www.deepinstinct.com Open in urlscan Pro
3.70.101.28  Public Scan

URL: https://www.deepinstinct.com/blog/darkbeatc2-the-latest-muddywater-attack-framework
Submission: On April 24 via api from IL — Scanned from IL

Form analysis 2 forms found in the DOM

<form __bizdiag="0" __biza="W___"><input type="text" placeholder="Search..." class="st-default-search-input w-56 HeaderSearch_header-search-icon__3pO2z" autocomplete="off" autocorrect="off" autocapitalize="off"></form>

<form __bizdiag="0" __biza="W___">
  <input class="st-default-search-input st-search-set-focus" type="text" value="" placeholder="Search this site" aria-label="Search this site" id="st-overlay-search-input" autocomplete="off" autocorrect="off" autocapitalize="off">
</form>

Text Content

We use cookies and similar technologies to enable essential services and
functionality on our website and to collect data for advertising, analytics and
support purposes. By continuing to use our website, you agree to the use of
cookies as set in our Privacy Policy and Cookie Policy.

Accept


ANNOUNCING DEEP INSTINCT PREVENTION FOR STORAGE FOR CLOUD STORAGE AND NAS
ENVIRONMENTS

Learn more
 * Partners
 * Login

 * en
    * ja

Please enter keyword to search.
 * Products
   EXPLORE THE PREDICTIVE PREVENTION PLATFORM
    * Prevention Platform
      End-to-end predictive prevention platform built on a deep learning
      framework that protects storage, applications, and endpoints.
    * Prevention for Storage
      Prevent >99% of zero-day exploits, ransomware, and unknown threats in your
      NAS and cloud storage repositories.
    * Prevention for Applications
      Proactively prevent malicious files from entering your storage environment
      through application uploads by customers, employees, and third parties.
    * Prevention for Endpoints
      Prevent known and unknown malware, zero-day exploits, ransomware, and
      script-based attacks before they execute on the endpoint – faster than a
      blink of an eye.
   
    * Data Security: Powered By Deep Instinct
      Leverage advanced predictive prevention technology to protect data across
      your entire environment.
    * Deep Learning: Prevention-First Cybersecurity
      Deep Instinct is the only deep learning framework in the world built from
      the ground up for cybersecurity.

 * Why Deep Instinct
   Unparalleled Prevention
    * >99% Threat Accuracy
      Leverage deep learning to deliver highly accurate threat detection and
      reduce false positives in a rapidly evolving threat landscape.
    * Prevent Ransomware
      Stop threats using real-time classification and prevention techniques to
      ensure robust and efficient cybersecurity.
    * Prevent Zero-Day Attacks
      Proactively stop zero-day threats in <20ms with unparalleled accuracy and
      minimal false positives.
   
   Enhance Existing Cyber Tools
    * Extend & Enhance EDR/XDR
      EDR is not enough — enhance existing cybersecurity tools with advanced,
      real-time threat prevention using deep learning to produce defense in
      depth.
    * + MICROSOFT DEFENDER
      Deep Instinct complements Microsoft Defender with advanced threat
      prevention to stop threats before they enter your environment.
    * + TANIUM
      Deep Instinct and Tanium deliver prevention-first endpoint security to
      reduce risk and boost productivity.
    * LEGACY AV
      Replace outdated, legacy AV solutions with prevention-first,
      deep-learning-based protection purpose-built for cybersecurity.

 * Resources
    * Asset Library
    * Threat Research
    * Voice Of SecOps
    * Blog
    * Videos
    * Events & Webinars
    * Training

 * Company
    * About Deep Instinct
    * Our Customers
    * Leadership Team
    * Board of Directors
    * Newsroom
    * Careers
    * Contact Us

 * Request Demo


Back To Blog
APRIL 4, 2024



DARKBEATC2: THE LATEST MUDDYWATER ATTACK FRAMEWORK

Simon KeninThreat Intelligence Researcher
Deep Instinct Threat Lab

During the “Swords of Iron War” against Hamas terrorists, Iranian threat actors
increased the intensity of their “hack and leak” fake hacktivist operations
against Israeli companies in the private sector. This blog post highlights some
of the recent attacks conducted and provides an analysis of “DarkBeatC2,” the
latest C2 framework in MuddyWater’s arsenal.

