ÒÔºì¶ÓÊӽǿ´FireEyeÍøÂç¹¥»÷ÊÂÎñ
2020-12-10
12ÔÂ8ÈÕ£¬ÃÀ¹ú¶¥¼¶Çå¾²¹«Ë¾FireEye£¨ÖÐÎÄÃû£º»ðÑÛ£©Ðû²¼Ò»Ôòͨ¸æ³ÆÆäÄÚ²¿ÍøÂ类ij¸ö“ÓµÓÐÒ»Á÷ÍøÂç¹¥»÷ÄÜÁ¦µÄ¹ú¼Ò”ËùÍ»ÆÆ¡£ÏÖÔÚ£¬FireEyeÕýÔÚÓëÁª°îÊÓ²ì¾ÖºÍ°üÀ¨MicrosoftÔÚÄ򵀮äËûÖ÷ÒªÏàÖúͬ°é¾ÙÐÐÆð¾¢µÄÊÓ²ìÏàÖú¡£
¶àÄêÀ´FireEye×÷ΪȫÇòÁìÏȵÄÍøÂçÇå¾²³§ÉÌÓëÃÀ¹úÕþ¸®ÓÐ×Åǧ˿ÍòÂÆµÄÁªÏµ£¬ÏȽøµÄ·À»¤²úÆ·ºÍÆäÖ÷ÒªµÄ¿Í»§Èº£¨Õþ¸®»ú¹¹¡¢Òªº¦»ù´¡ÉèÊ©ºÍ´óÐÍÆóÒµ£©Îª¹«¹²ËùÊìÖª¡£Õâ´Î¹¥»÷ÊÂÎñÒ»¾Ðû²¼£¬Á¬Ã¦ÒýÆðÁËÇå¾²½çµÄÆÕ±é¹Ø×¢¡£
¾Ý¼ÓÈëÊÓ²ìµÄÁª°îÊÓ²ì¾ÖÆÊÎö£¬Õâ´Î¹¥»÷ÊÇרΪFireEyeÁ¿Éí¶¨ÖÆ£¬Ê¹ÓÃÁËÒÑÍù´Óδ¼û¹ýµÄÐÂÓ±ÊÖÒÕ×éºÏ£¬¸ß¶ÈÏÓÒÉÊÇÓɹú¼Ò×ÊÖúµÄ¹¥»÷ÕßÕö¿ªµÄ¡£
ƾ֤FireEye×Ô¼ºÐû²¼µÄÎÄÕ³ƣ¬¹¥»÷ÕßÖ»ÊÇ»á¼ûÁËijЩRed TeamÆÀ¹À¹¤¾ß¡£ÕâЩ¹¤¾ßÄ£ÄâÁËÐí¶àÍøÂç¹¥»÷ÕßµÄÐÐΪ£¬Ö÷ҪΪFireEyeµÄ¿Í»§Ìṩ»ù±¾µÄÉøÍ¸²âÊÔ·þÎñ£¬²¢Ã»ÓаüÀ¨0dayÎó²î¡£±ðµÄ£¬¹¥»÷ÕßµÄÄ¿µÄÊÇҪ׷ÇóÓëijЩÕþ¸®¿Í»§ÓйصÄÐÅÏ¢£¬¿ÉÊÇûÓÐÖ¤¾ÝÅú×¢£¬¹¥»÷Õß»ñÈ¡ÁËÏà¹ØµÄÐÅÏ¢¡£
FireEye ³Æ²»È·¶¨¹¥»÷ÕßÊÇ·ñÍýÏëʹÓÃÕâЩRed Team¹¤¾ß»ò¹ûÕæÅû¶ËüÃÇ¡£¿ÉÊÇ£¬³öÓÚÉóÉ÷˼Á¿£¬ÎªÁËÐÖúÌá·ÀÕâЩ¹¤¾ß±»¹ûÕæµÄΣº¦£¬FireEye ÒÑÐû²¼Ê¶±ðÕâЩ¹¤¾ßµÄOpenIOC£¬Yara£¬SnortºÍClamAV¼ì²â¹æÔò£¬ÒÔÖ»¹ÜïÔÌɥʧÕâЩ¹¤¾ßµÄDZÔÚÓ°Ïì¡£
