$add_header('Content-Security-Policy', $replace('default-src \'self\' https://racecenter.letour.fr https://emeaclientportal.datacenter.hello.global.ntt https://unpkg.com/web-vitals/dist/web-vitals.iife.js https://s1329636.t.eloqua.com https://www.google.com.br https://www.google.com.hk https://www.google.com.sg https://www.google.co.in https://www.google.co.nz https://www.google.com.bh https://www.google.co.kr https://www.google.com.my https://www.google.ca https://www.google.ie https://www.google.lt https://www.google.com.au https://www.google.com.pa https://www.google.nl https://www.google.co.jp https://*.fls.doubleclick.net https://prodau-cdn.azureedge.net https://prodeu-cdn.azureedge.net https://www.google.com https://resources.digital-cloud.medallia.eu https://*.licdn.com https://s7.addthis.com https://vars.hotjar.com/ https://connect.facebook.net/ https://www.facebook.com/ *.crazyegg.com https://youtube.com https://www.youtube.com https://youtu.be https://i.ytimg.com/vi_webp/PfZzvGGRaOM/mqdefault.webp; img-src \'self\' blob: data: https://*.emtana.com:* https://emeaclientportal.datacenter.hello.global.ntt/servlet/servlet.ImageServer?id=0151i000000vC0y&oid=00D58000000H2jR https://portal.webolytics.com/ https://admin.bound360.com/images/logos/bound-logo-full.png https://cdn.bizible.com https://cdn.bizibly.com https://px4.ads.linkedin.com https://ad.doubleclick.net https://www.google.be https://pbs.twimg.com https://*.analytics.google.com https://*.google.com https://*.brightfunnel.com https://q.quora.com https://alb.reddit.com https://www.marketing-town.com https://assets.getsmartcontent.com https://www.google.co.in https://www.google.com.hk https://www.google.com.sg https://www.google.co.nz https://www.google.co.jp https://www.google.com.br https://www.google.com.bh https://www.google.co.kr https://www.google.com.my https://www.google.ca https://www.google.ie https://www.google.lt https://www.google.com.au https://www.google.nl https://di3c8wks3odob.cloudfront.net https://maps.gstatic.com https://maps.googleapis.com https://www.google.de https://www.google.it https://pixel.tapad.com https://decibel-49-adswizz.attribution.adswizz.com https://www.google.co.uk https://attribution.decibelads.com https://reverseads.matomo.cloud https://tracking.connect.services.global.ntt https://fonts.gstatic.com https://cdn.cookielaw.org https://analytics.twitter.com https://analytics.google.com https://*.terminus.services https://match.adsrvr.org https://prodeu-strgacc-cdn.azureedge.net https://prodau-strgacc-cdn.azureedge.net https://*.leady.com/ https://resources.digital-cloud.medallia.eu https://j.mrpdata.net https://857338121.privacysandbox.googleadservices.com https://720787047.privacysandbox.googleadservices.com https://apt.techtarget.com https://620993155.privacysandbox.googleadservices.com https://p.adsymptotic.com/ *.crazyegg.com https://tracking.hello.global.ntt/ https://www.google.co.za https://*.kampyle.com https://vars.hotjar.com https://pubads.g.doubleclick.net https://script.hotjar.com http://script.hotjar.com www.googletagmanager.com https://www.google.com https://www.google.com.pa https://googleads.g.doubleclick.net https://www.google-analytics.com https://ssl.gstatic.com https://www.gstatic.com https://prodeu-cdn.azureedge.net https://prodau-cdn.azureedge.net https://t.co/ https://px.ads.linkedin.com/ https://connect.facebook.net/ https://www.facebook.com/ https://www.linkedin.com/ https://s2190102.t.eloqua.com/ https://storage.googleapis.com/ https://*.akstat.io; style-src \'unsafe-inline\' \'unsafe-eval\' \'self\' *.crazyegg.com https://cdn.jsdelivr.net/npm/swiper@8/swiper-bundle.min.css https://prodeu-strgacc-cdn.azureedge.net https://prodau-strgacc-cdn.azureedge.net https://cdnjs.cloudflare.com/ajax/libs/tiny-slider/2.9.1/tiny-slider.css https://fonts.googleapis.com https://tagmanager.google.com https://www.googletagmanager.com; font-src \'self\' https://prodeu-strgacc-cdn.azureedge.net https://prodau-strgacc-cdn.azureedge.net https://fonts.gstatic.com data: http://script.hotjar.com https://script.hotjar.com; upgrade-insecure-requests; block-all-mixed-content; frame-ancestors https://cm.euprod.services.global.ntt https://prodeu-strgacc-cdn.azureedge.net https://prodau-strgacc-cdn.azureedge.net https://vars.hotjar.com https://bid.g.doubleclick.net