The main threat groups targeting Brazil: meet Red Apollo

The main threat groups targeting Brazil: meet Red Apollo

By Ismael Rocha: An advanced persistent threat(APT) works to access computer networks and systems without being detected or noticed. These threats, sometimes executed by a nation-state or a state-sponsored group, can steal private and secret information, damage IT systems and disrupt the functioning of vital systems. Defending against advanced persistent threats is a difficult task as they act stealthily and their intrusions can be difficult to recognize.

Brazil is a country with a wide variety of economic sectors, such as: education/research, finance, health, government/military, retail, energy, communication, technology, among others. These sectors generate large sums of money for governments and organizations, consequently arousing the interest of advanced threat groups. Thus, it is possible to note the great increase in cyber attacks for financial gain, access to secret and confidential files or country disruption by cybercriminals.

About Red Apollo (APT10)

APT10 (Red Apollo) is a cyber threat group that is widely believed to be a Chinese state-sponsored operation. They are known for targeting organizations around the world in various industries, including information technology, communications, engineering, aerospace and others.

APT10's main objective is to steal intellectual property, confidential information and data from organizations around the world for economic gain. They usually carry out their operations through phishing, custom malware and other advanced social engineering techniques to gain access to corporate networks and exfiltrate data.

The group is also known for its long-term operations and ability to remain hidden in victims' networks for months or even years, allowing them to obtain a significant amount of confidential data. APT10 Red Apollo is considered one of the most advanced and persistent cyber threat groups currently active.

TTPs - MITRE ATT&CK

TacticsTechniqueDetails
DiscoveryT1046Attackers try to obtain a list of services running on remote hosts and local network infrastructure devices, including those that may be vulnerable to exploitation by remote software.
Initial AccessT1566Sending malicious Office documents by e-mail as part of spearphishing campaigns, as well as executables disguised as documents.
ExecutionT1204It tries to get victims to open malicious files such as Windows shortcuts (.lnk) and/or Microsoft Office documents sent by e-mail.
ExecutionT1059Using PowerSploit to inject shellcode into PowerShell.
Lateral MovementT1021Use of RDP connections to move around the victim's network.
Defense EvasionT1027Encoding strings in your malware with base64, as well as with a simple single-byte XOR obfuscation using the 0x40 key.
Defense EvasionT1036Use of esentutl to change file extensions to their true type that were masked as .txt files.
Initial AccessT1078Use of valid accounts, including those shared between managed service providers and clients, to move between the two environments.

Indicators of Commitment (IoCs)

ISH Technology handles several Indicators of Commitment collected through open sources, closed sources and also through analysis performed by the Heimdall security team. In light of this, below we list all Indicators of Commitments (IOCs) related to the analysis of the artifact(s) in this report.