Ïêϸ¹æÔòÏê¼û£º
https://github.com/fireeye/red_team_tool_countermeasures
¾ÅÓÎÀÏ¸ç¿Æ¼¼M01NÇå¾²Ñо¿ÍŶӣ¬×÷Ϊºã¾Ã¹Ø×¢ºì¶ÓÊÖÒÕµÄÑо¿ÍŶӣ¬µÚһʱ¼äƾ֤Ðû²¼µÄ¹æÔò¶ÔÕâЩ±»ÇÔÈ¡µÄºì¶Ó¹¤¾ß¾ÙÐÐÁËÆÊÎö¡£
×ß©¹¤¾ß
1.ºì¶Ó¹¤¾ßÊáÀí
¶ÔFireEye×ß©µÄºì¶Ó¹¤¾ß¼¯µÄ¼ì²â¹æÔòÎļþ¾ÙÐÐÁËÊáÀíÆÊÎö£¬¾ÅÓÎÀÏ¸ç¿Æ¼¼M01NÇå¾²Ñо¿ÍŶӷ¢Ã÷ËùÉæ¼°¹¤¾ß°üÀ¨¿ªÔ´¹¤¾ß¡¢¿ªÔ´¹¤¾ßµÄ¶þ´Î¿ª·¢°æ±¾ÒÔ¼°²¿·Ö×ÔÑй¤¾ß£¬»ù±¾ÁýÕÖÁ˰üÀ¨³¤ÆÚ»¯¡¢È¨ÏÞÌáÉý¡¢·ÀÓùÈÆ¹ý¡¢Æ¾Ö¤»ñÈ¡¡¢ÓòÄÚÐÅÏ¢ÍøÂç¡¢ºáÏòÒÆ¶¯µÈ¹¥»÷ÉúÃüÖÜÆÚµÄ¸÷¸ö½×¶Î¡£
¹¤¾ßÊáÀíÏê¼û£º
FireEye Red Team Toolkit ÏêϸÁÐ±í£¨Çë¼ûÔĶÁÔÎÄ£©
2.¹¥»÷ÊÖÒÕÆÊÎö
¡ñ´ÓPowerShellÏò·´ÉäÐÔC££×ª±ä£¬¹æ±Ü¶Ëµã¼ì²â
PowerShellÒѱ»¹¥»÷×é֯ʹÓÃÁ˶àÄ꣬µ«Ëæ×Ź¥·À²©ÞĵÄÒ»Ö±Éú³¤£¬Çå¾²ÐÐÒµµÄ×îзÀÓùÊÖÒÕ£¬°üÀ¨Ïñ¾ç±¾¿éÈÕÖ¾¼Í¼£¬·´¶ñÒâÈí¼þ¾ç±¾½Ó¿Ú£¨AMSI£©ÒÔ¼°µÚÈý·½Çå¾²¹©Ó¦ÉÌÕë¶Ô¶ñÒâPowerShellÔ˶¯¼ì²â¶¼Ö±½Óµ¼ÖÂÁË»ùÓÚPowerShellµÄPost-Explotation¹¥»÷Êܵ½Öî¶àÏÞÖÆ¡£Ö®ºó¹¥»÷×éÖ¯´ÓPowerShellת¶øÏò·´ÉäÐÔC££Öð²½¾ÙÐÐת±ä£¬ÒÔͼÌÓ±ÜÏÖ´úÇå¾²·ÀÓùϵͳ¡£
¡ñNET¿ª·¢¹á´®Õû¸ö¹¥»÷ÉúÃüÖÜÆÚ
