Introduction
At the end of 2019, the team at the Positive Technologies Expert Security Center (PT ESC) discovered a new cybercrime group, which they dubbed Space Pirates. It had been active since at least 2017. The first-ever comprehensive research paper describing the group saw light in early 2022. The Space Pirates group have since stepped up attacks on Russian companies: we have come across the group frequently while investigating cyberattacks in the past year. They have hardly changed their tactics, but they have developed new tools and improved their old ones.
The cybercriminals’ main goals are still espionage and theft of confidential information, but the group has expanded its interests and the geography of its attacks. Over the year, at least 16 organizations have been attacked in Russia and one in Serbia. Some of the new victims that we identified are Russian and Serbian government and educational institutions, private security companies, aerospace manufacturers, agricultural producers, defense, energy, and infosec companies.
1. Investigating the network infrastructure
We found an Acunetix installation on one of the Space Pirates command-and-control (C&C) servers, which suggested that the group exploited vulnerabilities—an attack vector we had not seen it use earlier.
During our investigation, we noticed that the group was interested in PST email archives (among other targets). A configuration error on a Space Pirates C&C server allowed us to scan its contents, discovering two email archives belonging to a Serbian ministry.
We alerted the ministry via Serbia’s National CERT. Other contents of the server included a Godzilla web shell and an obfuscated Neo-reGeorg tunnel.
The Space Pirates network infrastructure continues to use a small number of IP addresses as indicated by the DDNS domains. The malicious actors often reuse old website URLs by creating high-level domains, such as ruclient.dns04.com.ruclient.dns04.com.
The group had also begun using the ShadowPad malware, something we discovered as we were tracking changes in the hacker infrastructure using our internal ScanDat automated system. An alert we received pointed to a chain of SSL certificates characteristic of ShadowPad. That chain was covered in one of our previous reports. As we continued to investigate the incident in question, we found a copy of ShadowPad used by the Space Pirates group in the client’s systems.
2. Analysis of the malware and tools
2.1. Deed RAT
Virtually every investigation we conducted found that the group was using Deed RAT. As far as we can tell, the Space Pirates group is moving away from other backdoors. Code similarities between Deed RAT and ShadowPad, noted by our peers, suggest that the backdoor is an evolution of ShadowPad. ShadowPad is in turn believed to be an evolution of PlugX. Unlike ShadowPad and PlugX, though, Deed RAT has been known to be exclusive to the Space Pirates group to date.
The backdoor is still under active development. We found a 64-bit version of Deed RAT on an infected device while investigating the incident. The structure of the main module and plugin headers is all but identical to the 32-bit version. Below is what it looks like:
struct SectionHeader { DWORD VirtualSize; DWORD SizeOfRawData; }; struct ModuleHeader { DWORD Signature; // 0xDEED4554 DWORD ModuleId; DWORD EntryPoint; QWORD OriginalBase; DWORD AbsoluteOffset; SectionHeader Sections[3]; DWORD RelocationsVirtualSize; };
The string encryption algorithm in recent versions is somewhat different. String length is no longer specified, and strings are null-terminated.
We found computers infected with Deed RAT to contain two plugins, retrieved dynamically from the C&C server. The first one is named Disk, has the identifier 0×250, and is used as a disk tool. Essentially a Windows API wrapper, Disk supports the 10 network commands described below.
Identifier |
Description |
0х250 |
List disks |
0х251 |
List files inside folder |
0х252 |
List files inside folder recursively. The response returns the fields of the WIN32_FIND_DATAW structure, such as timestamp, size, attributes, and name |
0х253 |
Call the SHFileOperation function with specified operation code and flags FOF_NOERRORUI | FOF_NOCONFIRMMKDIR | FOF_NOCONFIRMATION | FOF_SILENT | FOF_MULTIDESTFILES |
0х254 |
Execute command via CreateProcess |
0х255 |
Get file attributes and content |
0х257 |
Write file to specified path with attributes |
0х259 |
Create folder |
0х25A |
List network resources |
0х25B |
Connect network drive. The command sends a NETRESOURCEW structure |
The other plugin is named Portmap and has the identifier 0×290. The hackers likely based it on the ZXPortMap utility often used by Asian cybercrime groups. The plugin is used for port forwarding and supports three network commands, each corresponding to an operating mode.
Identifier |
Description |
0х290 |
Proxy one request |
0х292 |
Start simple proxy on specified port |
0х294 |
Start SOCKS5 proxy without authentication on specified port |
Additionally, the main module code contains a reference to a module with the identifier 0xC0, which we did not come across. Apparently, it was a built-in module that executed some actions before the backdoor started.
The configuration header in recent versions looks as follows:
struct DeedRATConfigHeader { DWORD Signature; // 0xC88CDB32 BYTE UnusedFlag; WORD pInitialKey; BYTE PairReplacableFlag1; WORD pInstallationPath; WORD pSideLoadingDllName; WORD pShellcodeName; WORD pServiceName; WORD pDisplayedServiceName; WORD pServiceDescription; WORD pPersistentRegistryKey; WORD pPersistentRegistryValue; BYTE PairReplacableFlag2; WORD pTargetProcessForInject1; WORD pTargetProcessForInject2; WORD pTargetProcessForInject3; WORD pTargetProcessForInject4; WORD pBotID; BYTE UnusedFlag; WORD pMutexName; BYTE Unknown[58]; BYTE DayOfWeek1; BYTE StartHour1; BYTE EndHour1; BYTE DayOfWeek2; BYTE StartHour2; BYTE EndHour2; BYTE DayOfWeek3; BYTE StartHour3; BYTE EndHour3; BYTE DayOfWeek4; BYTE StartHour4; BYTE EndHour4; BYTE DnsFlag; DWORD DnsIP1; DWORD DnsIP2; DWORD DnsIP3; DWORD DnsIP4; BYTE DohFlag; WORD pDohAddress1; WORD pDohAddress2; WORD pDohAddress3; WORD pDohAddress4; BYTE Unknown[34]; WORD pC2Url1; WORD pC2Url2; WORD pC2Url3; WORD pC2Url4; BYTE UnusedFlag; WORD pProxyUrl1; WORD pProxyUrl2; WORD pProxyUrl3; WORD pProxyUrl4; BYTE Unknown[3]; };
The rest of the configuration consists of encrypted strings referenced in the header.
The DNS list in the configuration remains unchanged as follows: 8.8.8.8 (Google Public DNS), 1.1.1.1 (Cloudflare DNS), 9.9.9.9 (Quad9 DNS), 222.222.67[.]208. The final DNS likely should be spelled as 208.67.222.222 (Cisco OpenDNS). The config seems to use little-endian addressing, rather than the network byte order. The likely reason why the error might have gone unnoticed so far is that this address is the last one on the list and seldom sees use, while the others are not affected by endianness.
Never once did we see a DNS service hosted at 222.222.67[.]208. We have seen similar attempts to resolve domain names using non-existent DNS servers (see figure below).
Queries like these are a likely sign of Deed RAT infection.
Unlike the sample described above, the backdoor contains the environment pseudovariable %AUTOPATH%, used in the configuration field InstallationPath and, depending on backdoor permissions and system bitness, resolved as follows:
- %AppData% if the backdoor is missing administrator permissions
- %ProgramFiles(x86)% if the backdoor has administrator permissions and the system is 64-bit Windows
- %ProgramFiles% if the backdoor has administrator permissions and the system is 32-bit Windows
We have seen a similar implementation in PlugX, which used the variable %AUTO%.
It seems interesting in light of the group’s presumed Chinese origins that the number four is a regular feature of the code: four days on which the backdoor cannot run, four links to C&C servers, four links to proxies, four inject processes the malware into, four DNS servers, four DoH addresses. The pronunciation of the Chinese character 四 (four) differs from 死 (death) only in tone, thus the number four is considered unlucky.
2.2. Voidoor
During an investigation, we obtained a sample of unknown, functionally different malware. Our timeline of the sample appearing on the infected computer suggested that the malware is delivered via Deed RAT already installed on the machine and belongs to the Space Pirates group. We were later shown to be right. We named the malware Voidoor, after the C&C server and the backdoor malware type.