Malicious/analyzed artifact compromise indicators
md5:577a47811b3c57a663bcbf2aab99c9e3
sha1:dbc48357bfbe41f5bfdd3045066486e76a23ad2d
sha256:70225015489cae369d311b62724ef0caf658ffdf62e5edbafd8267a8842e7696
File name:70225015489cae369d311b62724ef0caf658ffdf62e5edbafd8267a8842e7696.bin
Malicious/analyzed artifact compromise indicators
md5:69ef2d7f9ed29840b60a7fd32030cbd1
sha1:b24e254f6fdd67318547915495f56f8f2a0ac4fe
sha256:91f8805e64f434099d0137d0b7ebf3db3ccbf5d76cd071d1604e3e12a348f2d9
File name:mpclient.dll
Malicious/analyzed artifact compromise indicators
md5:f259765905cd16ff40132f35c85a862a
sha1:d9efd4c4e1fb4e3d4a171c4ca0985839ad1cdee9
sha256:7fe5674c9a3af8413d0ec71072a1c27d39edc14e4d110bfeb79d1148d55ce0b6
File name:7fe5674c9a3af8413d0ec71072a1c27d39edc14e4d110bfeb79d1148d55ce0b6.bin
Malicious/analyzed artifact compromise indicators
md5:bde2a3c8e034d30ce13e684f324c6702
sha1:a413f4bcb7406710b76fabdaba95bb4690b24406
sha256:f04f444d9f17d4534d37d3369bf0b20415186862986e62a25f59fd0c2c87562f
File name:mpclient.dll
Malicious/analyzed artifact compromise indicators
md5:0c4a84b66832a08dccc42b478d9d5e1b
sha1:160320b920a5ef22ac17b48146152ffbef60461f
sha256:5b56c5d86347e164c6e571c86dbf5b1535eae6b979fede6ed66b01e79ea33b7b
File name:5b56c5d86347e164c6e571c86dbf5b1535eae6b979fede6ed66b01e79ea33b7b.exe
Malicious/analyzed artifact compromise indicators
md5:4c3c7053ec145ad3976b2a84038c5feb
sha1:3246867705e8aad60491fe195bcc83af79470b22
sha256:15b52c468cfd4dee4599ec22b1c04b977416fbe5220ab30a097f403903d28a3a
File name:vmtools.ini
Malicious/analyzed artifact compromise indicators
md5:a4a6abf4ed4c9447683fba729a17197b
sha1:ead02cb3f6b811427f2635a18398392bc2ebca3a
sha256:b0fb6c7eecbf711b2c503d7f8f3cf949404e2dd256b621c8cf1f3a2bdfb54301
File name:glib-2.0.dll
Malicious/analyzed artifact compromise indicators
md5:809fcab1225981e87060033d72edaeaf
sha1:64f5044709efc77230484cec8a0d784947056022
sha256:62fea3942e884855283faf3fb68f41be747c5baa922d140509237c2d7bacdd17
File name:62fea3942e884855283faf3fb68f41be747c5baa922d140509237c2d7bacdd17.bin
Malicious/analyzed artifact compromise indicators
md5:b16bb2f910f21e2d4f6e2aa1a1ea0d8b
sha1:a75e9b702a892cc3e531e158ab2e4206b939f379
sha256:8502852561fcb867d9cbf45ac24c5985fa195432b542dbf8753d5f3d7175b120
File name:LockDown.dll
Malicious/analyzed artifact compromise indicators
md5:78c309be8437e7c1d2dd3f12d7c034c8
sha1:8c4f32b532dcbec914228baf16cf6b21fb12e2fc
sha256:c10d7ea92fa96c79cfc3dd6957cad346ae3efd611eb4cca6e368c5c0fcad87be
File name:sample.doc
Malicious/analyzed artifact compromise indicators
md5:77c02893cf4a86ad2fd629aea4db772f
sha1:851234d83f283c87b9195178b8e6af6e7836fb1a
sha256:00d33ab9a73211ba9ed30d0afbe8cc2a1a2a4a60c90fe7f13fa2250d92a7ad85
File name:tw.rtf
Malicious/analyzed artifact compromise indicators
md5:db212129be94fe77362751c557d0e893
sha1:7fe6c8191749767254513b03da03cfbf6dd6c139
sha256:fadf362a52dcf884f0d41ce3df9eaa9bb30227afda50c0e0657c096baff501f0
File name:db212129be94fe77362751c557d0e893.vir
Malicious/analyzed artifact compromise indicators
md5:faf9576ce2af23aac67d3087eb85a92b
sha1:daadf23bf09519e77a8d9259164e893bddd6e621
sha256:db28df72ac3a076cc80eae301c4a1bcb1feab27331f33c928a99879f8290bcb3
File name:Adobechoose.exe
Malicious/analyzed artifact compromise indicators
md5:e6c596cfa163fe9b8883c7618d594018
sha1:4bc116cfb79ed3f116b8c1da4d82a435adf7c534
sha256:c5e9df74abe15f2751681117fd7efbce03f93157a3ccc314d51da9060dab3790
File name:scvhost
Malicious/analyzed artifact compromise indicators
md5:172ce304ce8946ae7be8d223d4520d80
sha1:c90b19dd970360ad8a0bc74ee6ecf3a002714698
sha256:d97e64eef62f109d19cb00651224fdfcfb2a14317c420096230627680be0bd78
File name:Invitation.doc
Malicious/analyzed artifact compromise indicators
md5:b08694e14a9b966d8033b42b58ab727d
sha1:6716078e371d4bce479e35146c25a753b2b02202
sha256:af69ad95e6564d682b0f8220dd8c4cca61b60227add59c883eea960350747084
File name:PiShellPut
Malicious/analyzed artifact compromise indicators
md5:05ac9875df6a4e1b7b7a21099d27caaf
sha1:6a1ce9b2c7d8b1309941d8ce06278d3ab6eb6a2a
sha256:68bad787576e8766b6d1747c25829c784ddc9a9783872a50e6b5ee10fe17d6c3
File name:vt-upload-Db6R6
Malicious/analyzed artifact compromise indicators
md5:bd092cc922a8f83880b896a0911774a6
sha1:06c9661095a9063c8028c493874f178b15aa73f4
sha256:02b3114e249b11d6f051450356704ddf7871aecbdbab5657fc0ccd17ce13e514
File name:Live360.exe
Malicious/analyzed artifact compromise indicators
md5:056725205f97051a381ebe7894ba0671
sha1:5fd8e622f205a2ffb408399eb3848a33058fdfc6
sha256:b88fe756176e2ee448bdc1f19c5c5675ecf465034a77e106679970b787942511
File name:kugou.dll
Malicious/analyzed artifact compromise indicators
md5:156ce6a9d3eaac1584b8df714a35c530
sha1:75800a58d1c42ecba6415c3b5b3a07e65019b456
sha256:98aefbea97d086f0bbe082b6bb7499f4ee1fbf707766f3b2739ed99857802ad8
File name:1.xls
Malicious/analyzed artifact compromise indicators
md5:667989ffa5e77943f3384e78adf93510
sha1:aee17dbab01ed334bb94506fcbc2ed259242159e
sha256:7eeaa97d346bc3f8090e5b742f42e8900127703420295279ac7e04d06ebe0a04
File name:667989ffa5e77943f3384e78adf93510.virobj