ƾ֤¾ÅÓÎÀÏ¸ç¿Æ¼¼M01NÇå¾²Ñо¿ÍŶӯÊÎö£¬´Ë´ÎFireEyeºì¶Ó×ß©¹¤¾ß£¬Áè¼Ý90%µÄ¹¤¾ß»ùÓÚ.Net¿ª·¢£¬Åú×¢FireEyeºì¶ÓÒ²ÔÚÆð¾¢¸ú½ø¹¥»÷ÊÖÒÕÉú³¤Æ«Ïò¡£¾ÅÓÎÀÏ¸ç¿Æ¼¼M01NÇå¾²Ñо¿ÍŶӴӿªÔ´ÉçÇøÖÐÊӲ쵽ʹÓÃC#¿ª·¢µÄ¹¤¾ß£¬ÀýÈçSeatbelt¡¢SharpUpÒÔ¼°SharpViewµÈ¿ªÔ´¹¤¾ß£¬¿ÉÒÔÐÖúºì¶ÓÍê³É¹¥»÷ÉúÃüÖÜÆÚµÄ¸÷¸ö½×¶ÎÐÔʹÃü£¬µ«ÔÚ³¤ÆÚ»¯½×¶ÎÓÐËùǷȱ¡£FireEyeµÄºì¶ÓÂÊÏȶԴ˾ÙÐÐÁË×ÛºÏÐÔÑо¿£¬ÓÚ2019Äê9Ô¶ÔÍâÐû²¼ÁËSharPersist: Windows Persistence Toolkit in C# FireEye Inc³¤ÆÚ»¯¹¤¾ß¼¯£¬¶ø¸Ã¹¤¾ßҲͬÑùÊÇ´Ë´ÎÊÂÎñÖеÄÒ»²¿·Ö¡£²»µ«ÔÆÔÆ£¬»¹¿ÉÒÔ¿´µ½°üÀ¨SharPivot¡¢SharPsack¡¢SharPYµÈÀàËÆ¹¤¾ß¡£

SharPersistÖ§³Ö¶àÖÖ³¤ÆÚÐÔÊÖÒÕ
¡ñʹÓÃ.NETÓëÎÞÎļþ¹¥»÷µÄÓÅÒìÏàÈÝÐÔ£¬¹¹½¨Ò»ÏµÁлùÓÚ.NETµÄ×ÔÑй¤¾ß
ÔÚ¿ª·¢ÓïÑÔÏòC#ת±äͬʱ£¬.NETÎÞа¶øÇ¿Ê¢µÄÓïÑÔÌØÕ÷ÓëDLRµÄÒýÈëʹÆäÓÈÆäÊÊÓÚÎÞÎļþ¹¥»÷µÄʩչ¡£µÃÒæÓÚ³ÉÊìµÄCLR HostingÊÖÒÕ£¬.NET³ÌÐò¼¯¿ÉÎÞаµØÔÚÄÚ´æÖмÓÔØ¶øÎÞÐèÔÚÍâµØ²ÐÁôÎļþ¡£FireEyeÒ²ÎÞÒÉ˳Ӧ×Å.NETÓëÎÞÎļþ¹¥»÷µÄÓÅÒìÏàÈÝÐÔ£¬¹¹½¨Ò»ÏµÁлùÓÚ.NETµÄ×ÔÑй¤¾ß£¬²¢Æð¾¢µØ½«ËùÓй¤¾ßÄÉÈëÎÞÎļþ¹¥»÷µÄϵͳÖС£¼´¼´ÊÇ.NETϵͳ֮ÍâµÄWin32³ÌÐòÒ²¿Éͨ¹ýMATRYOSHKA¹¤¾ß½«Æäת±äΪshellcode²¢½ÓÄÉProcess HollowingµÄÒªÁì¾ÙÐÐÎÞÎļþ¼ÓÔØ¡£
¡ñ×ÛºÏʹÓÃÁ˶àÖÖ¿ª·¢ÓïÑÔµÄÓÅÊÆÒÔµÖ´ï×î¼ÑµÄʵսЧ¹û