Compiled at the end of 2022, Voidoor is a 32-bit EXE file containing the PDB path "C:\_\Project1\Release\Project1.pdb".
Most of the strings inside are XOR-encoded with the key 0×22.
The Voidoor life cycle can be broken down into the following phases:
- Preparation
- Talking to GitHub repositories
- Gaining persistence
- Talking to the voidtools forum
- Talking to GitHub
2.2.1. Preparatory phase
The sample starts by trying to open port 27015. If unsuccessful, the process is terminated, so that only one sample is left running at any given time. This is followed by decrypting the bulk of the strings. These can be broken down into the following groups:
- Talking to GitHub: access token, HTTP headers, user name, user repositories, names of files to be downloaded and run
- Talking to the voidtools forum: URI with parameters
- Talking to both GitHub and voidtools: User-Agent header: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.0.0 Safari/537.36. The HTTP header in the network commands is written in lowercase, unlike the other fields
- Local activity: name of scheduler task, paths of files created by Voidoor
The above strings are decrypted inside one function, and they can be categorized as file configuration. In addition to that, as the malware runs, it decrypts locally used strings.
This phase also sees Voidoor use the victim identifier, stored in a %TEMP%/ids file. If not present, the file is created, with three concatenated random numbers used as the ID.
2.2.2. Talking to GitHub repositories
A personal access token hard-coded in the sample tells us a few things about the owner and their repositories:
Token issuer: hasdhuahd Token issuer url: https://api.github.com/users/hasdhuahd User created at: 2022-11-23T01:08:24Z User updated at: 2023-03-20T07:47:54Z Project: hasdhuahd/919A1C3FD38A41D89ED53F1967AF443D Created at: 2022-11-23T03:44:21Z Visibility: private Project: hasdhuahd/myprivaterepo-1 Created at: 2022-11-23T03:44:32Z Visibility: private Project: hasdhuahd/13F20E32BDBA46229631517AB130A7E7 Created at: 2022-11-24T04:39:35Z Visibility: public Project: hasdhuahd/al-khaser Created at: 2022-12-07T08:16:58Z Visibility: public
- hasdhuahd/919A... acts as the C&C center.
- hasdhuahd/myprivaterepo-1 holds the tools used by the malware.
- hasdhuahd/13F2... contains the only file that has a UUID. Its function is unknown.
- hasdhuahd/al-khaser is a fork of a public antivirus benchmarking utility.
The sample assembles the paths to the repositories it will use.
Network communication is handled by libcurl.
Voidoor’s first task is to tell the operators about the new victim. To do this, it builds the link https://api.github.com/repos/hasdhuahd/919A.../git/trees/main?recursive=1 and downloads the file 1A11878899834F1591DFADC277B2132E. If network is unavailable, the program will keep trying until it can download the file. The file maintains a victim list of several dozen strings consisting of a computer name and a pre-generated identifier.
The JSON file returned by GitHub is parsed by chopping it into substrings.
If the above list does not contain a the identifier generated for the victim, Voidoor sends an HTTP PUT request to api.github.com. GitHub supports adding and modifying files with PUT requests as detailed here: docs.github.com/en/rest/repos/contents#create-or-update-file-contents. Remarkably, this phase includes the decryption of a string in the malware code that will be modified later:
{"message": "commit message", "content": "dGhpcyBpcyBkb25l", "sha": "164adc449d458c4b0819bb348db9b07ca2fc367d", "branch": "main"}
The sequence dGhpcyBpcyBkb25l turns into "this is done". This string is replaced with the ID to be added, and the resulting value is sent to the file 164adc449d458c4b0819bb348db9b07ca2fc367d. The sample then calls the repository myprivaterepo-1, downloading a shellcode file XOR-encrypted with the key 0×22 to the folder %TEMP%\myfile.bin.
It is worth noting that the developer has implemented integrity control by appending a SHA-256 checksum to the end of the file names, which is derived from the downloaded files and checked.
Judging by the corrupted shellcode files in the repository history, this desperate measure was intended as an extra guarantee that the file is valid. Interestingly enough, at some point, the developer began to additionally encode binary files in Base64 to avoid byte interpretation issues when storing these in Git.
Then, the sample terminates every process with the name ConsoleApplication1.exe, downloads a file with that name from the tooling repository, and saves it to the folder with the shellcode.
2.2.3. Gaining persistence
Voidoor generates a scheduler task as follows:
schtasks /create /tn MyApp /tr <File path> /sc minute /mo 1 /f && schtasks /create /tn MyApp /tr <File path> /sc minute /mo 1 /ru system /f
This task runs the malware every minute, with system permissions if possible. Clashes that may be caused by this outrageous frequency are avoided by checking port 27015. Notable is the method of gaining persistence: the malware uses the previously downloaded file ConsoleApplication1.exe, which is also used to run the shellcode. The process then generates a task inside the file orderFile.txt, formatting its contents in a way that resembles the output of certutil -encode (see figure below).
A Base64-encrypted command is placed in the BEGIN CERTIFICATE and END CERTIFICATE strings. The program runs the file ConsoleApplication1, which decrypts the shellcode (using the operation XOR 0×22) and runs it. The file logic is as follows:
cmd /c certutil -decode C:\Users\Public\Downloads\orderFile.txt C:\Users\Public\Downloads\silentBase.bat && echo 1 > C:Users\Public\Downloads\checkString || echo 1 > C:\Users\Public\Downloads\checkString cmd /c type C:\Users\Public\Downloads\silentBase.bat>C:\Users\Public\Downloads\Basesilent.txt && copy C:\Users\Public\Downloads\Basesilent.txt C:\Users\Public\Downloads\silentBase.bat && del C:\Users\Public\Downloads\Basesilent.txt && echo 1>C:\Users\Public\Downloads\checkString || echo 1>C:\Users\Public\Downloads\checkString cmd /c C:\Users\Public\Downloads\silentBase.bat &&echo 1>C:\Users\Public\Downloads\interResultFile.txt && echo 1>C:\Users\Public\Downloads\checkString || echo 1>C:\Users\Public\Downloads\checkString Removal of API files via Windows C:\Users\Public\Downloads\houston, C:\Users\Public\Downloads\interResultFile.txt, C:\Users\Public\Downloads\silentBase.bat
It can be simplified as follows:
# Decode orderFile.txt to silentBase.bat cd C:\Users\Public\Downloads certutil -decode orderFile.txt silentBase.bat # Use type and copy commands to complicate automated tracking of links between processes and artifacts type silentBase.bat>Basesilent.txt copy Basesilent.txt silentBase.bat del Basesilent.txt # Execute the script—in this case, the main file persistence logic silentBase.bat # Clean up temporary files
2.2.4. Talking to the voidtools forum
To support further operation, the program creates an invisible window with two threads.
The second thread serves the simple purpose of standing by for ten hours, then activating the termination flag for the first one.
The flag will be checked in the global cycle of the first thread.
The checks relating to the forum part must be passed to proceed to the next phase.
First, the thread decrypts the strings https://www.voidtools.com, /forum/ucp.php, and ?i=ucp_pm&mode=options. "UCP" means "User Control Panel" in the context of this website. Interestingly, the sample adds "asdasdasd" to the cookie request header, but we could not find any common sense in that.
The process concatenates the strings and sends a request to the resulting address. If there is a connection, the request will be redirected to the login page.
The sample will then send a POST request to log in to the forum using the hard-coded login and password, and if successful, store the values of the phpbb3_h6rei_u, phpbb3_h6rei_k, and phpbb3_h6rei_sid cookies, which are required for the session.
The forum has a personal messaging system that supports custom rules.
The sample will try to define a new rule even if this rule already exists:
check_option=1&rule_option=1&rule_string=^<victim ID>^&rule_user_id=0&rule_group_id=0&cond_option=text&action_option=1|0&add_rule=Add rule&foldername=&rename_folder_id=8&new_folder_name=&remove_folder_id=8&remove_action=1&move_to=0&full_move_to=0&full_action=3&creation_time=<device timestamp>&form_token=<parsed token from the page>
The malware will download the page with the list of rules again. This time, though, it is looking for a folder whose name features the victim ID.
