{"id":5583,"date":"2020-09-22T11:06:12","date_gmt":"2020-09-22T18:06:12","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=5583"},"modified":"2024-08-07T12:24:26","modified_gmt":"2024-08-07T19:24:26","slug":"apt39-malicious-activity-and-tools","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/apt39-malicious-activity-and-tools\/","title":{"rendered":"APT39 Malicious Activity and Tools"},"content":{"rendered":"<p>Author: Nathan Toporek<\/p>\n<p>TLP:WHITE<\/p>\n<h3><strong>Executive Summary<\/strong><\/h3>\n<p>On 17 September, the Federal Bureau of Investigation (FBI) published a new FLASH alert in coordination with the Department of Homeland Security (DHS), and the Department of the Treasury (Treasury).<sup>1<\/sup> The report describes multiple types of malware that the Iranian Rana Intelligence Computing Company &#8211; also known as APT39 &#8211; has used in their global operations. In the report, the FBI included descriptions of how the various types of malware operate, as well as a set of YARA rules for each type. The FBI also published a representative set of malware samples to VirusTotal for public analysis.<\/p>\n<p>Rana Intelligence Computing Company is a front company for Iran&#8217;s Ministry of Intelligence and Security (MOIS). According to the FBI, it has targeted hundreds of individuals and entities in more than 30 countries spread across Asia, Africa, Europe, and North America. It has previously targeted foreign citizens, foreign governments, and organizations predominantly in the travel, hospitality, academic, and telecommunications industries. Specifically in Iran, it has targeted individuals and dissidents, in addition to companies and academic institutions.<\/p>\n<h3><strong>Analysis<\/strong><\/h3>\n<p>The FLASH alert describes multiple variants of malware that Rana used in its operations, including signatures for indicators of compromise (IOCs), along with sets of YARA rules that the FBI has developed to identify samples. The report includes variants of malicious Visual Basic Script (VBS), AutoIt Malware, two executables leveraging the Background Intelligent Transfer Service (BITS), an executable that mocks the Firefox web browser, a Python-based malware script, a malicious Android Package (APK), and a malicious Microsoft Cabinet file named <em>depot.dat<\/em>.<\/p>\n<ul>\n<li><strong>VBS Malware<\/strong><\/li>\n<\/ul>\n<p>APT39 embedded multiple VBS scripts inside Microsoft Office documents, which it sent to victims via spear phishing and other techniques that use social engineering. When a victim opens one of the documents, the VBS code will:<\/p>\n<ol>\n<li>Deobfuscate and run two scripts: one PowerShell, and another VBS.<\/li>\n<li>Configure download and upload paths on the victim&#8217;s computer.<\/li>\n<li>Set up a scheduled task to run the VBS file from step one every two minutes.<\/li>\n<li>Run the PowerShell script from step one.<\/li>\n<li>Communicate with a command and control (C2) server using a URL of:\u00a0 <em>&lt;actor IP or URL&gt;:port\/update.php?req=&lt;victim identifier&gt;.<\/em> This URL is preceded by information specifying an action to download data, upload data, or download a batch file.<\/li>\n<\/ol>\n<p>Both the VBS and the PowerShell scripts work to upload a victim&#8217;s files and execute commands locally via <em>cmd.exe<\/em>.<\/p>\n<ul>\n<li><strong>AutoIt Malware<\/strong><\/li>\n<\/ul>\n<p>APT39 leveraged several AutoIt scripts, which were likely embedded in Microsoft Office documents or malicious links, then sent to victims via a technique such as spear phishing. The FBI&#8217;s analysis determined these scripts to be similar in nature to the VBS malware. Each will:<\/p>\n<ol>\n<li>Perform a DNS flush.<\/li>\n<li>Create upload and download directories on the victim&#8217;s computer.<\/li>\n<li>Check for, then update the following registry key: <em>HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion.<\/em><\/li>\n<li>Communicate with a C2, similar to the VBS scripts in the previous section.\n<ul>\n<li><strong>BITS 1.0 Malware<\/strong><\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<p>Both the VBS and AutoIt malware download this malware, which uses Microsoft&#8217;s Background Intelligent Transfer Service (BITS) to upload a victim&#8217;s data to a C2 server. The FBI&#8217;s analysis showed that this malware installs a dropper containing two Microsoft cabinet (CAB) files. One of them is empty, while the other contains two Microsoft executable files (EXEs), along with XML files that create and run scheduled tasks to upload victim data. The two EXE files in the CAB exfiltrate the victim&#8217;s data to attacker infrastructure via BITS.