ËäÈ»FireEyeÍŶӽÓÄÉ.NET×÷ΪÖ÷Òª¿ª·¢ÓïÑÔ£¬µ«Ò²×ÛºÏʹÓÃÁ˶àÖÖ¿ª·¢ÓïÑÔµÄÓÅÊÆÒÔµÖ´ï×î¼ÑµÄʵսЧ¹û¡£ÀýÈçʹÓÃDÓïÑÔ¾ÙÐкóÃŵĿª·¢(DSHELL)¡¢Ê¹ÓÃruby¼ÓÔØshellcode£¬ÊµÏÖ½ÏÁ¿ºÃµÄ·ÀÓù¹æ±ÜЧ¹û£»Ê¹ÓÃpythonÓëgolangʵÏÖ¿çÆ½Ì¨µÄÓÅÒì¼æÈÝÐÔ¡£
¡ñ°üÀ¨ÁË´ó×ÚÊ×´ÎÅû¶µÄLOLBASʹÓÃÒªÁì
ÖµµÃ×¢ÖØµÄÊÇÕ¼´Ë´ÎÅû¶¹¤¾ß¼¯Öкܴó±ÈÀýµÄPGF(PayloadGenerationFramework) ÎäÆ÷¼Ò×壬°üÀ¨ÁË´ó×ÚLOLBASʹÓÃÒªÁ죬²¿·ÖÖ´ÐÐÒªÁì¿ÉÄÜΪÊ×´ÎÅû¶µ«»¹ÐèÈ·ÈÏ¡£
3.Éæ¼°Îó²îʹÓÃÇéÐÎ
´ÓFireEyeÐû²¼µÄÐÅÏ¢À´¿´£¬Òѱ»ÇÔÈ¡µÄºì¶Ó¹¤¾ßÖÐʹÓÃÁË16¸öÒÑÖªÎó²î£¨·Ç0day£©£¬ËùÉæ¼°¹¤¾ß°üÀ¨²Ù×÷ϵͳ£¬ÆóÒµ³£ÓÃÓ¦ÓÃÈí¼þ¡¢ÍøÂç×°±¸µÈ¡£¾¾ÅÓÎÀÏ¸ç¿Æ¼¼M01NÇå¾²Ñо¿ÍŶӺËʵȷÈÏ£¬ÕâЩÎó²î¾ùÒѹûÕæÎó²îPOC£¬¾ø´ó²¿·ÖÒ²ÒÑÓйûÕæµÄÎó²îEXP¡£²àÃæÍÆ²â£¬ÕâÅúºì¶Ó¹¤¾ßÖÐÒ²°üÀ¨Æä¶ÔÎó²îµÄʹÓã¬ÒÔ¸¨ÖúÍê³É¶ÔÆóÒµ¶Ôºì¶ÓÆÀ¹À¡£´Óºì¶ÓÊÖÒÕÀ´¿´£¬ÒѹûÕæEXPµÄÎó²îÔÚÖÚ¶à´óÐÍÄÚ²¿ÍøÂçÖÐÈÔȻûÓÐÍêÈ«±»ÐÞ¸´£¬Ê¹ÓÃÀÖ³ÉÂÊÈÔÈ»¿É¹Û¡£Í¬Ê±£¬Ò²¿´µ½ÐÞ¸´ÕâЩÎó²î½«ÓÐÓÃÏÞÖÆºì¶Ó¹¤¾ßʩչ×÷Óá£
FireEyeºì¶Ó
FireEyeÔÚAPTÇ鱨á÷ÁÔ¼°APT×éÖ¯¸ú×Ù·½ÃæµÄÄÜÁ¦ÊÇÌìÏÂÒ»Á÷µÄ£¬ËäÈ»´Ë´ÎÊܵ½ÍøÂç¹¥»÷£¬µ«´Ó×ß©µÄ¹¤¾ßÀ´¿´Ò²ÄÜ×¢ÖØµ½FireEyeÔÚºì¶Ó·½ÃæÁÙһЩÄÜÁ¦£º
1.µÐÊÖ·ÂÕæÊÖÒÕ
