Satellite Turla

Satellite Turla
(Type: Backdoor, Tunneling)

(Kaspersky) The regular usage of satellite-based Internet links by the Turla group represents an interesting aspect of their operation. The links are generally up for several months, but never for too long. It is unknown if this is due to operational security limitations self-imposed by the group or because of shutdown by other parties due to malicious behavior. The technical method used to implement these Internet circuits relies on hijacking downstream bandwidth from various ISPs and packet-spoofing. This is a method that is technically easy to implement, and provides a much higher degree of anonymity than possibly any other conventional method such as renting a VPS or hacking a legitimate server.

[News Analysis] Trends:

Total Trend: 2

Trend Per Year
1
2015
1
2017


Trend Per Month
1
Sep 2015
1
Aug 2017



[News Analysis] News Mention Another Threat Name:

1 - Satellite Turla1 - Turla


[TTP Analysis] Technique Performance:

reconnaissance
0/43
resource development
7/45
initial access
3/19
execution
7/36
persistence
5/113
privilege escalation
9/96
defense evasion
11/184
credential access
2/63
discovery
18/44
lateral movement
2/22
collection
4/37
command and control
7/39
exfiltration
1/18
impact
0/26


[TTP Analysis] Mitre Attack Matrix:

TA0043 TA0042 TA0001 TA0002 TA0003 TA0004 TA0005 TA0006 TA0007 TA0008 TA0009 TA0011 TA0010 TA0040
Reconnaissance Resource Development Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact
T1583.006
Acquire Infrastructure : Web Services
T1584.003
Compromise Infrastructure : Virtual Private Server
T1584.004
Compromise Infrastructure : Server
T1584.006
Compromise Infrastructure : Web Services
T1587.001
Develop Capabilities : Malware
T1588.001
Obtain Capabilities : Malware
T1588.002
Obtain Capabilities : Tool
T1189
Drive-by Compromise
T1566.002
Phishing : Spearphishing Link
T1078.003
Valid Accounts : Local Accounts
T1059.001
Command And Scripting Interpreter : Powershell
T1059.003
Command And Scripting Interpreter : Windows Command Shell
T1059.005
Command And Scripting Interpreter : Visual Basic
T1059.006
Command And Scripting Interpreter : Python
T1059.007
Command And Scripting Interpreter : Javascript
T1106
Native Api
T1204.001
User Execution : Malicious Link
T1547.001
Boot Or Logon Autostart Execution : Registry Run Keys / Startup Folder
T1547.004
Boot Or Logon Autostart Execution : Winlogon Helper Dll
T1546.003
Event Triggered Execution : Windows Management Instrumentation Event Subscription
T1546.013
Event Triggered Execution : Powershell Profile
T1078.003
Valid Accounts : Local Accounts
T1134.002
Access Token Manipulation : Create Process With Token
T1547.001
Boot Or Logon Autostart Execution : Registry Run Keys / Startup Folder
T1547.004
Boot Or Logon Autostart Execution : Winlogon Helper Dll
T1546.003
Event Triggered Execution : Windows Management Instrumentation Event Subscription
T1546.013
Event Triggered Execution : Powershell Profile
T1068
Exploitation For Privilege Escalation
T1055
Process Injection
T1055.001
Process Injection : Dynamic-link Library Injection
T1078.003
Valid Accounts : Local Accounts
T1134.002
Access Token Manipulation : Create Process With Token
T1140
Deobfuscate/decode Files Or Information
T1562.001
Impair Defenses : Disable Or Modify Tools
T1112
Modify Registry
T1027.005
Obfuscated Files Or Information : Indicator Removal From Tools
T1027.010
Obfuscated Files Or Information : Command Obfuscation
T1027.011
Obfuscated Files Or Information : Fileless Storage
T1055
Process Injection
T1055.001
Process Injection : Dynamic-link Library Injection
T1553.006
Subvert Trust Controls : Code Signing Policy Modification
T1078.003
Valid Accounts : Local Accounts
T1110
Brute Force
T1555.004
Credentials From Password Stores : Windows Credential Manager
T1087.001
Account Discovery : Local Account
T1087.002
Account Discovery : Domain Account
T1083
File And Directory Discovery
T1615
Group Policy Discovery
T1201
Password Policy Discovery
T1120
Peripheral Device Discovery
T1069.001
Permission Groups Discovery : Local Groups
T1069.002
Permission Groups Discovery : Domain Groups
T1057
Process Discovery
T1012
Query Registry
T1018
Remote System Discovery
T1518.001
Software Discovery : Security Software Discovery
T1082
System Information Discovery
T1016
System Network Configuration Discovery
T1016.001
System Network Configuration Discovery : Internet Connection Discovery
T1049
System Network Connections Discovery
T1007
System Service Discovery
T1124
System Time Discovery
T1570
Lateral Tool Transfer
T1021.002
Remote Services : Smb/windows Admin Shares
T1560.001
Archive Collected Data : Archive Via Utility
T1213
Data From Information Repositories
T1005
Data From Local System
T1025
Data From Removable Media
T1071.001
Application Layer Protocol : Web Protocols
T1071.003
Application Layer Protocol : Mail Protocols
T1105
Ingress Tool Transfer
T1090
Proxy
T1090.001
Proxy : Internal Proxy
T1102
Web Service
T1102.002
Web Service : Bidirectional Communication
T1567.002
Exfiltration Over Web Service : Exfiltration To Cloud Storage


