were disclosed this time.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-4.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9530\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-4.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"354\" height=\"473\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-4.jpg 354w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-4-225x300.jpg 225w\" sizes=\"(max-width: 354px) 100vw, 354px\" \/><\/a><\/p>\n<h3><strong><a name=\"_Toc6669487\"><\/a>1.2 About APT34<\/strong><\/h3>\n<p>The APT34 group, named by FireEye, uses tools and attack approaches that bear a high resemblance to the OilRig organization, an organization active in the Middle East followed up by Palo Alto Networks. The APT34 group started to carry out malicious activities as early as in 2014, targeting governments and the financial, energy, chemical, and telecom sectors. This group, though often seen in the Middle East, also hits China, as indicated in files leaked this time.<\/p>\n<p>On November 4, 2017, FireEye discovered that this group exploited the vulnerability (CVE-2017-11882) to launch attacks by leveraging tools similar to those leaked this time.<\/p>\n<h2><strong><a name=\"_Toc6669488\"><\/a>2 TTPs<\/strong><\/h2>\n<p>During the functional analysis of APT34&#8217;s leaked sample, we have ascertained the attack tactics and techniques used by this hacking group, via a reverse deduction based on attack procedures. Overall, four phases of the kill chain are involved: privilege escalation, collection, exfiltration, and command and control.<\/p>\n<p><strong>Privilege Escalation<\/strong><\/p>\n<p>This leaked sample uses multiple WebShell backdoor programs like HighShell, HyperShell, and MinionProject, each of which is a .NET program. Some of these programs encrypt the communications in order to evade defense measures. By reference to the tool use record documents included in the leaked files and the list of websites compromised by APT34, we can see that this hacking group mainly uses these WebShell programs, placed in \/owa\/auth\/, to target the Outlook email system of the Exchange server. This sample&#8217;s attack targets are found all around the world, including 14 enterprises in the energy and securities sectors in the Chinese mainland. By the time this report is released, some of those WebShell backdoor programs are still active.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-5.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9531\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-5.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"549\" height=\"142\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-5.jpg 549w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-5-300x78.jpg 300w\" sizes=\"(max-width: 549px) 100vw, 549px\" \/><\/a><\/p>\n<p>The following figure shows WebShell backdoors targeting companies in China:<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-6.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9532\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-6.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"522\" height=\"157\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-6.jpg 522w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-6-300x90.jpg 300w\" sizes=\"(max-width: 522px) 100vw, 522px\" \/><\/a><\/p>\n<p>The following table lists URLs of active WebShells:<\/p>\n<table width=\"556\">\n<thead>\n<tr>\n<td width=\"299\">WebShell<\/td>\n<td width=\"154\">Website<\/td>\n<td width=\"103\">Country\/Region<\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td width=\"299\">https:\/\/202.***.***.31\/owa\/auth\/signout.aspx<\/td>\n<td width=\"154\">rtarf.*****.th<\/td>\n<td width=\"103\">Thailand<\/td>\n<\/tr>\n<tr>\n<td width=\"299\">https:\/\/202.***.***.4\/owa\/auth\/signout.aspx<\/td>\n<td width=\"154\">rtarf.*****.th<\/td>\n<td width=\"103\">Thailand<\/td>\n<\/tr>\n<tr>\n<td width=\"299\">https:\/\/122.***.***.136\/owa\/auth\/error3.aspx<\/td>\n<td width=\"154\">mail.*****.com.tw<\/td>\n<td width=\"103\">Taiwan<\/td>\n<\/tr>\n<tr>\n<td width=\"299\">https:\/\/202.***.***.169\/owa\/auth\/signin.aspx<\/td>\n<td width=\"154\">*****.com{outlook}<\/td>\n<td width=\"103\"><\/td>\n<\/tr>\n<tr>\n<td width=\"299\">https:\/\/202.***.***.206\/owa\/auth\/signout.aspx<\/td>\n<td width=\"154\">wmail.*****.com<\/td>\n<td width=\"103\"><\/td>\n<\/tr>\n<tr>\n<td width=\"299\">https:\/\/213.***.***.51\/owa\/auth\/logon.aspx<\/td>\n<td width=\"154\">*****.gov.tr{outlook}<\/td>\n<td width=\"103\">Turkey<\/td>\n<\/tr>\n<tr>\n<td width=\"299\">https:\/\/1.***.***.13\/owa\/auth\/error1.aspx<\/td>\n<td width=\"154\">mail.*****.cn<\/td>\n<td width=\"103\">China<\/td>\n<\/tr>\n<tr>\n<td width=\"299\">https:\/\/1.***.***.14\/owa\/auth\/error1.aspx<\/td>\n<td width=\"154\">mail.*****.cn<\/td>\n<td width=\"103\">China<\/td>\n<\/tr>\n<tr>\n<td width=\"299\">https:\/\/114.***.***.1\/owa\/auth\/error1.aspx<\/td>\n<td width=\"154\">mail.generali-*****.cn<\/td>\n<td width=\"103\">China<\/td>\n<\/tr>\n<tr>\n<td width=\"299\">https:\/\/180.***.***.217\/owa\/auth\/error3.aspx<\/td>\n<td width=\"154\">exchange.*****.com.cn<\/td>\n<td width=\"103\">China<\/td>\n<\/tr>\n<tr>\n<td width=\"299\">https:\/\/180.***.***.230\/owa\/auth\/error1.aspx<\/td>\n<td width=\"154\">*****.com.cn<\/td>\n<td width=\"103\">China<\/td>\n<\/tr>\n<tr>\n<td width=\"299\">https:\/\/210.***.***.26\/owa\/auth\/error1.aspx<\/td>\n<td width=\"154\">lswebext.*****.com.cn<\/td>\n<td width=\"103\">China<\/td>\n<\/tr>\n<tr>\n<td width=\"299\">https:\/\/221.***.***.230\/owa\/auth\/outlook.aspx<\/td>\n<td width=\"154\">mail.*****.com.cn<\/td>\n<td width=\"103\">China<\/td>\n<\/tr>\n<tr>\n<td width=\"299\">https:\/\/222.***.***.8\/owa\/auth\/outlook.aspx<\/td>\n<td width=\"154\">mail.*****.com.cn<\/td>\n<td width=\"103\">China<\/td>\n<\/tr>\n<tr>\n<td width=\"299\">https:\/\/222.***.***.76\/owa\/auth\/error1.aspx<\/td>\n<td width=\"154\">*****.*****.com.cn<\/td>\n<td width=\"103\">China<\/td>\n<\/tr>\n<tr>\n<td width=\"299\">https:\/\/58.***.***.113\/owa\/auth\/error1.aspx<\/td>\n<td width=\"154\">mail.*****.com.cn<\/td>\n<td width=\"103\">China<\/td>\n<\/tr>\n<tr>\n<td width=\"299\">https:\/\/60.***.***.237\/owa\/auth\/error3.aspx<\/td>\n<td width=\"154\">*****.cn<\/td>\n<td width=\"103\">China<\/td>\n<\/tr>\n<tr>\n<td width=\"299\">https:\/\/60.***.***.237\/owa\/auth\/logoff.aspx<\/td>\n<td width=\"154\">*****.cn<\/td>\n<td width=\"103\">China<\/td>\n<\/tr>\n<tr>\n<td width=\"299\">https:\/\/202.***.***.218\/owa\/auth\/error1.aspx<\/td>\n<td width=\"154\">mail.*****.com<\/td>\n<td width=\"103\"><\/td>\n<\/tr>\n<tr>\n<td width=\"299\">https:\/\/202.***.***.218\/owa\/auth\/exppw.aspx<\/td>\n<td width=\"154\">mail.*****.com<\/td>\n<td width=\"103\"><\/td>\n<\/tr>\n<tr>\n<td width=\"299\">https:\/\/132.***.***.165\/owa\/auth\/logout.aspx<\/td>\n<td width=\"154\">CSEX.*****.technion.ac.il<\/td>\n<td width=\"103\">Israel<\/td>\n<\/tr>\n<tr>\n<td width=\"299\">https:\/\/132.***.***.165\/owa\/auth\/signout.aspx<\/td>\n<td width=\"154\">CSEX.csf.*****.ac.il<\/td>\n<td width=\"103\">Israel<\/td>\n<\/tr>\n<tr>\n<td width=\"299\">https:\/\/209.***.***.35\/owa\/auth\/logout.aspx<\/td>\n<td width=\"154\">mail.*****.co.zw<\/td>\n<td width=\"103\">Zimbabwe<\/td>\n<\/tr>\n<tr>\n<td width=\"299\">https:\/\/114.***.***.22\/owa\/auth\/login.aspx<\/td>\n<td width=\"154\">mail.******.ws<\/td>\n<td width=\"103\">Samoa<\/td>\n<\/tr>\n<tr>\n<td width=\"299\">https:\/\/114.***.***.3\/owa\/auth\/login.aspx<\/td>\n<td width=\"154\">mail.