The folder must be created by the C&C server, or else the sample will get stuck in a loop for ten hours repeatedly adding the new rule. Multiple folders cannot be created, as the sample will take the first entry for comparison. We suspect this means that the C&C server can communicate with only one sample via GitHub at any given time.
The forum is powered by the phpBB engine; it proved to be a treasure trove of useful information.
The forum notably requires some activity from users before allowing them to send email.
The so-called "Remember me" login keys were a real catch. This function helps to manage active sessions whose tokens are stored client-side. If the device is stolen, the user can block it by removing the key from the list. The device will lose access to the profile, and the forum will ask for a user name and password to log in again. This is a legacy feature based on a use case that was described in a 2004 post we found on the phpBB community forum. We consider that functionality to be dangerous.
We found more than 3,500 login events associated with 73 unique IP addresses, and we were able to attribute voidoor to the APT group after discovering a series of logins from Space Pirates IP addresses that occurred within days of registering the account. By correlating these events with activities in the GitHub repository, we established that these logins took place during the malware development and testing phases.
The hackers have targeted universities, healthcare centers, energy companies, private security providers and government organizations in Russia and Serbia.
2.2.5. GitHub-based C&C server
The sample switches to the communication mode based on GitHub commands. It searches the repository 919A... for a file whose name consists of two parts: a string of the same type as the value returned by the command and an identifier.
Communication takes place as follows:
- The malware receives a command in the specified file. The command consists of three strings: the command identifier, the return value type, and the command body. We are aware of the following two return value types:
- D737C9A763E941BDAA69C6EE83553014: download the file from the victim’s computer and upload it to GitHub
- 139445A83B5B4ED79FAF4439FC7FFE69: execute the command
- The sample runs the above task and uses a PUT request to upload an object with the name formatted as <command type> + <victim identifier> to the repository.
- The process loops to the start: the sample returns to standby mode, waiting to get a command with an identifier different from the previous one.
Example of this kind of communication:
datetime: 2022-11-24 12:40:59+08:00 message: commit message 1A11878899834F1591DFADC277B2132E 2 insertions, 0 deletions, 2 lines (file with the new infected victim added) >>> \n DESKTOP-94KT1VQ+200882088117246 <<< datetime: 2022-11-24 12:42:05+08:00 message: commit message D7B3FDC2EABE453BB39FA73557FC77F3200882088117246 4 insertions, 0 deletions, 4 lines >>> uuid: 8b0e4a01-b242-45a4-a86d-25ab54a3308a md5: 139445A83B5B4ED79FAF4439FC7FFE69 cmd: hostname <<< datetime: 2022-11-24 12:46:30+08:00 message: commit message A2EE1A74A32344FEA87A42D395013499200882088117246 5 insertions, 0 deletions, 5 lines >>> GB18030 (simplified_chinese): C:\mylittletrojan\shellcodeloader\thumb_drive-main\thumb_drive_copy_real_time\7z2200-src\CPP\7zip\UI\Client7z>hostname DESKTOP-94KT1VQ <<<
Unfortunately, our copy of the file is missing that functionality: the command identifier includes an extraneous hard-coded identifier with an unknown return value type: D7B3FDC2EABE453BB39FA73557FC77F3171542571331346. The string prevents the code from executing correctly, causing the sample to loop for ten hours, as the termination flag that the cycle checks is set by the second thread. As the string is XOR-encrypted in its entirety inside the file, the function can be considered deactivated but not removed.
2.2.6. Some facts about the developer of the tool
By analyzing the GitHub repositories, we can easily identify the testing and operation phases of the malware. We know that the name of the hacker’s device is desktop-94kt1vq. Online search returns a blog on Chinese Software Developer Network.
The user posts a lot, with a total of 177 original entries, and importantly for us, his name in the system ("X") matches the name used by the C&C server.
Some of the user's other noteworthy blog posts deal with storing files on GitHub, using IDA Pro and reverse engineering in general, and kernel programming.
The profile description caught our eyes too.
This mentions another account, abandoned in March 2021.
This other blog focuses mostly on pentesting, vulnerability analysis, and descriptions of internal Windows mechanics.
By comparing these pieces of information (matching computer names, user names, and relevant skills), we can assume with some confidence that this person is one of the developers of the malware in question, if not the only one.
2.3. Other tools
Besides the backdoors described above, the hackers have made use of the following publicly available network tools:
- Stowaway
- Mimikatz
- fscan
- procdump
- PortQry версии 2.0 Gold
- NetSess
- NBTscan
- PsExec
- KrbRelayUp
- SharpRoast
- nmap
- Impacket
- CHAOS
- reGeorg
- Neo-reGeorg
- Godzilla (web shell)
- xсmdsvc
The group often uses tools written in Golang and obfuscated with Garble. We also found a homebrew utility that is not available publicly and likely has been developed by the Space Pirates group. It monitors connected drives, collecting files from every newly appearing device and creating a new database record. The utility uses the 7z.dll library to pack files into an archive with a name formatted as hh.mm.ss, where hh is the current hour, mm is the current minute, and ss is the current second. All archives are saved to C:\Users\Public\Downloads\dest.
The utility uses two database files: 1.db in place of mutexes and 2.db for logging connected devices. Information about the latest changes to the removable drive contents is stored here as well, so the utility can check if it needs to copy any new files. The program masquerades as the 7-Zip file archiver.
Conclusion
The Space Pirates group is relentlessly stepping up activity targeting Russian companies: the number of attacks has increased manifold. The hackers are working on new malware that implements unconventional techniques, such as voidoor, and modifying their existing malware. In addition, we have seen a drastic reduction in the use of other backdoors characteristic of the group and an increase in attacks that employ Deed RAT.
The Space Pirates group uses a large number of publicly available tools for navigating networks. The hackers also use Acunetix to reconnoiter infrastructures it targets. Meanwhile, the group’s tactics have hardly changed.
The cybercriminals’ main goals are still espionage and theft of confidential information, but the group has expanded its interests and the geography of its attacks.
The PT ESC team continues to monitor and respond to threats, including those associated with the Space Pirates group.