[Infrastructure Analysis] Based on Related IOC:

IP:Port Timestamp
Domain Timestamp
URL Timestamp


[Target Analysis] Region/Sector:

No information


References:

News Article (Credit @Malpedia)

Hackers are Humans too

2017-08-09 by CSE Canada from CSE

Satellite Turla: APT Command and Control in the Sky

2015-09-09 by Stefan Tanase from Kaspersky Labs

Basic Information (Credit @etda.or.th)

Tool: Satellite Turla

Names: Satellite Turla

Description: (Kaspersky) The regular usage of satellite-based Internet links by the Turla group represents an interesting aspect of their operation. The links are generally up for several months, but never for too long. It is unknown if this is due to operational security limitations self-imposed by the group or because of shutdown by other parties due to malicious behavior. The technical method used to implement these Internet circuits relies on hijacking downstream bandwidth from various ISPs and packet-spoofing. This is a method that is technically easy to implement, and provides a much higher degree of anonymity than possibly any other conventional method such as renting a VPS or hacking a legitimate server.

Category: Malware

Type: Backdoor, Tunneling

Information: https://securelist.com/satellite-turla-apt-command-and-control-in-the-sky/72081/

Malpedia: https://malpedia.caad.fkie.fraunhofer.de/details/win.satellite_turla

Alienvault-otx: https://otx.alienvault.com/browse/pulses?q=tag:satellite

Last-card-change: 2021-04-24

Source: https://apt.etda.or.th/cgi-bin/listtools.cgi

TTP Info (Credit @Mitre)

