<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p style="margin: 0in 0in 0.0001pt; font-size: 16px;"><span style="font-family: 'Trebuchet MS', Geneva, Tahoma, sans-serif;">In April of this year, activity by the Chinese cyber espionage group APT10 was <a href="https://blog.ensilo.com/uncovering-new-activity-by-apt10">recognized by enSilo</a>.<span style="color: red;"> </span>This new campaign boasted previously undiscovered variants of malware and payloads showing many similarities to APT10’s previous campaigns. PlugX, a modular malware spotted in the campaign, is developed by the espionage group themselves and has been widely used in the past for targeted attacks against government and private organizations.</span></p> <p style="margin: 0in 0in 0.0001pt; font-size: 16px;"><span style="font-family: 'Trebuchet MS', Geneva, Tahoma, sans-serif;"><!--more--></span></p> <p style="margin: 0in 0in 0.0001pt; font-size: 16px;"><span style="font-family: 'Trebuchet MS', Geneva, Tahoma, sans-serif;">&nbsp;</span></p> <p style="margin: 0in 0in 0.0001pt; font-size: 16px;"><span style="font-family: 'Trebuchet MS', Geneva, Tahoma, sans-serif;">In enSilo’s report, 6 out of the 7 domains posted in their Indicators of Compromise section were typosquat domains. The ThreatSTOP Security Team decided to take a closer look at these malicious domains.</span></p> <p style="margin-bottom: 6pt; text-align: center; font-size: 16px;"><span style="font-family: 'Trebuchet MS', Geneva, Tahoma, sans-serif;"><strong><span style="color: black;">In this use case, we will show how our analysis team used free open-source analysis tools mentioned in previous posts to analyze APT10 campaign domains.</span></strong></span></p> <p style="margin-bottom: 6pt; font-size: 16px;"><span style="font-family: 'Trebuchet MS', Geneva, Tahoma, sans-serif; color: black;"><img src="https://info.threatstop.com/hubfs/image-45.png"></span></p> <p style="margin: 0in 0in 0.0001pt; font-size: 16px;"><span style="font-family: 'Trebuchet MS', Geneva, Tahoma, sans-serif;">&nbsp;</span></p> <p style="margin: 0in 0in 0.0001pt; font-size: 16px;"><span style="font-family: 'Trebuchet MS', Geneva, Tahoma, sans-serif;">Right off the bat, our team noticed some suspicious resolve activity, with the domains appearing for short periods of time and then disappearing off the radar for a while during their first month of activity. After this bout of suspicious resolves, the typosquat domains proceeded to shift to a different set of IPs not mentioned in the report.</span></p> <p style="margin: 0in 0in 0.0001pt; font-size: 16px;"><span style="font-family: 'Trebuchet MS', Geneva, Tahoma, sans-serif;">&nbsp;</span></p> <p style="margin: 0in 0in 0.0001pt; font-size: 16px;"><span style="font-family: 'Trebuchet MS', Geneva, Tahoma, sans-serif;"><img src="https://info.threatstop.com/hubfs/image-46.png"></span></p> <p style="margin: 0in 0in 0.0001pt; font-size: 16px;">&nbsp;</p> <p style="margin: 0in 0in 0.0001pt; font-size: 16px;"><span style="font-family: 'Trebuchet MS', Geneva, Tahoma, sans-serif;"><span style="font-family: 'Trebuchet MS', Geneva, Tahoma, sans-serif;">For example, the IP 34[.]80[.]150[.]70 started hosting many of the sighted Kaspersky and Microsoft typosquats shortly after the report was published. A closer look at the IP shows a number of subdomains that also did not appear in the report, as well as a new typosquat domains – microsofts[.]info and miscrosofts[.]com.</span><span lang="HE" dir="RTL"></span></span></p> <p style="margin: 0in 0in 0.0001pt; font-size: 16px;">&nbsp;</p> <p style="margin: 0in 0in 0.0001pt; font-size: 16px;"><span style="font-family: 'Trebuchet MS', Geneva, Tahoma, sans-serif;"><img src="https://info.threatstop.com/hubfs/image-47.png"></span></p> <p style="margin: 0in 0in 0.0001pt; font-size: 16px;">&nbsp;</p> <p style="margin-bottom: 6pt; font-size: 16px;"><span style="font-family: 'Trebuchet MS', Geneva, Tahoma, sans-serif;"><span style="font-family: 'Trebuchet MS', Geneva, Tahoma, sans-serif;">Using RiskIQ’s Passivetotal subdomain view, our team was able to easily view all previously uncovered subdomains of these obviously malicious domains.