Authors: Denis Kuvshinov, Stanislav Rakovsky, Stanislav Pyzhov
Applications
Verdicts by Positive Technologies products
Network rules
10007678 SUSPICIOUS [PTsecurity] TLS Server Certificate (Some-Company Some-State)
10007870 SUSPICIOUS [PTsecurity] Multiple attempting to connect to an external non-http/smtp server
10007917 SUSPICIOUS [PTsecurity] Multiple POST request
10008972 SUSPICIOUS [PTsecurity] GET request in TCP
10008973 SUSPICIOUS [PTsecurity] POST request in TCP
YARA rules
apt_mem_CN_SpacePirates__Backdoor__DeedRAT____EncryptionArtifacts__R1
apt_win86_CN_SpacePirates__Backdoor__Github__And__Voidtools__Backdoor
apt_win86_CN_SpacePirates__Shellcode__From__Github
apt_win_CN_SpacePirates__Trojan__DllLoader
crime_linux_ZZ_Chaos__Backdoor
tool_multi_ZZ_NBTscan__HackTool
tool_multi_ZZ_Stowaway__HackTool
tool_multi_ZZ_fscan__HackTool
tool_win_CN_ShadowPad__Backdoor__NewDecrypt
tool_win_ZZ_GhostPack__HackTool__SharpRoast
tool_win_ZZ_GodzillaShell__Backdoor
tool_win_ZZ_GolangObfuscation__RiskTool__Garble
tool_win_ZZ_KrbRelay__HackTool__Strings
tool_win_ZZ_Mimikatz__HackTool__Generic
tool_win_ZZ_ProcDump__Hacktool
tool_win_ZZ_PsExec__Hacktool
tool_win_ZZ_reGeorg__Backdoor__WebShell
Behavioral rules
Trojan.Win32.Generic.a
Trojan.Win32.Evasion.a
Trojan.Script.Impacket.a
Backdoor.Elf.Chaos.a
Trojan.MachineLearning.Generic.a
Create.Process.ProcDump.CredentialDumping
Create.Process.PortQry.NetworkConnectionsDiscovery
Create.Process.NBTscan.NetworkSniffing
MITRE
ID |
Name |
Description |
Reconnaissance |
|
|
T1595.002 |
Active Scanning: Vulnerability Scanning |
The Space Pirates group uses Acunetix to search for vulnerabilities in victim infrastructures |
Initial Access |
|
|
T1566.001 |
Phishing: Spearphishing Attachment |
Space Pirates uses phishing emails with malicious attachments |
T1566.002 |
Phishing: Spearphishing Link |
Space Pirates uses phishing emails with links to malware |
Execution |
|
|
T1059.003 |
Command and Scripting Interpreter: Windows Command Shell |
Space Pirates malware features remote command shell functionality |
T1059.005 |
Command and Scripting Interpreter: Visual Basic |
Space Pirates uses VBS scripts, including ReVBShell |
T1106 |
Native API |
Space Pirates malware uses WinAPI functions to run new processes and implement shellcode |
T1053.002 |
Scheduled Task/Job: At (Windows) |
Space Pirates uses atexec.py to run commands on a remote host |
T1053.005 |
Scheduled Task/Job: Scheduled Task |
Space Pirates uses system tasks |
T1569.002 |
System Services: Service Execution |
Space Pirates creates malicious services |
Persistence |
|
|
T1053.005 |
Scheduled Task/Job: Scheduled Task |
Space Pirates creates system tasks for persistence on the host |
T1543.003 |
Create or Modify System Process: Windows Service |
Space Pirates creates malicious services for persistence on the host |
T1546.015 |
Event Triggered Execution: Component Object Model Hijacking |
RtlShare malware persists in the system through substitution of the MruPidlList COM object |
T1547.001 |
Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder |
For persistence on the host, Space Pirates can place a shortcut in the autorun folder and use the Run and RunOnce registry keys |
Privilege Escalation |
|
|
T1548.002 |
Abuse Elevation Control Mechanism: Bypass User Account Control |
Space Pirates malware contains various techniques for bypassing UAC |
T1068 |
Exploitation for Privilege Escalation |
Space Pirates can exploit the CVE-2017-0213 vulnerability for privilege escalation |
Defense Evasion |
|
|
T1027.001 |
Obfuscated Files or Information: Binary Padding |
The RtlShare dropper adds random bytes to the extracted payload |
T1027.002 |
Obfuscated Files or Information: Software Packing |
One of the stages of the BH_A006 malware is obfuscated using an unknown protector |
T1036.004 |
Masquerading: Masquerade Task or Service |
Space Pirates uses legitimate-looking names when creating services |
T1036.005 |
Masquerading: Match Legitimate Name or Location |
Space Pirates masks its malware as legitimate software |
T1055 |
Process Injection |
Space Pirates malware can inject shellcode into other processes |
T1055.001 |
Process Injection: Dynamic-link Library Injection |
Space Pirates malware can inject DLLs with payload into other processes |
T1078.002 |
Valid Accounts: Domain Accounts |
Space Pirates uses compromised privileged credentials |
T1112 |
Modify Registry |
Deed RAT stores all its data in the registry, including configuration and plugins |
T1140 |
Deobfuscate/Decode Files or Information |
Space Pirates malware uses various algorithms to encrypt configuration data and payload |
T1197 |
BITS Jobs |
Space Pirates uses BITS jobs to download malware |
T1218.011 |
Signed Binary Proxy Execution: Rundll32 |
Space Pirates can use rundll32.exe to run DLLs |
T1553.002 |
Subvert Trust Controls: Code Signing |
Space Pirates uses stolen certificates to sign some Zupdax instances |
T1564.001 |
Hide Artifacts: Hidden Files and Directories |
Space Pirates can store its malware in hidden folders at C:\ProgramData |
T1574.002 |
Hijack Execution Flow: DLL Side-Loading |
Space Pirates uses legitimate applications vulnerable to DLL side-loading |
T1620 |
Reflective Code Loading |
Space Pirates malware uses reflective loading to run payloads in memory |
Credential Access |
|
|
T1555.003 |
Credentials from Password Stores: Credentials from Web Browsers |
Space Pirates uses the Chromepass tool to retrieve passwords from Chrome browser storage |
T1003.001 |
OS Credential Dumping: LSASS Memory |
Space Pirates gets LSASS process dumps for further credential dumping |
T1040 |
Network Sniffing |
Deed RAT collects information about in-use proxies through network sniffing |
Discovery |
|
|
T1087.001 |
Account Discovery: Local Account |
Space Pirates collects information about users through the query user command |
T1087.002 |
Account Discovery: Domain Account |