*****.ws<\/td>\n<td width=\"103\">Samoa<\/td>\n<\/tr>\n<tr>\n<td width=\"299\">https:\/\/185.***.***.199\/owa\/auth\/logout.aspx<\/td>\n<td width=\"154\">******.com.sa<\/td>\n<td width=\"103\">Saudi Arabia<\/td>\n<\/tr>\n<tr>\n<td width=\"299\">https:\/\/46.***.****.125\/owa\/auth\/signin.aspx<\/td>\n<td width=\"154\">*****.com.sa<\/td>\n<td width=\"103\">Saudi Arabia<\/td>\n<\/tr>\n<tr>\n<td width=\"299\">https:\/\/51.***.***.170\/owa\/auth\/owaauth.aspx<\/td>\n<td width=\"154\">*****.edu.sa<\/td>\n<td width=\"103\">Saudi Arabia<\/td>\n<\/tr>\n<tr>\n<td width=\"299\">https:\/\/91.***.***.155\/owa\/auth\/signin.aspx<\/td>\n<td width=\"154\">*****.gov.sa<\/td>\n<td width=\"103\">Saudi Arabia<\/td>\n<\/tr>\n<tr>\n<td width=\"299\">https:\/\/83.***.***.132\/owa\/auth\/logon.aspx<\/td>\n<td width=\"154\">mail.*****.com.ps{outlook}<\/td>\n<td width=\"103\">Palestine<\/td>\n<\/tr>\n<tr>\n<td width=\"299\">https:\/\/78.***.***.199\/owa\/auth\/logon.aspx<\/td>\n<td width=\"154\">*****.gov.qa{outlook}<\/td>\n<td width=\"103\">Qatar<\/td>\n<\/tr>\n<tr>\n<td width=\"299\">https:\/\/110.***.***.90\/owa\/auth\/errorff.aspx<\/td>\n<td width=\"154\">mail.fmis.*****.gov.kh<\/td>\n<td width=\"103\">Cambodia<\/td>\n<\/tr>\n<tr>\n<td width=\"299\">https:\/\/211.***.***.68\/owa\/auth\/error1.aspx<\/td>\n<td width=\"154\">mailexchange.*****.co.kr<\/td>\n<td width=\"103\">North Korea<\/td>\n<\/tr>\n<tr>\n<td width=\"299\">https:\/\/168.***.***.220\/owa\/auth\/error3.aspx<\/td>\n<td width=\"154\">mail.tc-*****.co<\/td>\n<td width=\"103\">Colombia<\/td>\n<\/tr>\n<tr>\n<td width=\"299\">https:\/\/213.***.***.221\/owa\/auth\/errorff.aspx<\/td>\n<td width=\"154\">*****.gov.kw<\/td>\n<td width=\"103\">Kuwait<\/td>\n<\/tr>\n<tr>\n<td width=\"299\">https:\/\/77.***.***.125\/owa\/auth\/logout.aspx<\/td>\n<td width=\"154\">{ul.*****.lb}<\/td>\n<td width=\"103\">Lebanon<\/td>\n<\/tr>\n<tr>\n<td width=\"299\">https:\/\/202.***.***.11\/owa\/auth\/error1.aspx<\/td>\n<td width=\"154\">webmail.*****.com.mo<\/td>\n<td width=\"103\">Macao<\/td>\n<\/tr>\n<tr>\n<td width=\"299\">https:\/\/202.***.***.141\/owa\/auth\/error3.aspx<\/td>\n<td width=\"154\">*****.must.edu.mo<\/td>\n<td width=\"103\">Macao<\/td>\n<\/tr>\n<tr>\n<td width=\"299\">https:\/\/213.***.***.73\/owa\/auth\/error4.aspx<\/td>\n<td width=\"154\">ad.*****.eg{shell}<\/td>\n<td width=\"103\">Egypt<\/td>\n<\/tr>\n<tr>\n<td width=\"299\">https:\/\/200.***.***.13\/owa\/auth\/error3.aspx<\/td>\n<td width=\"154\">sre.*****.mx<\/td>\n<td width=\"103\">Mexico<\/td>\n<\/tr>\n<tr>\n<td width=\"299\">https:\/\/202.***.***.68\/owa\/auth\/error0.aspx<\/td>\n<td width=\"154\">mfa.*****.mn<\/td>\n<td width=\"103\">Myanmar<\/td>\n<\/tr>\n<tr>\n<td width=\"299\">https:\/\/202.***.***.68\/owa\/auth\/error1.aspx<\/td>\n<td width=\"154\">mifa.*****.mn<\/td>\n<td width=\"103\">Myanmar<\/td>\n<\/tr>\n<tr>\n<td width=\"299\">https:\/\/197.***.***.10\/owa\/auth\/logout.aspx<\/td>\n<td width=\"154\">mail.*****.gov.ng<\/td>\n<td width=\"103\">Nigeria<\/td>\n<\/tr>\n<tr>\n<td width=\"299\">https:\/\/41.***.***.221\/owa\/auth\/logout.aspx<\/td>\n<td width=\"154\">mail.*****.gov.ng<\/td>\n<td width=\"103\">Nigeria<\/td>\n<\/tr>\n<tr>\n<td width=\"299\">https:\/\/mail.*****.ae\/owa\/auth\/change_password.aspx<\/td>\n<td width=\"154\">mail.*****.ae<\/td>\n<td width=\"103\">United Arab Emirates<\/td>\n<\/tr>\n<tr>\n<td width=\"299\">https:\/\/mail.*****.com.sa\/owa\/auth\/GetLoginToken.aspx<\/td>\n<td width=\"154\">mail.*****.com.sa<\/td>\n<td width=\"103\">Saudi Arabia<\/td>\n<\/tr>\n<tr>\n<td width=\"299\">https:\/\/webmail.*****.bh\/owa\/auth\/Timeoutctl.aspx<\/td>\n<td width=\"154\">webmail.*****.bh<\/td>\n<td width=\"103\">Bahrain<\/td>\n<\/tr>\n<tr>\n<td width=\"299\">https:\/\/webmail.*****.bh\/owa\/auth\/EventClass.aspx<\/td>\n<td width=\"154\">webmail.*****.bh<\/td>\n<td width=\"103\">Bahrain<\/td>\n<\/tr>\n<tr>\n<td width=\"299\">https:\/\/webmail.*****.bh\/ecp\/auth\/EventClass.aspx<\/td>\n<td width=\"154\">webmail.*****.bh<\/td>\n<td width=\"103\">Bahrain<\/td>\n<\/tr>\n<tr>\n<td width=\"299\">http:\/\/*****.ae:8080\/_layouts\/WrkStatLog.aspx<\/td>\n<td width=\"154\">*****.ae<\/td>\n<td width=\"103\">United Arab Emirates<\/td>\n<\/tr>\n<tr>\n<td width=\"299\">https:\/\/www.*****.jo\/statistic.aspx<\/td>\n<td width=\"154\">www.*****.jo<\/td>\n<td width=\"103\">Jordan<\/td>\n<\/tr>\n<tr>\n<td width=\"299\">https:\/\/e-*****.al\/dptaktkonstatim.aspx<\/td>\n<td width=\"154\">e-*****.al<\/td>\n<td width=\"103\">Albania<\/td>\n<\/tr>\n<tr>\n<td width=\"299\">https:\/\/webmail.*****.ae\/owa\/auth\/RedirSuiteService.aspx<\/td>\n<td width=\"154\">webmail.*****.ae<\/td>\n<td width=\"103\">United Arab Emirates<\/td>\n<\/tr>\n<tr>\n<td width=\"299\">https:\/\/webmail.*****.ae\/owa\/auth\/handlerservice.aspx<\/td>\n<td width=\"154\">webmail.*****.ae<\/td>\n<td width=\"103\">United Arab Emirates<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><strong>Collection<\/strong><\/p>\n<p>Our Webmask analysis of this leaked sample mainly focuses on attacks against Outlook. Through the analysis, we found that such attacks used the email connection and man-in-the-browser (MITB) technologies. Also, we dissected the sample&#8217;s source code and instructions and discovered that this tool could steal users&#8217; email account passwords and cookies for Outlook authentication as well as inject code into traffic for further information collection.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-7.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9533\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-7.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"693\" height=\"572\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-7.jpg 693w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-7-300x248.jpg 300w\" sizes=\"(max-width: 693px) 100vw, 693px\" \/><\/a><\/p>\n<p><strong>Exfiltration<\/strong><\/p>\n<p>In this phase, the Exfiltration Over Command and Control Channel tactic is applied. The attacker sends sensitive data to the controlled server using a DNS protocol through command and control, in a way to avoid information disclosure due to common data loss prevention techniques.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-8.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9534\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-8.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"672\" height=\"321\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-8.jpg 672w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-8-300x143.jpg 300w\" sizes=\"(max-width: 672px) 100vw, 672px\" \/><\/a><\/p>\n<p><strong>Command and Control<\/strong><\/p>\n<p>The leaked sample used two remote access Trojans (RATs), <strong>poisonfrog.ps1 <\/strong>(old version) and Glimpse (<strong>dns_main.ps1<\/strong>) (new version), for remote control of the target server by using a DNS protocol for communication.<\/p>\n<p>After a sample analysis, we found that both versions of RATs used PowerShell as an agent for code execution, and prior to that, the RATs needed to hijack the victim&#8217;s DNS server for DNS redirection in order to parse the domain name suffix designated by the attacker. By generating a subdomain with a specific algorithm, the victim&#8217;s machine performs a DNS query to request an A\/TXT record of the subdomain from the DNS server (C2 server) and obtains the IP address provided by the C2 server for communications. In addition, the attacker will create a scheduled task to execute the PowerShell script regularly to obtain information from the C2 server before executing commands. The C2 server mainly provides command execution and file upload and download functions.