Mélofée: a new alien malware in the Panda's toolset targeting Linux hosts
Common Information
Type Value
UUID c712afba-ce62-42e0-9d77-fb07eb918d2d
Fingerprint 9e90961b2cfb3d9d
Analysis status DONE
Considered CTI value 2
Text language
Published March 28, 2023, midnight
Added to db June 1, 2023, 10:51 a.m.
Last updated Nov. 17, 2024, 6:56 p.m.
Headline Mélofée: a new alien malware in the Panda's toolset targeting Linux hosts
Title Mélofée: a new alien malware in the Panda's toolset targeting Linux hosts
Detected Hints/Tags/Attributes 137/4/118
Source URLs
Attributes
Details Type #Events CTI Value
Details Domain 1
www.data-yuzefuji.com
Details Domain 1
git1ab.com
Details Domain 1
cloudf1are.com
Details Domain 1
dev.yuanta.dev
Details Domain 1
dgbyem.com
Details Domain 1
update.ankining.com
Details Domain 1
ssm.awszonwork.com
Details Domain 1
stock.awszonwork.com
Details Domain 1
help.git1ab.com
Details Domain 1
about.git1ab.com
Details Domain 1
www.git1ab.com
Details Domain 1
cdn.cloudf1are.com
Details Domain 1
cdn2.cloudf1are.com
Details Domain 1
cdn3.cloudf1are.com
Details Domain 1
cdn4.cloudf1are.com
Details Domain 1
dns.cloudf1are.com
Details Domain 1
dns2.cloudf1are.com
Details Domain 1
test.yuanta.dev
Details Domain 1
us.securitycloud-symantec.icu
Details Domain 2
vt.livehost.live
Details Domain 35
blackhat.com
Details Domain 60
documents.trendmicro.com
Details Domain 434
medium.com
Details Domain 546
www.recordedfuture.com
Details Domain 30
blog.csdn.net
Details File 15
a.dat
Details File 104
www.dat
Details File 1
socksmanager.cpp
Details File 1
as-22-leonsilvia-nextgenplugxshadowpad.pdf
Details File 3
wp-operation-earth-berberoka.pdf
Details File 32
blog.cs
Details sha256 1
3ca39774a4405537674673227940e306cf5e8cd8dfa1f5fc626869738a489c3d
Details sha256 1
758b0934b7adddb794951d15a6ddcace1fa523e814aa40b55e2d071cf2df81f0
Details sha256 1
a5a4284f87fd475b9474626040d289ffabba1066fae6c37bd7de9dabaf65e87a
Details sha256 1
2db4adf44b446cdd1989cbc139e67c068716fb76a460654791eef7a959627009
Details sha256 1
8d855c28744dd6a9c0668ad9659baf06e5e448353f54d2f99beddd21b41390b7
Details sha256 1
f3e35850ce20dfc731a6544b2194de3f35101ca51de4764b8629a692972bef68
Details sha256 1
330a61fa666001be55db9e6f286e29cce4af7f79c6ae267975c19605a2146a21
Details sha256 1
7149cdb130e1a52862168856eae01791cc3d9632287f990d90da0cce1dc7c6b9
Details sha256 1
a62b67596640a3ebadd288e733f933ff581cc1822d6871351d82bd7472655bb5
Details sha256 1
3535f45bbfafda863665c41d97d894c39277dfd9af1079581d28015f76669b88
Details sha256 1
2e62d6c47c00458da9338c990b095594eceb3994bf96812c329f8326041208e8
Details sha256 1
407ab8618fed74fdb5fd374f3ed4a2fd9e8ea85631be2787e2ad17200f0462b8
Details sha256 1
187b6a4c6bc379c183657d8eafc225da53ab8f78ac192704b713cc202cf89a17
Details sha256 1
2801a3cc5aed8ecb391a9638a3c6f8db58ca3002e66f11bf88f8c7c2e5a6b009
Details sha256 1
6e858c2c9ae20e3149cb0012ab9a24995aa331d2a818b127b2f517bc3aa745a0
Details sha256 1
7684e1dfaeb2e7c8fd1c9bd65041b705bc92a87d9e11e327309f6c21b5e7ad97
Details sha256 1
899ef7681982941b233e1ea3c1a6d5a4e90153bbb2809f70ee5f6fcece06cabc
Details sha256 1
c36ab5108491f4969512f4d35e0d42b3d371033c8ccf03e700c60fb98d5a95f8
Details sha256 1
ad5bc6c4e653f88c451f6f6375516cc36a8fa03dd5a4d1412a418c91d4f9bec8
Details sha256 1
1f9e4bfb25622eab6c33da7da9be6c51cf8bf1a284ee1c1703a3cee445bc8cd9
Details sha256 1
22fd67457274635db7dd679782e002009363010db66523973b4748d5778b1a2a
Details sha256 1
3c1842d29a3445bd3b85be486e49dba36b8b5ad55841c0ce00630cb83386881d