Space Pirates collects information about users in the domain through the legitimate CSVDE tool |
T1082 |
System Information Discovery |
Space Pirates malware collects system information, including OS version, CPU, memory, and disk information |
T1614.001 |
System Location Discovery: System Language Discovery |
Deed RAT gets the language code identifier (LCID) during system information collection |
T1016 |
System Network Configuration Discovery |
Space Pirates collects information about the network settings of the infected machine |
T1069.002 |
Permission Groups Discovery: Domain Groups |
Space Pirates collects information about groups in the domain through the legitimate CSVDE tool |
T1083 |
File and Directory Discovery |
Space Pirates collects information about .doc and .pdf files in the system |
T1033 |
System Owner/User Discovery |
Space Pirates collects information about users of compromised computers |
T1057 |
Process Discovery |
Space Pirates uses the tasklist.exe tool to retrieve process information |
Lateral Movement |
|
|
T1021.002 |
Remote Services: SMB/Windows Admin Shares |
Space Pirates uses the atexec.py and psexec.rb tools to move through the network |
Collection |
|
|
T1119 |
Automated Collection |
Space Pirates searches for and copies files with the masks *.doc and *.pdf |
T1560.001 |
Archive Collected Data: Archive via Utility |
Space Pirates zips stolen documents into password-protected archives using 7-Zip |
T1056.001 |
Input Capture: Keylogging |
Space Pirates malware can capture user input |
Command and Control |
|
|
T1071.001 |
Application Layer Protocol: Web Protocols |
Deed RAT может инкапсулировать свой протокол в HTTP и HTTPS |
T1071.004: DNS |
Non-Application Layer Protocol T1095 |
Deed RAT can encapsulate its protocol in DNS |
T1132.001 |
Data Encoding: Standard Encoding |
Space Pirates malware can compress network messages using the LZNT1 and LZW algorithms |
T1573.001 |
Encrypted Channel: Symmetric Cryptography |
Space Pirates malware can encrypt network messages using symmetric algorithms |
T1008 |
Fallback Channels |
Space Pirates malware supports multiple C2s and can update the C2 list through web pages |
T1095 |
Non-Application Layer Protocol |
Space Pirates malware uses its own protocols to communicate with the C2 server |
T1102.002 |
Web Service: Bidirectional Communication |
Space Pirates malware uses a combination of the voidtools forum and GitHub as the C&C server |
T1105 |
Ingress Tool Transfer |
Space Pirates downloads additional utilities from the C2 server using the certutil tool |
T1571 |
Non-Standard Port |
Space Pirates uses non-standard ports, such as 8081, 5351, 63514, etc., to communicate with the C2 server |
T1572 |
Protocol Tunneling |
The Space Pirates group uses the dog-tunnel utility for traffic tunneling |
T1090.001 |
Proxy: Internal Proxy |
Deed RAT can discover and use proxies to connect to its C&C |
IOCs
File indicators
Deed RAT
b6860214fcc1ef17937e82b1333672afa5fcf1c1b394a0c7c0447357477fe7c9 |
3f8ee1e875cbb01e145a09db7d857b6be22bdd92 |
972a1a6f17756da29d55a84d7f3f23a4 |
212f750a1d38921b83e68e142ee4ae1c7b612bf11c99210da60775f17c85a83e |
f99f5f397fe1abb3fc25cc99fe95952fe24b6123 |
51ca39e3700e9ed16d90302dd31f3a1d |
6cfa8ce876c09f7e24af17bbe9baa97f089e9bf478a47d18417e399e64a18d40 |
1fb924ec4f0ab73a952f2a3cb624b94933275d1b |
b0b438bcb2a71233721a2ddcdb765a68 |
b7bb9b41298420d681d1a79765d7afb7ecf05d6f0baf0b29a07b8b1af20a8c97 |
2910415d483972cc17c76548e2b2aa5afd5bc59a |
0fa4a2b8210500427bb23d2d92502964 |
f554ff7eb069f0ea5ebc49e015bde1e88d4cf83f6df21e4de2056716e83fedc6 |
067ca2d961b913cb2e6d6aaa92595345125d6683 |
804824203f31ebfb56e580e73e932d26 |
7ee776272f7c51e41e10f5ffbd55c8c24ddb332e8c376e132e5a8cb72abd7397 |
1a6e675d82e67cc41493ff991f99da70316848c4 |
38c43e589e3dc65258322d91b58e2e15 |
ece771ab5ae8372078c378fa0cf0a1ac055ea5cbe6091f890185c02caf0edc19 |
c055f30523028037f51cc62d25ce6d38334a531e |
ef6264abe296357100e2db48820b13f6 |
87a2176d8839e087100530ee79aa169f5078173acac2a5652527a35924ebf15e |
2404ac00114cd2481099c52b879e1776dedb2d24 |
24ec73b4e1845088a28dde0007c2d6bd |
5c7f727c852819ae60182c4406c233f5b86962c1da3b933953058985d9f90722 |
ced02716f59a9a70c37eaf373c42796e6f3e93b0 |
d217fe96c7737ac318321deafc4cd261 |
ceca49486dd7e5cf8af7b8f297d87efe65aba69124a3b61255c6f4a099c4a2ab |
e986b238cb5fe037718172d965a41c12c85bbdd0 |
633ccb76bd17281d5288f3a5e03277a0 |
4f84f4333dc9c42ae4ed55c4550ebb14c8079235ae7de9fef4191251537454fc |
59239f73996a3f5a6260228cf7ca3c01e3a00822 |
77ef4bc2f23ef97add7ec0ad229396a4 |
8c3e0fdddc2c53cf7961f770080e96332592c847839ccf84c280da555456baf0 |
84ca568879ca62448d035d56bec816a11188b831 |
8002cd74e579a44a78b2c8e66f8f08a4 |
85d190304accb34422d3e1d603c33b86b6b8c4e88cc4713b0e0c6d4fdee9d93e |
ac499c86012858f40eb78ecf3bcefae779527d73 |
d4e51120c368ee4ef5f5571756803fd3 |
a3df5eb54f0a77cb52beccf1b2aa2caa427f80fcd047fc6be4c7aa849649e1b5 |
99cc3349b64188aae1c986afbcee7e776aa4b349 |
66e8f82a418923b92bef57ad61bcebf3 |
f9e97776826f83278c63cda59910c49920b7316433d9d95570dd187e154fed0b |
30ad2f4a758ab2c526b6439772c7cd7cee66ffc4 |
fb23fc47484150250cfd7b1260e23524 |
74ac74ea85118fe3686f9d6774de2d63db7870dadb4f0ba0d119a77d6c11323a |
0d0c026a1661923cd184b6d0fde647128be75488 |
99b86ad9bf6193b044076df373534fad |
057a16008ce50c3d02c910eac697748eb157afb8a6e8573adefa4b75b495a778 |
20c83bcfd9fb45a8ba5922dbefb74d47cb361db7 |
4db33e5390bfebd84e38cbb85b75c006 |
66bca22ba5fbd01758fde8e57e1e251191cd1c7bb599f0beb8dd0ffd661464ac |
e50dc750e7697ba5e28d6dde12e9a4d370076c0c |
dbb5995037745e04d03dc7f2985f017f |
10d122833af8b8fec97ebdd843942bfc2bf237e3b8c01ae9f852eaca2e9cddc7 |
491248fdf1141e81d5ff23eb1e44d58b50339fe2 |
a94277fad94ca6fbdb2b8eeb716bac90 |
f0b8bf55a3e23379aefd9a95c556430e073ad206b4c39e0086f0a17d00ae64fe |
c58d5d36201cee88a01c9913d771723edde302e4 |
7aa890406a74a44f17fe665653bd92e2 |
8a3aefd75501137f601d4b802959fb50b7cba2b135ce2ab2f1f5fa65b1a86159 |