Distribution URLs and C2 IP addresses:

114.55[.]109[.]199
185.225[.]17[.]39
43.254[.]216[.]104
45.124[.]115[.]103
161.82[.]181[.]4
43.254[.]219[.]153
45.124[.]115[.]103
185.225[.]19[.]17
94.158[.]245[.]249
5.252[.]179[.]227
222.186[.]151[.]141
47.111[.]22[.]65
154.223[.]141[.]36
103.139[.]2[.]93
apple[.]ikwb[.]com
support1[.]mrface[.]com
unspa[.]hostport9[.]net
aotuo[.]9966[.]org
dedydns[.]ns01[.]us
services[.]arkouowi[.]com
creatos[.]kozow[.]com
quick[.]oldbmwy[.]com
jepsen[.]r3u8[.]com
sakai[.]unhamj[.]com
nttdata[.]otzo[.]com
forward[.]davidgagnon[.]org
cvnx[.]zyns[.]com
zebra[.]wthelpdesk[.]com
algorithm[.]ddnsgeek[.]com
music[.]websegoo[.]net
hk[.]have8000[.]com
fbi[.]sexxxy[.]biz
friendlysupport[.]giize[.]com
idpmus[.]hostport9[.]net
lion[.]wchildress[.]com
vm[.]vmdnsup[.]org
scorpion[.]poulsenv[.]com
web[.]casacam[.]net
synssl[.]dnset[.]com
smo[.]gadskysun[.]com
abcd120719[.]6600[.]org
firtstdata[.]kozow[.]com
nunluck[.]re26[.]com
send[.]mofa[.]ns01[.]info
bulk[.]tmpxctl[.]com
yz[.]chromeenter[.]com
kawasaki[.]cloud-maste[.]com
un[.]dnsrd[.]com
record[.]wschandler[.]com
tv [.]goldtoyota[.]com
cpu[.]4pu[.]com
av[.]ddns[.]us
send[.]have8000[.]com
contacts[.]rvenee[.]com
trems[.]rvenee[.]com
video[.]vmdnsup[.]org
www[.]jadl-or[.]com
art[.]p6p6[.]net
vmyiersend[.]websago[.]info
trasul[.]mypicture[.]info
1j[.]www1[.]biz
google[.]usrobothome[.]com
bak[.]have8000[.]com
google[.]macforlinux[.]net
herring[.]kozow[.]com
be[.]yourtrap[.]com
grandeur[.]kozow[.]com
wike[.]wikaba[.]com
bk56[.]twilightparadox[.]com
kmd[.]crabdance[.]com
img[.]microtoo[.]info
inspgon[.]re26[.]com
iphone[.]vizvaz[.]com
babyprintf[.]2288[.]org
cia[.]toh[.]info
last[.]p6p6[.]net
jimin[.]jimindaddy[.]com
stone[.]jumpingcrab[.]com
sky[.]oldbmwy[.]com
army[.]xxuz[.]com
sh[.]chromeenter[.]com
mailj[.]hostport9[.]net
domain[.]casacam[.]net
applelib120102[.]9966[.]org
szdns[.]etfiber[.]net
2014[.]zzux[.]com
voov[.]2288[.]org
document[.]methoder[.]com
sbuudd[.]webssl9[.]info
baby[.]macforlinux[.]net
ducksow[.]ddnsgeek[.]com
jpn[.]longmusic[.]com
malware[.]dsmtp[.]com
zone[.]usrobothome[.]com
area[.]wthelpdesk[.]com
resource[.]arkouowi[.]com
sendmsg[.]jumpingcrab[.]com
japan[.]fuckanti[.]com
hk[.]cmdnetview[.]com
record[.]hostport9[.]net
cao[.]p6p6[.]net
im[.]suibian2010[.]info
taipei[.]yourtrap[.]com
sstday[.]jkub[.]com
diamond[.]ninth[.]biz
start[.]usrobothome[.]com
amsidgoo[.]thedomais[.]info
janpan[.]bigmoney[.]biz
info[.]uroljp[.]com
iu[.]niushenghuo[.]info
usa[.]radiorig[.]com
fukuoka[.]cloud-maste[.]com
sz[.]thedomais[.]info
whellbuy[.]wschandler[.]com
app[.]lehigtapp[.]com
firefoxcomt[.]arkouowi[.]com
kawasaki[.]unhamj[.]com
drives[.]methoder[.]com
apple[.]cmdnetview[.]com
messagea[.]emailfound[.]info
gold[.]polopurple[.]com
sdmsg[.]onmypc[.]org
fiveavmersi[.]websegoo[.]net
dick[.]ccfchrist[.]com
byeserver[.]com
dnsgogle[.]com
gamewushu[.]com
gxxservice[.]com
ibmupdate[.]com
infestexe[.]com
kasparsky[.]net
linux-update[.]net
macfee[.]ga
micros0ff[.]com
micros0tf[.]com
notped[.]com
operatingbox[.]com
paniesx[.]com
serverbye[.]com
sexyjapan.ddns[.]info
symanteclabs[.]com
techniciantext[.]com
win7update[.]net
xigncodeservice[.]com
agegamepay[.]com
ageofwuxia[.]com
ageofwuxia[.]info
ageofwuxia[.]net
ageofwuxia[.]org