<\/p>\n<p>The C2 server of the old version already implements proxy detection and can download files from the remote server for web proxy configuration. The old version only supports the query of DNS A records and generates subdomain names that contain part of the UUID (Universally Unique Identifier) value of the victim&#8217;s system.<\/p>\n<p>The C2 server of the new version does not involve proxy configuration and deems that the DNS hijacking is already completed. It can parse DNS TXT records and generate subdomain names that do not contain the UUID value of the victim&#8217;s system.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-9.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9535\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-9.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"498\" height=\"279\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-9.jpg 498w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-9-300x168.jpg 300w\" sizes=\"(max-width: 498px) 100vw, 498px\" \/><\/a><\/p>\n<h2><strong><a name=\"_Toc6669489\"><\/a>3 Trojan and WebShell Analysis<\/strong><\/h2>\n<p>The following figures show the directory structure of each tool used by this leaked sample:<\/p>\n<p>Glimpse:<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-10.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9536\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-10.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"266\" height=\"238\"><\/a><\/p>\n<p>PoisonFrog:<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-11.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9537\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-11.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"363\" height=\"379\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-11.jpg 363w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-11-287x300.jpg 287w\" sizes=\"(max-width: 363px) 100vw, 363px\" \/><\/a><\/p>\n<p>Webmask:<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-12.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9538\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-12.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"293\" height=\"177\"><\/a><\/p>\n<p>Webshells_and_Panel:<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-13.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9539\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-13.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"487\" height=\"43\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-13.jpg 487w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-13-300x26.jpg 300w\" sizes=\"(max-width: 487px) 100vw, 487px\" \/><\/a><\/p>\n<p>When sorting out files and trying to reproduce the sample, we found that remote control tools had an incomplete logic which renders one-click deployment impossible. These tools can run properly only after an analysis and reconfiguration is completed. MinionProject, however, cannot directly execute due to the lack of files.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-14.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9540\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-14.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"567\" height=\"212\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-14.jpg 567w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-14-300x112.jpg 300w\" sizes=\"(max-width: 567px) 100vw, 567px\" \/><\/a><\/p>\n<p>To sum up, we believe that the leaked toolkit is incomplete, which should be noted during analysis of the toolkit. So far, no backdoor is discovered left by the leaker.<\/p>\n<h3><strong><a name=\"_Toc6669490\"><\/a>3.1 Glimpse<\/strong><\/h3>\n<p>Glimpse is a remote control tool that uses DNS tunneling. It consists of an agent, a panel, and a server.<\/p>\n<h4><strong>3.1.1 Agent<\/strong><\/h4>\n<p>The agent is a program at the controlled end.<\/p>\n<ul>\n<li><strong>Major Functions<\/strong><\/li>\n<\/ul>\n<p>The startup script is <strong>runner_.vbs<\/strong> which is used to start the main script of PowerShell.<\/p>\n<p>The main script is <strong>dns_main.ps1<\/strong> used for communications with the server.<\/p>\n<ul>\n<li><strong>File-related Operations<\/strong><\/li>\n<\/ul>\n<p>The program generates the directory <strong>PUBLIC\\Libraries\\guid\\<\/strong> (hereinafter referred to as the agent directory in which guid is generated by <strong>Dns_main.ps1<\/strong>) and creates folders in this directory like <strong>receivebox<\/strong>, <strong>sendbox<\/strong>, and <strong>done<\/strong> to communicate with the server by reading or writing into files in these folders.<\/p>\n<ul>\n<li><strong>Communication Process<\/strong><\/li>\n<\/ul>\n<ol>\n<li>The agent can communicate with the server through the ping mode (DNS A mode) or text mode (DNS TXT mode). Commands received by the agent from the server are saved as files with RCVD as the file name prefix in the <strong>\\receivebox\\ <\/strong>directory of the agent.<\/li>\n<li>Check the commands from the server and perform the related behavior.<\/li>\n<\/ol>\n<p>The following table lists commands from the server.<\/p>\n<table width=\"529\">\n<thead>\n<tr>\n<td width=\"101\">Trailing Byte of a Command File Name<\/td>\n<td width=\"123\">Meaning<\/td>\n<td width=\"296\">Operation<\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td width=\"101\">0<\/td>\n<td width=\"123\">Executing commands issued by the server<\/td>\n<td width=\"296\">Reads contents from the command file, executes them as CMD commands, and saves the command output as a file with <strong>proc<\/strong> as the file name prefix in the agent directory, <strong>\\sendbox<\/strong>.<\/td>\n<\/tr>\n<tr>\n<td width=\"101\">1<\/td>\n<td width=\"123\">Uploading a file<\/td>\n<td width=\"296\">Places the file designated in the body of the command file in the agent directory <strong>\\sendbox<\/strong> and sends this file to the C&amp;C server.<\/td>\n<\/tr>\n<tr>\n<td width=\"101\">Others<\/td>\n<td width=\"123\">Downloading a file<\/td>\n<td width=\"296\">Places the command file in the agent directory <strong>\\done<\/strong>.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<ol start=\"3\">\n<li>After executing commands issued by the server, the agent will send the file saved in the agent directory <strong>\\sendbox<\/strong> to the server.<\/li>\n<\/ol>\n<h4><strong>3.1.2 Panel<\/strong><\/h4>\n<p>The panel is the graphic panel of Glimpse, used to manage the communications between the agent and the server.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-15.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9541\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-15.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"507\" height=\"281\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-15.jpg 507w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-15-300x166.jpg 300w\" sizes=\"(max-width: 507px) 100vw, 507px\" \/><\/a><\/p>\n<h4><strong>3.1.3 Server<\/strong><\/h4>\n<p>The server issues commands to the agent, instructing it what to do next.<\/p>\n<ul>\n<li><strong>Major Functions<\/strong><\/li>\n<\/ul>\n<p>The server uses a DNS tunneling protocol for communications, issuing commands to the agent or receiving files uploaded by the agent via the DNS tunnel of the A or TXT type.