TA0043 TA0042 TA0001 TA0002 TA0003 TA0004 TA0005 TA0006 TA0007 TA0008 TA0009 TA0011 TA0010 TA0040
Reconnaissance Resource Development Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact
T1583.006
ACQUIRE INFRASTRUCTURE : WEB SERVICES
turla has created web accounts including dropbox and github for c2 and document exfiltration.
T1584.003
COMPROMISE INFRASTRUCTURE : VIRTUAL PRIVATE SERVER
turla has used the vps infrastructure of compromised iranian threat actors.
T1584.004
COMPROMISE INFRASTRUCTURE : SERVER
turla has used compromised servers as infrastructure.
T1584.006
COMPROMISE INFRASTRUCTURE : WEB SERVICES
turla has frequently used compromised wordpress sites for c2 infrastructure.
T1587.001
DEVELOP CAPABILITIES : MALWARE
turla has developed its own unique malware for use in operations.
T1588.001
OBTAIN CAPABILITIES : MALWARE
turla has used malware obtained after compromising other threat actors, such as oilrig.
T1588.002
OBTAIN CAPABILITIES : TOOL
turla has obtained and customized publicly-available tools like mimikatz.
T1189
DRIVE-BY COMPROMISE
turla has infected victims using watering holes.
T1566.002
PHISHING : SPEARPHISHING LINK
turla attempted to trick targets into clicking on a link featuring a seemingly legitimate domain from adobe.com to download their malware and gain initial access.
T1078.003
VALID ACCOUNTS : LOCAL ACCOUNTS
turla has abused local accounts that have the same password across the victim’s network.
T1059.001
COMMAND AND SCRIPTING INTERPRETER : POWERSHELL
turla has used powershell to execute commands/scripts, in some cases via a custom executable or code from empire's psinject. turla has also used powershell scripts to load and execute malware in memory.
T1059.003
COMMAND AND SCRIPTING INTERPRETER : WINDOWS COMMAND SHELL
turla rpc backdoors have used cmd.exe to execute commands.
T1059.005
COMMAND AND SCRIPTING INTERPRETER : VISUAL BASIC
turla has used vbs scripts throughout its operations.
T1059.006
COMMAND AND SCRIPTING INTERPRETER : PYTHON
turla has used ironpython scripts as part of the ironnetinjector toolchain to drop payloads.
T1059.007
COMMAND AND SCRIPTING INTERPRETER : JAVASCRIPT
turla has used various javascript-based backdoors.
T1106
NATIVE API
turla and its rpc backdoors have used apis calls for various tasks related to subverting amsi and accessing then executing commands through rpc and/or named pipes.
T1204.001
USER EXECUTION : MALICIOUS LINK
turla has used spearphishing via a link to get users to download and run their malware.
T1547.001
BOOT OR LOGON AUTOSTART EXECUTION : REGISTRY RUN KEYS / STARTUP FOLDER
a turla javascript backdoor added a local_update_check value under the registry key hklm\software\microsoft\windows\currentversion\run to establish persistence. additionally, a turla custom executable containing metasploit shellcode is saved to the startup folder to gain persistence.
T1547.004
BOOT OR LOGON AUTOSTART EXECUTION : WINLOGON HELPER DLL
turla established persistence by adding a shell value under the registry key hkcu\software\microsoft\windows nt\currentversion\winlogon.
T1546.003
EVENT TRIGGERED EXECUTION : WINDOWS MANAGEMENT INSTRUMENTATION EVENT SUBSCRIPTION
turla has used wmi event filters and consumers to establish persistence.
T1546.013
EVENT TRIGGERED EXECUTION : POWERSHELL PROFILE
turla has used powershell profiles to maintain persistence on an infected machine.
T1078.003
VALID ACCOUNTS : LOCAL ACCOUNTS
turla has abused local accounts that have the same password across the victim’s network.
T1134.002
ACCESS TOKEN MANIPULATION : CREATE PROCESS WITH TOKEN
turla rpc backdoors can impersonate or steal process tokens before executing commands.
T1547.001
BOOT OR LOGON AUTOSTART EXECUTION : REGISTRY RUN KEYS / STARTUP FOLDER
a turla javascript backdoor added a local_update_check value under the registry key hklm\software\microsoft\windows\currentversion\run to establish persistence. additionally, a turla custom executable containing metasploit shellcode is saved to the startup folder to gain persistence.
T1547.004
BOOT OR LOGON AUTOSTART EXECUTION : WINLOGON HELPER DLL
turla established persistence by adding a shell value under the registry key hkcu\software\microsoft\windows nt\currentversion\winlogon.