0912822548e5983f8a2b6d77848994f6d929ffed |
9faf04fc6e522050527e71dea5918d01 |
3a1e67006fb1e761e0188a04361cb7a57329346e7d0a78ef909fbc5469e3c08b |
af71956b59b9c05acdcd7badecc232ca6237cc8d |
1a04af6c3abe8f67bf98adc588c46736 |
e88c7dd128c456a34804a36459f32cdf97fe30a5642caa3072ff31cda07f29e2 |
bfe05003730d79f0004cc41e09f48944df6f68fe |
6d52d0e7f49817c6315b308cb973d405 |
a2d7255cf7c8710cdec62c01b3e2c9d22600441b20914d73eb8f8af3245a9806 |
19da36d73e0a72f65c8a9f6fc2e2504ed599b57d |
8e3217391e11cabf6f9a62a35c636835 |
bfa3c91767c333a97d6849a3f885f4ed2205f24882bffbbfc916624b2601a9b7 |
6e0c406d07206b588652729a271e054c416b5c90 |
97c00cee887279f12f309a86e7bc3638 |
241d1ab6a0da9dfcbc9c565d1ff948743cd7673ed334e5906a1428055cab6c82 |
338881ff10434b523feb63a8a66370f444378cc7 |
5d0aa944ce19e0a70adad562ce0e7880 |
c8c3b639c6e880d7e01cba8cb019087f0c4d2cf4dcdfa712a18054b78e525a47 |
f4a5778b74b73745a533f22d33a65880f2968705 |
1d07e53969cd1cb34db944bfdfa5bf6f |
5e712e78736bde2d3ed507fb730be3a9d55d2b4ee3f7ff827f961fcada4e4e0b |
57792f875625fec78bea22af46010bd34dff863a |
81a93165b338dd5ebb59841e199e0460 |
c4e023110216481d0ccb09787ccc5ea46879fdf331f5d2fda2b1f33719a35104 |
a24d306d0ed0061485cb05901cf9fc9d5f07c097 |
a2221a72d42b978c0f295557a100d574 |
ef17d44cde003c17c28137c6d4692eb4a1b42f86e5d6995f2f06a05e363f044a |
c321233155af13a53ecd746eaab84cc6ac69d510 |
c1be341ffc0f58bafdf4e5210b881106 |
42ef77391f20ffc1751ded79da25376bc20a007d03e501049fff37f781df5403 |
6f8cc7abbf3185a085aa43186c5da332b04c3156 |
9a6b1bd3b7f13d30d1595b874f513744 |
cae7622a5f1ed791d317db0b3bc791a8ab71a9c68837282435f5db6bab540615 |
a7de9de3774ad507e7d1ddfcce4924625a600434 |
ab6a57e40ba74135de9fc6b8f37efa7b |
2707602481a025da29438d01e894cfc9742389d419a5b08aa96ddc76bde38cba |
493e89a70c4176dcec50f34b79eaa4f910e50800 |
7949b560ecf60644e2b537199589d67b |
5311e4fd3329945496962c6417b74da919f5e50ae20ba7ab0d5983012c956f4b |
ab64d32da52a1e516b0c874aad006db404f9c21e |
81de205ac5e44e1167c0c01c7207c6c4 |
dc3c1df20d73a62e8219ed6193ecf1229845dd0a6e42d32eb11cbaee04cfa7df |
a3225a0bbb66b5babf52466ae23a1538407f0cef |
4fdb78de4da91c06e5778feb560750f4 |
70e43da5c5b6a8cfea8fcad768a2e5cfdf532b49b5ac87ec8ca9d05d83e0e915 |
c5c844582c0590cdc901c253a121568251154c61 |
2ec55245fbe57cae1a045f9106ca709a |
1473fcf2297376a819b6cccd50dc709fb61f48f70dc9a0eaff741c893b33d670 |
e49d21f1e66268715efc6003c4e2d3b98cee666a |
ffc18496b2b1563e081beefc9e884769 |
67f7faf0161fdac7ebb619a2aa0c73a4a08def05d7752dfdd698d24410d9989e |
28ed17b046e0bed3d1cde67eccf241ecf01fe3c4 |
ef4d35b1780cb1799eadb648f4e7b5b5 |
7c11eecc2fef6a2ad2e5d80156946d7bdcb9c345d542781c3116141f10eb490f |
aa42f3758dc599e6184894a2911e774c2e16b92d |
01b596051d1fa4785ef4e73dc3f08ec0 |
e2735841dd8ae66a825182d6d06629821c49aca44357e5980c3bfb97ace7ebf0 |
57b138f2bb4731b1c50a034aff3013bce735267c |
54c7f04fc5418553812910db8adc6995 |
374fff9a48949254d72bfe34b9b62129da1cfafb74623d187791ada09d976e7d |
f95deea8d824ee681341f9457e0a86129ec4eb91 |
824fbfa8b35f19152a834a1bfff9ef54 |
Voidoor
86c17c549433223f3b59f5ee3e4f2694ebf4e6aabd66508a9a6fec1bdf830c61 |
1749f99443b345860dd037940505421c45156950 |
48097e614cdf1f9c908b7449cd1119c5 |
PlugX
22c6d07b64d40811ef31113faac7293348845ab6a06f7319a653ca694c26e94a |
a8808089c37faacebc19bafd2677ba011afffc49 |
3cf999dd950af82cad3f8c6eb5430bd5 |
8c8f9fd17d1c28b471bcc4c870ab53a3b4b260ae2fd123b0ef2a2a819ce1cc78 |
154da55173f97c50e41e48157bc94515cc6146ec |
6d3ce5d4003ce4c9af3048826638ab82 |
USB stealer
ff9a833d34ff89660c1c5f3fa71d4d88c287c183235f714e03ccbdec7a3a6b17 |
89375a28a96286584e321401915bff2860190470 |
b33e5e2e14b0fbe319f6a8b719c43c1a |
Stowaway
87d36c48bf6d1d9a3b157aaab45ae162b78b79b0c956383a670dcc7d9d7c14e8 |
3caf909e6590a4ae2db99ae577d5585d854ad15e |
8ec966f8b441fa20225e08ffd5e83f94 |
0992aa7f311e51cf84ac3ed7303b82664d7f2576598bf852dbf55d62cb101601 |
7abf05ccdf0709aacae2ebe07b7104c81b19abe1 |
3381df84cf05826aff084002ba323774 |
8756f0619caff132b0d4dfefad4387b8d5ea134b8706f345757b92658e6e50ff |
fc6b59571353c74d4d8cbd254ea7b216f8449208 |
8a7b4985db84e9093e169c237b853adc |
aafb0a46610064cd88ba99672e0f18456ed827cf46b2d3064487c45bac75637a |
b85fec5a965785830af1cf5534ef6a3b437542c2 |
5e25310d2ada344715cf8edd5e64a848 |
50c34013472f3848abb0fb280254d0514e83a65c1ce289ae199389795dcfb575 |
8ef130998044df15395dcf50123e5a1d8f6ce208 |
0c19d2e8bc1429fac245dd6c870afbe0 |
CHAOS
f3f122aee9cd682074cdc757844dfd4e65d6268c2a71430d77265cf369deb774 |
ec5394b93c376e359a8a2c380622e3a9d033d0de |
d0ea84204096109f18a2201fae1c4f30 |
Network indicators
0077.x24hr.com |
alex.dnset.com |
amazon-corp.wikaba.com |
api.microft.dynssl.com |
apple-corp.changeip.org |
as.amazon-corp.wikaba.com |
asd.powergame.0077.x24hr.com |
bamo.ocry.com |
chdsjjkrazomg.dhcp.biz |
comein.journal.itsaol.com |
elienceso.kozow.com |
eset.zzux.com |
fgjhkergvlimdfg2.wikaba.com |
findanswer123.tk |
freewula.strangled.net |
fssprus.dns04.com |
ftp.microft.dynssl.com |
goon.oldvideo.longmusic.com |
journal.itsaol.com |
js.journal.itsaol.com |
lck.gigabitdate.com |
loge.otzo.com |
mail.playdr2.com |
miche.justdied.com |
micro.dns04.com |
microft.dynssl.com |
mktoon.ftp1.biz |
news.flashplayeractivex.info |
noon.dns04.com |
ns2.gamepoer7.com |
ns9.mcafee-update.com |
oldvideo.longmusic.com |
pop.playdr2.com |
reportsearch.dynamic-dns.net |
rt.ftp1.biz |
ruclient.dns04.com |
serviechelp.changeip.us |
shareddocs.microft.dynssl.com |
srv.xxxy.biz |
staticd.dynamic-dns.net |
szuunet.strangled.net |
tombstone.kozow.com |
toogasd.www.oldvideo.longmusic.com |
toon.mrbasic.com |
update.flashplayeractivex.info |
web.miscrosaft.com |
werwesf.dynamic-dns.net |
wwa1we.wbew.amazon-corp.wikaba.com |
www.0077.x24hr.com |
www.omgod.org |
ybcps4.freeddns.org |
beachdrivingfun.com |
123q4wfbs.staticd.dynamic-dns.net |
1cnet.changeip.co |
aace.zzux.com |
ablank.ddnsfree.com |
accountsupport.ftp1.biz |
ace1.dynamic-dns.net |
add.srv.xxxy.biz |
ade.aace.zzux.com |
adm.outlook.onmypc.net |
adn.aace.zzux.com |
aeo.dotnet.almostmy.com |