<\/p>\n<ul>\n<li><strong>File-related Operations<\/strong><\/li>\n<\/ul>\n<p>The program generates the directory <strong>ALLUSERSPROFILE\/Glimpse\/dns\/aid\/<\/strong> (hereinafter referred to as the server directory in which <strong>aid<\/strong> indicates the guid ID received from the agent) and then creates folders like <strong>wait<\/strong>, <strong>receive<\/strong>, <strong>done<\/strong>, <strong>sended<\/strong>, and <strong>sending<\/strong> in this directory to communicate with the agent by reading or writing into files in those folders.<\/p>\n<ul>\n<li><strong>Communication Process<\/strong><\/li>\n<\/ul>\n<ol>\n<li>Receives false DNS requests from the agent.<\/li>\n<li>Parses information received from the agent by using local rules.<\/li>\n<\/ol>\n<p>For a false DNS request, the contents are in the format of data.mainData.mainData2.mainData3, each part of which contains different contents.<\/p>\n<p><strong>Data<\/strong><\/p>\n<table width=\"529\">\n<thead>\n<tr>\n<td width=\"89\">0&acirc;&euro;&ldquo;14<\/td>\n<td width=\"64\">15&acirc;&euro;&ldquo;n<\/td>\n<td width=\"64\">n+1<\/td>\n<td width=\"105\">n+2<\/td>\n<td width=\"104\">n+3<\/td>\n<td width=\"48\">n+4<\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td width=\"89\">dataRand<\/td>\n<td width=\"64\">Unknown<\/td>\n<td width=\"64\">C<\/td>\n<td width=\"105\">reqNoIndex<\/td>\n<td width=\"104\">actionIndex<\/td>\n<td width=\"48\">T<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>If the data contains the trailing string CxxT (x indicates arbitrary characters), the server determines that the data is based on a tunneling protocol.<\/p>\n<p>If the data contains the trailing string in other formats than CxxT, the server forwards the data.<\/p>\n<p><strong>datarand<\/strong>: records the action and aid. The data location is variable and determined by both reqNoIndex and actionIndex.<\/p>\n<p><strong>aid<\/strong>: ID of the packet, based on which the server directory is generated on the server.<\/p>\n<p><strong>action<\/strong>: action of the agent.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-16.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9542\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-16.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"532\" height=\"154\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-16.jpg 532w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-16-300x87.jpg 300w\" sizes=\"(max-width: 532px) 100vw, 532px\" \/><\/a><\/p>\n<table width=\"529\">\n<thead>\n<tr>\n<td width=\"109\">Value of the action Field<\/td>\n<td width=\"410\">Operation<\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td width=\"109\">M<\/td>\n<td width=\"410\">The agent checks the <strong>mode<\/strong> folder in the specific directory and handles ping information.<\/td>\n<\/tr>\n<tr>\n<td width=\"109\">W<\/td>\n<td width=\"410\">The server, in the DNS TXT manner, merges the contents in the <strong>wait<\/strong> folder in the server directory and sends them.<\/td>\n<\/tr>\n<tr>\n<td width=\"109\">D<\/td>\n<td width=\"410\">The server sends the contents in the <strong>wait<\/strong> folder in the server directory as fragments in DNS TXT manner.<\/td>\n<\/tr>\n<tr>\n<td width=\"109\">0<\/td>\n<td width=\"410\">The server disguises names of files in the <strong>wait<\/strong> folder as IP strings and sends them to the agent.<\/td>\n<\/tr>\n<tr>\n<td width=\"109\">1<\/td>\n<td width=\"410\">The server sends files in the <strong>wait<\/strong> folder as fragments to the agent in DNS A manner.<\/td>\n<\/tr>\n<tr>\n<td width=\"109\">2<\/td>\n<td width=\"410\">The server receives files by fragment from the agent in DNS A manner and saves them in the <strong>part<\/strong> folder.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>mainData<\/strong>: saves the body of the command file.<\/p>\n<p><strong>mainData2<\/strong>: saves the command file name.<\/p>\n<p><strong>mainData3<\/strong>: saves the domain name of the C&amp;C server.<\/p>\n<ul>\n<li><strong>Tunnel Format<\/strong><\/li>\n<\/ul>\n<p>The server is a forged DNS server which responds to the agent&#8217;s DNS requests by returning designated IP strings. Different IP strings have different meanings, as shown in the following table.<\/p>\n<table width=\"529\">\n<thead>\n<tr>\n<td>IP String<\/td>\n<td>Meaning<\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>99.250.250.199<\/td>\n<td>The server responds to a new agent and creates a session.<\/td>\n<\/tr>\n<tr>\n<td>199.250.250.99<\/td>\n<td>The server responds to the ping information of the agent.<\/td>\n<\/tr>\n<tr>\n<td>3.2.1.0<\/td>\n<td>The server has files to be sent.<\/td>\n<\/tr>\n<tr>\n<td>24.125.a.b<\/td>\n<td>A file named <strong>a+b<\/strong> waits to be sent by the server.<\/td>\n<\/tr>\n<tr>\n<td>11.24.237.110<\/td>\n<td>There are files to be sent by the server.<\/td>\n<\/tr>\n<tr>\n<td>a.b.c.d<\/td>\n<td>The server sends fragments as DNS A records. In this IP string, <strong>a.b.c<\/strong> indicates the data contents and <strong>d<\/strong> indicates the data index.<\/td>\n<\/tr>\n<tr>\n<td>1.2.3.0<\/td>\n<td>Fragments are sent by the server.<\/td>\n<\/tr>\n<tr>\n<td>a.2.3.b<\/td>\n<td>The server is receiving fragments from the agent. In this IP string, <strong>a<\/strong> indicates the agent ID and <strong>b<\/strong> indicates the fragment ID.<\/td>\n<\/tr>\n<tr>\n<td>253.25.42.87<\/td>\n<td>The server has received fragments from the agent.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<h3><strong><a name=\"_Toc6669491\"><\/a>3.2 PoisonFrog<\/strong><\/h3>\n<ul>\n<li><strong>Major Functions<\/strong><\/li>\n<\/ul>\n<p>PoisonFrog is a remote control tool that can steal information from the controlled server and execute CMD commands issued by the C&amp;C server.<\/p>\n<ul>\n<li><strong>Operation Process<\/strong><\/li>\n<\/ul>\n<ol>\n<li>The <strong>ps1<\/strong> script executes to release the <strong>hUpdater.ps1<\/strong> and <strong>dUpdater.ps1<\/strong> scripts and the <strong>UpdateTask.vbs<\/strong> script as well as set Windows scheduled tasks.<\/li>\n<li>The <strong>ps1<\/strong> script accesses the C&amp;C domain and uploads and downloads files as instructed by commands issued via the domain.<\/li>\n<li>The <strong>ps1<\/strong> script identifies the trailing character of the name of the file downloaded from the C&amp;C server as the command and operates on files in the specified directory as instructed by this command.<\/li>\n<li>As a scheduled task, the <strong>vbs<\/strong> script is set to execute every 10 minutes.<\/li>\n<\/ol>\n<p>The following figure shows part of contents of the <strong>poisonfrog.ps1<\/strong> script.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-17.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9543\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-17.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"754\" height=\"125\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-17.jpg 754w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-17-300x50.jpg 300w\" sizes=\"(max-width: 754px) 100vw, 754px\" \/><\/a><\/p>\n<ul>\n<li><strong>Component Analysis<\/strong><\/li>\n<\/ul>\n<p><strong>hUpdater.ps1<\/strong><\/p>\n<p>This script is mainly used to send data to the C&amp;C server and receive commands and files from this server.<\/p>\n<p>When <strong>cfg.ini<\/strong> exists, the <strong>hUpdater.ps1<\/strong> script will read contents from this file to extract the proxy and communicate with the C&amp;C server in proxy mode.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-18.