Security Insights

Backdoor Xtrat Continues To Evade Detection

Backdoor Xtrat Continues To Evade Detection
While reviewing recent reports scanned by ZULU, we came across a malicious report that drew our attention. It was notable as the final redirection downloaded ZIP content by accessing a PHP file on the domain ''. 

URL: hxxp://www[.]stisanic[.]com/wp-content/coblackberrycomnotasdevozdate07052014[.]php
ZULU's virustotal check scored the file as higher risk. At the time 10 vendors on VT detected the ZIP file as malicious.
  • File : 
  • md5 : d7d6574a443909b04b1ac76fb07b8dc2 
  • VT Report : 10/52
The ZIP file contained an EXE. Once again, only 10 vendors flagged the executable as malicious on VT. 
  • File: coblackberrycomnotasdevozdate07052014.exe 
  • md5: bd06e73db5b169120723206998a6074a 
  • VT Report: 10/52
The ZULU report turned out be live example of Backdoor Xtrat, which is a relatively old threat but one that many AV vendors are still not consistently detecting. AV vendors had first released a signature for this malware in May 2011 (MS advisory). The poor AV detection is the result of a common challenge - the attackers consistently alter the binary and there are numerous variants. This is of course a known limitation of signature based approaches and something that attackers regularly take advantage of. It's also a reason why security vendors, like Zscaler, are increasingly relying on behavioral analysis when analyzing binary files. Behavioral analysis doesn't rely on signatures or require any prior knowledge of the threat and is a key component in the Cloud-based APT solution that Zscaler released in 2013. 
Zscaler behavioral analysis report:
Screen capture of the Zscaler Behavioral Analysis report for Backdoor.Xtrat

Typical behavior of this backdoor:
  • Injects itself into svchost.exe, exploere.exe and iexplore.exe
  • Drops PE files
  • Performs network activity to accept commands from a remote server and sends data to the remote server
Dropped file details:

The backdoor drops the following two EXE files on victim's machine. Both of the EXE files are same, but are dropped with different names.
  • vbc.exe/wintegfire.exe
    • md5 : 6fb9ce258a2420d898b6d0fa4d73bb8f
    • VT Report : 6/52 (Also very less detection)
Network Activity:
The backdoor downloads content from '' over port 3460. 
  • URL: hxxp://analaloca[.]chickenkiller[.]com:3460/123456.functions 
  • IP: 181[.]135[.]149[.]40
  • Zulu report: 100/100

CnC Server Location:

CnC URLs with the above pattern of '/123456.functions':

We also observed CnC URLs related to this backdoor with a small variation in the pattern. The pattern varinat observed was '/1234567890.functions'.  

CnC URLs with pattern '/1234567890.functions':

Snort signatures:
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"Backdoor Xtrat URL Request"; flow:established,to_server; content:"/123456.functions"; http_uri; nocase; classtype:trojan-activity; reference:''; sid:XXXXX; rev:XX;)

alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"Backdoor Xtrat URL Request"; flow:established,to_server; content:"/1234567890.functions"; http_uri; nocase; classtype:trojan-activity; reference:''; sid:YYYYY; rev:YY;) 
We are seeing new CnC domains related to this attack every day. This shows that the attack remains active.
Avoid this backdoor and stay safe !


Get the latest Zscaler blog updates in your inbox

Subscription confirmed. More of the latest from Zscaler, coming your way soon!

By submitting the form, you are agreeing to our privacy policy.