T1546.003
EVENT TRIGGERED EXECUTION : WINDOWS MANAGEMENT INSTRUMENTATION EVENT SUBSCRIPTION
turla has used wmi event filters and consumers to establish persistence.
T1546.013
EVENT TRIGGERED EXECUTION : POWERSHELL PROFILE
turla has used powershell profiles to maintain persistence on an infected machine.
T1068
EXPLOITATION FOR PRIVILEGE ESCALATION
turla has exploited vulnerabilities in the vboxdrv.sys driver to obtain kernel mode privileges.
T1055
PROCESS INJECTION
turla has also used powersploit's invoke-reflectivepeinjection.ps1 to reflectively load a powershell payload into a random process on the victim system.
T1055.001
PROCESS INJECTION : DYNAMIC-LINK LIBRARY INJECTION
turla has used metasploit to perform reflective dll injection in order to escalate privileges.
T1078.003
VALID ACCOUNTS : LOCAL ACCOUNTS
turla has abused local accounts that have the same password across the victim’s network.
T1134.002
ACCESS TOKEN MANIPULATION : CREATE PROCESS WITH TOKEN
turla rpc backdoors can impersonate or steal process tokens before executing commands.
T1140
DEOBFUSCATE/DECODE FILES OR INFORMATION
turla has used a custom decryption routine, which pulls key and salt values from other artifacts such as a wmi filter or powershell profile, to decode encrypted powershell payloads.
T1562.001
IMPAIR DEFENSES : DISABLE OR MODIFY TOOLS
turla has used a amsi bypass, which patches the in-memory amsi.dll, in powershell scripts to bypass windows antimalware products.
T1112
MODIFY REGISTRY
turla has modify registry values to store payloads.
T1027.005
OBFUSCATED FILES OR INFORMATION : INDICATOR REMOVAL FROM TOOLS
based on comparison of gazer versions, turla made an effort to obfuscate strings in the malware that could be used as iocs, including the mutex name and named pipe.
T1027.010
OBFUSCATED FILES OR INFORMATION : COMMAND OBFUSCATION
turla has used encryption (including salted 3des via powersploit's out-encryptedscript.ps1), random variable names, and base64 encoding to obfuscate powershell commands and payloads.
T1027.011
OBFUSCATED FILES OR INFORMATION : FILELESS STORAGE
turla has used the registry to store encrypted and encoded payloads.
T1055
PROCESS INJECTION
turla has also used powersploit's invoke-reflectivepeinjection.ps1 to reflectively load a powershell payload into a random process on the victim system.
T1055.001
PROCESS INJECTION : DYNAMIC-LINK LIBRARY INJECTION
turla has used metasploit to perform reflective dll injection in order to escalate privileges.
T1553.006
SUBVERT TRUST CONTROLS : CODE SIGNING POLICY MODIFICATION
turla has modified variables in kernel memory to turn off driver signature enforcement after exploiting vulnerabilities that obtained kernel mode privileges.
T1078.003
VALID ACCOUNTS : LOCAL ACCOUNTS
turla has abused local accounts that have the same password across the victim’s network.
T1110
BRUTE FORCE
turla may attempt to connect to systems within a victim's network using net use commands and a predefined list or collection of passwords.
T1555.004
CREDENTIALS FROM PASSWORD STORES : WINDOWS CREDENTIAL MANAGER
turla has gathered credentials from the windows credential manager tool.
T1087.001
ACCOUNT DISCOVERY : LOCAL ACCOUNT
turla has used net user to enumerate local accounts on the system.
T1087.002
ACCOUNT DISCOVERY : DOMAIN ACCOUNT
turla has used net user /domain to enumerate domain accounts.
T1083
FILE AND DIRECTORY DISCOVERY
turla surveys a system upon check-in to discover files in specific locations on the hard disk %temp% directory, the current user's desktop, the program files directory, and recent. turla rpc backdoors have also searched for files matching the lph*.dll pattern.
T1615
GROUP POLICY DISCOVERY
turla surveys a system upon check-in to discover group policy details using the gpresult command.
T1201
PASSWORD POLICY DISCOVERY
turla has used net accounts and net accounts /domain to acquire password policy information.
T1120
PERIPHERAL DEVICE DISCOVERY
turla has used fsutil fsinfo drives to list connected drives.
T1069.001
PERMISSION GROUPS DISCOVERY : LOCAL GROUPS
turla has used net localgroup and net localgroup administrators to enumerate group information, including members of the local administrators group.
