A glimpse into the Quad7 operators' next moves and associated botnets
Tags
Common Information
Type | Value |
---|---|
UUID | 7be329a6-3a7c-42ff-8822-863fc0bd7627 |
Fingerprint | a78582549c9b25d9 |
Analysis status | DONE |
Considered CTI value | 2 |
Text language | |
Published | Sept. 9, 2024, 12:30 p.m. |
Added to db | Sept. 9, 2024, 4:12 p.m. |
Last updated | Nov. 17, 2024, 6:54 p.m. |
Headline | A glimpse into the Quad7 operators’ next moves and associated botnets |
Title | A glimpse into the Quad7 operators' next moves and associated botnets |
Detected Hints/Tags/Attributes | 87/3/38 |
Source URLs
URL Provider
RSS Feed
Details | Id | Enabled | Feed title | Url | Added to db |
---|---|---|---|---|---|
Details | 59 | ✔ | Sekoia.io Blog | https://blog.sekoia.io/feed/ | 2024-08-30 22:08 |
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 2 | exec.sh |
|
Details | Domain | 118 | sekoia.io |
|
Details | 18 | tdr@sekoia.io |
||
Details | File | 1 | fsy.bin |
|
Details | File | 1 | fsy.tar |
|
Details | File | 1 | netd.dat |
|
Details | File | 13 | sys.dat |
|
Details | md5 | 2 | 408152285671bbd0e6e63bd71d6abaaf |
|
Details | md5 | 2 | 5efc7d824851be9ec90a97d889a40d23 |
|
Details | md5 | 2 | f42849076e24b7827218f7a25bc11ccc |
|
Details | md5 | 2 | 92093dd7ba6ae8fe34a215c4c4bd1cd4 |
|
Details | md5 | 2 | e6f6a6de285d7c2361c32b1f29a6c3f6 |
|
Details | md5 | 2 | b3b09819f820a4ecd31f82f369000af2 |
|
Details | md5 | 2 | 3c4b3d1480952d6ddfe434fef07054f7 |
|
Details | md5 | 2 | cdb37db4543dde5ca2bd98a43699828f |
|
Details | md5 | 2 | 22633ef920f0093e3d720e7bbeb9fec8 |
|
Details | md5 | 2 | d617f43163cb0f355dbf63058aa82d1d |
|
Details | md5 | 2 | 150d444848a02be230ed9fbf3692d226 |
|
Details | md5 | 2 | 43ea387b8294cc4d0baaef6d26ff7c72 |
|
Details | md5 | 2 | 4d9067e7cf517158337123a30a9bd0e3 |
|
Details | md5 | 2 | 8542a3cbe232fe78baa0882736c61926 |
|
Details | md5 | 2 | 777d6f907da38365924a0c2a12e973c5 |
|
Details | md5 | 2 | 470c6ee61b4314721a8cc9ebafe8fef8 |
|
Details | md5 | 2 | 1b08725acc371f6b7d05bb72d0c2d759 |
|
Details | md5 | 2 | 40b5ac87ff87634c48fdd2cf64ccb66b |
|
Details | md5 | 2 | 199045538d9c139f9cf562d5b76a5cd5 |
|
Details | md5 | 2 | 4b8e97260d9ef6ca774675be682d9c8c |
|
Details | md5 | 2 | 5b0a28631ca106c31e1d5e81d8e25297 |
|
Details | IPv4 | 1 | 158.247.194.125 |
|
Details | IPv4 | 1 | 45.77.44.119 |
|
Details | IPv4 | 1 | 151.236.20.30 |
|
Details | IPv4 | 1 | 103.140.239.63 |
|
Details | IPv4 | 1 | 103.57.248.202 |
|
Details | Threat Actor Identifier - APT | 783 | APT28 |
|
Details | Yara rule | 1 | rule unk_Quad7_UPDTAE_backdoor_strings { meta: id = "02d5394e-734c-4744-b293-1bf96bf1518c" version = "1.0" malware = "UPDTAE backdoor" intrusion_set = "Quad7 Botnet operators" description = "UPDTAE backdoor used by Quad7 operators" source = "Sekoia.io" creation_date = "2024-08-19" classification = "TLP:GREEN" hash = "40b5ac87ff87634c48fdd2cf64ccb66b" hash = "4b8e97260d9ef6ca774675be682d9c8c" strings: $ = "User-Agent: IOT" $ = "/iot/post" $ = "vender" $ = "Response: %s" $ = "cmdNum" $ = "UPDTAE" $ = "cmdResult" condition: uint32be(0) == 0x7f454c46 and filesize < 5MB and 4 of them } |
|
Details | Yara rule | 1 | rule unk_Quad7_wildcard_login { meta: id = "01510244-0795-4299-aa66-056a2b4682e7" version = "1.0" intrusion_set = "Quad7 Botnet operators" malware = "xlogin" description = "Detects the *login bind shells" source = "Sekoia.io" creation_date = "2024-07-18" classification = "TLP:CLEAR" hash = "4d9067e7cf517158337123a30a9bd0e3" hash = "43ea387b8294cc4d0baaef6d26ff7c72" hash = "777d6f907da38365924a0c2a12e973c5" hash = "8542a3cbe232fe78baa0882736c61926" strings: $string1 = { 2F 62 69 6E 2F 73 68 00 2F 74 6D 70 2F 6C 6F 67 69 6E } $string2 = { 2F 62 69 6E 2F 73 68 00 2D 63 00 65 78 69 74 20 30 } condition: uint32be(0) == 0x7f454c46 and filesize < 180KB and @string2 - @string1 < 3400 } |
|
Details | Yara rule | 1 | rule unk_Quad7_FsyNet_strings { meta: id = "897b2421-c177-48c0-8f5b-82d8434208cb" version = "1.0" malware = "FsyNet" intrusion_set = "Quad7 Botnet operators" description = "Matches node-r-control, asr_node, node-relay" source = "Sekoia.io" creation_date = "2024-08-20" classification = "TLP:GREEN" hash = "f42849076e24b7827218f7a25bc11ccc" hash = "b3b09819f820a4ecd31f82f369000af2" hash = "92093dd7ba6ae8fe34a215c4c4bd1cd4" hash = "e6f6a6de285d7c2361c32b1f29a6c3f6" hash = "408152285671bbd0e6e63bd71d6abaaf" hash = "5efc7d824851be9ec90a97d889a40d23" strings: $ = "prev_hop_port" $ = "next_hop_port" $ = "back_hop_port" $ = "next_tsn_port" $ = "prev_hop_ip" $ = "next_hop_ip" $ = "back_hop_ip" $ = "next_tsn_ip" $ = "ikcp_" $ = "/tmp/log_r" $ = "total_hop" condition: uint32be(0) == 0x7f454c46 and filesize < 5MB and 6 of them } |
|
Details | Yara rule | 1 | rule unk_Quad7_netd_strings { meta: id = "3f527f0e-c101-4356-9024-fc61aea644d1" version = "1.0" malware = "netd" intrusion_set = "Quad7 Botnet operators" description = "Matches netd binary" source = "Sekoia.io" creation_date = "2024-08-23" classification = "TLP:GREEN" hash = "cdb37db4543dde5ca2bd98a43699828f" hash = "22633ef920f0093e3d720e7bbeb9fec8" strings: $ = "./netd.dat" $ = "./sys.dat" $ = "--conf" $ = "--init" $ = "--nobg" $ = "Url is NULL." condition: uint32be(0) == 0x7f454c46 and filesize < 1MB and 4 of them } |