ºì¶Ó±£´æµÄÒâÒåÔÚÓÚÄ£ÄâÕæÊµµÄ¸ß¼¶Íþв£¬Ä£ÄâµÐÊÖÊÖÒÕ¶ÔÆóÒµÍøÂç¾ÙÐзÂÕæ¹¥»÷·¢Ã÷¿ÉÄܱ£´æµÄÇå¾²¶Ì°å¡£´Ó×ß©¹¤¾ß¿ÉÒÔ¿´³öÆäÖÐÓдó×ÚÀàAPTµÄ¹¤¾ß¡¢ÊÖÒÕºÍÊֶΣ¬ºÃ±ÈÔÚʹÓÃNortonµÈÇå¾²²úÆ·µÄÊðÃûÎļþ¾ÙÐг¤ÆÚ»¯£¬²¢½«Æä×÷ΪCobaltStrikeµÄÀ©Õ¹£¬ÖÖÖÖ¶¼Ó¡Ö¤ÁËFireEyeºì¶ÓȷʵÊÇÒÀÀµÆä¸ß¼¶ÍþвÇ鱨ϵͳÕö¿ªºì¶ÓÆÀ¹ÀÊÂÇ飬°üÀ¨Ä£ÄâÒÑÖªµÄºÍδ֪µÄÍþв¡£
2.ÈÈÃÅÊÖÒÕ
´Ó¾ÅÓÎÀÏ¸ç¿Æ¼¼M01NÇå¾²Ñо¿ÍŶӶԹ¤¾ßµÄÕûÌåÊáÀíµ½ËùÉæ¼°²¿±ðÀëÒյįÊÎö£¬²»ÄÑ¿´³öFireEyeºì¶Ó¼«¾ß¹ú¼Êºì¶ÓµÄÊÖÒÕÆø¸Å£¬²¢ÄÜÕÆÎÕ¹¥»÷ÊÖÒÕÉú³¤µÄÇ÷ÊÆÈ¥×öÁ¢Ò죬¹¤¾ßÉæ¼°Á˽üÁ½Äê½ÏÁ¿ÈÈÃŵĺì¶ÓÊÖÒÕ£¬ºÃ±ÈCLR Hosting¡¢Gadget2JScript¡¢Process HollowingµÈ¡£
ÈÔÐèСÐŤ¾ß±»Ì»Â¶¼°ÀÄÓôøÀ´µÄΣº¦
ËäÈ»ÕâÅú¹¤¾ß²¢Î´°üÀ¨0day£¬´Óºì¶Ó½Ç¶ÈÀ´¿´Ò²²¢Ã»ÓÐÉæ¼°Ì«¶àеÄÊÖÒÕ£¬µ«ÕâЩ½ÏΪ³ÉÊìµÄרҵºì¶Ó¹¤¾ßÒ»µ©±»Ì»Â¶³öÀ´£¬¼«¿ÉÄܱ»¶ñÒâ¹¥»÷ÕßÀÄÓ㬵¼ÖÂÑÏÖØµÄÇ徲ʹʡ£´ÓFireEye¼±ÓÚÊͷŹæÔòµÄÐж¯À´¿´£¬ÕâЩ¹æÔò¼«¿ÉÄÜ»¹Ã»Óб»´ó¹æÄ£¼ì²â£¬½¨Òé¸÷Çå¾²³§ÉÌÐÖúÆóÒµ¿Í»§Æð¾¢·ÀÓù£¬·À»¼ÓÚδȻ¡£
¾ÅÓÎÀϸçÍþвÇ鱨ÖÐÐÄ£¨NTI£©Ò²ÒÑÖ§³Ö¶Ô¸ÃÊÂÎñµÄÔÚÏß¼ì²â£¨https://nti.nsfocus.com£©£¬ÒÑʹÓÃÇ鱨¸³ÄܵIJúÆ·ÔÚÉý¼¶°üÖÐÒ²¿É»ñÈ¡ÏìÓ¦IOC£¨Ò»Á¬¸üУ©¡£
¾ÅÓÎÀϸçÍþвÇ鱨ÖÐÐÄÊÕ¼µÄÏêϸIOC£º

