PULSE NAME
APT29 Domain Fronting With TOR
WHITE APT 29 AlienVault 2017-03-27 Modified: 2017-07-24
10
IOCs
LOW VOLUME
Mandiant has observed Russian nation-state attackers APT29 employing domain fronting techniques for stealthy backdoor access to victim environments for at least two years. There has been considerable discussion about domain fronting following the release of a paper detailing these techniques. Domain fronting provides outbound network connections that are indistinguishable from legitimate requests for popular websites. APT29 has used The Onion Router (TOR) and the TOR domain fronting plugin meek to create a hidden, encrypted network tunnel that appeared to connect to Google services over TLS. This tunnel provided the attacker remote access to the host system using the Terminal Services (TS), NetBIOS, and Server Message Block (SMB) services, while appearing to be traffic to legitimate websites. The attackers also leveraged a common Windows exploit to access a privileged command shell without authenticating.
Indicators of Compromise (10)
All FileHash-SHA256 YARA
TYPEINDICATORDESCRIPTIONCREATED
FileHash-SHA256 2f39dee2ee608e39917cc022d9aae399959e967a2dd70d83b81785a98bd9ed36 2017-03-27
FileHash-SHA256 fe744a5b2d07de396a8b3fe97155fc64e350b76d88db36c619cd941279987dc5 2017-03-27
YARA e970b17014fa4a2d0a8b233355095c5fcf714e14 2017-07-24
YARA cd6bd57f8bc62459dc51fad08d43f70355f699db 2017-07-24
YARA 4b254e81b009973f78e0504cda17b08e59eda3aa 2017-07-24
YARA bf44b070aec6efbdca062061c80fd488b0c191aa 2017-07-24
YARA e772889fbfc4fc08ddbebd6d62f12c00459d01e4 Detects PAS Tool PHP Web Kit 2017-07-24
FileHash-SHA256 55058d3427ce932d8efcbe54dccf97c9a8d1e85c767814e34f4b2b6a6b305641 2017-07-24
FileHash-SHA256 9acba7e5f972cdd722541a23ff314ea81ac35d5c0c758eb708fb6e2cc4f598a0 2017-07-24
FileHash-SHA256 9f918fb741e951a10e68ce6874b839aef5a26d60486db31e509f8dcaa13acec5 2017-07-24