Animator - Archer
Historical mappings of domains to IP addresses and vice versa
Sources of PDNS
Using domain registrant information to look for other potentially related domains
Sources of trackable whois information
Code signing certificate != TLS certificate
What certificates have been seen on 185.12.44.51
This will be covered later in the slides
What IP addresses is a1833c32d5f61d6ef9d1bb0133585112069d770e currently seen on
This will be covered later in the slides
Most of these you will have to do with your own sonar scan data or censys.io data
First you need some data
Checkout my Python Scansio-Sonar-ES github repo
Or my Golang Sonar-ES-GO github repo
Scans performed by Rapid7
Maintained by the University of Michigan and University of Illinois Urbana-Champaign
Disclamer: PassiveTotal provided me researcher access for data required for this presentation
Source: PassiveTotal
Where is a1833c32d5f61d6ef9d1bb0133585112069d770e currently seen
Source: Censys.io
Source: Censys.io
Source: My sonar es instance
Passive DNS records that were active around time of Microsoft report
Whois on domain provided
Repeat two steps above on any new info found
SHA1: df7240fb9bcd5312eba5f9c2dde7a29a1dc8f355
Great write up on targeting of Hong Kong, Taiwan, Vietnam, the Philippines, and Indonesia and the use of the Elise trojan
Provided csv of iocs on github
An overall picture of how long this certificate has been seen by IP
Inital indicators were several malicious hashes that were shared with me
What piqued my interest was the malware in a few cases was attempting to use DNS to tunnel once running
We could have found all of this infrastucture with out doing the certificate pivoting
Multiple passive dns pivots would have eventually gotten us to this point
The certificate pivoting helped connect the dots in the relations of all the infrastructure
To the PWC Poland red team for being good sports and allowing me to mention their infrastructure in this talk
More pivots to be done but I will leave this as an exercise for you to try