Space Pirates: a look into the group's unconventional techniques, new attack vectors, and tools By Positive Technologies Published: 2024-08-19 · Archived: 2026-04-05 20:13:53 UTC Introduction At the end of 2019, the team at the Positive Technologies Expert Security Center (PT ESC) discovered a new cybercrime group, which they dubbed Space Pirates. It had been active since at least 2017. The first-ever comprehensive research paper describing the group saw light in early 2022. The Space Pirates group have since stepped up attacks on Russian companies: we have come across the group frequently while investigating cyberattacks in the past year. They have hardly changed their tactics, but they have developed new tools and improved their old ones. The cybercriminals’ main goals are still espionage and theft of confidential information, but the group has expanded its interests and the geography of its attacks. Over the year, at least 16 organizations have been attacked in Russia and one in Serbia. Some of the new victims that we identified are Russian and Serbian government and educational institutions, private security companies, aerospace manufacturers, agricultural producers, defense, energy, and infosec companies. 1. Investigating the network infrastructure We found an Acunetix installation on one of the Space Pirates command-and-control (C&C) servers, which suggested that the group exploited vulnerabilities—an attack vector we had not seen it use earlier. Figure 1. Evidence of Acunetix being installed on a Space Pirates C&C server During our investigation, we noticed that the group was interested in PST email archives (among other targets). A configuration error on a Space Pirates C&C server allowed us to scan its contents, discovering two email archives belonging to a Serbian ministry. https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/space-pirates-a-look-into-the-group-s-unconventional-techniques-new-attack-vectors-and-tools/#id4 Page 1 of 40 Figure 2. C&C server with web shells and stolen data We alerted the ministry via Serbia’s National CERT. Other contents of the server included a Godzilla web shell and an obfuscated Neo-reGeorg tunnel. The Space Pirates network infrastructure continues to use a small number of IP addresses as indicated by the DDNS domains. The malicious actors often reuse old website URLs by creating high-level domains, such as ruclient.dns04.com.ruclient.dns04.com. The group had also begun using the ShadowPad malware, something we discovered as we were tracking changes in the hacker infrastructure using our internal ScanDat automated system. An alert we received pointed to a chain of SSL certificates characteristic of ShadowPad. That chain was covered in one of our previous reports. As we continued to investigate the incident in question, we found a copy of ShadowPad used by the Space Pirates group in the client’s systems. Figure 3. Chain of SSL certificates characteristic of ShadowPad 2. Analysis of the malware and tools 2.1. Deed RAT Virtually every investigation we conducted found that the group was using Deed RAT. As far as we can tell, the Space Pirates group is moving away from other backdoors. Code similarities between Deed RAT and ShadowPad, noted by our peers, suggest that the backdoor is an evolution of ShadowPad. ShadowPad is in turn believed to be an evolution of PlugX. Unlike ShadowPad and PlugX, though, Deed RAT has been known to be exclusive to the Space Pirates group to date. The backdoor is still under active development. We found a 64-bit version of Deed RAT on an infected device while investigating the incident. The structure of the main module and plugin headers is all but identical to the 32-bit version. Below is what it looks like: https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/space-pirates-a-look-into-the-group-s-unconventional-techniques-new-attack-vectors-and-tools/#id4 Page 2 of 40 struct SectionHeader { DWORD VirtualSize; DWORD SizeOfRawData; }; struct ModuleHeader { DWORD Signature; // 0xDEED4554 DWORD ModuleId; DWORD EntryPoint; QWORD OriginalBase; DWORD AbsoluteOffset; SectionHeader Sections[3]; DWORD RelocationsVirtualSize; }; The string encryption algorithm in recent versions is somewhat different. String length is no longer specified, and strings are null-terminated. Figure 4. Original encryption algorithm, with string length explicitly stated https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/space-pirates-a-look-into-the-group-s-unconventional-techniques-new-attack-vectors-and-tools/#id4 Page 3 of 40 Figure 5. Updated decryption algorithm for null-terminated