<\/p>\n<ul>\n<li><strong>BITS 2.0 Malware<\/strong><\/li>\n<\/ul>\n<p>This variant is similar to the BITS 1.0 malware above in how it communicates with attacker infrastructure, but it has significant technical differences. Compared to the BITS 1.0 malware, the BITS 2.0 malware is a self-extracting executable containing an image, a VBS file, and another EXE. The VBS file creates and runs a persistent scheduled task to exfiltrate data; the EXE leverages BITS to exfiltrate data to attacker infrastructure.<\/p>\n<ul>\n<li><strong>Firefox Malware<\/strong><\/li>\n<\/ul>\n<p>This malware masquerades as a legitimate Firefox executable. It contains files and functionality that allow it to:<\/p>\n<ul>\n<li>Compress \/ decompress files,<\/li>\n<li>Log keyboard activity,<\/li>\n<li>Capture screenshots, and<\/li>\n<li>Communicate with a C2.\n<ul>\n<li><strong>Python-Based Malware<\/strong><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>This Python-based malware came packaged in a Roshal Archive (RAR) file. It reaches out via HTTP to a C2 server and downloads additional malware when it runs. The FBI did not specify the nature or function of additional malware.<\/p>\n<ul>\n<li><strong>Android Malware<\/strong><\/li>\n<\/ul>\n<p>APT39 used a malicious APK named <em>optimizer.apk<\/em> that was designed to communicate with the C2 server <em>saveingone[.]com,<\/em> and can:<\/p>\n<ul>\n<li>Record audio,<\/li>\n<li>Take photos, and<\/li>\n<li>Exfiltrate data to a C2 server.\n<ul>\n<li><strong>dat Malware<\/strong><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>The <em>depot.dat<\/em> malware is a Microsoft CAB file containing four dynamic link libraries (DLLs) that can perform keylogging, and capture screenshots of the victim&#8217;s computer. A separate dropper file decrypts and achieves persistence of the files in <em>depot.dat<\/em> by overriding the <em>SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Windows<\/em> registry key.<\/p>\n<h3><strong>Prevention and Mitigation<\/strong><\/h3>\n<p>The FBI FLASH report provides the following set of recommendations to mitigate this malware:<\/p>\n<ul>\n<li>Employ regular updates to applications and the host operating system to ensure protection against known vulnerabilities.<\/li>\n<li>Establish, and backup offline, a &#8220;known good&#8221; version of the relevant server and a regular changemanagement policy to enable monitoring for alterations to servable content with a file integrity system.<\/li>\n<li>Employ user input validation to restrict local and remote file inclusion vulnerabilities.\u00a0 Implement a least-privileges policy on the Webserver to:\n<ul>\n<li>Reduce adversaries\u2019 ability to escalate privileges or pivot laterally to other hosts.<\/li>\n<li>Control creation and execution of files in particular directories.<\/li>\n<\/ul>\n<\/li>\n<li>If not already present, consider deploying a demilitarized zone (DMZ) between the Web-facing systems and corporate network. Limiting the interaction and logging traffic between the two provides a method to identify possible malicious activity.<\/li>\n<li>Ensure a secure configuration of Webservers. All unnecessary services and ports should be disabled or blocked. All necessary services and ports should be restricted where feasible. This can include whitelisting or blocking external access to administration panels and not using default login credentials.<\/li>\n<li>Use a reverse proxy or alternative service to restrict accessible URL paths to known legitimate ones.<\/li>\n<li>Conduct regular system and application vulnerability scans to establish areas of risk. While this method does not protect against zero day attacks, it will highlight possible areas of concern.<\/li>\n<li>Deploy a Web application firewall and conduct regular virus signature checks, application fuzzing, code reviews, and server network analysis.<\/li>\n<\/ul>\n<h3><strong>Indicators of Compromise<\/strong><\/h3>\n<p>Below is a list of MD5 hashes representative of each malware variant. In-depth YARA rules for each are included in the FLASH report.