APT10 Targeted Norwegian MSP and US Companies in Sustained Campaign
Image Description
Common Information
Type Value
UUID f7e75c49-b91b-4d0d-8acc-1c971e3199d6
Fingerprint 9e88059c015aadbef92a1fbe6df22aeca2f95cc23afddcd4cee2a5a19c98eeff
Analysis status DONE
Considered CTI value 2
Text language
Published Feb. 6, 2019, 12:21 p.m.
Added to db March 10, 2024, 12:50 a.m.
Last updated Aug. 30, 2024, 10:34 p.m.
Headline APT10 Targeted Norwegian MSP and US Companies in Sustained Campaign
Title APT10 Targeted Norwegian MSP and US Companies in Sustained Campaign
Detected Hints/Tags/Attributes 351/4/169
Attributes
Details Type #Events CTI Value
Details Autonomous System Number 1
AS32181
Details Autonomous System Number 2
AS36351
Details Domain 546
www.recordedfuture.com
Details Domain 111
www.justice.gov
Details Domain 1
vpnconsumer.com
Details Domain 1
tailoreddeploy.host
Details Domain 1
www.miphomanager.com
Details Domain 145
www.us-cert.gov
Details Domain 71
blogs.jpcert.or.jp
Details Domain 9
internet.bs
Details Domain 5
cyber-berkut.org
Details Domain 3
ns-canada.topdns.com
Details Domain 2
ns-uk.topdns.com
Details Domain 2
ns-usa.topdns.com
Details Domain 14
content.dropboxapi.com
Details Domain 98
www.ncsc.gov.uk
Details Domain 1
www.llpsearch.com
Details Domain 9
sam.save
Details Domain 1
hemas.microsoft.com
Details File 4
pd.exe
Details File 9
x.bat
Details File 61
1.bat
Details File 2
cu.exe
Details File 1
ss.rar
Details File 18
r.exe
Details File 26
gup.exe
Details File 35
libcurl.dll
Details File 8
unins000.exe
Details File 1
castsp.exe
Details File 89
version.dll
Details File 20
host.exe
Details File 1
tailoreddeploy.exe
Details File 69
vcruntime140.dll
Details File 1
selfdestruction.cpp
Details File 1
mysocket.cpp
Details File 1
commmanager.cpp
Details File 1
common.cpp
Details File 30
main.cpp
Details File 2
manager.cpp
Details File 1
servicemanager.cpp
Details File 1
tcpcomm.cpp
Details File 1
udpcomm.cpp
Details File 1
source-rat.html
Details File 3
unpack200.exe
Details File 1
kkk.rar
Details File 4
pp.rar
Details File 1
dds.rar
Details File 1
gggg.rar
Details File 2
ccseupdt.exe
Details File 42
msvcr100.dll
Details File 96
rar.exe
Details File 93
curl.exe
Details File 9
iisstart.aspx
Details File 4
coinst.exe
Details File 24
c.exe
Details File 1
v2_0.pdf
Details File 1
casrtsp.exe
Details File 30
at.exe
Details File 4
c.bat
Details File 6
lg.exe
Details File 11
ps.exe
Details File 1
dd.dmp
Details File 21
ns.exe
Details md5 1
d8e37f07fdc9827871f0f959519275e1
Details md5 1
f5322b2f18605674b9a0c1757de5fd94
Details md5 1
6807be8466955bafffa568b6da0e785c
Details md5 1
1e3a57cff7cba8732364c26f4bbdcbe2
Details md5 1
5739c1f17503e21e56667d53ea823401
Details md5 1
C8ea12ee884f274ca35fa54a073df130
Details md5 1
8f07160febdb240909b27aa519bba575
Details md5 1
c326c208bc65e6309413d8e699062a39
Details md5 1
0df4d1c641594cfb0df9e8869fa35db8
Details md5 1
1c6aa1b4dfcf6a901b9a00dc3fbbd5a9
Details md5 1
fb922430eca89767438043450c56afcf
Details md5 1
8c4dc1fd8c5de32c5f78cf7b057b0119
Details md5 2
e8e59b44613b5af58688809f8cb6dfa8