EXECUTIVE SUMMARY

Iranian threat actors continue to collaborate and hand off compromised targets
to conduct supply-chain attacks by leveraging information from previous
breaches.

Deep Instinct’s Threat Research team identified a previously unreported C2
framework that MuddyWater is suspected of using.

In this post, we shed additional light on recent state-sponsored attacks.

BACKGROUND

Despite the large number of Iranian cyber attacks against Israeli organizations,
which has significantly increased since the start of the “Swords of Iron War,”
Israeli reporting about the attacks has been limited to mainstream news reports
without technical details beyond general IOCs.

Most of the technical details about the attacks are exclusively being shared by
international companies outside of Israel even though most of the incident
response is done by local Israeli companies and the Israel National Cyber
Directorate (INCD).

For example, in mid-February 2024, Google shared a recap of some of the events
that have occurred since the start of 2024. The report includes information not
reported by the local news or the INCD.

When the INCD does share alerts about malicious cyber activity against Israeli
companies, which is infrequent, they’re vague on specifics. Recently, they
shared an alert about multiple state-sponsored groups targeting “mostly” a few
specific sectors.

The alert also includes a Yara rule set and a long list of IOCs without any
additional context.

Providing IOCs without any context might help for a day, but there is a reason
why they are located at the bottom of the “Pyramid of Pain,” a term we will
often refer to in this blog.

GOING THROUGH A PILE OF GARBAGE TO FIND GOLDEN NUGGETS

While the shared information is not enough to be useful for the companies that
are being targeted, let’s do a dumpster dive into what has been shared and see
if we can salvage anything useful.

The Yara rules are for various wipers based on the rule’s names. Although no
hashes or additional info is provided, it is possible to link the rules to the
following specific attacks:

 1. BiBi wiper by KarMa
 2. Homeland Justice wiper targeting Albanian Parliament (2022)
 3. Homeland Justice wiper targeting Albania’s Institute of Statistics (INSTAT)

Google links KarMa to DEV-0842/BanishedKitten. In Microsoft’s investigation into
the 2022 Albanian government attacks, they “assessed with high confidence that
multiple Iranian actors participated in this attack.” Microsoft states,
“DEV-0842 deployed the ransomware and wiper malware,” while three additional
groups participated in the attack. Each group was responsible for a different
step in the “Cyber Kill Chain.”

Additionally, Microsoft links all the different groups in this attack to the
Iranian Ministry of Intelligence and Security (MOIS).

Figure 1: Threat actors behind the attack against the Albanian government in
2022. (Source: Microsoft)



In another investigation into the 2022 Albanian government attack, Mandiant also
raised “the possibility of a cross-team collaboration.”

The IOC list shared by INCD includes hashes for seven files, only three of which
are publicly available. Among those publicly available, two are generic
webshells from 2020.

The last file is also a webshell. But unlike the other two, it is not a generic
webshell but a variant of the FoxShell used by
ScarredManticore/DEV-0861/ShroudedSnooper, which Microsoft observed
participating in the 2022 cyberattack on the Albanian government.

If we make an analogy to medical terminology, webshell is just a symptom, and
trying to prevent webshells by hash values is easily bypassed. Therefore, it is
not considered as a prevention capability.

Out of the three domains shared by INCD, only one is publicly known to be
directly related to Iranian activity. The domain vatacloud[.]com was used by
DEV-1084 (DarkBit) in their attack against the Technion in February 2023.
According to Microsoft, “DEV-1084 likely worked in partnership with MERCURY.”

Mercury, known as MuddyWater, is also part of the Iranian MOIS.

The last of the IOCs includes 31 IP addresses without a description.