</span><span style="font-family: 'Trebuchet MS', Geneva, Tahoma, sans-serif;"></span><span style="font-family: 'Trebuchet MS', Geneva, Tahoma, sans-serif;"></span></span></p> <p style="margin-bottom: 6pt; font-size: 16px;"><span style="font-family: 'Trebuchet MS', Geneva, Tahoma, sans-serif; color: black;"><img src="https://info.threatstop.com/hubfs/image-48.png"></span></p> <p style="margin: 0in 0in 0.0001pt; font-size: 16px;">&nbsp;</p> <p style="margin-bottom: 6pt; font-size: 16px;"><span style="font-family: 'Trebuchet MS', Geneva, Tahoma, sans-serif;">Using a few simple tools, our team grew 6 domains related to the new APT10 campaign in to a list of over 25 suspicious domains, which are very likely related to the campaign.</span></p> <p style="margin-bottom: 6pt; font-size: 16px;">&nbsp;</p> <p style="margin-bottom: 6pt; text-align: center; font-size: 16px;"><span style="font-family: 'Trebuchet MS', Geneva, Tahoma, sans-serif;"><strong><span style="color: black;">Want to hear more about the tools and platforms mentioned in this use case?</span><span style="color: black;"> Check out our previous posts in this series:</span></strong></span></p> <p style="font-size: 16px;"><span style="font-family: 'Trebuchet MS', Geneva, Tahoma, sans-serif;">Part 1:&nbsp;<a href="https://blog.threatstop.com/free-open-source-ioc-analysis-tools-why-use-iocs">Why use IOCs?</a></span></p> <p style="font-size: 16px;"><span style="font-family: 'Trebuchet MS', Geneva, Tahoma, sans-serif;">Part 2:&nbsp;<a href="https://blog.threatstop.com/threat-exchanges-ioc-sharing">Threat Exchanges and IOC Sharing</a></span></p> <p style="font-size: 16px;"><span style="font-family: 'Trebuchet MS', Geneva, Tahoma, sans-serif;">Part 3:&nbsp;<a href="https://blog.threatstop.com/analyzing-threat-infrastructure">Analyzing Threat Infrastructure</a></span></p> <p style="font-size: 16px;"><span style="font-family: 'Trebuchet MS', Geneva, Tahoma, sans-serif;">Part 4:&nbsp;<a href="https://blog.threatstop.com/enrichments-connecting-the-dots">Enrichments and Connecting the Dots</a></span></p> <p style="font-size: 16px;"><span style="font-family: 'Trebuchet MS', Geneva, Tahoma, sans-serif;">Part 5:&nbsp;<a href="https://blog.threatstop.com/emotet-banking-trojan-use-case" rel="noopener" target="_blank">Emotet Banking Trojan Use Case</a></span></p> <p style="font-size: 16px;"><span style="font-family: 'Trebuchet MS', Geneva, Tahoma, sans-serif;">Part 6: <a href="/use-case-guildma-information-stealer" rel="noopener" target="_blank"><span style="color: #ff0201;">Guildma Information Stealer Use Case</span></a></span></p> <p style="font-size: 16px;">&nbsp;</p> <p style="text-align: center; font-size: 16px;"><span style="font-family: 'Trebuchet MS', Geneva, Tahoma, sans-serif;"><strong><span style="color: black;">Want to see more IOC analysis use cases? </span></strong></span></p> <p style="text-align: center; font-size: 16px;"><span style="font-family: 'Trebuchet MS', Geneva, Tahoma, sans-serif;"><span style="color: black;">Check out recent analyses posted by our Security Research Team, using similar analysis concepts: </span><a href="https://blog.threatstop.com/riltok-mobile-banking-trojan-targets"><span style="color: black;">Riltok Mobile Banking Trojan Analysis</span></a><span style="color: black;">, </span><a href="https://blog.threatstop.com/over-120-malicious-domains-discovered-in-analysis-on-new-roaming-mantis-campaign"><span style="color: black;">Roaming Mantis Cryptomining Malware Analysis</span></a><span style="color: black;">.</span></span></p> <p style="text-align: center; font-size: 16px;">&nbsp;</p> <div class="section post-body"> <p style="text-align: center; font-size: 16px;"><span style="font-family: 'Trebuchet MS', Geneva, Tahoma, sans-serif;"><strong><span style="font-family: 'Trebuchet MS', Geneva, Tahoma, sans-serif;">If you haven't yet, subscribe to our blog so y</span>ou don't miss out on this series and other posts from our experts around all things cyber security.&nbsp;</strong></span></p> <p style="text-align: center; font-size: 16px;"><em>Ready to try ThreatSTOP in your network? Want an expert-led demo to see how it works?</em></p> <p style="text-align: center; font-size: 16px;"><em></em></p> </div></span>