Details sha256 2
5861584bb7fa46373c1b1f83b1e066a3d82e9c10ce87539ee1633ef0f567e743
Details sha256 1
378acfdbcec039cfe7287faac184adf6ad525b201cf781db9082b784c9c75c99
Details sha256 1
617f9add4c27f3bb91a32fee007cce01f5a51deaf42e75e6cec3e71afe2ba967
Details sha256 2
69ff2f88c1f9007b80d591e9655cc61eaa4709ccd8b3aa6ec15e3aa46b9098bd
Details sha256 1
ad979716afbce85776251d51716aeb00665118fb350038d150c129256dd6fc5f
Details sha256 1
f49f1b2cc52623624fdd3d636056b8a80705f6456a3d5a676e3fb78749bdd281
Details sha256 1
2c1a6fe08c8cbdc904809be4c12b520888da7f33123d1656a268780a9be45e20
Details sha256 1
a37661830859ca440d777af0bfa829b01d276bb1f81fe14b1485fa3c09f5f286
Details IPv4 1
173.209.62.186
Details IPv4 1
156.67.208.192
Details IPv4 1
5.61.57.80
Details IPv4 1
147.139.28.254
Details IPv4 1
173.209.62.187
Details IPv4 1
173.209.62.188
Details IPv4 1
173.209.62.189
Details IPv4 1
173.209.62.190
Details IPv4 1
167.172.73.202
Details IPv4 1
47.243.51.98
Details IPv4 1
185.145.128.90
Details IPv4 1
103.87.10.100
Details IPv4 1
202.182.101.174
Details IPv4 1
144.202.112.187
Details IPv4 1
38.54.30.39
Details IPv4 30
192.168.1.101
Details MITRE ATT&CK Techniques 82
T1583.001
Details MITRE ATT&CK Techniques 1
T5183.004
Details MITRE ATT&CK Techniques 442
T1071.001
Details MITRE ATT&CK Techniques 96
T1587.001
Details MITRE ATT&CK Techniques 10
T1037.004
Details MITRE ATT&CK Techniques 86
T1059.004
Details MITRE ATT&CK Techniques 40
T1132.002
Details MITRE ATT&CK Techniques 130
T1573.001
Details MITRE ATT&CK Techniques 585
T1083
Details MITRE ATT&CK Techniques 16
T1592.002
Details MITRE ATT&CK Techniques 94
T1564.001
Details MITRE ATT&CK Techniques 9
T1562.003
Details MITRE ATT&CK Techniques 297
T1070.004
Details MITRE ATT&CK Techniques 1
T1599.001
Details MITRE ATT&CK Techniques 159
T1095
Details MITRE ATT&CK Techniques 115
T1571
Details MITRE ATT&CK Techniques 160
T1027.002
Details MITRE ATT&CK Techniques 28
T1027.007
Details MITRE ATT&CK Techniques 42
T1588.001
Details MITRE ATT&CK Techniques 59
T1588.002
Details MITRE ATT&CK Techniques 433
T1057
Details MITRE ATT&CK Techniques 95
T1572
Details MITRE ATT&CK Techniques 152
T1090
Details MITRE ATT&CK Techniques 41
T1014
Details MITRE ATT&CK Techniques 49
T1608.001
Details MITRE ATT&CK Techniques 15
T1608.002
Details MITRE ATT&CK Techniques 1006
T1082
Details MITRE ATT&CK Techniques 57
T1497.003
Details Threat Actor Identifier by Recorded Future 18
TAG-22
Details Url 1
http://173.209.62.186:8765/installer
Details Url 1
http://173.209.62.186:8765/a.dat
Details Url 1
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/5/html/deployment_guide/s1-kernel-modules-persistant
Details Url 1
https://i.blackhat.com/asia-22/thursday-materials/as-22-leonsilvia-nextgenplugxshadowpad.pdf
Details Url 3
https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/higaisa-or-winnti-apt-41-backdoors-old-and-new
Details Url 2
https://documents.trendmicro.com/assets/white_papers/wp-operation-earth-berberoka.pdf
Details Url 1
https://medium.com/chronicle-blog/winnti-more-than-just-windows-and-gates-e4f03436031a
Details Url 1
https://www.recordedfuture.com/chinese-group-tag-22-targets-nepal-philippines-taiwan
Details Url 1
https://blog.csdn.net/weixin_29100927/article/details/116577862
Details Yara rule 1
rule UNK_APT_MelofeeImplant {
	meta:
		author = "Exatrack"
		date = "2023-03-03"
		update = "2023-03-03"
		description = "Detects the Melofee implant"
		tlp = "CLEAR"
