APT-C-53 (aka Gamaredon) launches new DDOS attacks using LOIC

0

360 Qihoo researchers observed a series of DDoS attacks launched by the Russia-affiliated APT-C-53 (aka Gamaredon) and reported that the threat actors also released the code of a DDoS Trojan called LOIC as open source. The copies of the malware discovered by the experts were collected in early March, a few days after the Russian invasion of Ukraine began.

“We found that multiple C2 servers distributed an open-source DDoS Trojan program LOIC compiled by .net from March 4th to 5th, 2022.” reads the analysis published by 360 Qihoo.

While monitoring the activities of the APT group, experts have observed that the threat actors are carrying out multiple attacks, including phishing emails, file remote template injection execution, S FX self-extracting program execution of malicious scripts, Wiper malware delivery, And registry write load schedule task execution and so on. The experts were able to locate the C2 infrastructures used by the national actors.

Also Read: PDF Campaign Delivering Snake Keylogger

During the monitoring process of this batch of C 2 servers, Qihoo research team found that multiple C2 servers distributed an open-source DDos Trojan program LOIC compiled by .net from March 4th to 5th, 2022.

Below is the list of C&C domain name addresses involved in the DDoS attack task delivery

decree.maizuko.**
caciques.gloritapa.**
delicate.maizuko.**
jealousy.jump.artisola.**
dense.gitrostan.**
decision.lotorgas.**
decency.maizuko.**
junior.jacket.artisola.**
defective88.maizuko.**
deception.lotorgas.**
destination.delight.coffiti.**
cachinate.gloritapa.**
January.josie.artisola.**
defective19.maizuko.**
deception.lotorgas.**
destination.delight.coffiti.**

DDoS program sample file information:

MD 55486BCE58C5D30C7B3F940079C33B95F
CompileTimestamp2022/3/4 21:53
File Size _ _156.16K

Also Read: Latest IOCs – Threat Actor URLs , IP’s & Malware Hashes

The malicious code distributed by the APT group includes hard-coded IP addresses and ports for the targets.“The distribution of the LOIC Trojan may be the prelude to a new round of DDoS attacks.” concludes the researchers that also shared Indicators of compromise for the attacks.

Source: https://securityaffairs.co/wordpress/131762/apt/gamaredon-apt-ddos-attacks.html

Previous articleASEC Weekly Malware Statistics
Next articleNew Microsoft Office Zero-day “Follina” – Detection & Response
BalaGanesh
Balaganesh is a Incident Responder. Certified Ethical Hacker, Penetration Tester, Security blogger, Founder & Author of Soc Investigation.

LEAVE A REPLY

Please enter your comment!
Please enter your name here