MALWARE TECHNICAL INSIGHT TURLA “Penquin_x64
Image Description
Common Information
Type Value
UUID 638073a7-21fd-4541-b8f9-d60871b3dac8
Fingerprint 0ce5ca914f9c8c456f587147cc528ba8e441192d7dba157ea59eaece0a9d19a5
Analysis status DONE
Considered CTI value 2
Text language
Published May 28, 2020, 5:03 p.m.
Added to db March 10, 2024, 3:59 a.m.
Last updated Aug. 31, 2024, 3:12 a.m.
Headline MALWARE TECHNICAL INSIGHT TURLA “Penquin_x64
Title MALWARE TECHNICAL INSIGHT TURLA “Penquin_x64
Detected Hints/Tags/Attributes 139/3/51
Attributes
Details Type #Events CTI Value
Details Domain 2
www.phenoelit.org
Details Domain 11
govcert.ch
Details Domain 1
sync.pid
Details Domain 10
gcc.gnu.org
Details Domain 1
leonardocompany.com
Details File 1
tc_sock.bin
Details File 3
releases.html
Details md5 3
0994d9deb50352e76b0322f48ee576c6
Details md5 3
14ecd5e6fc8e501037b54ca263896a11
Details md5 3
19fbd8cbfb12482e8020a887d6427315
Details md5 2
edf900cebb70c6d1fcab0234062bfc28
Details md5 2
ea06b213d5924de65407e8931b1e4326
Details md5 2
e079ec947d3d4dacb21e993b760a65dc
Details md5 1
ad6731c123c4806f91e1327f35194722
Details md5 2
b4587870ecf51e8ef67d98bb83bc4be7
Details md5 1
7533ef5300263eec3a677b3f0636ae73
Details sha1 1
8dc3d053e5008ab92a17dc47fed43213a9873db0
Details sha1 1
04686b0d2fdafa7cb6c17adc551abade334d7b85
Details sha1 1
7f043eb95d74d051ac780aee52ebf1c497c43060
Details sha1 1
4594453e2e4002101481dc44f203d3ffebe079ae
Details sha1 1
09580f1deb096bb50d082bd169271d41756adf73
Details sha1 1
9d133d7e0616573a7d1c822cc878149e7aa7bad6
Details sha1 1
0675329cfa4d13ee35f74c1cc236bc630b7de464
Details sha1 1
f5a1a9180913bbeb1641af48660fbb756325f91e
Details sha1 1
c67abb20ae5100f12ce084279827632fdbcb222a
Details sha256 1
1d5e4466a6c5723cd30caf8b1c3d33d1a3d4c94c25e2ebe186c02b8b41daf905
Details sha256 2
67d9556c695ef6c51abf6fbab17acb3466e3149cf4d20cb64d6d34dc969b6502
Details sha256 1
3e138e4e34c6eed3506efc7c805fce19af13bd62aeb35544f81f111e83b5d0d4
Details sha256 1
8856a68d95e4e79301779770a83e3fad8f122b849a9e9e31cfe06bf3418fa667
Details sha256 1
2dabb2c5c04da560a6b56dbaa565d1eab8189d1fa4a85557a22157877065ea08
Details sha256 1
5a204263cac112318cd162f1c372437abf7f2092902b05e943e8784869629dd8
Details sha256 1
d49690ccb82ff9d42d3ee9d7da693fd7d302734562de088e9298413d56b86ed0
Details sha256 1
8ccc081d4940c5d8aa6b782c16ed82528c0885bbb08210a8d0a8c519c54215bc
Details sha256 1
d9f2467ff11efae921ec83e074e4f8d2eac7881d76bff60a872a801bd45ce3d5
Details IPv4 2
82.146.175.43
Details IPv4 3
192.168.202.1
Details IPv4 1
192.168.202.130
Details IPv4 1
10.11.60.129
Details IPv4 1
10.188.60.129
Details MITRE ATT&CK Techniques 492
T1105
Details MITRE ATT&CK Techniques 695
T1059
Details MITRE ATT&CK Techniques 19
T1205
Details MITRE ATT&CK Techniques 22
T1024
Details MITRE ATT&CK Techniques 23
T1032
Details MITRE ATT&CK Techniques 42
T1158
Details MITRE ATT&CK Techniques 265
T1222
Details MITRE ATT&CK Techniques 23
T1094
Details Url 1
http://www.phenoelit.org/stuff/cd00r.c
