As highlighted in the ThreatConnect CameraShy report, greensky27.vicp.net played a critical role in uncovering potential cyber threat actors associated with nation state activity. Operating under the assumption that we know nothing about this domain, lets see what we can find using PassiveTotal. When viewing the domain inside the platform, its clear theres a lot of information to go through, so as cyber security analyst where do you start?
On the left-hand side of the results is a summary pane describing the metadata associated with the domain. Within a few seconds, we know this domain has been in use for at least 4-5 years with the first known data being tracked back to 2010-11-11. Another helpful detail is knowing that vicp.net is actually a dynamic DNS provider which could explain its extended use and hundreds of unique records.
Directly to the right of the summary results is the primary pane for analysis with the heatmap being presented directly above the resolution records. Even without reading the labels, its clear theres a pattern of activity that occurred sometime between the end of June and mid-August. Using the heatmap, its easy to make the following statements about this particular domain:
- For the past six months, the domain has been resolving to routable infrastructure
- For many of the months, the domain only resolved to one IP address
- Starting at the end of June, several new IP addresses (as indicated by the orange boxes) were introduced for the next several weeks
- Towards the end of August, new IP addresses stopped associating and the domain began to resolve back to one address
So without ever looking at the actual DNS information, we already have some idea about the domain greensky27.vicp.net. Its been around a few years, has associations with a dynamic DNS provider and the most interesting period over the last six months lies somewhere in the resolution history from the end of June until mid-August.
At this point, we could begin branching out off the IP addresses during the time period of interest in an effort to discover new infrastructure. Clicking a search on 22.214.171.124 reveals two other dynamic DNS domains, killlab.ticp.net and killlab.vicp.net. Doing a simple Google search online reveals a malware report where those two domains are found within the strings of a binary that attempts to mask as a PDF, a common technique of some nation state malware.
Keeping in mind this is just one possible pivot-point within the results PassiveTotal collected and displayed, its likely there are a number of other malicious domains that overlap with greensky27. Whats important to take away from this post is how quickly a cyber security analyst can focus their research on a domain that is otherwise unknown to them. Simply running a search, making a couple calculated clicks and noting conclusions could reveal a much larger threat than anticipated.
The RiskIQ Intelligence Connector for Microsoft Azure Sentinel Is the Context-Rich Force Multiplier Security Teams Need
Digital initiatives have changed the enterprise attack surface and how organizations appear online, both to users and malicious actors. Meanwhile, the threat landscape has evo...