<\/p>\n<ul>\n<li><strong>Indicators<\/strong><\/li>\n<\/ul>\n<table>\n<tbody>\n<tr>\n<td><strong>Indicator<\/strong><\/td>\n<td><strong>Description<\/strong><\/td>\n<\/tr>\n<tr>\n<td>9f7c280b20d021f0a0984d1ad0aeba41<\/td>\n<td>VBS Malware MD5<\/td>\n<\/tr>\n<tr>\n<td>486aa8849c173450911f886116f4b5d6<\/td>\n<td>AutoIt Malware MD5<\/td>\n<\/tr>\n<tr>\n<td>91e1793bd5f3f274ddb22b47662cb860<\/td>\n<td>BITS 1.0 Malware MD5<\/td>\n<\/tr>\n<tr>\n<td>2f01092e9cd49448b0de7da48e545682<\/td>\n<td>BITS 1.0 Malware MD5<\/td>\n<\/tr>\n<tr>\n<td>0d6d385354584264e2b37ff3a199ea04<\/td>\n<td>BITS 1.0\u00a0 Malware MD5<\/td>\n<\/tr>\n<tr>\n<td>8f848b67af0d6ad3dd3419c9d11c28c1<\/td>\n<td>BITS 1.0 Malware MD5<\/td>\n<\/tr>\n<tr>\n<td>45045fa9d428f29e8a3a988048e3aff1<\/td>\n<td>BITS 1.0 Malware MD5<\/td>\n<\/tr>\n<tr>\n<td>43124f6d418b086f3107a8cb708c3d2b<\/td>\n<td>BITS 2.0 Malware MD5<\/td>\n<\/tr>\n<tr>\n<td>6269e8ae9d86c648c15e41c7d89509ab<\/td>\n<td>BITS 2.0 Malware MD5<\/td>\n<\/tr>\n<tr>\n<td>eee655c5522267d63314a0b20162d619<\/td>\n<td>Firefox Malware MD5<\/td>\n<\/tr>\n<tr>\n<td>de8986682ab25d98448e688506250b94<\/td>\n<td>Python Malware MD5<\/td>\n<\/tr>\n<tr>\n<td>50ded657ff5a1c80d736fe3b80beb87f<\/td>\n<td>Python Malware MD5<\/td>\n<\/tr>\n<tr>\n<td>426351383DFE8F88A0959A9D5E8C43C7<\/td>\n<td>Android Malware MD5<\/td>\n<\/tr>\n<tr>\n<td>saveingone[.]com<\/td>\n<td>Android Malware C2<\/td>\n<\/tr>\n<tr>\n<td>59c2c1c6451417f054efaee32416c652<\/td>\n<td>Depot.dat MD5<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><strong>Endnotes<\/strong><\/p>\n<ol>\n<li><a href=\"https:\/\/www.ic3.gov\/media\/news\/2020\/200917-2.pdf\">https:\/\/www.ic3.gov\/media\/news\/2020\/200917-2.pdf<\/a><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Author: Nathan Toporek TLP:WHITE Executive Summary On 17 September, the Federal Bureau of Investigation (FBI) published a new FLASH alert in coordination with the Department of Homeland Security (DHS), and the Department of the Treasury (Treasury).1 The report describes multiple types of malware that the Iranian Rana Intelligence Computing Company &#8211; also known as APT39 [&hellip;]<\/p>\n","protected":false},"author":397,"featured_media":4416,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[254],"tags":[32,189],"class_list":{"0":"post-5583","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threat-intelligence","8":"tag-malware","9":"tag-cybersecurity","10":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>APT39 Malicious Activity and Tools<\/title>\n<meta name=\"description\" content=\"On 17 September, the Federal Bureau of Investigation (FBI) published a new FLASH alert in coordination with the Department of Homeland Security (DHS), and the Department of the Treasury (Treasury).1 The report describes multiple types of malware that the Iranian Rana Intelligence Computing Company - also known as APT39 - has used in their global operations. In the report, the FBI included descriptions of how the various types of malware operate, as well as a set of YARA rules for each type. The FBI also published a representative set of malware samples to VirusTotal for public analysis.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/apt39-malicious-activity-and-tools\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"APT39 Malicious Activity and Tools\" \/>\n<meta property=\"og:description\" content=\"On 17 September, the Federal Bureau of Investigation (FBI) published a new FLASH alert in coordination with the Department of Homeland Security (DHS), and the Department of the Treasury (Treasury).1 The report describes multiple types of malware that the Iranian Rana Intelligence Computing Company - also known as APT39 - has used in their global operations. In the report, the FBI included descriptions of how the various types of malware operate, as well as a set of YARA rules for each type. The FBI also published a representative set of malware samples to VirusTotal for public analysis.