While reviewing recent reports scanned by ZULU
, we came across a malicious report
that drew our attention. It was notable as the final redirection downloaded ZIP content by accessing a PHP file on the domain 'www.stisanic.com
ZULU's virustotal check scored the file as higher risk. At the time 10 vendors
on VT detected the ZIP file as malicious.
- File : coblackberrycomnotasdevozdate07052014.zip
- md5 : d7d6574a443909b04b1ac76fb07b8dc2
- VT Report : 10/52
The ZIP file contained an EXE. Once again, only 10 vendors flagged the executable as malicious on VT.
- File: coblackberrycomnotasdevozdate07052014.exe
- md5: bd06e73db5b169120723206998a6074a
- VT Report: 10/52
The ZULU report turned out be live example of Backdoor Xtrat
, which is a relatively old threat but one that many AV vendors are still not consistently detecting. AV vendors had first released a signature for this malware in May 2011 (MS advisory
). The poor AV detection is the result of a common challenge - the attackers consistently alter the binary and there are numerous variants. This is of course a known limitation of signature based approaches and something that attackers regularly take advantage of. It's also a reason why security vendors, like Zscaler, are increasingly relying on behavioral analysis when analyzing binary files. Behavioral analysis doesn't rely on signatures or require any prior knowledge of the threat and is a key component in the Cloud-based APT solution that Zscaler released
Zscaler behavioral analysis report:
|Screen capture of the Zscaler Behavioral Analysis report for Backdoor.Xtrat|
Typical behavior of this backdoor:
- Injects itself into svchost.exe, exploere.exe and iexplore.exe
- Drops PE files
- Performs network activity to accept commands from a remote server and sends data to the remote server
Dropped file details:
The backdoor drops the following two EXE files on victim's machine. Both of the EXE files are same, but are dropped with different names.
- md5 : 6fb9ce258a2420d898b6d0fa4d73bb8f
- VT Report : 6/52 (Also very less detection)
The backdoor downloads content from 'analaloca.chickenkiller.com' over port 3460.
- URL: hxxp://analaloca[.]chickenkiller[.]com:3460/123456.functions
- IP: 181[.]135[.]149[.]40
- Zulu report: 100/100
CnC Server Location: CnC URLs with the above pattern of '/123456.functions': cascarita1.no-ip.biz:33100/123456.functions
cascarita2.no-ip.biz:33200/123456.functions cascarita3.no-ip.biz:33500/123456.functions windows.misconfused.org:999/123456.functions
We also observed CnC URLs related to this backdoor with a small variation in the pattern. The pattern varinat observed was '/1234567890.functions'
. CnC URLs with pattern '/1234567890.functions': suportassisten.no-ip.info:2180/1234567890.functions laithmhrez.no-ip.info/1234567890.functions
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"Backdoor Xtrat URL Request"; flow:established,to_server; content:"/123456.functions"; http_uri; nocase; classtype:trojan-activity; reference:''; sid:XXXXX; rev:XX;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"Backdoor Xtrat URL Request"; flow:established,to_server; content:"/1234567890.functions"; http_uri; nocase; classtype:trojan-activity; reference:''; sid:YYYYY; rev:YY;)
We are seeing new CnC domains related to this attack every day. This shows that the attack remains active.
Avoid this backdoor and stay safe !