ETUMBOT

Description

(FireEye) FireEye observed APT12 utilizing RIPTIDE, a proxy-aware backdoor that communicates via HTTP to a hard-coded command and control (C2) server. RIPTIDE’s first communication with its C2 server fetches an encryption key, and the RC4 encryption key is used to encrypt all further communication.

In June 2014, Arbor Networks published an article describing the RIPTIDE backdoor and its C2 infrastructure in great depth. The blog highlighted that the backdoor was utilized in campaigns from March 2011 till May 2014.

Following the release of the article, FireEye observed a distinct change in RIPTIDE’s protocols and strings. We suspect this change was a direct result of the Arbor blog post in order to decrease detection of RIPTIDE by security vendors. The changes to RIPTIDE were significant enough to circumvent existing RIPTIDE detection rules. FireEye dubbed this new malware family HIGHTIDE.

Names

Name
ETUMBOT
RIPTIDE
HIGHTIDE
Exploz
Specfix

Category

Malware

Type

  • Backdoor

Information

Mitre Attack

Malpedia

Alienvault Otx

Other Information

Uuid

2f137525-43e3-4296-bbcd-b7d626694f4a

Last Card Change

2020-05-13