strings We found computers infected with Deed RAT to contain two plugins, retrieved dynamically from the C&C server. The first one is named Disk, has the identifier 0×250, and is used as a disk tool. Essentially a Windows API wrapper, Disk supports the 10 network commands described below. Identifier Description 0х250 List disks 0х251 List files inside folder 0х252 List files inside folder recursively. The response returns the fields of the WIN32_FIND_DATAW structure, such as timestamp, size, attributes, and name 0х253 Call the SHFileOperation function with specified operation code and flags FOF_NOERRORUI | FOF_NOCONFIRMMKDIR | FOF_NOCONFIRMATION | FOF_SILENT | FOF_MULTIDESTFILES 0х254 Execute command via CreateProcess 0х255 Get file attributes and content 0х257 Write file to specified path with attributes 0х259 Create folder 0х25A List network resources 0х25B Connect network drive. The command sends a NETRESOURCEW structure https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/space-pirates-a-look-into-the-group-s-unconventional-techniques-new-attack-vectors-and-tools/#id4 Page 4 of 40 The other plugin is named Portmap and has the identifier 0×290. The hackers likely based it on the ZXPortMap utility often used by Asian cybercrime groups. The plugin is used for port forwarding and supports three network commands, each corresponding to an operating mode. Identifier Description 0х290 Proxy one request 0х292 Start simple proxy on specified port 0х294 Start SOCKS5 proxy without authentication on specified port Additionally, the main module code contains a reference to a module with the identifier 0xC0, which we did not come across. Apparently, it was a built-in module that executed some actions before the backdoor started. The configuration header in recent versions looks as follows: struct DeedRATConfigHeader { DWORD Signature; // 0xC88CDB32 BYTE UnusedFlag; WORD pInitialKey; BYTE PairReplacableFlag1; WORD pInstallationPath; WORD pSideLoadingDllName; WORD pShellcodeName; WORD pServiceName; WORD pDisplayedServiceName; WORD pServiceDescription; WORD pPersistentRegistryKey; WORD pPersistentRegistryValue; BYTE PairReplacableFlag2; WORD pTargetProcessForInject1; WORD pTargetProcessForInject2; WORD pTargetProcessForInject3; WORD pTargetProcessForInject4; WORD pBotID; BYTE UnusedFlag; WORD pMutexName; BYTE Unknown[58]; BYTE DayOfWeek1; BYTE StartHour1; BYTE EndHour1; BYTE DayOfWeek2; BYTE StartHour2; BYTE EndHour2; BYTE DayOfWeek3; BYTE StartHour3; BYTE EndHour3; BYTE DayOfWeek4; BYTE StartHour4; BYTE EndHour4; BYTE DnsFlag; DWORD DnsIP1; DWORD DnsIP2; DWORD DnsIP3; DWORD DnsIP4; BYTE DohFlag; WORD pDohAddress1; WORD pDohAddress2; WORD pDohAddress3; WORD pDohAddress4; https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/space-pirates-a-look-into-the-group-s-unconventional-techniques-new-attack-vectors-and-tools/#id4 Page 5 of 40 BYTE Unknown[34]; WORD pC2Url1; WORD pC2Url2; WORD pC2Url3; WORD pC2Url4; BYTE UnusedFlag; WORD pProxyUrl1; WORD pProxyUrl2; WORD pProxyUrl3; WORD pProxyUrl4; BYTE Unknown[3]; }; The rest of the configuration consists of encrypted strings referenced in the header. The DNS list in the configuration remains unchanged as follows: 8.8.8.8 (Google Public DNS), 1.1.1.1 (Cloudflare DNS), 9.9.9.9 (Quad9 DNS), 222.222.67[.]208. The final DNS likely should be spelled as 208.67.222.222 (Cisco OpenDNS). The config seems to use little-endian addressing, rather than the network byte order. The likely reason why the error might have gone unnoticed so far is that this address is the last one on the list and seldom sees use, while the others are not affected by endianness. Never once did we see a DNS service hosted at 222.222.67[.]208. We have seen similar attempts to resolve domain names using non-existent DNS servers (see figure below). Figure 6. Traffic containing requests to a non-existent DNS server Queries like these are a likely sign of Deed RAT infection. Unlike the sample described above, the backdoor contains the environment pseudovariable %AUTOPATH%, used in the configuration field InstallationPath and, depending on backdoor permissions and system bitness, resolved as follows: %AppData% if the backdoor is missing administrator permissions %ProgramFiles(x86)% if the backdoor has administrator permissions and the system is 64-bit Windows %ProgramFiles% if the backdoor has administrator permissions and the system is 32-bit Windows We have seen a similar implementation in PlugX, which used the variable %AUTO%. It seems interesting in light of the group’s presumed Chinese origins that the number four is a regular feature of the code: four days on which the backdoor cannot run, four links to C&C servers, four links to proxies, four inject processes the malware into, four DNS servers, four DoH addresses. The pronunciation of the Chinese character 四 (four) differs from 死 (death) only in tone, thus the number four is considered unlucky. 