Out of those, Deep Instinct could not identify any known malicious activity in
11 IP addresses.

Another 11 IP addresses are known to be associated with MuddyWater from previous
campaigns,

such as SimpleHarm, PhonyC2, and MuddyC2Go (1, 2).

The nine remaining IP addresses are most likely also related to MuddyWater.
Moreover, we believe that these IPs host the latest tools used by the threat
actor and their latest C2 framework, which we named “DarkBeatC2.”

Now, let’s examine the additional context surrounding the above findings to see
the full picture.

PRESENTING “LORD NEMESIS”

“Lord Nemesis” is the latest, “all the rage” Iranian “faketivist” operation.



Figure 2: Faketivism definition.



Due to the lack of transparency and context in reports on most Iranian cyber
operations against Israel, the following rare sighting of a detailed report
about a recent supply-chain attack amplifies why context is so important.

A unique report from OP Innovate details how the attackers, who call themselves
“Lord Nemesis,” managed to access multiple organizations by compromising a
single IT provider named “Rashim.”

According to the report, “One of the critical factors that allowed Lord Nemesis
to extend its attack beyond Rashim was the company’s practice of maintaining an
admin user account on some of its customer systems. By hijacking this admin
account, the attackers were able to access numerous organizations by using their
VPN that relied on the Michlol CRM, potentially compromising the security of
these institutions and putting their data at risk.”

While the report contains additional context that explains how the attackers
operated after they gained initial access, it does not explain how the attack
was attributed to “Nemesis Kitten,” as mentioned at the beginning of their
report.

According to Microsoft, “Nemesis Kitten” is DEV-0270 (Cobalt Mirage,
TunnelVision), a subgroup of the Iranian threat actor Mint Sandstorm
(PHOSPHORUS, APT35, Charming Kitten), which we have previously observed
exploiting Exchange servers.

While “Mint Sandstorm” has been linked to the Iranian IRGC, DEV-0270 is a
private subcontractor known as “SecNerd” or “Najee Technology.”

However, the most important detail from Op Innovate’s blog is the following: “To
instill fear in his victims and demonstrate the extent of his access, ‘Lord
Nemesis,’ contacted a list of Rashim’s users and colleagues via Rashim’s email
system on March 4th. This communication occurred four months after the initial
breach of Rashim’s infrastructure, highlighting the attacker’s prolonged
presence within the system.”

This is important because if “Lord Nemesis” were able to breach Rashim’s email
system, they might have breached the email systems of Rashim’s customers using
the admin accounts that now we know they obtained from “Rashim,” thanks to Op
Innovate’s reporting.

So, why is this so important? Read on.

BACK TO MUDDYWATER

We have reported about MuddyWater activity numerous times.

Despite the reports, the threat actor only slightly changes its core TTPs, as
the “Pyramid of Pain” predicted. While occasionally switching to a new remote
administration tool or changing their C2 framework (due to a previous one being
leaked), MuddyWater’s methods remain constant, as described in our very first
blog about the threat actor.



Figure 3: Updated MuddyWater campaign overview.



In a recent security brief by Proofpoint, MuddyWater (TA450) was observed
sending PDF attachments from the email of a compromised Israeli company.

Those PDF attachments contained links to various web hosting services where
users could download an archive containing a remote administration tool, as
shown in Figure 3 above.

However, one of those web hosting providers – “Egnyte,” with a
“salary.egnyte[.]com” subdomain – was new and not previously known to be in use
by MuddyWater.

While this change seems minor and insignificant, it is the exact opposite when
given additional context. At the same time Proofpoint reported this campaign,
Deep Instinct observed a similar campaign using a different subdomain,
“kinneretacil.egnyte[.]com.” The subdomain refers to the domain
“kinneret.ac.il,” which is an Israeli higher education college.

Kinneret is a customer of “Rashim,” thanks to the information that was shared by
OP Innovate. This led us to believe that kinneretacil.egnyte[.]com might be part
of their infrastructure compromised by “Lord Nemesis,” especially since it
shared username “ori ben-dor” which looks like an authentic Israeli name (see
Figure 4).