https://*.crazyegg.com; script-src [nonce] \'unsafe-inline\' \'unsafe-eval\' \'self\' blob: https://*.emtana.com:* https://emeaclientportal.datacenter.hello.global.ntt https://*.adobe.io https://*.go-mpulse.net https://portal.webolytics.com https://cdn.bizible.com https://secure.intelligentdata52.com https://a.quora.com https://unpkg.com/web-vitals@3.0.0/dist/web-vitals.attribution.iife.js https://*.brightfunnel.com https://*.analytics.google.com https://*.google.com https://www.redditstatic.com https://cdn.jsdelivr.net/npm/swiper@8/swiper-bundle.min.js https://maps.googleapis.com https://www.google.co.in https://www.google.co.nz https://www.google.com.pa https://www.google.de https://www.google.it https://cdn.matomo.cloud https://s.getsmartcontent.com https://cdn.getsmartcontent.com https://attribution.decibelads.com https://tracking.connect.services.global.ntt https://snippet.ramblechat.com https://munchkin.brightfunnel.com https://*.terminus.services https://analytics.google.com https://prodeu-strgacc-cdn.azureedge.net https://prodau-strgacc-cdn.azureedge.net https://*.leady.com/ https://www.gstatic.com https://trk.techtarget.com https://visitor.reactful.com https://*.crazyegg.com https://script.crazyegg.com https://connect.facebook.net/ https://cdn.cookielaw.org/ https://secure.east2pony.com/ https://protect-eu.mimecast.com/ https://www.google.co.za/ https://*.addthisedge.com https://z.moatads.com https://*.addthis.com https://script.hotjar.com http://script.hotjar.com http://static.hotjar.com https://static.hotjar.com https://www.googletagmanager.com https://www.googleadservices.com https://googleads.g.doubleclick.net https://www.google.com https://www.google-analytics.com https://ssl.google-analytics.com https://tagmanager.google.com https://analytics.twitter.com https://static.ads-twitter.com https://resources.digital-cloud.medallia.eu https://nebula-cdn.kampyle.com https://img03.en25.com https://script.crazyegg.com https://www.youtube.com www.googleadservices.com https://pubads.g.doubleclick.net https://snap.licdn.com https://cdnjs.cloudflare.com/ajax/libs/tiny-slider/2.9.1/min/tiny-slider.js https://geolocation.onetrust.com https://vidassets.terminus.services https://acrobatservices.adobe.com; connect-src \'self\' https://*.t.eloqua.com https://*.adobe.io https://*.go-mpulse.net https://portal.webolytics.com https://px.ads.linkedin.com https://*.brightfunnel.com https://*.analytics.google.com https://*.google.com https://ibc-flow.techtarget.com https://cdn.linkedin.oribi.io https://udc-neb.kampyle.com https://www.google.com.pa https://s.getsmartcontent.com https://chat-messaging.terminus.services https://www.gstatic.com https://maps.googleapis.com https://maps.googleapis.com/maps/api/mapsjs/mapConfigs https://reverseads.matomo.cloud wss://a1kkx7muourfsi-ats.iot.us-east-1.amazonaws.com https://chat-visitor-info.terminus.services https://iotas.terminus.services https://chat-team-management.terminus.services https://di3c8wks3odob.cloudfront.net https://realtime.ramblechat.com https://idx.liadm.com/ https://geolocation.onetrust.com/ https://api.brightfunnel.com https://analytics.google.com https://*.leady.com/ https://tracking.reactful.com https://resources.digital-cloud.medallia.eu https://visitor.reactful.com *.crazyegg.com https://www.facebook.com/ https://connect.facebook.net/ https://cdn.cookielaw.org/ https://stats.g.doubleclick.net/ https://www.google-analytics.com http://*.hotjar.com:* https://*.hotjar.com:* https://vc.hotjar.io:* https://surveystats.hotjar.io wss://*.hotjar.com https://script.crazyegg.com/* https://api-public.addthis.com https://*.addthis.com https://privacyportal-de.onetrust.com/ https://*.akstat.io https://*.akamaihd.net https://acrobatservices.adobe.com; object-src blob: ; frame-src https://connect.services.global.ntt https://racecenter.letour.fr https://block.opendns.com https://td.doubleclick.net https://ssp2.gin.ntt.net https://www.google.com.pa https://10155546.fls.doubleclick.net https://resources.digital-cloud.medallia.eu https://extraordinary-platypus-f5e0bb.netlify.app https://nttbdttour.netlify.app/ https://cm.euprod.services.global.ntt https://www.youtube.com https://www.google.com https://youtu.be https://acrobatservices.adobe.com', '[nonce]', $str('\'nonce-') + $(randomNonce) + $str('\''))) Behind the scenes of the Emotet Infrastructure