2.2. Voidoor During an investigation, we obtained a sample of unknown, functionally different malware. Our timeline of the sample appearing on the infected computer suggested that the malware is delivered via Deed RAT already installed on the machine and belongs to the Space Pirates group. We were later shown to be right. We named the malware Voidoor, after the C&C server and the backdoor malware type. https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/space-pirates-a-look-into-the-group-s-unconventional-techniques-new-attack-vectors-and-tools/#id4 Page 6 of 40 Figure 7. Voidoor (ConsoleApplication1.exe) appearing on the infected ALEX-PC computer Compiled at the end of 2022, Voidoor is a 32-bit EXE file containing the PDB path "C:\_\Project1\Release\Project1.pdb". Figure 8. Information from the DIE analysis tool Most of the strings inside are XOR-encoded with the key 0×22. Figure 9. Obfuscated stack strings The Voidoor life cycle can be broken down into the following phases: 1. Preparation 2. Talking to GitHub repositories 3. Gaining persistence 4. Talking to the voidtools forum 5. Talking to GitHub 2.2.1. Preparatory phase The sample starts by trying to open port 27015. If unsuccessful, the process is terminated, so that only one sample is left running at any given time. This is followed by decrypting the bulk of the strings. These can be broken down into the following groups: 1. Talking to GitHub: access token, HTTP headers, user name, user repositories, names of files to be downloaded and run 2. Talking to the voidtools forum: URI with parameters 3. Talking to both GitHub and voidtools: User-Agent header: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.0.0 Safari/537.36. The HTTP header in the network commands is written in lowercase, unlike the other fields 4. Local activity: name of scheduler task, paths of files created by Voidoor The above strings are decrypted inside one function, and they can be categorized as file configuration. In addition to that, as the malware runs, it decrypts locally used strings. This phase also sees Voidoor use the victim identifier, stored in a %TEMP%/ids file. If not present, the file is created, with three concatenated random numbers used as the ID. https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/space-pirates-a-look-into-the-group-s-unconventional-techniques-new-attack-vectors-and-tools/#id4 Page 7 of 40 Figure 10. Generating a victim ID 2.2.2. Talking to GitHub repositories A personal access token hard-coded in the sample tells us a few things about the owner and their repositories: Token issuer: hasdhuahd Token issuer url: https://api.github.com/users/hasdhuahd User created at: 2022-11-23T01:08:24Z User updated at: 2023-03-20T07:47:54Z Project: hasdhuahd/919A1C3FD38A41D89ED53F1967AF443D Created at: 2022-11-23T03:44:21Z Visibility: private Project: hasdhuahd/myprivaterepo-1 Created at: 2022-11-23T03:44:32Z Visibility: private Project: hasdhuahd/13F20E32BDBA46229631517AB130A7E7 Created at: 2022-11-24T04:39:35Z Visibility: public Project: hasdhuahd/al-khaser Created at: 2022-12-07T08:16:58Z Visibility: public hasdhuahd/919A... acts as the C&C center. hasdhuahd/myprivaterepo-1 holds the tools used by the malware. hasdhuahd/13F2... contains the only file that has a UUID. Its function is unknown. hasdhuahd/al-khaser is a fork of a public antivirus benchmarking utility. The sample assembles the paths to the repositories it will use. https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/space-pirates-a-look-into-the-group-s-unconventional-techniques-new-attack-vectors-and-tools/#id4 Page 8 of 40 Figure 11. Building the paths to a repository Network communication is handled by libcurl. Voidoor’s first task is to tell the operators about the new victim. To do this, it builds the link https://api.github.com/repos/hasdhuahd/919A.../git/trees/main?recursive=1 and downloads the file 1A11878899834F1591DFADC277B2132E. If network is unavailable, the program will keep trying until it can download the file. The file maintains a victim list of several dozen strings consisting of a computer name and a pre-generated identifier. Figure 12. Part of the victim list. The plus sign is used as a delimiter The JSON file returned by GitHub is parsed by chopping it into