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/apt39-malicious-activity-and-tools\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-22T18:06:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-07T19:24:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/visible-threat-featured-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"613\" \/>\n\t<meta property=\"og:image:height\" content=\"434\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Infoblox Threat Intel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Infoblox Threat Intel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/apt39-malicious-activity-and-tools\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/apt39-malicious-activity-and-tools\\\/\"},\"author\":{\"name\":\"Infoblox Threat Intel\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\"},\"headline\":\"APT39 Malicious Activity and Tools\",\"datePublished\":\"2020-09-22T18:06:12+00:00\",\"dateModified\":\"2024-08-07T19:24:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/apt39-malicious-activity-and-tools\\\/\"},\"wordCount\":1260,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/apt39-malicious-activity-and-tools\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/visible-threat-featured-image.jpg\",\"keywords\":[\"Malware\",\"Cybersecurity\"],\"articleSection\":[\"Infoblox Threat Intel\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/apt39-malicious-activity-and-tools\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/apt39-malicious-activity-and-tools\\\/\",\"name\":\"APT39 Malicious Activity and Tools\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/apt39-malicious-activity-and-tools\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/apt39-malicious-activity-and-tools\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/visible-threat-featured-image.jpg\",\"datePublished\":\"2020-09-22T18:06:12+00:00\",\"dateModified\":\"2024-08-07T19:24:26+00:00\",\"description\":\"On 17 September, the Federal Bureau of Investigation (FBI) published a new FLASH alert in coordination with the Department of Homeland Security (DHS), and the Department of the Treasury (Treasury).1 The report describes multiple types of malware that the Iranian Rana Intelligence Computing Company - also known as APT39 - has used in their global operations. In the report, the FBI included descriptions of how the various types of malware operate, as well as a set of YARA rules for each type. The FBI also published a representative set of malware samples to VirusTotal for public analysis.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/apt39-malicious-activity-and-tools\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/apt39-malicious-activity-and-tools\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/apt39-malicious-activity-and-tools\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/visible-threat-featured-image.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/visible-threat-featured-image.jpg\",\"width\":613,\"height\":434},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/apt39-malicious-activity-and-tools\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infoblox Threat Intel\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"APT39 Malicious Activity and Tools\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\",\"name\":\"Infoblox Threat Intel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"caption\":\"Infoblox Threat Intel\"},\"description\":\"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/infoblox-threat-intel\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"APT39 Malicious Activity and Tools","description":"On 17 September, the Federal Bureau of Investigation (FBI) published a new FLASH alert in coordination with the Department of Homeland Security (DHS), and the Department of the Treasury (Treasury).1 The report describes multiple types of malware that the Iranian Rana Intelligence Computing Company - also known as APT39 - has used in their global operations. In the report, the FBI included descriptions of how the various types of malware operate, as well as a set of YARA rules for each type. The FBI also published a representative set of malware samples to VirusTotal for public analysis.