Figure 4: Uploader information at kinneretacil.egnyte[.]com



Thanks to the context given by Proofpoint, it appears the Egnyte account was not
compromised but rather created by MuddyWater. This can be seen by the lack of
creativity in the uploader name (“Shared by gsdfg gsg”) in the instance
Proofpoint observed (See Figure 5).



Figure 5: Uploader information at salary.egnyte[.]com



Since MuddyWater used a compromised email account to spread the links to
salary.egnyte[.]com, this was also likely with the kinneretacil.egnyte[.]com
links, although we don’t have direct evidence.

MuddyWater may have used the “Kinneret” email account to distribute these links,
exploiting the trust recipients have in the sender as a familiar and credible
organization.

During the same time, another archive hosted both on Sync and OneHub was
observed using the Hebrew name for “scholarship.” This indicates another
potential abuse of their access to “Rashim’s” accounts to target victims in the
education sector, tricking them into installing a remote administration tool.

While not conclusive, the timeframe and context of the events indicate a
potential hand-off or collaboration between IRGC and MOIS to inflict as much
harm as possible on Israeli organizations and individuals.

ADDITIONAL MUDDYWATER SHENANIGANS

In early March 2024, after a year of silence, DarkBit made some bold claims
about their new victims. However, so far, the only proof they have provided
indicates a single compromise at the INCD.

For those of you who don’t remember, DarkBit is the group that took
responsibility for the Technion hack. Microsoft attributed it to MuddyWater, and
DarkBit itself later admitted this (See Figure 6).



Figure 6: DarkBit acknowledging they are MuddyWater. (Source: K7 Security Labs)



While DarkBit has since deleted this message, the internet still remembers.

In their current iteration, DarkBit decided to upload and leak stolen data using
“freeupload[.]store”



Figure 7: DarkBit using freeupload[.]store (Source: K7 Security Labs)



During the same timeframe, in early March 2024, Deep Instinct identified two
different MSI files named “IronSwords.msi,” which are installers of “Atera
Agent,” the current RMM used by MuddyWater.

Those files have been uploaded as is, without being packaged into archives. One
file has been uploaded to filetransfer[.]io, while the second file was uploaded
to freeupload[.]store.

The domain freeupload[.]store belongs to the “0Day forums,” a hacking community
on the dark web.

The discovery of the Atera installer on a public hosting service, by itself,
does not provide sufficient evidence to draw conclusions. However, when
considering the context – the specific filename, the timing of its appearance,
the nature of the software, and the fact the same file hosting service was used
– the likelihood that these two files are connected to another Iranian campaign,
likely carried out by MuddyWater, is significantly increased.

INTRODUCING DARKBEATC2

Deep Instinct found a needle in the haystack: the DarkBeatC2 and other new tools
that MuddyWater most likely uses.

The IP address 185.236.234[.]161 is not known to be associated with MuddyWater.
However, it does belong to “Stark-Industries,” a known hosting provider for
malicious activity.

The IP address hosts the “reNgine” open-source reconnaissance framework.

While there is no previous public documentation of MuddyWater using this
framework, they have a track record of using a variety of open-source tools, and
reconnaissance is an important part of the “Cyber Kill Chain.”

Additionally, the domains aramcoglobal[.]site and mafatehgroup[.]com point to
the IP address 185.236.234[.]161.

The domain mafatehgroup[.]com impersonates the domain mafateehgroup.com, which
is a digital services provider with offices in Jordan and Saudi Arabia. Jordan,
Saudia, and Aramco are known targets of Iranian threat actors.

The IP address 185.216.13[.]242 also belongs to “Stark-Industries,” but this IP
hosted an administration panel for “Tactical RMM.”

Cybersecurity researchers have reported that “Tactical RMM” is being exploited
by threat actors to deploy ransomware.

“Tactical RMM” is another remote administration tool. It’s no surprise that
MuddyWater is abusing it given its track record of leveraging RATs.

