Chasing BlackTech’s Domain Abuse: Open sourced way is amazing!

morimolymoly
InfoSec Write-ups
Published in
2 min readJun 11, 2023

--

Hello, I am morimolymoly.

I analyzed domain abuse by BlackTech which actively attacking Japan, Taiwan, US, Singapore, Hong Kong.

I read TrendMicro’s article about BlackTech.

BlackTech used itaiwans[.]com for C2.

I searched this domain on VirusTotal and got result.

sub domains

I could obtain some subdomains.

Domains which marked malicious is well-known and not interested for me so I looked at library[.]itaiwans[.]com and got result.

suspicious urls

As we can see, hxxp://library[.]itaiwans[.]com/logo[.]png seems really good and BlackTech is reusing this domain for years!

malware?

And I could also got one Malware sample(47ec90f43990c19c62317839168e34637be57d77bcd8d4adadf02963a93b5808).

IconDown

Yeah, it is IconDown!

DIE
stackstrings

IconDown fetches encrypted file from C2 server, and use RC4 to decrypt payload and deploy it into %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\slui.exe

encrypted payload is embedded
deploy
cmd.exe /c to execute
IconDown’s main routine

I looked at domain details and PassiveDNS results.

This domain(library[.]itaiwans[.]com) is registered by GMO internet(お名前.com)

I looked at PassiveDNS, Sakura Internet’s IP is linked to this domain.

All of them is Japanese services!

I could not find this sample on Twitter or some.

By open sourced way, we have to care about many things like detections and some subdomains or whatever. You are the sensor!

IoC

  • 47ec90f43990c19c62317839168e34637be57d77bcd8d4adadf02963a93b5808
  • hxxp://library[.]itaiwans[.]com/logo[.]png
  • library[.]itaiwans[.]com

--

--