20.04.2016 Views

y5qa5B

y5qa5B

y5qa5B

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

ASERT Threat Intelligence Report 2016-03: The Four-Element Sword Engagement<br />

The xinxin20080628 hostname portion of one of the domain names is also interesting, as it was mentioned in <br />

a 2009 report by F-­‐secure [15] as associated with a different dynamic DNS provider, gicp.net. The domain in <br />

that case was xinxin20080628.gicp[.]net instead of xinxin20080628.3322[.]org as observed here. The <br />

xinxin20080628.3322[.]org domain only resolved for a very short period of approximately four hours on April <br />

23, 2014. <br />

While it is of course possible that the use of this domain is a misdirection designed to point analysts in the <br />

wrong direction, it is also possible that the actor using the dynamic DNS client/script made a mistake and <br />

temporarly resolved the domain, or had need to do so on a short-­‐term basis (to test C2 perhaps). As this is an <br />

older artifact, there could be other explanations however it is a clue worth noting that may tie modern activity <br />

to previously documented campaigns and their TTPs and threat actors. <br />

A master list of IOC’s provided by Citizen Lab (released in conjunction with their reporting on various <br />

advanced threat activity) lists the domain xinxin20080628[.]gicp.net in November 2010 [16] and the IP address <br />

being used at that time: <br />

2010-­‐11-­‐19 xinxin20080628.gicp[.]net 114.60.106[.]156 <br />

This domain is also included in the aforementioned USENIX paper. Other campaign activities involving the <br />

xinxin20080628.gicp[.]net domain were profiled by Communities @ Risk [17] and reveals activity in 2010 <br />

involving two executables delivered to a target. The payload in that case was the IEXPL0RE RAT, also known as <br />

C0d0s0. The IEXPL0RE campain discussed therein involved targeting of Tibetan and Chinese communities. The <br />

12 Proprietary and Confidential Information of Arbor Networks, Inc.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!