T1069.002
PERMISSION GROUPS DISCOVERY : DOMAIN GROUPS
turla has used net group "domain admins" /domain to identify domain administrators.
T1057
PROCESS DISCOVERY
turla surveys a system upon check-in to discover running processes using the tasklist /v command. turla rpc backdoors have also enumerated processes associated with specific open ports or named pipes.
T1012
QUERY REGISTRY
turla surveys a system upon check-in to discover information in the windows registry with the reg query command. turla has also retrieved powershell payloads hidden in registry keys as well as checking keys associated with null session named pipes .
T1018
REMOTE SYSTEM DISCOVERY
turla surveys a system upon check-in to discover remote systems on a local network using the net view and net view /domain commands. turla has also used net group "domain computers" /domain, net group "domain controllers" /domain, and net group "exchange servers" /domain to enumerate domain computers, including the organization's dc and exchange server.
T1518.001
SOFTWARE DISCOVERY : SECURITY SOFTWARE DISCOVERY
turla has obtained information on security software, including security logging information that may indicate whether their malware has been detected.
T1082
SYSTEM INFORMATION DISCOVERY
turla surveys a system upon check-in to discover operating system configuration details using the systeminfo and set commands.
T1016
SYSTEM NETWORK CONFIGURATION DISCOVERY
turla surveys a system upon check-in to discover network configuration details using the arp -a, nbtstat -n, net config, ipconfig /all, and route commands, as well as nbtscan. turla rpc backdoors have also retrieved registered rpc interface information from process memory.
T1016.001
SYSTEM NETWORK CONFIGURATION DISCOVERY : INTERNET CONNECTION DISCOVERY
turla has used tracert to check internet connectivity.
T1049
SYSTEM NETWORK CONNECTIONS DISCOVERY
turla surveys a system upon check-in to discover active local network connections using the netstat -an, net use, net file, and net session commands. turla rpc backdoors have also enumerated the ipv4 tcp connection table via the gettcptable2 api call.
T1007
SYSTEM SERVICE DISCOVERY
turla surveys a system upon check-in to discover running services and associated processes using the tasklist /svc command.
T1124
SYSTEM TIME DISCOVERY
turla surveys a system upon check-in to discover the system time by using the net time command.
T1570
LATERAL TOOL TRANSFER
turla rpc backdoors can be used to transfer files to/from victim machines on the local network.
T1021.002
REMOTE SERVICES : SMB/WINDOWS ADMIN SHARES
turla used net use commands to connect to lateral systems within a network.
T1560.001
ARCHIVE COLLECTED DATA : ARCHIVE VIA UTILITY
turla has encrypted files stolen from connected usb drives into a rar file before exfiltration.
T1213
DATA FROM INFORMATION REPOSITORIES
turla has used a custom .net tool to collect documents from an organization's internal central database.
T1005
DATA FROM LOCAL SYSTEM
turla rpc backdoors can upload files from victim machines.
T1025
DATA FROM REMOVABLE MEDIA
turla rpc backdoors can collect files from usb thumb drives.
T1071.001
APPLICATION LAYER PROTOCOL : WEB PROTOCOLS
turla has used http and https for c2 communications.
T1071.003
APPLICATION LAYER PROTOCOL : MAIL PROTOCOLS
turla has used multiple backdoors which communicate with a c2 server via email attachments.
T1105
INGRESS TOOL TRANSFER
turla has used shellcode to download meterpreter after compromising a victim.
T1090
PROXY
turla rpc backdoors have included local upnp rpc proxies.
T1090.001
PROXY : INTERNAL PROXY
turla has compromised internal network systems to act as a proxy to forward traffic to c2.
T1102
WEB SERVICE
turla has used legitimate web services including pastebin, dropbox, and github for c2 communications.
T1102.002
WEB SERVICE : BIDIRECTIONAL COMMUNICATION
a turla javascript backdoor has used google apps script as its c2 server.
T1567.002
EXFILTRATION OVER WEB SERVICE : EXFILTRATION TO CLOUD STORAGE
turla has used webdav to upload stolen usb files to a cloud drive. turla has also exfiltrated stolen files to onedrive and 4shared.