Behind the scenes of the Emotet Infrastructure

by Security division of NTT Ltd.

18 June 2020

Topics in this article

Emotet is a threat known to use large amounts of command and control servers (C2s) in parallel, in order to ensure uptime and bypass blocking. This first layer of C2s, also called Tier 1 C2s, will in part forward their received traffic to Tier 2 servers. This relationship has previously been observed by Centurylink1. We decided to explore the malware infrastructure of Emotet deeper, with multiple goals in mind:
  • ensure our long term detection capabilities for Emotet traffic in our customer environments
  • explore the underlying Emotet infrastructure and track the setup and longevity of the Tier 2 servers
  • collaborate with CERTs and notify ISPs of malicious activity

We own and operate one of the world's largest Tier-1 IP backbones, giving insight into a significant portion of the global internet traffic. We’re also consistently ranked among the top five network providers in the world. In the fall of 2018, our security division added botnet infrastructure detection capabilities to our Managed Security Services (MSS) Threat Detection services. This unique capability was used during this project in order to explore and monitor the Emotet network infrastructure.

Starting the journey

The assumptions of behavior of the Tier 1 C2s were reduced to the expectation that they forward their traffic towards a Tier 2 C2. We initially monitored Tier 1 C2 traffic en masse. We extracted Tier 1 C2 lists from Emotet samples and applied these IOCs in netflow monitoring in our global internet infrastructure, where one potential Tier 2 C2 was found:

Tier 1 C2s  graph

The Emotet botnet is divided into separate Epochs, Epoch 1, 2 and 3, which all have their own separate Tier 1 C2 infrastructure2. The Tier 1 C2s in the picture above belong to Epoch 2.

A Shodan lookup of the services of the Tier 2 C2 showed the following setup of HTTP services:

Tier 1 C2s  graph

At this point in the investigation, we assumed that the above was the standard setup for all Tier 2 C2s and automated the analysis of outgoing traffic from Tier 1 C2s to find new Tier 2 C2s. We found new ones by selecting traffic where:

  • the source IP is an Emotet Tier 1 C2
  • the destination port is TCP/80 and is running a NGINX service, with the error message ‘HTTP 404 Not found’
  • the destination IP is also running an Apache service which gives ‘HTTP 200 OK’ status message over port TCP/8080