substrings. https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/space-pirates-a-look-into-the-group-s-unconventional-techniques-new-attack-vectors-and-tools/#id4 Page 9 of 40 Figure 13. Every developer had this phase If the above list does not contain a the identifier generated for the victim, Voidoor sends an HTTP PUT request to api.github.com. GitHub supports adding and modifying files with PUT requests as detailed here: docs.github.com/en/rest/repos/contents#create-or-update-file-contents. Remarkably, this phase includes the decryption of a string in the malware code that will be modified later: {"message": "commit message", "content": "dGhpcyBpcyBkb25l", "sha": "164adc449d458c4b0819bb348db9b07ca2fc367d" The sequence dGhpcyBpcyBkb25l turns into "this is done". This string is replaced with the ID to be added, and the resulting value is sent to the file 164adc449d458c4b0819bb348db9b07ca2fc367d. The sample then calls the repository myprivaterepo-1, downloading a shellcode file XOR-encrypted with the key 0×22 to the folder %TEMP%\myfile.bin. It is worth noting that the developer has implemented integrity control by appending a SHA-256 checksum to the end of the file names, which is derived from the downloaded files and checked. https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/space-pirates-a-look-into-the-group-s-unconventional-techniques-new-attack-vectors-and-tools/#id4 Page 10 of 40 Figure 14. Verifying the checksum of a downloaded file Judging by the corrupted shellcode files in the repository history, this desperate measure was intended as an extra guarantee that the file is valid. Interestingly enough, at some point, the developer began to additionally encode binary files in Base64 to avoid byte interpretation issues when storing these in Git. Then, the sample terminates every process with the name ConsoleApplication1.exe, downloads a file with that name from the tooling repository, and saves it to the folder with the shellcode. 2.2.3. Gaining persistence Voidoor generates a scheduler task as follows: schtasks /create /tn MyApp /tr /sc minute /mo 1 /f && schtasks /create /tn MyApp /tr /sc minute /mo 1 /ru system /f This task runs the malware every minute, with system permissions if possible. Clashes that may be caused by this outrageous frequency are avoided by checking port 27015. Notable is the method of gaining persistence: the malware uses the previously downloaded file ConsoleApplication1.exe, which is also used to run the shellcode. The process then generates a task inside the file orderFile.txt, formatting its contents in a way that resembles the output of certutil -encode (see figure below). Figure 15. Decrypting stack strings related to certutil https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/space-pirates-a-look-into-the-group-s-unconventional-techniques-new-attack-vectors-and-tools/#id4 Page 11 of 40 A Base64-encrypted command is placed in the BEGIN CERTIFICATE and END CERTIFICATE strings. The program runs the file ConsoleApplication1, which decrypts the shellcode (using the operation XOR 0×22) and runs it. The file logic is as follows: cmd /c certutil -decode C:\Users\Public\Downloads\orderFile.txt C:\Users\Public\Downloads\silentBase.bat && ec cmd /c type C:\Users\Public\Downloads\silentBase.bat>C:\Users\Public\Downloads\Basesilent.txt && copy C:\Users 1>C:\Users\Public\Downloads\checkString || echo 1>C:\Users\Public\Downloads\checkString cmd /c C:\Users\Public\Downloads\silentBase.bat &&echo 1>C:\Users\Public\Downloads\interResultFile.txt && echo Removal of API files via Windows C:\Users\Public\Downloads\houston, C:\Users\Public\Downloads\interResultFile It can be simplified as follows: # Decode orderFile.txt to silentBase.bat cd C:\Users\Public\Downloads certutil -decode orderFile.txt silentBase.bat # Use type and copy commands to complicate automated tracking of links between processes and artifacts type silentBase.bat>Basesilent.txt copy Basesilent.txt silentBase.bat del Basesilent.txt # Execute the script—in this case, the main file persistence logic silentBase.bat # Clean up temporary files 2.2.4. Talking to the voidtools forum To support further operation, the program creates an invisible window with two threads. Figure 16. Creating two threads The second thread serves the simple purpose of standing by for ten hours, then activating the termination flag for the first one. https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/space-pirates-a-look-into-the-group-s-unconventional-techniques-new-attack-vectors-and-tools/#id4 Page 12 of 40 Figure 17. Body of the termination control thread The