¾ÅÓÎÀÏ¸ç¿Æ¼¼M01NÇå¾²Ñо¿ÍŶÓרעÓÚRed Team¡¢APTµÈ¸ß¼¶¹¥»÷ÊÖÒÕ¡¢Õ½Êõ¼°ÍþвÑо¿£¬Éæ¼°WebÇå¾²¡¢ÖÕ¶ËÇå¾²¡¢ADÇå¾²¡¢ÔÆÇå¾²µÈÏà¹ØÁìÓò¡£Í¨¹ýÑÐÅÐÏÖÍø¹¥»÷ÊÖÒÕÉú³¤Æ«Ïò£¬ÒÔ¹¥´Ù·À£¬ÎªÎ£º¦Ê¶±ð¼°Íþв¶Ô¿¹Ìṩ¾öÒéÖ§³Ö£¬ÖÜÈ«ÌáÉýÇå¾²·À»¤ÄÜÁ¦¡£
M01NÕ½¶Ó×Ô2019Ä꽨ÉèÒÔÀ´£¬ÈÙ»ñ2020ÄêµÚÈý½ì³µÁªÍøÐÅÏ¢Çå¾²ÊÖÒÕ´óÈüÒ»µÈ½±¡¢2020Êý×ÖÖйúÁ¢Òì´óÈü»¢·ûÍøÂçÇå¾²ÈüµÀÒ»µÈ½±¡¢2020ÄêµÚÈý½ì“Ç¿Íø”Äâ̬·ÀÓù¹ú¼Ê¾«Ó¢ÌôÕ½ÈüÒ»µÈ½±¡¢2020WIDCÌìÏÂÖÇÄܼÝÊ»ÌôÕ½Èü-ÐÅÏ¢Çå¾²ÌôÕ½ÈüÓÅʤ½±¡¢2020Ä깤ҵÐÅÏ¢Çå¾²ÊÖÒÕ´óÈü¶þµÈ½±¡¢“µÚÎå¿Õ¼ä”ÖÇÄÜÇå¾²´óÈü¶þµÈ½±¡¢2020“á۷弫¿Í”ÍøÂçÇå¾²ÊÖÒÕÌôÕ½Èü¶þµÈ½±¡¢2019“ºþÏæ±”ÍøÂçÇå¾²ÊÖÒÕ´óÈüÒ»µÈ½±¡¢2019Öйú¹ú¼ÊÊý×Ö¾¼ÃÕ¹ÀÀ»áÊý×Ö¾¼ÃÔÆÇå¾²¹²²â´óÈüÒ»µÈ½±¡¢2019Ä깤ҵÐÅÏ¢Çå¾²ÊÖÒÕ´óÈüÒ»µÈ½±¡£
¾ÅÓÎÀϸçÍþвÇ鱨ÖÐÐÄ
¾ÅÓÎÀϸçÍþвÇ鱨ÖÐÐÄ£¨NSFOCUS Threat Intelligence center, NTI£©ÒÀÍй«Ë¾×¨ÒµµÄÇå¾²ÍŶӺÍǿʢµÄÇå¾²Ñо¿ÄÜÁ¦£¬¶ÔÈ«ÇòÍøÂçÇå¾²ÍþвºÍÌ¬ÊÆ¾ÙÐÐÒ»Á¬ÊÓ²ìºÍÆÊÎö£¬ÒÔÍþвÇ鱨µÄÉú²ú¡¢ÔËÓª¡¢Ó¦ÓõÈÄÜÁ¦¼°Òªº¦ÊÖÒÕ×÷Ϊ½¹µãÑо¿ÄÚÈÝ£¬ÍƳöÁ˾ÅÓÎÀϸçÍþвÇ鱨ƽ̨ÒÔ¼°Ò»ÏµÁм¯³ÉÍþвÇ鱨µÄÐÂÒ»´úÇå¾²²úÆ·£¬ÎªÓû§Ìṩ¿É²Ù×÷µÄÇ鱨Êý¾Ý¡¢×¨ÒµµÄÇ鱨·þÎñºÍ¸ßЧµÄÍþв·À»¤ÄÜÁ¦£¬×ÊÖúÓû§¸üºÃµØÏàʶºÍÓ¦¶ÔÖÖÖÖÍøÂçÍþв¡£

¾ÅÓÎÀϸçÔÆ