Details md5 1
8998D76981C6006B994D6C13D0781EDB
Details md5 1
bbd3c23b9f3451b2c96df24441c76359
Details md5 1
926ac3b9e79042520b69075417a4c157
Details md5 1
e4c0adce9258da655bef089ab0b697b0
Details md5 1
C43F640BBB78CE5032ED15AFB3A9B868
Details md5 1
ee6a293893724c8d719ca00aa45d72d6
Details sha1 1
7c5b35bd14c0633b8d544b5f19c435d0b05c0e1f
Details sha1 2
2e84fd87150a002df98233093f2842337c594604
Details sha1 1
ce878facca3698a129e0633a93e8a9dc4105fe98
Details sha1 1
781069228a9271531cc3fe6b1ba7a5f75db486b6
Details sha1 1
85377f8815f433a3f2a2028ba3d6d2a908b400a4
Details sha1 1
b5dd2dfe09a18e5e97fe0e3d0f8002882c8d056f
Details sha1 1
0c44c5c7cfa9f8e90fd851a68f343f0143a6896e
Details sha256 1
42b5eb1f77a25ad73202d3be14e1833ef0502b0b6ae7ab54f5d4b5c2283429c6
Details sha256 1
f6e0f076e27391a6e6eb23f23f77c2ff078488875113df388640aca8bf4dd64b
Details sha256 1
10182f0e64b765db989c158402c76eb1e0e862cab407f7c5cec133d8e5cb73e3
Details sha256 1
fc6a130504b54fa72cfc104c656fe2cd92d7998f42ca064e22167e1d402a1514
Details sha256 1
e6280de09f9adf79212409529eb25c0c2ea73e33a50281e22228a3db3998eecb
Details sha256 1
eed0c7f7d36e75382c83e945a8b00abf01d3762b973c952dec05ceccb34b487d
Details sha256 1
ad116485f9184c85fd28331edae629c41fc39ec5123f41b15f6507b139a883c1
Details sha256 1
c77535e19e5655f6ef72de3b2318e580095ca396c4383287cf8b5d4896235756
Details sha256 1
bfeb6efee4891de135431091079e659631376953a46065f7e44335df10d16425
Details sha256 1
5c5618e680bc45654dd55f161f195afbac98a7e111e4ef536ed811656582168d
Details sha256 1
465c4e72580f62a340e0555afc857a79ad8b9d86de228efe3627f26690cc45f7
Details sha256 1
243d47fc2a24b391e1153d5c7807c6e5de51aba65fc79465d7b3e5c64d5fac41
Details IPv4 1
104.237.86.0
Details IPv4 1
45.56.155.0
Details IPv4 1
45.62.52.0
Details IPv4 1
173.239.198.0
Details IPv4 1
173.254.236.158
Details IPv4 1
104.237.86.157
Details IPv4 1
104.237.86.183
Details IPv4 1
173.239.198.167
Details IPv4 1
45.56.155.117
Details IPv4 1
45.56.155.143
Details IPv4 1
45.56.155.147
Details IPv4 1
45.62.52.42
Details IPv4 1
45.62.52.7
Details IPv4 1
45.76.30.127
Details IPv4 1
98.159.233.0
Details IPv4 1
45.56.149.0
Details IPv4 1
173.244.55.0
Details IPv4 1
104.238.45.0
Details IPv4 1
85.203.23.0
Details IPv4 1
45.56.148.0
Details IPv4 1
173.239.199.0
Details IPv4 1
104.238.32.0
Details IPv4 1
46.244.28.0
Details IPv4 1
45.56.146.0
Details IPv4 1
104.194.220.0
Details IPv4 1
45.56.158.0
Details IPv4 1
45.56.143.0
Details IPv4 1
173.239.197.0
Details IPv4 1
104.194.218.0
Details IPv4 1
45.56.157.0
Details IPv4 1
45.56.142.0
Details IPv4 1
173.239.195.0
Details IPv4 1
104.194.203.0
Details IPv4 1
45.56.156.0
Details IPv4 1
45.56.141.0
Details IPv4 1
157.97.121.0
Details IPv4 1
104.143.95.0
Details IPv4 1
45.56.140.0
Details IPv4 1
104.37.31.0
Details IPv4 1
104.143.92.0
Details IPv4 1
45.56.154.0
Details IPv4 1
45.56.136.0
Details IPv4 1
104.37.30.0
Details IPv4 1
104.143.84.0
Details IPv4 1
45.56.153.0
Details IPv4 1
45.41.147.0
Details IPv4 1
104.238.62.0
Details IPv4 1
45.56.152.0
Details IPv4 1
45.41.145.0
Details IPv4 1
104.238.59.0
Details IPv4 1
45.56.151.0
Details IPv4 1