The domain “websiteapicloud[.]com” resolves to the same IP address,
185.216.13[.]242, which hosts the “Tactical RMM.” This has already been observed
to be linked to an unnamed APT.

While writing this blog, we learned that “Intel-Ops” is also tracking the
MuddyWater activity described above.

Deep Instinct tracks the domain “websiteapicloud[.]com” as part of MuddyWater's
new DarkBeatC2 framework.

While IP addresses are at the bottom of the “Pyramid of Pain” and should be easy
for a threat actor to change, MuddyWater keeps reusing the same IP addresses.

Early links between MuddyWater and DarkBeatC2 can be seen in the following IP
addresses:

 1. 91.121.240[.]102 – This IP was mentioned almost a year ago in the
    “SimpleHarm” campaign, but in February this year, the domain
    googlelinks[.]net started to point to it.
 2. 137.74.131[.]19 – This IP is in the same subnet that has been known to host
    MuddyWater servers in both “SimpleHarm” and “PhonyC2” campaigns. The domain
    googlevalues[.]com also pointed to this IP address in February 2024.
 3. 164.132.237[.]68 – This IP is in the same subnet that has been known to host
    MuddyWater servers in both “SimpleHarm” and “PhonyC2” campaigns. The domain
    nc6010721b[.]biz resolved to this IP address in 2021. The domain name
    pattern (6nc/nc6) is very similar to domains we suspected to be related to
    MuddyWater in their “PhonyC2” campaign. While we still can’t confirm whether
    this is done by the VPS provider or by MuddyWater, there is a relation
    between those two.

While there are more domains and IPs related to the DarkBeatC2, which you can
find in the indicators appendix to this blog, we will focus on the following
domain: googleonlinee[.]com

Much like MuddyWater’s previous C2 frameworks, it serves as a central point to
manage all of the infected computers. The threat actor usually establishes a
connection to their C2 in one of the following ways:

 1. Manually executing PowerShell code to establish a connection to the C2 after
    gaining initial access via another method.
 2. Wrapping a connector to execute the code to establish a C2 connection within
    the first stage payload, which is delivered in a spear phishing email.
 3. Sideloading a malicious DLL to execute the code to establish a C2 connection
    by masquerading as a legitimate application (PowGoop and MuddyC2Go).

While we could not identify how the connection to DarkBeatC2 was made, we were
able to obtain some of the PowerShell responses to understand more about what it
does and how.

In general, this framework is similar to the previous C2 frameworks used by
MuddyWater. PowerShell remains their “bread and butter.”

The URL googleonlinee[.]com/setting/8955224/r4WB7DzDOwfaHSevxHH0 contains the
following PowerShell code:

Figure 8: PowerShell code from “setting” URI.



The above code simply fetches and executes two additional PowerShell scripts
from the same C2 server.

The code from the URL with “8946172” is included in Figure 9.

Figure 9: PowerShell code from “8946172” URI.



This code is also simple. It reads the contents of a file named
“C:\ProgramData\SysInt.log“ and sends it to the C2 via a POST request.

While we don’t know the contents of the file, the C2 framework creates it in
another stage, perhaps for a similar purpose to the file named “db.sqlite” in
PhonyC2.

The code from the second URL, with “7878123,” is included in Figure 10.



Figure 10: PowerShell code from “7878123” URI.



This code is more complex than the previous two code snippets. It runs in a loop
that sleeps for 20 seconds, trying to connect to the C2 and fetch additional
content. If the content is not null, there is an additional check to see if the
content contains the string “SRT_”. If this string is present, the content is
converted into an array with the sign “_” as a delimiter. The script then takes
the second object of the array and sleeps the amount of time in seconds that is
represented as a number in that object.

If the content is not null but does not contain the string “SRT_” the script
will convert the content of the response into a scriptblock and will execute it
while writing the response to the aforementioned “SysInt.log” file.

During our analysis, the server responded with a 403-error message. As such, we
did not receive any content during this phase.