aep.winsvr.lflinkup.org |
afa.aace.zzux.com |
afd.aace.zzux.com |
afm.dotnet.almostmy.com |
afp.anp.ddns.ms |
agdfyvkiyrgyauhfjdf.journal.itsaol.com |
am.jex.ddns.us |
another.journal.itsaol.com |
anp.aace.zzux.com |
anp.ddns.ms |
ans.itissohard.journal.itsaol.com |
apd.anp.ddns.ms |
api.reportsearch.dynamic-dns.net |
app.anp.ddns.ms |
areyoufuckingkiddingme.staticd.dynamic-dns.net |
aro.noon.wikaba.com |
asb.anp.ddns.ms |
asd3.as.amazon-corp.wikaba.com |
asdfas.w3.oldvideo.longmusic.com |
asrweer.amazon-corp.wikaba.com |
asu.noon.wikaba.com |
atec.dnset.com |
ato.dotnet.almostmy.com |
ato.jex.ddns.us |
au.dotnet.almostmy.com |
au.serviechelp.changeip.us |
auca.py.dns04.com |
ava.anp.ddns.ms |
azx.aace.zzux.com |
ba.tu.qpoe.com |
back.serviechelp.changeip.us |
bba.dns04.com |
bca.aace.zzux.com |
beachdrivingfun.com |
bel.dynamicdns.edns.biz |
bin.anp.ddns.ms |
bin.bba.dns04.com |
bin.faz.dynamic-dns.net |
bit.chdsjjkrazomg.dhcp.biz |
blog.beachdrivingfun.com |
brenken.dotnet.almostmy.com |
brrkst.dynamic-dns.net |
bz.py.dns04.com |
cai.wulatula.xxxy.biz |
cba.anp.ddns.ms |
cch.noon.xxxy.biz |
cchp.aace.zzux.com |
cchp.wulatula.xxxy.biz |
cdnsvc.microft.dynssl.com |
chip.noon.dns04.com |
chip.serviechelp.changeip.us |
chrome.py.dns04.com |
ciii.chdsjjkrazomg.dhcp.biz |
cloud.noon.dns04.com |
cmax.amazon-corp.wikaba.com |
coa.noon.wikaba.com |
com.loge.otzo.com |
com.ruclient.dns04.com |
community.reportsearch.dynamic-dns.net |
conhost.reportsearch.dynamic-dns.net |
contact.chdsjjkrazomg.dhcp.biz |
cood.serviechelp.changeip.us |
crc.jex.ddns.us |
crc.noon.wikaba.com |
crc.noon.xxxy.biz |
cro.src.ssl443.org |
cstg.jmjejij.otzo.com |
cstg.tu.wwwhost.us |
cstg.wula.zzux.com |
cumulative.dotnet.almostmy.com |
dba.aace.zzux.com |
dbb.anp.ddns.ms |
didle.staticd.dynamic-dns.net |
digital.brrkst.dynamic-dns.net |
dm.jex.ddns.us |
dmz.jex.ddns.us |
dnmd.0077.x24hr.com |
dns04.com.ruclient.dns04.com |
dnsfind.reportsearch.dynamic-dns.net |
dnsinfo.microft.dynssl.com |
docs.ace1.dynamic-dns.net |
docs.atec.dnset.com |
docs.bba.dns04.com |
docs.jmjejij.otzo.com |
docs.microft.dynssl.com |
dotnet.almostmy.com |
dr.journal.itsaol.com |
dt.staticd.dynamic-dns.net |
dttd.chdsjjkrazomg.dhcp.biz |
dttd.serviechelp.changeip.us |
dwm.dotnet.almostmy.com |
dynamicdns.edns.biz |
edge.microft.dynssl.com |
edu.jex.ddns.us |
ee.chdsjjkrazomg.dhcp.biz |
ee.mktoon.ftp1.biz |
eeee.chdsjjkrazomg.dhcp.biz |
eeee.mktoon.ftp1.biz |
emv1.beachdrivingfun.com |
erdcserver.microft.dynssl.com |
erdserver.microft.dynssl.com |
etonlkk.chdsjjkrazomg.dhcp.biz |
exam.bba.dns04.com |
exam.faz.dynamic-dns.net |
exam.reportsearch.dynamic-dns.net |
exec.anp.ddns.ms |
exowa.microft.dynssl.com |
fa.anp.ddns.ms |
fand.faz.dynamic-dns.net |
fas.anp.ddns.ms |
faugi.1cnet.changeip.co |
faugi.py.dns04.com |
faz.dynamic-dns.net |
faz.faz.dynamic-dns.net |
fcc.noon.xxxy.biz |
fcc.src.ssl443.org |
fera.aace.zzux.com |
fileserverrt.reportsearch.dynamic-dns.net |
final.staticd.dynamic-dns.net |
finallyd.youthinkyouaredecent.oldvideo.longmusic.com |
find.mktoon.ftp1.biz |
find.serviechelp.changeip.us |
first.srv.xxxy.biz |
fly.chdsjjkrazomg.dhcp.biz |
flyme.oldvideo.longmusic.com |
foc.jex.ddns.us |
follme.www.amazon-corp.wikaba.com |
forgodsake.oldvideo.longmusic.com |
forsafeconcern.journal.itsaol.com |
ftp.1cnet.changeip.co |
ftp.aace.zzux.com |
ftp.accountsupport.ftp1.biz |
ftp.amazon-corp.wikaba.com |
ftp.anp.ddns.ms |
ftp.apple-corp.changeip.org |
ftp.bba.dns04.com |
ftp.dotnet.almostmy.com |
ftp.faz.dynamic-dns.net |
ftp.jmjejij.otzo.com |
ftp.journal.itsaol.com |
ftp.miche.justdied.com |
ftp.nvidia.freewww.biz |
ftp.oldvideo.longmusic.com |
ftp.rt.ftp1.biz |
ftp.staticd.dynamic-dns.net |
ftp.werwesf.dynamic-dns.net |
ftp.winsvr.lflinkup.org |
ftp.wula.zzux.com |
fucker.www.amazon-corp.wikaba.com |
fuckinglifs.journal.itsaol.com |
fx.anp.ddns.ms |
ggt.jmjejij.otzo.com |
ggt.wula.zzux.com |
go.staticd.dynamic-dns.net |
gofuckyourself.amazon-corp.wikaba.com |
google.ace1.dynamic-dns.net |
google.atec.dnset.com |
google.winsvr.lflinkup.org |
google.wula.zzux.com |
google.wulatula.xxxy.biz |
goole.faz.dynamic-dns.net |
gooz.noon.dns04.com |
gov.ace1.dynamic-dns.net |
gov.atec.dnset.com |
gov.jmjejij.otzo.com |
gov.noon.xxxy.biz |
gov.winsvr.lflinkup.org |
gov.wula.zzux.com |
gov.wulatula.xxxy.biz |
govnmer.0077.x24hr.com |
grcc.winsvr.lflinkup.org |
h.mktoon.ftp1.biz |
heavsick.staticd.dynamic-dns.net |
hello.noon.dns04.com |
hello.serviechelp.changeip.us |
help.chdsjjkrazomg.dhcp.biz |
help.mktoon.ftp1.biz |
help.noon.dns04.com |
help.noon.xxxy.biz |
hignland.oldvideo.longmusic.com |
homeportal.reportsearch.dynamic-dns.net |
hop.mktoon.ftp1.biz |
hostname.reportsearch.dynamic-dns.net |
hq.faz.dynamic-dns.net |
httpproxy.reportsearch.dynamic-dns.net |
hug.noon.dns04.com |
hv.dotnet.almostmy.com |
hyataung.duckdns.org |
int.jex.ddns.us |
int.noon.wikaba.com |
it.jmjejij.otzo.com |
itissohard.journal.itsaol.com |
jc.chdsjjkrazomg.dhcp.biz |
jex.ddns.us |
jinj.faz.dynamic-dns.net |
jjton.srv.xxxy.biz |
jmjejij.otzo.com |
join.chdsjjkrazomg.dhcp.biz |
join.mktoon.ftp1.biz |
join.noon.dns04.com |
join.srv.xxxy.biz |
joodte.serviechelp.changeip.us |
juice.mktoon.ftp1.biz |
jujic.dotnet.almostmy.com |
ka.wula.zzux.com |
kami.atec.dnset.com |
kami.wulatula.xxxy.biz |
kamishi.wulatula.xxxy.biz |
kana.mktoon.ftp1.biz |
kana.serviechelp.changeip.us |
katana.serviechelp.changeip.us |
kingkong.amazon-corp.wikaba.com |
knowledge.reportsearch.dynamic-dns.net |
kono.noon.dns04.com |
kv.aace.zzux.com |
ladyboy.journal.itsaol.com |
lan.anp.ddns.ms |
lan.faz.dynamic-dns.net |
lan.noon.dns04.com |
lan.src.ssl443.org |
land.faz.dynamic-dns.net |
last.mktoon.ftp1.biz |
lb.brrkst.dynamic-dns.net |
lcd.noon.xxxy.biz |
le.bba.dns04.com |
life.serviechelp.changeip.us |
like.serviechelp.changeip.us |
like.srv.xxxy.biz |
likeit.chdsjjkrazomg.dhcp.biz |
lin.aace.zzux.com |
lin.bba.dns04.com |