flag will be checked in the global cycle of the first thread. Figure 18. Global cycle of the first thread with the exit condition The checks relating to the forum part must be passed to proceed to the next phase. First, the thread decrypts the strings https://www.voidtools.com, /forum/ucp.php, and ?i=ucp_pm&mode=options. "UCP" means "User Control Panel" in the context of this website. Interestingly, the sample adds "asdasdasd" to the cookie request header, but we could not find any common sense in that. The process concatenates the strings and sends a request to the resulting address. If there is a connection, the request will be redirected to the login page. Figure 19. Forum login form The sample will then send a POST request to log in to the forum using the hard-coded login and password, and if successful, store the values of the phpbb3_h6rei_u, phpbb3_h6rei_k, and phpbb3_h6rei_sid cookies, which are required for the session. The forum has a personal messaging system that supports custom rules. https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/space-pirates-a-look-into-the-group-s-unconventional-techniques-new-attack-vectors-and-tools/#id4 Page 13 of 40 Figure 20. Email rules from several malware samples The sample will try to define a new rule even if this rule already exists: check_option=1&rule_option=1&rule_string=^^&rule_user_id=0&rule_group_id=0&cond_option=text&action_option=1|0&add_rule=Add rule&foldername=&rename_folder_id=8&new_folder_name=&remove_folder_id=8&remove_action=1&move_to=0&full_move_to=0&full_action=3& &form_token= Figure 21. Warning message when trying to create a duplicate rule The malware will download the page with the list of rules again. This time, though, it is looking for a folder whose name features the victim ID. Figure 22. List of directories and folders The folder must be created by the C&C server, or else the sample will get stuck in a loop for ten hours repeatedly adding the new rule. Multiple folders cannot be created, as the sample will take the first entry for comparison. We suspect this means that the C&C server can communicate with only one sample via GitHub at any given time. https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/space-pirates-a-look-into-the-group-s-unconventional-techniques-new-attack-vectors-and-tools/#id4 Page 14 of 40 The forum is powered by the phpBB engine; it proved to be a treasure trove of useful information. Figure 23. Account registration date Figure 24. Address created by a temporary email service Figure 25. The time zone is Antarctic The forum notably requires some activity from users before allowing them to send email. Figure 26. Restriction on messaging for newcomers The so-called "Remember me" login keys were a real catch. This function helps to manage active sessions whose tokens are stored client-side. If the device is stolen, the user can block it by removing the key from the list. The device will lose access to the profile, and the forum will ask for a user name and password to log in again. This is a legacy feature based on a use case that was described in a 2004 post we found on the phpBB community forum. We consider that functionality to be dangerous. Figure 27. Top of the active session list We found more than 3,500 login events associated with 73 unique IP addresses, and we were able to attribute voidoor to the APT group after discovering a series of logins from Space Pirates IP addresses that occurred within days of registering the https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/space-pirates-a-look-into-the-group-s-unconventional-techniques-new-attack-vectors-and-tools/#id4 Page 15 of 40 account. By correlating these events with activities in the GitHub repository, we established that these logins took place during the malware development and testing phases. Figure 28. Addresses related to the Space Pirates C&C server The hackers have targeted universities, healthcare centers, energy companies, private security providers and government organizations in Russia and Serbia. 2.2.5. GitHub-based C&C server The sample switches to the communication mode based on GitHub commands. It searches the repository 919A... for a file whose name consists of two parts: a string of the same type as the value returned by the command and an identifier. Communication takes place as follows: 1. The malware receives a command in the specified file. The command consists of three strings: the command identifier, the return value type, and the command body. We are aware of the following two return value types: D737C9A763E941BDAA69C6EE83553014: download the file from the victim’s computer and upload it to GitHub 139445A83B5B4ED79FAF4439FC7FFE69: execute the command 2. The sample runs the above task and uses a PUT request to upload an object with the name formatted as  + to the repository. 