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9544\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-18.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"547\" height=\"264\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-18.jpg 547w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-18-300x145.jpg 300w\" sizes=\"(max-width: 547px) 100vw, 547px\" \/><\/a><\/p>\n<p>As for command format parsing, the <strong>hUpdater.ps1<\/strong> script obtains strings from the C&amp;C server and splits them into four or more arrays with angle brackets. SSA[0]&lt;&gt;SSA[1]&lt;&gt;SSA[2]&lt;&gt;SSA[3]&lt;&gt;SSA[4]&lt;&gt;SSA[5] is such an example. In the string, each array corresponds to a different response function. For instance, when SSA[2] has a value other than <strong>not<\/strong>, it downloads files to a specified directory. The following table describes functions of these arrays.<\/p>\n<table width=\"529\">\n<thead>\n<tr>\n<td width=\"89\">Command<\/td>\n<td width=\"461\">Description<\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td width=\"89\">SSA[0]<\/td>\n<td width=\"461\">When SSA[0] has a value other than <strong>not<\/strong>, upload the file named <strong>SSA[0]<\/strong> to the URI <strong>\/fil\/<em>domain name<\/em>\/SSA[0]<\/strong> and then delete the original file.<\/td>\n<\/tr>\n<tr>\n<td width=\"89\">SSA[1]<\/td>\n<td width=\"461\">When SSA[1] has a value other than <strong>not<\/strong>, it uploads strings to a specified URL. SSA[1] code has been commented out.<\/td>\n<\/tr>\n<tr>\n<td width=\"89\">SSA[2]<\/td>\n<td width=\"461\">When SSA[0] has a value other than <strong>not<\/strong>, download the file under <strong>\/fil\/SSA[3] <\/strong>to the local directory C:\/&#8230;.\/SSA[0]\/SSA[2].<\/td>\n<\/tr>\n<tr>\n<td width=\"89\">SSA[4]<\/td>\n<td width=\"461\">When SSA[4] has a value other than <strong>not<\/strong>, upload the SSA[4] file to <strong>\/fil\/<em>domain name<\/em>\/SSA[0]<\/strong>.<\/td>\n<\/tr>\n<tr>\n<td width=\"89\">SSA[5]<\/td>\n<td width=\"461\">When the array length is 2, continue to perform operations within the loop.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-19.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9545\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-19.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"548\" height=\"341\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-19.jpg 548w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-19-300x187.jpg 300w\" sizes=\"(max-width: 548px) 100vw, 548px\" \/><\/a><\/p>\n<p><strong>dUpdater.ps1<\/strong><\/p>\n<p>The <strong>dUpdater.ps1<\/strong> script parses the trailing character in the file name located first during the traversal of the <strong>receivebox<\/strong> folder, as a command. The following table describes the mapping between commands and the script&#8217;s functions.<\/p>\n<table width=\"529\">\n<thead>\n<tr>\n<td width=\"102\">Command<\/td>\n<td width=\"448\">Description<\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td width=\"102\">0<\/td>\n<td width=\"448\">The <strong>dUpdater.ps1<\/strong> script parses the contents in the <strong>ZZA[0]<\/strong> file in the <strong>receivebox<\/strong> folder and writes the contents into the<strong> ZZA[0]<\/strong> file in the <strong>sendbox<\/strong> directory. If the <strong>ZZA[0]<\/strong> file exists in the <strong>receivebox<\/strong> folder, this script will delete this file.<\/td>\n<\/tr>\n<tr>\n<td width=\"102\">1<\/td>\n<td width=\"448\">If the contents in the <strong>ZZA[0]<\/strong> file in the <strong>receivebox<\/strong> folder is parsed as a file path, the <strong>dUpdater.ps1<\/strong> script copies this file to the <strong>sendbox<\/strong> directory and then deletes the <strong>ZZA[0]<\/strong> file in the <strong>receivebox<\/strong> folder.<\/p>\n<p>&nbsp;<\/td>\n<\/tr>\n<tr>\n<td width=\"102\">2<\/td>\n<td width=\"448\">The <strong>dUpdater.ps1<\/strong> script moves the<strong> ZZA[0]<\/strong> file in the <strong>receivebox <\/strong>folder to the <strong>done\/<\/strong> directory and types <strong>200&lt;&gt;<\/strong> plus <em>the path of the done\/ directory<\/em> as the content of this file and then deletes the <strong>ZZA[0] file<\/strong> in the <strong>receivebox <\/strong>folder.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-20.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9546\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-20.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"685\" height=\"459\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-20.jpg 685w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-20-300x201.jpg 300w\" sizes=\"(max-width: 685px) 100vw, 685px\" \/><\/a><\/p>\n<p><strong>Server-Side Scripts<\/strong><\/p>\n<p>The scripts are used to assemble commands (e.g. SSA[0]&lt;&gt;SSA[1]&lt;&gt;SSA[2]&lt;&gt;SSA[3]&lt;&gt;SSA[4]&lt;&gt;SSA[5]) and store data. Each function has its own function.<\/p>\n<table width=\"529\">\n<thead>\n<tr>\n<td width=\"220\">Function<\/td>\n<td width=\"300\">Description<\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td width=\"220\">Panel<\/td>\n<td width=\"300\">Serves as a control panel.<\/td>\n<\/tr>\n<tr>\n<td width=\"220\">NotFount<\/td>\n<td width=\"300\">Notifies the log-in user of the login failure.<\/td>\n<\/tr>\n<tr>\n<td width=\"220\">Posted<\/td>\n<td width=\"300\">Issues commands from the agent panel to upload and download files.<\/td>\n<\/tr>\n<tr>\n<td width=\"220\">Deletecommand<\/td>\n<td width=\"300\">Deletes commands from the database.<\/td>\n<\/tr>\n<tr>\n<td width=\"220\">Deleteagent<\/td>\n<td width=\"300\">Deletes the agent and its related files.<\/td>\n<\/tr>\n<tr>\n<td width=\"220\">Descriptionposted<\/td>\n<td width=\"300\">Describes information returned by the server.<\/td>\n<\/tr>\n<tr>\n<td width=\"220\">Fileposted<\/td>\n<td width=\"300\">Sends files to the <strong>receive<\/strong> folder on the server.<\/td>\n<\/tr>\n<tr>\n<td width=\"220\">Agent<\/td>\n<td width=\"300\">Creates the <strong>receive<\/strong>, <strong>send<\/strong>, and <strong>wait<\/strong> folders in each <strong>agentID<\/strong> folder and stores files that contain commands in such folders and writes commands into the database.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<h3><strong><a name=\"_Toc6669492\"><\/a>3.3 WebMask<\/strong><\/h3>\n<p>This tool is used by the APT34 group as a DNS proxy and for HTTP hijacking.<\/p>\n<ul>\n<li>Major Functions<\/li>\n<\/ul>\n<p>This tool consists of three parts:<\/p>\n<ul>\n<li>Shell script <strong>sh<\/strong>: used for installation<\/li>\n<li><strong>py<\/strong>: used to steal passwords and for hijacking<\/li>\n<li><strong>py<\/strong>, <strong>dnsd.js<\/strong>, and <strong>config.json<\/strong>: used to configure the local DNS proxy\n<ul>\n<li>Component Analysis<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>DNSd Module<\/p>\n<p>This module starts the local DNS proxy. The configuration file and the IP address of the proxy server are specified with startup parameters. By default, the script only does DNS forwarding.<\/p>\n<p>The DNSd module can be started using the python script (<strong>dnsd.py<\/strong>) or JavaScript (<strong>dnsd.js<\/strong>).<\/p>\n<p><strong>guide.txt<\/strong> explains two way to use the DNSd tool.<\/p>\n<ol>\n<li><strong>py<\/strong> is used as a transparent proxy.<\/li>\n<\/ol>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-21.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9547\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-21.