Shark

Shark
(Type: Backdoor)

(ClearSky) In July 2021, we detected a second wave of similar attacks against additional companies in Israel. In this wave, Siamesekitten upgraded their backdoor malware to a new version called “Shark” and it replaced the old version of their malware called “{{Milan}}”.

[News Analysis] Trends:

Total Trend: 2

Trend Per Year
2
2021


Trend Per Month
1
Aug 2021
1
Nov 2021



[News Analysis] News Mention Another Threat Name:

3 - Milan3 - Shark2 - LYCEUM2 - danbot


[TTP Analysis] Technique Performance:

reconnaissance
0/43
resource development
0/45
initial access
0/19
execution
1/36
persistence
0/113
privilege escalation
0/96
defense evasion
5/184
credential access
0/63
discovery
3/44
lateral movement
0/22
collection
2/37
command and control
5/39
exfiltration
2/18
impact
0/26


[TTP Analysis] Mitre Attack Matrix:

TA0043 TA0042 TA0001 TA0002 TA0003 TA0004 TA0005 TA0006 TA0007 TA0008 TA0009 TA0011 TA0010 TA0040
Reconnaissance Resource Development Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact
T1059.003
Command And Scripting Interpreter : Windows Command Shell
T1140
Deobfuscate/decode Files Or Information
T1070.004
Indicator Removal : File Deletion
T1036.005
Masquerading : Match Legitimate Name Or Location
T1027
Obfuscated Files Or Information
T1497.001
Virtualization/sandbox Evasion : System Checks
T1012
Query Registry
T1082
System Information Discovery
T1497.001
Virtualization/sandbox Evasion : System Checks
T1005
Data From Local System
T1074
Data Staged
T1071.001
Application Layer Protocol : Web Protocols
T1071.004
Application Layer Protocol : Dns
T1568.002
Dynamic Resolution : Domain Generation Algorithms
T1008
Fallback Channels
T1105
Ingress Tool Transfer
T1041
Exfiltration Over C2 Channel
T1029
Scheduled Transfer


[Infrastructure Analysis] Based on Related IOC:

IP:Port Timestamp
Domain Timestamp
URL Timestamp


[Target Analysis] Region/Sector:

No information


References:

News Article (Credit @Malpedia)

Who are latest targets of cyber group Lyceum?

2021-11-09 by Prevailion from Prevailion

New Iranian Espionage Campaign By “Siamesekitten” - Lyceum

2021-08-17 by ClearSky from ClearSky

Basic Information (Credit @etda.or.th)

Tool: Shark

Names: Shark

Description: (ClearSky) In July 2021, we detected a second wave of similar attacks against additional companies in Israel. In this wave, Siamesekitten upgraded their backdoor malware to a new version called “Shark” and it replaced the old version of their malware called “{{Milan}}”.

Category: Malware

Type: Backdoor

Information: https://www.clearskysec.com/wp-content/uploads/2021/08/Siamesekitten.pdf

Mitre-attack: https://attack.mitre.org/software/S1019/

Malpedia: https://malpedia.caad.fkie.fraunhofer.de/details/win.shark

Last-card-change: 2022-12-30

Source: https://apt.etda.or.th/cgi-bin/listtools.cgi

TTP Info (Credit @Mitre)

TA0043 TA0042 TA0001 TA0002 TA0003 TA0004 TA0005 TA0006 TA0007 TA0008 TA0009 TA0011 TA0010 TA0040
Reconnaissance Resource Development Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact
T1059.003
COMMAND AND SCRIPTING INTERPRETER : WINDOWS COMMAND SHELL
shark has the ability to use cmd to execute commands.
T1140
DEOBFUSCATE/DECODE FILES OR INFORMATION
shark can extract and decrypt downloaded .zip files.
T1070.004
INDICATOR REMOVAL : FILE DELETION
shark can delete files downloaded to the compromised host.
T1036.005
MASQUERADING : MATCH LEGITIMATE NAME OR LOCATION
shark binaries have been named audioddg.pdb and winlangdb.pdb in order to appear legitimate.
T1027
OBFUSCATED FILES OR INFORMATION
shark can use encrypted and encoded files for c2 configuration.
T1497.001
VIRTUALIZATION/SANDBOX EVASION : SYSTEM CHECKS
shark can stop execution if the screen width of the targeted machine is not over 600 pixels.
T1012
QUERY REGISTRY
shark can query hkey_local_machine\software\microsoft\cryptography machineguid to retrieve the machine guid.
T1082
SYSTEM INFORMATION DISCOVERY
shark can collect the guid of a targeted machine.
T1497.001
VIRTUALIZATION/SANDBOX EVASION : SYSTEM CHECKS
shark can stop execution if the screen width of the targeted machine is not over 600 pixels.
T1005
DATA FROM LOCAL SYSTEM
shark can upload files to its c2.
T1074
DATA STAGED
shark has stored information in folders named u1 and u2 prior to exfiltration.
T1071.001
APPLICATION LAYER PROTOCOL : WEB PROTOCOLS
shark has the ability to use http in c2 communications.
T1071.004
APPLICATION LAYER PROTOCOL : DNS
shark can use dns in c2 communications.
T1568.002
DYNAMIC RESOLUTION : DOMAIN GENERATION ALGORITHMS
shark can send dns c2 communications using a unique domain generation algorithm.
T1008
FALLBACK CHANNELS
shark can update its configuration to use a different c2 server.
T1105
INGRESS TOOL TRANSFER
shark can download additional files from its c2 via http or dns.
T1041
EXFILTRATION OVER C2 CHANNEL
shark has the ability to upload files from the compromised host over a dns or http c2 channel.
T1029
SCHEDULED TRANSFER
shark can pause c2 communications for a specified time.