3. The process loops to the start: the sample returns to standby mode, waiting to get a command with an identifier different from the previous one. Example of this kind of communication: datetime: 2022-11-24 12:40:59+08:00 message: commit message 1A11878899834F1591DFADC277B2132E 2 insertions, 0 deletions, 2 lines (file with the new infected victim added) >>> \n DESKTOP-94KT1VQ+200882088117246 <<< datetime: 2022-11-24 12:42:05+08:00 message: commit message D7B3FDC2EABE453BB39FA73557FC77F3200882088117246 4 insertions, 0 deletions, 4 lines >>> uuid: 8b0e4a01-b242-45a4-a86d-25ab54a3308a md5: 139445A83B5B4ED79FAF4439FC7FFE69 cmd: hostname <<< datetime: 2022-11-24 12:46:30+08:00 https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/space-pirates-a-look-into-the-group-s-unconventional-techniques-new-attack-vectors-and-tools/#id4 Page 16 of 40 message: commit message A2EE1A74A32344FEA87A42D395013499200882088117246 5 insertions, 0 deletions, 5 lines >>> GB18030 (simplified_chinese): C:\mylittletrojan\shellcodeloader\thumb_drive-main\thumb_drive_copy_real_time\7z2200-src\CPP\7zip\UI\Client7z> DESKTOP-94KT1VQ <<< Unfortunately, our copy of the file is missing that functionality: the command identifier includes an extraneous hard-coded identifier with an unknown return value type: D7B3FDC2EABE453BB39FA73557FC77F3171542571331346. The string prevents the code from executing correctly, causing the sample to loop for ten hours, as the termination flag that the cycle checks is set by the second thread. As the string is XOR-encrypted in its entirety inside the file, the function can be considered deactivated but not removed. 2.2.6. Some facts about the developer of the tool By analyzing the GitHub repositories, we can easily identify the testing and operation phases of the malware. We know that the name of the hacker’s device is desktop-94kt1vq. Online search returns a blog on Chinese Software Developer Network. Figure 29. Web search results Figure 30. Developer profile The user posts a lot, with a total of 177 original entries, and importantly for us, his name in the system ("X") matches the name used by the C&C server. Figure 31. The user name "X" and the default project name "ConsoleApplication" Some of the user's other noteworthy blog posts deal with storing files on GitHub, using IDA Pro and reverse engineering in general, and kernel programming. https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/space-pirates-a-look-into-the-group-s-unconventional-techniques-new-attack-vectors-and-tools/#id4 Page 17 of 40 Figure 32. Post on storing files on GitHub The profile description caught our eyes too. Figure 33. Description of the first account This mentions another account, abandoned in March 2021. Figure 34. Second account This other blog focuses mostly on pentesting, vulnerability analysis, and descriptions of internal Windows mechanics. By comparing these pieces of information (matching computer names, user names, and relevant skills), we can assume with some confidence that this person is one of the developers of the malware in question, if not the only one. 2.3. Other tools Besides the backdoors described above, the hackers have made use of the following publicly available network tools: Stowaway Mimikatz fscan procdump PortQry версии 2.0 Gold NetSess NBTscan PsExec KrbRelayUp SharpRoast nmap Impacket CHAOS reGeorg Neo-reGeorg Godzilla (web shell) xсmdsvc https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/space-pirates-a-look-into-the-group-s-unconventional-techniques-new-attack-vectors-and-tools/#id4 Page 18 of 40 The group often uses tools written in Golang and obfuscated with Garble. We also found a homebrew utility that is not available publicly and likely has been developed by the Space Pirates group. It monitors connected drives, collecting files from every newly appearing device and creating a new database record. The utility uses the 7z.dll library to pack files into an archive with a name formatted as hh.mm.ss, where hh is the current hour, mm is the current minute, and ss is the current second. All archives are saved to C:\Users\Public\Downloads\dest. The utility uses two database files: 1.db in place of mutexes and 2.db for logging connected devices. Information about the latest changes to the removable drive contents is stored here as well, so the utility can check if it needs to copy