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"439\" height=\"211\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-21.jpg 439w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-21-300x144.jpg 300w\" sizes=\"(max-width: 439px) 100vw, 439px\" \/><\/a><\/p>\n<ol start=\"2\">\n<li>The native-dns module is used as a DNS proxy. As shown in the following figure, 195.229.237.52 is the IP address of a DNS server in the United Arab Emirates and 185.162.235.106 is a bot IP address used as an example.<\/li>\n<\/ol>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-22.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9548\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-22.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"487\" height=\"249\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-22.jpg 487w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-22-300x153.jpg 300w\" sizes=\"(max-width: 487px) 100vw, 487px\" \/><\/a><\/p>\n<p><strong>Icap Module<\/strong><\/p>\n<p>This module is a tool written in PyICAP. PyICAP is a python3 framework for writing ICAP servers. ICAP is usually used to extend transparent proxy servers, implementing content filters in the transparent HTTP proxy cache and performing specific services (can be specified by developers) for HTTP requests\/responses.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-23.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9549\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-23.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"526\" height=\"275\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-23.jpg 526w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-23-300x157.jpg 300w\" sizes=\"(max-width: 526px) 100vw, 526px\" \/><\/a><\/p>\n<p>The extract_login_password method is used to steal account passwords included in HTTP information and record them in a designated file. It extracts data in HTTP requests using regular expressions.<\/p>\n<p>Meanwhile, this tool records header information involved in HTTP interactions, including the user&#8217;s IP address, request time, requested content, and recorded cookies. When analyzing the tool code, we found hijacking code, i.e., the following JavaScript statement:<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-24.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9550\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-24.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"951\" height=\"37\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-24.jpg 951w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-24-300x12.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-24-768x30.jpg 768w\" sizes=\"(max-width: 951px) 100vw, 951px\" \/><\/a><\/p>\n<p>When the hijacking code executes, the first img src leads the victim&#8217;s machine to access <strong>logo.jpg<\/strong> on the attacker&#8217;s server. During the process, NTLM authentication will be conducted automatically to allow the attacker to obtain the NetNTLMv2 hash which can be used for man-in-the-middle (MITM) attacks.<\/p>\n<p>Assume that the attacker has taken control of the proxy. In this case, he can use his server to respond to DNS requests to WPAD, and then answer requests to obtain images that are actually PAC files.<\/p>\n<h3><strong><a name=\"_Toc6669493\"><\/a>3.4 Webshells_and_Panel<\/strong><\/h3>\n<p>The Webshells_and_Panel directory contains multiple WebShell tools written in C#:<\/p>\n<p><strong>simpleDownload.aspx<\/strong>: a simple tool only with the upload function.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-25.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9551\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-25.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"434\" height=\"135\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-25.jpg 434w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-25-300x93.jpg 300w\" sizes=\"(max-width: 434px) 100vw, 434px\" \/><\/a><\/p>\n<p><strong>simple.aspx<\/strong>: a relatively complicated tool to provide authentication and command execution functions besides the upload function.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-26.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9552\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-26.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"516\" height=\"252\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-26.jpg 516w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-26-300x147.jpg 300w\" sizes=\"(max-width: 516px) 100vw, 516px\" \/><\/a><\/p>\n<p><strong>highshell.aspx<\/strong>: a full-featured tool that seems like the first version, providing functions like file upload, command execution, and database manipulation. This version of tool was reported by Palo Alto Networks in 2017.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-27.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9553\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-27.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"734\" height=\"325\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-27.jpg 734w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-27-300x133.jpg 300w\" sizes=\"(max-width: 734px) 100vw, 734px\" \/><\/a><\/p>\n<p>This tool implements login authentication as follows:<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-28.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9554\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-28.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"866\" height=\"110\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-28.jpg 866w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-28-300x38.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-28-768x98.jpg 768w\" sizes=\"(max-width: 866px) 100vw, 866px\" \/><\/a><\/p>\n<p>The following shows how login authentication is implemented via pseudocode:<\/p>\n<p>Base64(sha256(bytes(cookies[&acirc;&euro;&oelig;p&acirc;&euro;] + salt))) == pp<\/p>\n<p>Both <strong>salt<\/strong> and <strong>pp<\/strong> are predefined values.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-29.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9555\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-29.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"740\" height=\"94\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-29.jpg 740w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-29-300x38.jpg 300w\" sizes=\"(max-width: 740px) 100vw, 740px\" \/><\/a><\/p>\n<p>The configured cookie value can be used for authentication.<\/p>\n<p>In addition, we have found multiple upgraded versions (minor differences exists between them) of HighShell in the Hypershell directory. The following figure shows HighShell 8.6.2.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-30.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9556\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-30.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"508\" height=\"277\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-30.jpg 508w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1109-30-300x164.jpg 300w\" sizes=\"(max-width: 508px) 100vw, 508px\" \/><\/a><\/p>\n<p>This version of tool is rewritten with the Semantic UI framework and its backend has been split into several modules. Arguably, this version goes further in engineering than common versions. Like other versions, this version performs authentication based on cookies.