CONCLUSION

Iranian threat actors are actively targeting Israeli networks. Sharing
information about these active intrusions could lead to proper treatment for the
issue. Exposing attack vectors and addressing underlying vulnerabilities is more
effective than simply reacting to IOCs after an infection has occurred.

We encourage everyone to share their findings – with context – like OP Innovate
did.

Because the security posture and maturity level of blue teams vary between
companies and industries, minimizing time to breach detection is crucial.

Relying solely on products that enhance detection capabilities could backfire
and slow the blue team’s detection capabilities due to the sheer amount of data
that needs to be processed.

This post, once again, highlights the strength of Deep Instinct’s
prevention-first capabilities. We prevent threats that other tools can’t find
leveraging our deep-learning framework. This eliminates the need for manual
intervention by the blue team, saving time, effort, and frustration while
ensuring breaches are eliminated.



IOCS



NETWORK

IP Address

Description

185.236.234[.]161reNgine185.216.13[.]242Tactical RMM
(websiteapicloud[.]com)45.66.249[.]226Suspected as DarkBeatC2
(googlelinks[.]net)137.74.131[.]19Suspected as DarkBeatC2
(googlevalues[.]com)164.132.237[.]68Suspected as DarkBeatC2
(google-word[.]com)95.164.61[.]64Suspected as DarkBeatC2 (webapicloud[.]com and
security-onedrive[.]com)95.164.46[.]54Suspected as DarkBeatC2
(webftpcloud[.]com)91.225.218[.]210Suspected as DarkBeatC2
(websiteftpcloud[.]com)95.164.38[.]68Suspected as DarkBeatC2
(softwaree-cloud[.]com)45.140.147[.]81Suspected as DarkBeatC2
(domainsoftcloud[.]com)80.71.157[.]130DarkBeatC2
(microsoft-corp[.]com)103.35.190[.]203DarkBeatC2
(asure-onlinee[.]com)95.164.46[.]253DarkBeatC2 (googleonlinee[.]com)



FILE

MD5

Description

353b4643ec51ecff7206175d930b0713MEK-DDMC.exe Albania’s INSTAT
Wiper3dd1f91f89dc70e90f7bc001ed50c9e7DarkBeatC2 PowerShell response from
googleonlinee[.]com/setting/8955224/r4WB7DzDOwfaHSevxHH0bede9522ff7d2bf7daff04392659b8a8DarkBeatC2
PowerShell response from
googleonlinee[.]com/zero/8946172/eUwYPH9eIbAOiLs32bfe46efceae5813b75b40852fde3c2DarkBeatC2
PowerShell response from
googleonlinee[.]com/zero/8946172/0IGkmSybmd3BXIeb7d15723d7ef47497c6efb270065ed84DarkBeatC2
PowerShell response from googleonlinee[.]com/zero/7878123/eUwYPH9eIbAOiLs



Back To Blog



PRODUCTS

 * Prevention Platform
 * Prevention for Storage
 * Prevention for Applications
 * Prevention for Endpoints
 * Data Security: Powered by Deep Instinct
 * Deep Learning: Prevention-First Cybersecurity


WHY DEEP INSTINCT

 * >99% Threat Accuracy
 * Prevent Ransomware
 * Prevent Zero-Day Attacks


ENHANCE EXISTING CYBER TOOLS

 * Extend & Enhance EDR/XDR
 * + Microsoft Defender
 * + Tanium
 * Legacy AV


COMPANY

 * About Deep Instinct
 * Our Customers
 * Newsroom
 * Careers
 * Contact Us


RESOURCES

 * Asset Library
 * Blog
 * Videos
 * Events & Webinars


QUICK LINKS

 * Request Demo
 * Customer Portal
 * Integrations and Compliance
 * Training

© 2024 Deep Instinct. All rights reserved.

 * Privacy Policy
 * Candidate Privacy Policy
 * Cookie Policy
 * Terms of use

 * 
 * 
 * 
 * 






Close


suggested results