Collecting In the Dark: Tropic Trooper Targets Transportation and Government

While analyzing samples, we found that the C&C server was already inactive. Without knowing the traffic between SmileSvr and C&C server, we could not fully understand all functions. However, most of the backdoor functions are listed here:

Command code Function
0x5001 Opens/Reads specified file
0x5002 Unknown
0x5004 Opens/Writes specified file
0x5006 Opens command shell
0x5007 Unknown
0x5009 Closes command shell
0x500A File System Traversal
0x500C Checks environment information
0x500E Unknown

As for the SSL version of SmileSvr, the capability of SSL communication is built by using wolfSSL, which is a lightweight, C-language based SSL/TLS library. The backdoor functions of SSL version SmileSvr are similar to the ICMP ones. The threat actors just use it to develop new ways to support data transfer via an encrypted channel.

Customized Gh0st RAT

In our investigation, we also found a suspicious executable named telegram.exe. After analyzing the file, we found that it was a customized version of Gh0st RAT. Compared to the original Gh0st RAT (Gh0st beta 3.6), the difference is that the customized version supports a new function to discover information from active sessions on the host.

All supported functions for the customized Gh0st are shown in the following table:

Command code Function
0xC8 Terminates connection
0xCA File manager to handle file operations
0xCB Screen monitoring
0xCC Opens remote shell for command execution
0XD5 Gets active session information

Post-Exploitation

After successfully exploiting the vulnerable system, the threat actor will use multiple hacking tools to discover and compromise machines on the victim’s intranet. In this stage, we also observed attempts to deploy tools to exfiltrate stolen information.

During our investigation, we found evidence of specific tools, which we listed in Table 1. With these tools, the attackers accomplish their goals (network discovery, access to the intranet, and exfiltration) step by step.

Tool name Purpose Description
SharpHound AD Discovery Discovery tool to understand the relationship in an AD environment
FRPC Intranet Penetration Fast reverse proxy to help expose a local server behind a NAT or firewall to the internet
Chisel Intranet Penetration Fast TCP/UDP tunnel
RClone Exfiltration A command-line program to sync files and directories to and from different cloud storage providers

Credential Dumping

We also observed that the group used multiple legitimate tools to dump credentials on compromised machines. It made good use of these tools to achieve its goal and keep its operation hidden and unobstructive.

For example, the group uses ProcDump.exe (a tool from Windows Sysinternals Suite that creates dumps of the processes in any scenario), which it renamed bootsys.exe:

c:\users\public\downloads\bootsys.exe  -accepteula -ma lsass.exe C:\Users\Public\Downloads\lsass.dmp

The group dumps credentials stored in registries by using reg.exe:

reg.exe save hklm\sam C:\Users\Public\Downloads\sam.hive

reg.exe save hklm\sam c:\windows\temp\sa.dit

reg.exe save hklm\security c:\windows\temp\se.dit

reg.exe save hklm\system c:\windows\temp\sy.dit

The group would also dump memory from the specified process by using comsvcs.dll:

rundll32.exe C:\Windows\System32\comsvcs.dll MiniDump 764 C:\Windows\TEMP\dump.bin full

Indicator Removal

To avoid exposing their footprints to investigators, the threat actors made their own tool to wipe out the event logs on the victimized machine. By using this tool, they could clean specified event logs and make it hard for investigators to track their operations.

The usage is as follows:

Read More HERE