45.41.144.0
Details IPv4 1
104.238.58.0
Details IPv4 1
45.56.150.0
Details IPv4 1
185.198.240.0
Details IPv4 1
104.238.51.0
Details Threat Actor Identifier - APT 278
APT10
Details Threat Actor Identifier - APT 78
APT3
Details Threat Actor Identifier - APT 783
APT28
Details Url 2
https://www.us-cert.gov/ncas/alerts/ta17-117a
Details Url 2
https://www.carbonblack
Details Url 1
https://blogs.jpcert.or.jp/en/2017/04/redleaves---malware-based-on-open-
Details Url 1
https://www.us-cert.gov/apts-targeting-
Details Url 3
https://www.us-cert.gov/ncas/alerts/ta18-276b
Details Url 1
https://www.ncsc.gov.uk/content/files/protected_files/article_files/apt10%20alert%20
Details Yara rule 1
rule YARA_CN_APT10_Trochilus_RC4Salsa20_decrypted_payload {
	meta:
		description = "Rule to identify Trochilus variant configured with RC4+Salsa20 encrypted C2 comms used by APT10 in 2018"
		author = "Insikt Group, Recorded Future"
		tlp = "white"
		date = "2019-01-10"
		hash1 = "42b5eb1f77a25ad73202d3be14e1833ef0502b0b6ae7ab54f5d4b5c2283429c6"
	strings:
		$s1 = "NASDKJF7832Hnkjsadf878UHds89iujkhNHKJDHJDH8UIYE98uihwjshewde8w"
		$s2 = "www.miphomanager.com"
		$s3 = { 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F 10 }
		$s4 = { 65 06 06 67 06 08 69 06 0A 6B 06 0C }
	condition:
		(uint16(0) == 0x5a4d and filesize < 1000KB and (2 of them))
}
Details Yara rule 1
import "pe"

rule YARA_CN_APT10_Trochilus_vcruntime140_dll_injector {
	meta:
		description = "Malicious DLL vcruntime140.dll launched using benign CASTSP.exe to inject encrypted shellcode containing 
Trochilus payload"
		author = "Insikt Group, Recorded Future"
		tlp = "white"
		date = "2019-01-16"
		hash1 = "eed0c7f7d36e75382c83e945a8b00abf01d3762b973c952dec05ceccb34b487d"
	strings:
		$s1 = "vcruntime140.dll" ascii fullword
		$s2 = "AppPolicyGetProcessTerminationMethod" ascii fullword
		$s3 = "CASTSP.exe" ascii fullword
		$s4 = "operator co_await" ascii fullword
		$s5 = "api-ms-win-appmodel-runtime-l1-1-2" wide fullword
		$s6 = "<!<(<3<=<E<" ascii fullword
		$s7 = "RUTLFJPBTJSFZZAOJTYP" ascii fullword
	condition:
		uint16(0) == 0x5a4d and filesize < 300KB and (pe.imphash() == "c326c208bc65e6309413d8e699062a39" or all of them)
}
Details Yara rule 1
import "pe"

rule YARA_CN_APT10_Trochilus_version_dll_injector {
	meta:
		description = "Malicious DLL version.dll launched using benign CASTSP.exe to inject encrypted shellcode containing 
Trochilus payload"
		author = "Insikt Group, Recorded Future"
		tlp = "white"
		date = "2019-01-16"
		hash1 = "10182f0e64b765db989c158402c76eb1e0e862cab407f7c5cec133d8e5cb73e3"
	strings:
		$s1 = "AppPolicyGetProcessTerminationMethod" ascii fullword
		$s2 = "CASTSP.exe" ascii fullword
		$s3 = "(p!xLq {Lp Lq h*r!iLq h*t!`Lq h*u!tLq G+y!~Lq G+u!xLq G+q!zLq G+s!zLq Rich{Lq " ascii fullword
		$s4 = "operator co_await" ascii fullword
		$s5 = "api-ms-win-appmodel-runtime-l1-1-2" wide fullword
		$s6 = "CZYSOYKPOIKKZGUFOIUI" ascii fullword
	condition:
		uint16(0) == 0x5a4d and filesize < 300KB and (pe.imphash() == "0df4d1c641594cfb0df9e8869fa35db8" or all of them)
}