Joshua Penny Profile picture
May 7 12 tweets 10 min read Twitter logo Read on Twitter
1/ New #MuddyWater 🇮🇷Infra detected; moves to #Metasploit and #HPAnywhere/#Teradici tool added?

@GroupIB_TI released a great report detailing MuddyWater’s use of SimpleHelp Remote Support Software. They tracked the #APT's infrastructure using Etags.

Let's take a look! 🧐 👇👇 Image
2/ First Etag(153): 🔟results.

First IP of interest: 👉164.132.237[.]67

If we now pivot on the SSH hash, we match on another IP:

👉3.6.222[.]144.

Looking at this IP, the SSL certificate presented mentions O=Teradici Corporation... Image
3/ Teradici (now HP Anywhere) allows for remote access to machines from any PCoIP client. 💻⬅️🌐⬅️💻

Indicating that MuddyWater may also be using HP’s Anywhere/Teradici as well as SimpleHelp?🧐 Image
4/ Using the hash presented by this IP you can find another 176 hosts on the internet:

👉http.html_hash:-1480707872

Searching for “ssl:Teradici” you find 2060 hosts!

HP Anywhere/Teradici is a remote desktop software: teradici.com, using PCoIP technology. ImageImage
5/ Second IP of Interest:

👉164.132.237[.]65

Open port 10443 but no banner information...if we pivot off of that hash we return 36 results.

Looking at the first IP:

👉 44.202.249[.]7

It also has the default Sliver C2 port 31337 open, including SSL certificate settings:👇 ImageImage
6/ Issuer: CN=operators, Subject: CN=multiplayer.

Building a Shodan search returns 287 results!

See Michael K’s thread 🔥 on hunt Sliver C2 here:

Additionally IP 5.34.180[.]39 has a MetaSploit certificate on port 3790:

CN=MetasploitSelfSignedCA Image
7/ Third IP of interest: 137.74.131[.]29:443.

Has interesting header when pivoted from returns 17 results, first being a MetaSploit C2 - 164.132.237[.]79. This IP is hosted on the same ISP subnet as 3 previously reported MW C2’s by GIB. 🔥👉This IP hasn’t been identified as MW. ImageImage
8/ This IP does share hostname:

👉6nc110821hdb[.]co

with 51.255.19[.]178 which is a SimpleHelp server attributed to MW.

👉IP: 137.74.131[.]24 is a MuddyWater IP address. The domain nc6jan20pol[.]co is shared across this and another IP. Image
9/ This IP was using the same Etag reported by GIB but now doesn’t return in that search, instead can still be found by the header or a hostname search. Image
10/ (Last one)

The Last IP of interest: 👉149.202.242[.]85. This IP is also running Metasploit with port 3790 open.

More evidence of change by MuddyWater to use MetaSploit.

Interesting changes (MetaSploit and Teradici) since the Group-IB report. Thanks for reading! 🙂 Image

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Joshua Penny

Joshua Penny Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(