NordVPN Promotion

Home / Industry

From URSNIF IoCs to Software Spoofing: Using DNS Intel to Connect the Dots

Financially motivated threat actors called “TA544” were first detected in 2017. TA544 is known for high-volume campaigns, sending hundreds of thousands of malicious messages daily.

While the threat actors used several malware payloads, they are widely known for distributing the URSNIF banking trojan. Proofpoint researchers1 also found TA544 using a new malware dubbed “WikiLoader,” which subsequently led to the installation of URSNIF into target systems.

WhoisXML API researchers gathered 21 domain names and 24 IP addresses publicly listed as indicators of compromise (IoCs)2,3,4,5 as part of recent URSNIF campaigns targeting companies in Italy. Our analysis and expansion of the IoCs led to these key findings.

  • 18 artifacts comprising 10 IP-connected domains and eight email-connected domains
  • Eight malicious IP- and email-connected artifacts
  • 1,067 string-connected artifacts comprising 476 domains starting with the string avast and 591 domains containing the string debian registered from 1 January – 28 August 2023
  • 653 unique IP addresses hosting 805 string-connected artifacts, some of which were malicious based on a bulk malware check

A sample of the additional artifacts obtained from our analysis is available for download from our website.

URSNIF IoC Profile and Analysis

We sought to identify the registrars and Internet service providers (ISPs) administering the IoCs. To do that, we ran a bulk WHOIS lookup and found that most of the domains were managed by the American Registry for Internet Numbers (ARIN) and Réseaux IP Européens (RIPE). The top registrars, meanwhile, included Web Commerce Communications (WEBCC) and several Europe-based entities, such as OVH, Scaleway, and Aruba.

We also conducted a bulk IP geolocation lookup on the IoCs and found that about 37% of them were administered by Nice IT Services Group, Inc. and DigitalOcean LLC. The resolving IoCs were primarily geolocated in Europe (74%), with the rest in the U.S. (24%) and the Middle East (2%). The map below shows the breakdown per country.

URSNIF IoC List Expansion

Threat actors use several web resources in their campaigns, and TA544 is no exception. As such, we analyzed the IoCs using DNS intelligence to retrieve domain connections.

First, we obtained their registrant email addresses by looking up the IoCs’ historical WHOIS records. We found 26 email addresses, but very few were unredacted. More than half had the email domain whoisprotection[.]cc. Still, reverse WHOIS searches for the remaining non-redacted email addresses yielded eight artifacts linked to the IoCs.

Reverse IP lookups for the IP addresses tagged as IoCs further revealed that only eight had resolving domains, which led us to 10 additional artifacts. In total, we found 18 IP- and email-connected domains, eight of which were already flagged as malicious.

Some of the artifacts continued to host or redirect to live pages, including what appeared to be an e-commerce website and an Apache test page.

A Deeper Probe Led to More Potential Threats

From the list of IoCs and artifacts, we noticed domain names that seemed to spoof Avast and Debian (i.e., avas1t[.]de and debian-package[.]center). Both domains have been reported as malicious on several security databases, prompting us to find out what other similar-looking domains are currently out in the wild.

To do that, we used Domains & Subdomains Discovery and retrieved all domains starting with avast and containing debian that were added from the beginning of this year to 28 August 2023. We found 476 and 591 cybersquatting domains, respectively.

We ran a bulk IP geolocation lookup to see which ones resolved to IP addresses. We found 1,462 resolutions attributed to 805 string-connected artifacts. Ranking the IP addresses based on their number of resolutions, 13 stood out since they each had more than a dozen resolutions.

While that may not be suspicious under normal circumstances, the fact that they were cybersquatting domains may hint at possible malicious or suspicious IP networks. An even more alarming finding is that various security engines flagged a few of the IP addresses as malicious.

Malicious IP AddressNumber of ResolutionsSample Resolving Domains and Subdomains
54[.]153[.]56[.]18331avastone[.]com[.]de
avast2014win81[.]com[.]de
duchangzuidebianhucijisilu[.]se[.]net
34[.]102[.]136[.]18024avasthome[.]site
avastargallery[.]com
debianns[.]com
91[.]216[.]248[.]2221avastwin81[.]clan[.]rip
avastwin81[.]webspace[.]rocks
agenda-debian-test[.]2ix[.]de
91[.]216[.]248[.]2120avast-free-antivirus[.]2ix[.]de
debian4[.]clan[.]rip
debian6[.]4lima[.]ch
91[.]216[.]248[.]2018avast2014pojie[.]4lima[.]de
debianpcjjos[.]lima-city[.]de
httpd-debian[.]lima-city[.]de
45[.]79[.]222[.]1389avastwin81[.]com[.]ph
debian6[.]org[.]ph
debianvm[.]mil[.]ph
162[.]55[.]0[.]1379avast-free-antivirus[.]square7[.]de
debian3[.]bplaced[.]net
debianhelp[.]square7[.]de
15[.]197[.]142[.]1738avastgalaxy[.]com
avastlog[.]com
avastore2023[.]com

Some of the cybersquatting domains and subdomains also hosted or redirected to questionable live pages. For example, these showed very similar login pages.

Screenshot of avast2014fanghuoqiang[.]b-data[.]io
Screenshot of avast2014pojie[.]gitpage[.]si
Screenshot of mydebianblog[.]fh-muenster[.]io

Whether or not these cybersquatting domains were directly related to URSNIF and TA544, they still raised suspicion because of their connection to malicious IP addresses and their impersonation of widely used systems.


URSNIF has consistently evolved and remained persistent over the years, with threat actors using the Trojan to target hundreds of banks and steal thousands of sensitive credentials. The cybersecurity community can benefit from any insight that can help prevent the threat it poses. As such, the artifacts we discovered in this research may aid security investigators in tackling URSNIF and the threat actors behind it.

If you wish to perform a similar investigation or learn more about the products used in this research, please don’t hesitate to contact us.

Disclaimer: We take a cautionary stance toward threat detection and aim to provide relevant information to help protect against potential dangers. Consequently, it is possible that some entities identified as “threats” or “malicious” may eventually be deemed harmless upon further investigation or changes in context. We strongly recommend conducting supplementary investigations to corroborate the information provided herein.

By WhoisXML API, A Domain Research, Whois, DNS, and Threat Intelligence API and Data Provider

Whois API, Inc. (WhoisXML API) is a big data and API company that provides domain research & monitoring, Whois, DNS, IP, and threat intelligence API, data and tools to a variety of industries.

Visit Page

Filed Under

Comments

Commenting is not available in this channel entry.
CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

Related

Topics

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

Cybersecurity

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

NordVPN Promotion