Details Url 1
https://gcc.gnu.org/releases.html
Details Yara rule 1
rule APT_MAL_LNX_Turla_Apr202004_1 {
	meta:
		description = "Detects Turla Linux malware x64 x32"
		date = "2020-04-24"
		hash1 = "67d9556c695ef6c51abf6fbab17acb3466e3149cf4d20cb64d6d34dc969b6502"
		hash2 = "8ccc081d4940c5d8aa6b782c16ed82528c0885bbb08210a8d0a8c519c54215bc"
		hash3 = "8856a68d95e4e79301779770a83e3fad8f122b849a9e9e31cfe06bf3418fa667"
		hash4 = "1d5e4466a6c5723cd30caf8b1c3d33d1a3d4c94c25e2ebe186c02b8b41daf905"
		hash5 = "2dabb2c5c04da560a6b56dbaa565d1eab8189d1fa4a85557a22157877065ea08"
		hash6 = "3e138e4e34c6eed3506efc7c805fce19af13bd62aeb35544f81f111e83b5d0d4"
		hash7 = "5a204263cac112318cd162f1c372437abf7f2092902b05e943e8784869629dd8"
		hash8 = "8856a68d95e4e79301779770a83e3fad8f122b849a9e9e31cfe06bf3418fa667"
		hash9 = "d49690ccb82ff9d42d3ee9d7da693fd7d302734562de088e9298413d56b86ed0"
	strings:
		$s1 = "/root/.hsperfdata" ascii fullword
		$s2 = "Desc|     Filename     |  size  |state|" ascii fullword
		$s3 = "VS filesystem: %s" ascii fullword
		$s4 = "File already exist on remote filesystem !" ascii fullword
		$s5 = "/tmp/.sync.pid" ascii fullword
		$s6 = "rem_fd: ssl " ascii fullword
		$s7 = "TREX_PID=%u" ascii fullword
		$s8 = "/tmp/.xdfg" ascii fullword
		$s9 = "__we_are_happy__" ascii fullword
		$s10 = "/root/.sess" ascii fullword
		$s11 = "ZYSZLRTS^Z@@NM@@G_Y_FE" ascii fullword
	condition:
		uint16(0) == 0x457f and filesize < 5000KB and 4 of them
}
Details Yara rule 1
rule APT_MAL_LNX_Turla_Apr202004_1_opcode {
	meta:
		description = "Detects Turla Linux malware x64 x32"
		date = "2020-04-24"
		hash1 = "67d9556c695ef6c51abf6fbab17acb3466e3149cf4d20cb64d6d34dc969b6502"
		hash2 = "8ccc081d4940c5d8aa6b782c16ed82528c0885bbb08210a8d0a8c519c54215bc"
		hash3 = "8856a68d95e4e79301779770a83e3fad8f122b849a9e9e31cfe06bf3418fa667"
		hash4 = "1d5e4466a6c5723cd30caf8b1c3d33d1a3d4c94c25e2ebe186c02b8b41daf905"
		hash5 = "2dabb2c5c04da560a6b56dbaa565d1eab8189d1fa4a85557a22157877065ea08"
		hash6 = "3e138e4e34c6eed3506efc7c805fce19af13bd62aeb35544f81f111e83b5d0d4"
		hash7 = "5a204263cac112318cd162f1c372437abf7f2092902b05e943e8784869629dd8"
		hash8 = "8856a68d95e4e79301779770a83e3fad8f122b849a9e9e31cfe06bf3418fa667"
		hash9 = "d49690ccb82ff9d42d3ee9d7da693fd7d302734562de088e9298413d56b86ed0"
	strings:
		$op0 = { 8D 41 05 32 06 48 FF C6 88 81 E0 80 69 00 }
		$op1 = { 48 FF C1 48 83 F9 49 75 E9 }
		$op2 = { C7 05 9B 7D 29 00 1D 00 00 00 C7 05 2D 7B 29 00 65 74 68 30 C6 05 2A 7B 29 00 00 E8 }
		$op3 = { BF FF FF FF FF E8 96 9D 0A 00 90 90 90 90 90 90 90 90 90 90 89 F0 }
		$op4 = { 88 D3 80 C3 05 32 9A C1 D6 0C 08 88 9A 60 A1 0F 08 42 83 FA 08 76 E9 }
		$op5 = { 8B 8D 50 DF FF FF B8 09 00 00 00 89 44 24 04 89 0C 24 E8 DD E5 02 00 }
		$op6 = { 8D 5A 05 32 9A 60 26 0C 08 88 9A 20 F4 0E 08 42 83 FA 48 76 EB }
		$op7 = { 8D 4A 05 32 8A 25 26 0C 08 88 8A 20 F4 0E 08 42 83 FA 08 76 EB }
	condition:
		uint16(0) == 0x457f and filesize < 5000KB and 2 of them
}