Evasive PenTesting Tool linked to Russian Hacking Group
Incident Report for Ascend Security Events
Resolved
Evasive PenTesting Tool linked to Russian Hacking Group

Source: Palo Alto Networks Unit 42

The Security Researchers at Palo Alto Networks have recently disclosed their findings regarding a near undetectable malware sample that is linked to the Russian Hacking Group APT29, also known as Cozy Bear. The sample contained a malicious payload associated with Brute Ratel C4 (BRc4), the newest red-teaming and adversarial attack simulation tool to hit the market.

This is uniquely dangerous as the BRc4 tool was specifically designed to avoid detection by endpoint detection and response (EDR) and antivirus (AV) capabilities. Its effectiveness at doing so can clearly be witnessed as it received a benign verdict from all 56 vendors on the popular website VirusTotal.

In terms of C2, researchers found that the sample called home to an Amazon Web Services (AWS) IP address located in the United States over port 443. Further, the X.509 certificate on the listening port was configured to impersonate Microsoft with an organization name of “Microsoft” and organization unit of “Security.” Additionally, pivoting on the certificate and other artifacts, the team identified a total of 41 malicious IP addresses, nine BRc4 samples, and an additional three organizations across North and South America who have been impacted by this tool so far.

Indicators of Compromise:

• 1fc7b0e1054d54ce8f1de0cc95976081c7a85c7926c03172a3ddaa672690042c
• 31acf37d180ab9afbcf6a4ec5d29c3e19c947641a2d9ce3ce56d71c1f576c069
• f58ae9193802e9baf17e6b59e3fdbe3e9319c5d27726d60802e3e82d30d14d46
• 3ed21a4bfcf9838e06ad3058d13d5c28026c17dc996953a22a00f0609b0df3b9
• 3ad53495851bafc48caf6d2227a434ca2e0bef9ab3bd40abfe4ea8f318d37bbe
• 973f573cab683636d9a70b8891263f59e2f02201ffb4dd2e9d7ecbb1521da03e
• dd8652e2dcfe3f1a72631b3a9585736fbe77ffabee4098f6b3c48e1469bf27aa
• e1a9b35cf1378fda12310f0920c5c53ad461858b3cb575697ea125dfee829611
• ef9b60aa0e4179c16a9ac441e0a21dc3a1c3dc04b100ee487eabf5c5b1f571a6
• d71dc7ba8523947e08c6eec43a726fe75aed248dfd3a7c4f6537224e9ed05f6f
• 5887c4646e032e015aa186c5970e8f07d3ed1de8dbfa298ba4522c89e547419b
• ea2876e9175410b6f6719f80ee44b9553960758c7d0f7bed73c0fe9a78d8e669
• b5d1d3c1aec2f2ef06e7d0b7996bc45df4744934bd66266a6ebb02d70e35236e
• 104.6.92[.]229
• 137.184.199[.]17
• 138.68.50[.]218
• 138.68.58[.]43
• 139.162.195[.]169
• 139.180.187[.]179
• 147.182.247[.]103
• 149.154.100[.]151
• 15.206.84[.]52
• 159.223.49[.]16
• 159.65.186[.]50
• 162.216.240[.]61
• 172.105.102[.]247
• 172.81.62[.]82
• 174.129.157[.]251
• 178.79.143[.]149
• 178.79.168[.]110
• 178.79.172[.]35
• 18.133.26[.]247
• 18.130.233[.]249
• 18.217.179[.]8
• 18.236.92[.]31
• 185.138.164[.]112
• 194.29.186[.]67
• 194.87.70[.]14
• 213.168.249[.]232
• 3.110.56[.]219
• 3.133.7[.]69
• 31.184.198[.]83
• 34.195.122[.]225
• 34.243.172[.]90
• 35.170.243[.]216
• 45.144.225[.]3
• 45.76.155[.]71
• 45.79.36[.]192
• 52.48.51[.]67
• 52.90.228[.]203
• 54.229.102[.]30
• 54.90.137[.]213
• 89.100.107[.]65
• 92.255.85[.]173
• 92.255.85[.]44
• 94.130.130[.]43
• ds.windowsupdate.eu[.]org

As a result, Ascend Technologies has pushed the detection ability of the known IOCs across our EDR, SIEM, and anti-malware platforms. These IOCs include IPs and hash values which will give us the ability to detect and alert. As is the case with most malware, end users are targeted which makes maintaining a robust security posture highly important, including end-user training, to develop safe and secure internet browsing habits.

Author: Evan Obal

Source: https://unit42.paloaltonetworks.com/brute-ratel-c4-tool/
Posted Jul 07, 2022 - 14:14 CDT