<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p>Earlier&nbsp;this month, a new variant of the Guildma information stealer was analyzed by the Internet Storm Center (ISC). The malware’s new campaign has been seen targeting various countries in South America, with the highest number of infections recorded in Brazil. It seems that Guildma is spreading quickly, with another recent campaign reaching over 150,000 infection attempts in a matter of weeks.</p> <p><!--more--></p> <p>The malware is spread via phishing emails, supposedly sent by the Federal Public Ministry of Brazil, containing malicious links. The link downloads a ZIP file containing another ZIP file, which in turn contains a LNK file that executes a malicious JavaScript. The machine is infected, Guildma accesses Facebook and YouTube profiles created by the cybercriminals that host encrypted lists of its C2 servers.</p> <p>This new Guildma variant was brought to our Security Research Team’s attention via an OTX (Open Threat Exchange) <a href="https://otx.alienvault.com/pulse/5d5bddb32e88e1ba2a9087ee">pulse</a>, including a link to a <a href="https://isc.sans.edu/diary/Guildma+malware+is+now+accessing+Facebook+and%A0YouTube+to+keep+up-to-date/25222">report by ISC</a>. Their in-depth analysis noted that this ongoing campaign has 76 C2 servers (and counting), so our team set out to analyze the IOCs and discover additional C2 servers in the malware’s infrastructure.</p> <p>In this use case, we will show how our analysis team used free open-source analysis tools mentioned in previous posts to analyze Guildma C2 domains.</p> <p>Since all of the variant’s C2s are appspot[.]com subdomains, our team chose to start off with the domain mentioned in the ISC report as a C2 server request example - soy-tower-248822[.]appspot[.]com.</p> <p><img src="https://info.threatstop.com/hubfs/image-41.png"></p> <p>(Photo credit: <a href="https://isc.sans.edu/">ISC</a>)</p> <p>&nbsp;</p> <p>A VirusTotal search on the domain, and a random handful of other domains from the report, showed that a number of the C2s in ISC’s list share a relation to a downloaded file called “xbd2” or “australia.html” (same file).</p> <p><img src="https://info.threatstop.com/hubfs/image-42.png"></p> <p>&nbsp;</p> <p>Although the file was deemed clean by the VirusTotal scan, our analysts used VT’s relations graph to examine the related domains and URLs, finding 40 additional, related appspot[.]com subdomains (shown below).</p> <p><img src="https://info.threatstop.com/hubfs/image-43.png"></p> <p>&nbsp;</p> <p>Looking at the domain list, it’s clear that many of the newly found domains’ syntaxes, such as praxis-water-248822[.]appspot[.]com and woven-mesh-248688[.]appspot[.]com, are very similar to the published Guildma C2s.</p> <p><img src="https://info.threatstop.com/hubfs/image-44.png"></p> <p>Although we cannot yet be completely certain that these domains are Guildma C2 domains, the relation and resemblance between them and the original published domains provide a fair amount of suspicion for their maliciousness.</p> <p>&nbsp;</p> <p>Want to hear more about the tools and platforms mentioned in this use case?</p> <p>Check out our previous posts in this series:</p> <p>Part 1: <a href="/free-open-source-ioc-analysis-tools-why-use-iocs" rel="noopener">Why use IOCs?</a></p> <p>Part 2: <a href="/threat-exchanges-ioc-sharing" rel="noopener">Threat Exchanges and IOC Sharing</a></p> <p>Part 3: <a href="/analyzing-threat-infrastructure" rel="noopener">Analyzing Threat Infrastructure</a></p> <p>Part 4: <a href="/enrichments-connecting-the-dots" rel="noopener">Enrichments and Connecting the Dots</a></p> <p>Part 5: <a href="/emotet-banking-trojan-use-case" rel="noopener">Emotet Banking Trojan Use Case</a></p> <p>Want to see more IOC analysis use cases?</p> <p>Check out recent analyses posted by our Security Research Team, using similar analysis concepts - <a href="/riltok-mobile-banking-trojan-targets" rel="noopener">Riltok Mobile Banking Trojan Analysis</a>, <a href="/over-120-malicious-domains-discovered-in-analysis-on-new-roaming-mantis-campaign" rel="noopener">Roaming Mantis Cryptomining Malware Analysis</a>.</p> <p>&nbsp;</p> <p style="text-align: center;"><strong>If you haven't yet, subscribe to our blog so you don't miss out on this series and other posts from our experts around all things cyber security. For more information about ThreatSTOP and proactively using threat intelligence, check us out below. </strong></p> <p style="text-align: center;">&nbsp; &nbsp; &nbsp; &nbsp;</p></span>