		sample_hash = "a5a4284f87fd475b9474626040d289ffabba1066fae6c37bd7de9dabaf65e87a,f3e35850ce20dfc731a6544b2194de3f35101ca51de4764b8629a692972bef68,8d855c28744dd6a9c0668ad9659baf06e5e448353f54d2f99beddd21b41390b7"
	strings:
		$str_melofee_implant_01 = "10PipeSocket"
		$str_melofee_implant_02 = "ikcp_ack_push"
		$str_melofee_implant_03 = "TLSSocketEE"
		$str_melofee_implant_04 = "/tmp/%s.lock"
		$str_melofee_implant_05 = "neosmart::WaitForMultipleEvents"
		$str_melofee_implant_06 = "9TLSSocket"
		$str_melofee_implant_07 = "7VServer"
		$str_melofee_implant_08 = "N5boost6detail13sp_ms_deleterI13UdpSocketWrapEE"
		$str_melofee_implant_09 = "UdpServerWrap"
		$str_melofee_implant_10 = "KcpUpdater"
		$str_melofee_implant_11 = "SelfForwardServer"
		$str_command_parsing_01 = { 3? 01 00 05 00 ?? ?? ?? ?? 00 00 3? 01 00 05 00 ?? ?? 3? 05 00 04 00 }
		$str_command_parsing_02 = { 3? 04 00 04 00 ?? ?? ?? ?? 00 00 3? 04 00 04 00 ?? ?? 3? 05 00 01 00 }
		$str_command_parsing_03 = { 3? 01 00 07 00 ?? ?? ?? ?? 00 00 3? 01 00 09 00 ?? ?? ?? ?? ?? 00 3? 01 00 06 00 }
	condition:
		3 of them
}
Details Yara rule 1
rule UNK_APT_Melofee_Installer {
	meta:
		author = "Exatrack"
		date = "2023-03-15"
		update = "2023-03-15"
		description = "Detects the installer for melofee malware"
		score = 80
		tlp = "AMBER"
		source = "Exatrack"
		sample_hash = "758b0934b7adddb794951d15a6ddcace1fa523e814aa40b55e2d071cf2df81f0"
	strings:
		$str_melofee_installer_01 = "#Script for starting modules"
		$str_melofee_installer_02 = "#End script"
		$str_melofee_installer_03 = "/etc/intel_audio/"
		$str_melofee_installer_04 = "rm -fr /etc/rc.modules"
		$str_melofee_installer_05 = "-i <data file>      Install"
		$str_melofee_installer_06 = "cteate home folder failed"
		$str_melofee_installer_07 = "create rootkit file failed"
		$str_melofee_installer_08 = "create auto start file failed"
		$str_melofee_installer_09 = "Remove Done!"
		$str_melofee_installer_10 = "Unkown option %c\n"
	condition:
		any of them
}
Details Yara rule 1
rule UNK_APT_Alien_Implant {
	meta:
		author = "Exatrack"
		date = "2023-03-03"
		update = "2023-03-03"
		description = "Detects an unknown implant from AlienManager family, maybe related to melofee"
		tlp = "CLEAR"
		sample_hash = "3535f45bbfafda863665c41d97d894c39277dfd9af1079581d28015f76669b88,"
	strings:
		$str_alien_01 = "[+]  Connect %s Successed,Start Transfer..."
		$str_alien_02 = "Alloc buffer to decrypt data error, length == %d."
		$str_alien_03 = "pel_decrypt_msg data error, error"
		$str_alien_04 = "encrypt data error, length == %d."
		$str_alien_05 = "DoRecvOverlapInternal error!"
		$str_alien_06 = "Socks Listen port is %d,Username is %s, password is %s"
		$str_alien_07 = "Start port mapping error! remoteAddr=%s remotePort=%d localAddr=%s localPort=%d"
		$str_alien_08 = "OnCmdSocksStart error!"
		$str_alien_09 = "The master isn't readable!"
		$str_alien_10 = "ConnectBypassSocks proxy:%s:%d error!"
		$str_alien_11 = "ConnectBypassSocks to %s %d"
		$str_alien_12 = "now datetime: %d-%d-%d %d:%d:%d"
		$str_alien_13 = "Not during working hours! Disconnect!"
		$str_alien_14 = "Example: ./AlienReverse --reverse-address=192.168.1.101:80 --reverse-password=123456"
		$str_alien_15 = "Not during working hours! Disconnect!"
		$str_alien_16 = "SocksManager.cpp"
		$str_alien_17 = "connect() in app_connect"
		$str_alien_18 = "They send us %hhX %hhX"
		$str_alien_19 = "your input directory is not exist!"
		$str_alien_20 = "Send data to local error ==> %d.\n"
	condition:
		any of them
}