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong><a name=\"_Toc6669494\"><\/a>4 YARA Rules<\/strong><\/h2>\n<table>\n<tbody>\n<tr>\n<td width=\"565\">\/*<\/p>\n<p>YARA Rule Set<\/p>\n<p>Author: Florian Roth<\/p>\n<p>Date: 2019-04-17<\/p>\n<p>Identifier: Leaked APT34 \/ OilRig tools<\/p>\n<p>Reference: https:\/\/twitter.com\/0xffff0800\/status\/1118406371165126656<\/p>\n<p>*\/<\/p>\n<p>rule APT_APT34_PS_Malware_Apr19_1 {<\/p>\n<p>meta:<\/p>\n<p>description = &#8220;Detects APT34 PowerShell malware&#8221;<\/p>\n<p>author = &#8220;Florian Roth&#8221;<\/p>\n<p>reference = &#8220;https:\/\/twitter.com\/0xffff0800\/status\/1118406371165126656&#8221;<\/p>\n<p>date = &#8220;2019-04-17&#8221;<\/p>\n<p>hash1 = &#8220;b1d621091740e62c84fc8c62bcdad07873c8b61b83faba36097ef150fd6ec768&#8221;<\/p>\n<p>strings:<\/p>\n<p>$x1 = &#8220;= get-wmiobject Win32_ComputerSystemProduct&Acirc;&nbsp; | Select-Object -ExpandProperty UUID&#8221; ascii<\/p>\n<p>$x2 = &#8220;Write-Host \\&#8221;excepton occured!\\&#8221;&#8221; ascii \/* \ud83d\ude42 *\/<\/p>\n<p>&nbsp;<\/p>\n<p>$s1 = &#8220;Start-Sleep -s 1;&#8221; fullword ascii<\/p>\n<p>$s2 = &#8220;Start-Sleep -m 100;&#8221; fullword ascii<\/p>\n<p>condition:<\/p>\n<p>1 of ($x*) or 2 of them<\/p>\n<p>}<\/p>\n<p>&nbsp;<\/p>\n<p>rule APT_APT34_PS_Malware_Apr19_2 {<\/p>\n<p>meta:<\/p>\n<p>description = &#8220;Detects APT34 PowerShell malware&#8221;<\/p>\n<p>author = &#8220;Florian Roth&#8221;<\/p>\n<p>reference = &#8220;https:\/\/twitter.com\/0xffff0800\/status\/1118406371165126656&#8221;<\/p>\n<p>date = &#8220;2019-04-17&#8221;<\/p>\n<p>hash1 = &#8220;2943e69e6c34232dee3236ced38d41d378784a317eeaf6b90482014210fcd459&#8221;<\/p>\n<p>strings:<\/p>\n<p>$x1 = &#8220;= \\&#8221;http:\/\/\\&#8221; + [System.Net.Dns]::GetHostAddresses(\\&#8221;&#8221; ascii<\/p>\n<p>$x2 = &#8220;$t = get-wmiobject Win32_ComputerSystemProduct&Acirc;&nbsp; | Select-Object -ExpandProperty UUID&#8221; fullword ascii<\/p>\n<p>$x3 = &#8220;| Where { $_ -notmatch &#8216;^\\\\s+$&#8217; }&#8221; ascii<\/p>\n<p>&nbsp;<\/p>\n<p>$s1 = &#8220;= new-object System.Net.WebProxy($u, $true);&#8221; fullword ascii<\/p>\n<p>$s2 = &#8221; -eq \\&#8221;dom\\&#8221;){$&#8221; ascii<\/p>\n<p>$s3 = &#8221; -eq \\&#8221;srv\\&#8221;){$&#8221; ascii<\/p>\n<p>$s4 = &#8220;+\\&#8221;&lt;&gt;\\&#8221; | Set-Content&#8221; ascii<\/p>\n<p>condition:<\/p>\n<p>1 of ($x*) and 3 of them<\/p>\n<p>}<\/p>\n<p>&nbsp;<\/p>\n<p>rule APT_APT34_PS_Malware_Apr19_3 {<\/p>\n<p>meta:<\/p>\n<p>description = &#8220;Detects APT34 PowerShell malware&#8221;<\/p>\n<p>author = &#8220;Florian Roth&#8221;<\/p>\n<p>reference = &#8220;https:\/\/twitter.com\/0xffff0800\/status\/1118406371165126656&#8221;<\/p>\n<p>date = &#8220;2019-04-17&#8221;<\/p>\n<p>hash1 = &#8220;27e03b98ae0f6f2650f378e9292384f1350f95ee4f3ac009e0113a8d9e2e14ed&#8221;<\/p>\n<p>strings:<\/p>\n<p>$x1 = &#8220;Powershell.exe -exec bypass -file ${global:$address1}&#8221;<\/p>\n<p>$x2 = &#8220;schtasks \/create \/F \/ru SYSTEM \/sc minute \/mo 10 \/tn&#8221;<\/p>\n<p>$x3 = &#8220;\\&#8221;\\\\UpdateTasks\\\\UpdateTaskHosts\\&#8221;&#8221;<\/p>\n<p>$x4 = &#8220;wscript \/b \\\\`\\&#8221;${global:$address1&#8221; ascii<\/p>\n<p>$x5 = &#8220;::FromBase64String([string]${global:$http_ag}))&#8221; ascii<\/p>\n<p>$x6 = &#8220;.run command1, 0, false\\&#8221; | Out-File &#8221; fullword ascii<\/p>\n<p>$x7 = &#8220;\\\\UpdateTask.vbs&#8221; fullword ascii<\/p>\n<p>$x8 = &#8220;hUpdater.ps1&#8221; fullword ascii<\/p>\n<p>condition:<\/p>\n<p>1 of them<\/p>\n<p>}<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><a name=\"_Toc6669495\"><\/a>Source: <a href=\"https:\/\/github.com\/Neo23x0\/signature-base\/blob\/master\/yara\/apt_oilrig.yar\">https:\/\/github.com\/Neo23x0\/signature-base\/blob\/master\/yara\/apt_oilrig.yar<\/a><\/p>\n<h2><strong>5 Indicators of Compromise<\/strong><\/h2>\n<p>myleftheart.com<\/p>\n<p>C:\\Users\\Public\\Public\\atag[0-9]{4}[A-Z]{2}<\/p>\n<p>C:\\Users\\Public\\Public\\dUpdater.ps1<\/p>\n<p>C:\\Users\\Public\\Public\\hUpdated.ps1<\/p>\n<p>C:\\Users\\Public\\Public\\UpdateTask.vbs<\/p>\n<p>27e03b98ae0f6f2650f378e9292384f1350f95ee4f3ac009e0113a8d9e2e14ed<\/p>\n<p>b1d621091740e62c84fc8c62bcdad07873c8b61b83faba36097ef150fd6ec768<\/p>\n<p>2943e69e6c34232dee3236ced38d41d378784a317eeaf6b90482014210fcd459<\/p>\n<p>07e791d18ea8f2f7ede2962522626b43f28cb242873a7bd55fff4feb91299741<\/p>\n<p>dd6d7af00ef4ca89a319a230cdd094275c3a1d365807fe5b34133324bdaa0229<\/p>\n<p>3ca3a957c526eaeabcf17b0b2cd345c0fffab549adfdf04470b6983b87f7ec62<\/p>\n<p>c9d5dc956841e000bfd8762e2f0b48b66c79b79500e894b4efa7fb9ba17e4e9e<\/p>\n<p>a6a0fbfee08367046d3d26fb4b4cf7779f7fb6eaf7e60e1d9b6bf31c5be5b63e<\/p>\n<p>fe1b011fe089969d960d2dce2a61020725a02e15dbc812ee6b6ecc6a98875392<\/p>\n<p>185.***.***.61<\/p>\n<p>46.***.***.196<\/p>\n<p>185.***.***.80<\/p>\n<p>185.***.***.17<\/p>\n<p>185.***.***,252<\/p>\n<p>185.***.***.103<\/p>\n<p>70.***.***.34<\/p>\n<p>109.***.***.129<\/p>\n<p>185.***.***.140<\/p>\n<p>185.***.***.158<\/p>\n<p>178.***.***.230<\/p>\n<p>146.***.***.108<\/p>\n<p>23.***.***.76<\/p>\n<p>185.***.***.8<\/p>\n<p>95.***.***.172<\/p>\n<p>173.***.***.194<\/p>\n<p>173.***.***.201<\/p>\n<p>172.***.***.238<\/p>\n<p>23.***.***.69<\/p>\n<p>185.***.***.86<\/p>\n<p>185.***.***.56<\/p>\n<p>194.***.***.15<\/p>\n<p>185.***.***.63<\/p>\n<p>81.***.***.249<\/p>\n<p>213.***.***.32<\/p>\n<p>46.***.***.42<\/p>\n<p>185.***.***.157<\/p>\n<p>198.***.***.22<\/p>\n<p>213.***.***.9<\/p>\n<p>158.***.***.62<\/p>\n<p>168.***.***.92<\/p>\n<p>38.***.***.153<\/p>\n<p>176.***.***.215<\/p>\n<p>88.***.***.174<\/p>\n<p>190.***.***.59<\/p>\n<p>103.***.***.181<\/p>\n<p>217.***.***.122<\/p>\n<p>46.***.***.52<\/p>\n<p>185.***.***.35<\/p>\n<p>172.***.***.226<\/p>\n<p>103.***.***.14<\/p>\n<p>95.***.***.173<\/p>\n<p>142.***.***.99<\/p>\n<p>194.***.***.23<\/p>\n<p>194.***.***.10<\/p>\n<p>185.***.***.14<\/p>\n<p>185.***.***.35<\/p>\n<p>185.***.***.75<\/p>\n<p>185.***.***.157<\/p>\n<p>185.***.***.59<\/p>\n<p>185.***.***.217<\/p>\n<p>23.***.***.6<\/p>\n<p>185.***.***.63<\/p>\n<h2><strong><a name=\"_Toc6669496\"><\/a>6 Mitigations<\/strong><\/h2>\n<ol>\n<li>Be cautious with emails from unknown sources. Do not open emails from strangers, such as those containing links, so as to prevent information disclosure or computer viruses.<\/li>\n<li>Do not use weak passwords. Change passwords frequently and make sure strong enough passwords are used.<\/li>\n<li>Fix vulnerabilities in time, especially those in border devices. Enable automatic update on not-frequently-used devices to keep the devices and their software latest.<\/li>\n<li>Deploy border protection devices and an intelligence-based alerting system provided by security firms to nip security hazards in the bud.<\/li>\n<\/ol>\n<h2><strong>7 Detection Means<\/strong><\/h2>\n<p>Network layer:<\/p>\n<p>Check whether there are abnormal DNS parsing server addresses.<\/p>\n<p>Check whether machines within the network send a great number of DNS requests every 50 ms.<\/p>\n<p>Check whether there are abnormal domain name requests.<\/p>\n<p>Host layer:<\/p>\n<p>Check whether the following directories or files exist on hosts:<\/p>\n<p>C:\\Users\\Public\\Public\\atag[0-9]{4}[A-Z]{2}<\/p>\n<p>C:\\Users\\Public\\Public\\dUpdater.ps1<\/p>\n<p>C:\\Users\\Public\\Public\\hUpdated.ps1<\/p>\n<p>C:\\Users\\Public\\Public\\UpdateTask.vbs<\/p>\n<p>Check whether DNS server addresses are tampered with on hosts.<\/p>\n<p><a name=\"_Toc6669498\"><\/a>Check whether unknown files exist in the root directory of the HTTP server.