Note: The links and IP addresses listed above may be active; be careful when manipulating these IoCs, to avoid clicking on them and becoming a victim of the malicious content hosted on the IoC.

Why have a Threat Hunting team?

The greatest danger of an APT is that it can remain active for long periods of time, often going undetected by cybersecurity defenses, allowing attackers to exfiltrate valuable information and cause significant damage. One of the main characteristics of an APT is its ability to avoid detection by traditional security solutions, such as firewalls and antivirus. Advanced threat groups often use sophisticated social engineering, phishing and reverse engineering techniques to infiltrate corporate networks and government institutions, causing major financial damage.

Traditional security solutions, such as firewalls and antivirus, are effective at detecting known threats, but can fail to detect new threats that are specifically designed to prevent them. The Threat Hunting team proactively searches for threats throughout the organization's IT infrastructure, using advanced threat analysis and forensic investigation techniques to find suspicious activity or anomalies that may indicate the presence of a threat. This allows the team to take immediate action to stop or neutralize a threat before it causes significant damage to the organization.

In short, a Threat Hunting team is important because it provides an additional layer of proactive protection against cyber threats, enabling organizations to identify and respond to advanced cyber threats more quickly and effectively.

How to protect yourself from the Red Apollo group

In addition to the indicators of compromise listed below by the ISH, measures may be adopted to mitigate the infection of the aforementioned to advanced persistent threats, such as:

  • Keeping software up to date: it is important to keep the operating system, applications and security software up to date with the latest security updates. This helps to correct known vulnerabilities that can be exploited by APTs.
  • Use multi-factor authentication: this can help protect against phishing attacks and stolen credentials. It adds an extra layer of security by requiring the user to provide additional information, apart from a password, in order to authenticate.
  • Do not download artifacts contained in suspicious emails and do not click on links in emails that appear to have malicious behavior.
  • Use encryption: this can help protect sensitive information, such as customer and corporate data, from being accessed by APTs.
  • Backing up regularly: cultivating this practice for critical data can help protect against data loss due to APT attacks.
  • Implementing network security controls: such as firewalls, IDS/IPS and advanced threat detection, can help identify and block APTs before they can cause damage.
  • Carry out security awareness training: this can help educate users about security threats and how to protect themselves against them.
  • Perform behavior analysis: this can help detect suspicious activity within the network, such as transferring large amounts of data to unknown locations or attempting to access confidential resources outside of working hours.
  • Adopt a company-wide security posture: to be effective against APTs it is important that companies adopt a comprehensive company-wide approach to security, including policies and procedures, security controls and regular security awareness training.

References

Leave a Comment

Your e-mail address will not be published. Required fields are marked with *