Observed backends

With our new workflow established, we’ve observed 16 Tier 2 C2 servers with incoming Tier 1 C2 traffic of their respective associated Epoch:

  • eight Tier 2 C2s belong to Epoch 1
  • five Tier 2 C2s belong to Epoch 2
  • three Tier 2 C2s belong to Epoch 3

With the following hosting providers used:

  • seven using Serverius Holding
  • five using GloboTech
  • two using Worldstream
  • one using PnS Hostings
  • one using RealHosters

The graphs below show the timelines for when each Tier 2 C2 is receiving connections from Tier 1 C2s grouped by each Epoch. The Y-axis is the number of connecting Tier 1 C2s and the X-axis is the timeline. The colored lines each represent a Tier 2 C2.

Epoch 1:

Tier 1 C2s  graph

Comment:

Based on the synchronization in time when old Tier 2 C2s disappear and new Tier 2 C2s appear, there are two separate Tier 2 C2 infrastructures for Epoch 1 in use at the same time: 37.252.15.50 -> 185.180.223.70 and 72.10.162.83 -> 72.10.162.84-> 72.10.162.85-> 72.10.162.86.

Epoch 2:

Tier 1 C2s  graph

Comment:

The new Tier 2 C2s appear at the same time or a little before the old one goes down. The overlap with two Tier 2 C2 active at the same time is noteworthy.

Epoch 3:

Tier 1 C2s  graph

Comment:

The IP 134.119.194.179 has for a very long time been utilized as a Tier 2. The IP 37.252.14.29 has a low utilization of connecting Tier 1 C2s.

From the analysis above, the following Tier 2 IPs were excluded due to their short time-span and low amount of connecting Tier 1 C2s, indicating them to possibly be inactive:

  • 37.252.15.52
  • 37.252.14.109
  • 185.180.223.114

Theories on administration

Our analysts have three main theories on how the actor behind Emotet administers the Tier 2 C2 servers:

Theory 1 – Apache TCP/8080

An administration panel and/or API access exposed over Apache TCP/8080 which the actor connects to. No network traffic in our global internet infrastructure supporting this theory has been seen.

Tier 2 C2  diagram

Theory 2 – NGINX TCP/80

The hosting of an administration panel and/or API access over the same port that they receive C2 traffic. This would make it easier for the actor to hide their tracks by possibly tunneling their traffic through Tier 1 C2s towards Tier 2 C2s.

Tier 2 C2  diagram

Theory 3 - A Tier 3 C2

Tier 2 C2s forwarding their traffic towards a central Tier3 C2 which has data for all three Epochs. No outgoing traffic from Tier 2 C2s inside of our global internet infrastructure has been observed supporting this and it’s seen as very unlikely.

Tier 2 C2  diagram

Closing thought on theories

The overlaps observed in the Tier 2 C2 infrastructure with multiple Tier 2 C2s being active at the same time indicates an additional complexity. Based on netflow monitoring of our global internet infrastructure, theory 2 is found to be most likely, but forensics of Tier 2 C2s would be needed in order to confirm this theory.

Conclusion

We have reliably been able to follow the changes in the use of Tier 2 servers in the Emotet network infrastructure. It’s noteworthy how one of the largest threat actors today can largely operate undisturbed with Tier 2 servers having uptime of multiple months. This research is useful when planning takedown actions, but also in understanding threat actors' operations and improving the detection capabilities that we have in customer environments.

In the recently released 2020 Global Threat Intelligence Report, our researchers and thought leaders share statistics and trends from the previous year. A key theme in this year’s report is ‘Threat actors are innovating and evolving their tradecraft’. Read more about how automation, multi-stage payloads and custom targeted malware are changing the threat landscape here.

References

https://blog.centurylink.com/emotet-illuminated-mapping-a-tiered-botnet-using-global-network-forensics/

2 https://isc.sans.edu/forums/diary/Emotet+epoch+1+infection+with+Trickbot+gtag+mor84/25752/

Security division of NTT Ltd.