<\/p>\n<h2><strong>8 References<\/strong><\/h2>\n<p>https:\/\/github.com\/Neo23x0\/signature-base\/blob\/master\/yara\/apt_oilrig.yar<\/p>\n<p>https:\/\/www.fireeye.com\/blog\/threat-research\/2017\/12\/targeted-attack-in-middle-east-by-apt34.html<\/p>\n<p>https:\/\/unit42.paloaltonetworks.com\/unit42-oilrig-performs-tests-twoface-webshell\/<\/p>\n<p>https:\/\/unit42.paloaltonetworks.com\/unit42-oilrig-uses-updated-bondupdater-target-middle-eastern-government\/<\/p>\n<p>https:\/\/misterch0c.blogspot.com\/2019\/04\/apt34-oilrig-leak.html<\/p>\n<p>https:\/\/raidforums.com\/Thread-access-to-top-secret-information-and-hacking-tools-of-Iran-ministry-of-intelligence?pid=540189<\/p>\n<p>https:\/\/anonfile.com\/8f8aL0S1mb\/targets_txt<\/body><\/html><\/p>\n","protected":false},"excerpt":{"rendered":"<p>1 Overview On April 18, 2019 a hacker\/hacker organization sold a toolkit of the APT34 group, under the false name of Lab Dookhtegan, on a Telegram channel. The organization also posted screenshots of the tool&#8217;s backend panels, where victim data had been collected. Early in the middle of March 2019, this hacker\/hacker organization had released [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":9273,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[5,15],"tags":[95],"class_list":["post-9526","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ddos-mitigation","category-research-reports","tag-apt34"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>APT34 Event Analysis Report - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"APT34 Event Analysis Report - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"1 Overview On April 18, 2019 a hacker\/hacker organization sold a toolkit of the APT34 group, under the false name of Lab Dookhtegan, on a Telegram\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/apt34-event-analysis-report\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2019-11-09T01:08:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/cover.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"APT34 Event Analysis Report - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"1 Overview On April 18, 2019 a hacker\/hacker organization sold a toolkit of the APT34 group, under the false name of Lab Dookhtegan, on a Telegram\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/cover.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"22 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apt34-event-analysis-report\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apt34-event-analysis-report\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"APT34 Event Analysis Report\",\"datePublished\":\"2019-11-09T01:08:39+00:00\",\"dateModified\":\"2026-04-17T18:07:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apt34-event-analysis-report\\\/\"},\"wordCount\":4373,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apt34-event-analysis-report\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/cover.jpg\",\"keywords\":[\"APT34\"],\"articleSection\":[\"DDoS Mitigation\",\"Research &amp; Reports\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/apt34-event-analysis-report\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apt34-event-analysis-report\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/apt34-event-analysis-report\\\/\",\"name\":\"APT34 Event Analysis Report - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apt34-event-analysis-report\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apt34-event-analysis-report\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/cover.jpg\",\"datePublished\":\"2019-11-09T01:08:39+00:00\",\"dateModified\":\"2026-04-17T18:07:51+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apt34-event-analysis-report\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/apt34-event-analysis-report\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apt34-event-analysis-report\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/cover.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/cover.jpg\",\"width\":699,\"height\":413,\"caption\":\"Futuristic glowing circuit board with neon lights.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apt34-event-analysis-report\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"APT34 Event Analysis Report\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"APT34 Event Analysis Report - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"APT34 Event Analysis Report - NSFOCUS","og_description":"1 Overview On April 18, 2019 a hacker\/hacker organization sold a toolkit of the APT34 group, under the false name of Lab Dookhtegan, on a Telegram","og_url":"https:\/\/nsfocusglobal.com\/apt34-event-analysis-report\/","og_site_name":"NSFOCUS","article_published_time":"2019-11-09T01:08:39+00:00","article_modified_time":"2026-04-17T18:07:51+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/cover.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"APT34 Event Analysis Report - NSFOCUS","twitter_description":"1 Overview On April 18, 2019 a hacker\/hacker organization sold a toolkit of the APT34 group, under the false name of Lab Dookhtegan, on a Telegram","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/cover.jpg","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"22 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/apt34-event-analysis-report\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/apt34-event-analysis-report\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"APT34 Event Analysis Report","datePublished":"2019-11-09T01:08:39+00:00","dateModified":"2026-04-17T18:07:51+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/apt34-event-analysis-report\/"},"wordCount":4373,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/apt34-event-analysis-report\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/cover.jpg","keywords":["APT34"],"articleSection":["DDoS Mitigation","Research &amp; Reports"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/apt34-event-analysis-report\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/apt34-event-analysis-report\/","url":"https:\/\/nsfocusglobal.com\/apt34-event-analysis-report\/","name":"APT34 Event Analysis Report - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/apt34-event-analysis-report\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/apt34-event-analysis-report\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/cover.jpg","datePublished":"2019-11-09T01:08:39+00:00","dateModified":"2026-04-17T18:07:51+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/apt34-event-analysis-report\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/apt34-event-analysis-report\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/apt34-event-analysis-report\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/cover.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/cover.jpg","width":699,"height":413,"caption":"Futuristic glowing circuit board with neon lights."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/apt34-event-analysis-report\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"APT34 Event Analysis Report"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/9526","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=9526"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/9526\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/9273"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=9526"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=9526"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=9526"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}