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/apt39-malicious-activity-and-tools\/","og_locale":"en_US","og_type":"article","og_title":"APT39 Malicious Activity and Tools","og_description":"On 17 September, the Federal Bureau of Investigation (FBI) published a new FLASH alert in coordination with the Department of Homeland Security (DHS), and the Department of the Treasury (Treasury).1 The report describes multiple types of malware that the Iranian Rana Intelligence Computing Company - also known as APT39 - has used in their global operations. In the report, the FBI included descriptions of how the various types of malware operate, as well as a set of YARA rules for each type. The FBI also published a representative set of malware samples to VirusTotal for public analysis.","og_url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/apt39-malicious-activity-and-tools\/","og_site_name":"Infoblox Blog","article_published_time":"2020-09-22T18:06:12+00:00","article_modified_time":"2024-08-07T19:24:26+00:00","og_image":[{"width":613,"height":434,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/visible-threat-featured-image.jpg","type":"image\/jpeg"}],"author":"Infoblox Threat Intel","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Infoblox Threat Intel","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/apt39-malicious-activity-and-tools\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/apt39-malicious-activity-and-tools\/"},"author":{"name":"Infoblox Threat Intel","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae"},"headline":"APT39 Malicious Activity and Tools","datePublished":"2020-09-22T18:06:12+00:00","dateModified":"2024-08-07T19:24:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/apt39-malicious-activity-and-tools\/"},"wordCount":1260,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/apt39-malicious-activity-and-tools\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/visible-threat-featured-image.jpg","keywords":["Malware","Cybersecurity"],"articleSection":["Infoblox Threat Intel"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/apt39-malicious-activity-and-tools\/","url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/apt39-malicious-activity-and-tools\/","name":"APT39 Malicious Activity and Tools","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/apt39-malicious-activity-and-tools\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/apt39-malicious-activity-and-tools\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/visible-threat-featured-image.jpg","datePublished":"2020-09-22T18:06:12+00:00","dateModified":"2024-08-07T19:24:26+00:00","description":"On 17 September, the Federal Bureau of Investigation (FBI) published a new FLASH alert in coordination with the Department of Homeland Security (DHS), and the Department of the Treasury (Treasury).1 The report describes multiple types of malware that the Iranian Rana Intelligence Computing Company - also known as APT39 - has used in their global operations. In the report, the FBI included descriptions of how the various types of malware operate, as well as a set of YARA rules for each type. The FBI also published a representative set of malware samples to VirusTotal for public analysis.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/apt39-malicious-activity-and-tools\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/threat-intelligence\/apt39-malicious-activity-and-tools\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/apt39-malicious-activity-and-tools\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/visible-threat-featured-image.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/visible-threat-featured-image.jpg","width":613,"height":434},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/apt39-malicious-activity-and-tools\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Infoblox Threat Intel","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/"},{"@type":"ListItem","position":3,"name":"APT39 Malicious Activity and Tools"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae","name":"Infoblox Threat Intel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","caption":"Infoblox Threat Intel"},"description":"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.","url":"https:\/\/www.infoblox.com\/blog\/author\/infoblox-threat-intel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5583","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/397"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=5583"}],"version-history":[{"count":2,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5583\/revisions"}],"predecessor-version":[{"id":5585,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5583\/revisions\/5585"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/4416"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=5583"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=5583"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=5583"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}