link.serviechelp.changeip.us |
live.serviechelp.changeip.us |
localmsk.reportsearch.dynamic-dns.net |
log.mktoon.ftp1.biz |
lonely.chdsjjkrazomg.dhcp.biz |
lt.wulatula.xxxy.biz |
mail.0077.x24hr.com |
mail.anp.ddns.ms |
mail.mktoon.ftp1.biz |
mail.serviechelp.changeip.us |
mail.werwesf.dynamic-dns.net |
mail1.serviechelp.changeip.us |
mail2.serviechelp.changeip.us |
mailend.dotnet.almostmy.com |
mailend.srv.xxxy.biz |
make.bba.dns04.com |
mcc.brrkst.dynamic-dns.net |
mcx.jex.ddns.us |
mdt.srv.xxxy.biz |
mf.noon.xxxy.biz |
mgi.faz.dynamic-dns.net |
mgimo.1cnet.changeip.co |
mgo.bba.dns04.com |
mgo.dynamicdns.edns.biz |
mgo.jex.ddns.us |
min.brrkst.dynamic-dns.net |
mjejij.otzo.com |
mmmg.chdsjjkrazomg.dhcp.biz |
mohana.casacam.net |
moon.mktoon.ftp1.biz |
mor.noon.wikaba.com |
mp.noon.dns04.com |
msk.chdsjjkrazomg.dhcp.biz |
msk.noon.dns04.com |
msk.serviechelp.changeip.us |
msu.anp.ddns.ms |
nb.dotnet.almostmy.com |
neg.src.ssl443.org |
nei.ace1.dynamic-dns.net |
nei.jmjejij.otzo.com |
ng.noon.xxxy.biz |
noo.noon.wikaba.com |
noon.wikaba.com |
noon.xxxy.biz |
npl.dynamicdns.edns.biz |
ns.mktoon.ftp1.biz |
ns02.dynamicdns.edns.biz |
ns05.reportsearch.dynamic-dns.net |
nvidia.freewww.biz |
nvidia.nvidia.freewww.biz |
nz.wulatula.xxxy.biz |
ohk.journal.itsaol.com |
ohyeah.dnmd.0077.x24hr.com |
ohyigaga.oldvideo.longmusic.com |
oka.faz.dynamic-dns.net |
oldfucl.oldvideo.longmusic.com |
olga.winsvr.lflinkup.org |
one.bba.dns04.com |
onetwo.mktoon.ftp1.biz |
opk.anp.ddns.ms |
opt.bba.dns04.com |
orl.jex.ddns.us |
outlook.onmypc.net |
pdd.jmjejij.otzo.com |
person.serviechelp.changeip.us |
pgs.dotnet.almostmy.com |
pornhub.journal.itsaol.com |
powergame.0077.x24hr.com |
ppt.jmjejij.otzo.com |
pre.noon.wikaba.com |
prime.1cnet.changeip.co |
pro.winsvr.lflinkup.org |
proryv2020.1cnet.changeip.co |
psq.jex.ddns.us |
pul.dynamicdns.edns.biz |
py.dns04.com |
ram.noon.wikaba.com |
rest.bba.dns04.com |
rid.serviechelp.changeip.us |
romis.wulatula.xxxy.biz |
rosgvard.py.dns04.com |
rov.anp.ddns.ms |
rov.dotnet.almostmy.com |
rov.noon.dns04.com |
rov.noon.wikaba.com |
rov.noon.xxxy.biz |
rox.noon.wikaba.com |
roz.noon.wikaba.com |
ru.serviechelp.changeip.us |
ru5.fljsm.com |
ruclient.dns04.com.ruclient.dns04.com |
sacere.youthinkyouaredecent.oldvideo.longmusic.com |
sdo.microft.dynssl.com |
seao.jex.ddns.us |
search.microft.dynssl.com |
secured02b-support.ftp1.biz |
serv.mktoon.ftp1.biz |
serv.serviechelp.changeip.us |
server.chdsjjkrazomg.dhcp.biz |
service.mktoon.ftp1.biz |
service.noon.dns04.com |
service.serviechelp.changeip.us |
seven.chdsjjkrazomg.dhcp.biz |
shirt.ftp1.biz |
sim.anp.ddns.ms |
skvm.serviechelp.changeip.us |
sms.serviechelp.changeip.us |
smsreport.microft.dynssl.com |
somuch.amazon-corp.wikaba.com |
south.chdsjjkrazomg.dhcp.biz |
spb.winsvr.lflinkup.org |
speedtest.reportsearch.dynamic-dns.net |
sprfilet.microft.dynssl.com |
src.ssl443.org |
srcier0wqesj1.microft.dynssl.com |
sslvpn.microft.dynssl.com |
stmspeedtest.reportsearch.dynamic-dns.net |
stp.noon.xxxy.biz |
surender.mktoon.ftp1.biz |
svhostlit.reportsearch.dynamic-dns.net |
sy.noon.wikaba.com |
ta.noon.xxxy.biz |
tach.anp.ddns.ms |
talk.noon.dns04.com |
task.noon.dns04.com |
tataka.chdsjjkrazomg.dhcp.biz |
tax.noon.xxxy.biz |
tc.chdsjjkrazomg.dhcp.biz |
tellmesomesotry.oldvideo.longmusic.com |
test.beachdrivingfun.com |
test.mktoon.ftp1.biz |
test.noon.wikaba.com |
third.srv.xxxy.biz |
three.brrkst.dynamic-dns.net |
three.dotnet.almostmy.com |
tim.bba.dns04.com |
tom.bba.dns04.com |
tongton.noon.dns04.com |
toomuch.brrkst.dynamic-dns.net |
toon.brrkst.dynamic-dns.net |
top.noon.dns04.com |
touch.brrkst.dynamic-dns.net |
touch.noon.dns04.com |
tracertoute.reportsearch.dynamic-dns.net |
tre.dynamicdns.edns.biz |
tt.oldvideo.longmusic.com |
tu.wula.zzux.com |
two.aace.zzux.com |
tx.wula.zzux.com |
udp.aace.zzux.com |
udp.tu.qpoe.com |
uis.noon.wikaba.com |
uisp.noon.xxxy.biz |
up.serviechelp.changeip.us |
upi.jex.ddns.us |
usi.jex.ddns.us |
uua.jex.ddns.us |
uuee.dotnet.almostmy.com |
val.mktoon.ftp1.biz |
veejayofficeds.synology.me |
vimdoc.reportsearch.dynamic-dns.net |
vipnet.1cnet.changeip.co |
vo.wula.zzux.com |
vo.wulatula.xxxy.biz |
vris.chdsjjkrazomg.dhcp.biz |
warp.whatzsofun.com |
wbbb.oldvideo.longmusic.com |
wch.anp.ddns.ms |
web.winsvr.lflinkup.org |
webdocsshare.microft.dynssl.com |
webservice.reportsearch.dynamic-dns.net |
webtest.reportsearch.dynamic-dns.net |
wifi48-2.loyno.edu |
wiki.noon.wikaba.com |
win.outlook.onmypc.net |
winsvr.lflinkup.org |
wl.oldvideo.longmusic.com |
wold.chdsjjkrazomg.dhcp.biz |
woldt.srv.xxxy.biz |
wood.chdsjjkrazomg.dhcp.biz |
wordpress.beachdrivingfun.com |
world.winsvr.lflinkup.org |
wserver1.microft.dynssl.com |
wula.zzux.com |
wulatula.xxxy.biz |
www.1cnet.changeip.co |
www.aace.zzux.com |
www.accountsupport.ftp1.biz |
www.alex.dnset.com |
www.amazon-corp.wikaba.com |
www.anp.ddns.ms |
www.bamo.ocry.com |
www.bba.dns04.com |
www.beachdrivingfun.com |
www.dotnet.almostmy.com |
www.elienceso.kozow.com |
www.fgjhkergvlimdfg2.wikaba.com |
www.journal.itsaol.com |
www.loge.otzo.com |
www.miche.justdied.com |
www.microft.dynssl.com |
www.news.flashplayeractivex.info |
www.nvidia.freewww.biz |
www.oldvideo.longmusic.com |
www.reportsearch.dynamic-dns.net |
www.rt.ftp1.biz |
www.secured02b-support.ftp1.biz |
www.update.flashplayeractivex.info |
www.veejayofficeds.synology.me |
www.winsvr.lflinkup.org |
xdd.wulatula.xxxy.biz |
xsy.tu.qpoe.com |
xts.reportsearch.dynamic-dns.net |
xx.wulatula.xxxy.biz |
yand.anp.ddns.ms |
yd.wulatula.xxxy.biz |
youthinkyouaredecent.oldvideo.longmusic.com |
yt.journal.itsaol.com |
yy.jmjejij.otzo.com |
za.anp.ddns.ms |
zai.aace.zzux.com |
zap.bba.dns04.com |
zhi.aace.zzux.com |
zim.faz.dynamic-dns.net |
zip.faz.dynamic-dns.net |
ziz.faz.dynamic-dns.net |
zmaiewrdtgfhnn.www.amazon-corp.wikaba.com |
zmain.www.amazon-corp.wikaba.com |
zt.wulatula.xxxy.biz |
zzp.bba.dns04.com |