any new files. The program masquerades as the 7-Zip file archiver. Figure 35. Properties of the removable-drive monitoring utility Conclusion The Space Pirates group is relentlessly stepping up activity targeting Russian companies: the number of attacks has increased manifold. The hackers are working on new malware that implements unconventional techniques, such as voidoor, and modifying their existing malware. In addition, we have seen a drastic reduction in the use of other backdoors characteristic of the group and an increase in attacks that employ Deed RAT. The Space Pirates group uses a large number of publicly available tools for navigating networks. The hackers also use Acunetix to reconnoiter infrastructures it targets. Meanwhile, the group’s tactics have hardly changed. The cybercriminals’ main goals are still espionage and theft of confidential information, but the group has expanded its interests and the geography of its attacks. The PT ESC team continues to monitor and respond to threats, including those associated with the Space Pirates group. Authors: Denis Kuvshinov, Stanislav Rakovsky, Stanislav Pyzhov Applications Verdicts by Positive Technologies products Network rules 10007678 SUSPICIOUS [PTsecurity] TLS Server Certificate (Some-Company Some-State) 10007870 SUSPICIOUS [PTsecurity] Multiple attempting to connect to an external non-http/smtp server 10007917 SUSPICIOUS [PTsecurity] Multiple POST request 10008972 SUSPICIOUS [PTsecurity] GET request in TCP 10008973 SUSPICIOUS [PTsecurity] POST request in TCP YARA rules apt_mem_CN_SpacePirates__Backdoor__DeedRAT____EncryptionArtifacts__R1 apt_win86_CN_SpacePirates__Backdoor__Github__And__Voidtools__Backdoor apt_win86_CN_SpacePirates__Shellcode__From__Github apt_win_CN_SpacePirates__Trojan__DllLoader crime_linux_ZZ_Chaos__Backdoor tool_multi_ZZ_NBTscan__HackTool tool_multi_ZZ_Stowaway__HackTool https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/space-pirates-a-look-into-the-group-s-unconventional-techniques-new-attack-vectors-and-tools/#id4 Page 19 of 40 tool_multi_ZZ_fscan__HackTool tool_win_CN_ShadowPad__Backdoor__NewDecrypt tool_win_ZZ_GhostPack__HackTool__SharpRoast tool_win_ZZ_GodzillaShell__Backdoor tool_win_ZZ_GolangObfuscation__RiskTool__Garble tool_win_ZZ_KrbRelay__HackTool__Strings tool_win_ZZ_Mimikatz__HackTool__Generic tool_win_ZZ_ProcDump__Hacktool tool_win_ZZ_PsExec__Hacktool tool_win_ZZ_reGeorg__Backdoor__WebShell Behavioral rules Trojan.Win32.Generic.a Trojan.Win32.Evasion.a Trojan.Script.Impacket.a Backdoor.Elf.Chaos.a Trojan.MachineLearning.Generic.a Create.Process.ProcDump.CredentialDumping Create.Process.PortQry.NetworkConnectionsDiscovery Create.Process.NBTscan.NetworkSniffing MITRE ID Name Description Reconnaissance T1595.002 Active Scanning: Vulnerability Scanning The Space Pirates group uses Acunetix to search for vulnerabilities in victim infrastructures Initial Access T1566.001 Phishing: Spearphishing Attachment Space Pirates uses phishing emails with malicious attachments T1566.002 Phishing: Spearphishing Link Space Pirates uses phishing emails with links to malware Execution T1059.003 Command and Scripting Interpreter: Windows Command Shell Space Pirates malware features remote command shell functionality T1059.005 Command and Scripting Interpreter: Visual Basic Space Pirates uses VBS scripts, including ReVBShell https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/space-pirates-a-look-into-the-group-s-unconventional-techniques-new-attack-vectors-and-tools/#id4 Page 20 of 40 T1106 Native API Space Pirates malware uses WinAPI functions to run new processes and implement shellcode T1053.002 Scheduled Task/Job: At (Windows) Space Pirates uses atexec.py to run commands on a remote host T1053.005 Scheduled Task/Job: Scheduled Task Space Pirates uses system tasks T1569.002 System Services: Service Execution Space Pirates creates malicious services Persistence T1053.005 Scheduled Task/Job: Scheduled Task Space Pirates creates system tasks for persistence on the host T1543.003 Create or Modify System Process: Windows Service Space Pirates creates malicious services for persistence on the host T1546.015 Event Triggered Execution: Component Object Model Hijacking RtlShare malware persists in the system through substitution of the MruPidlList COM object T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder For persistence on the host, Space Pirates can place a shortcut in the autorun folder and use the Run and RunOnce registry keys Privilege Escalation T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control Space Pirates malware contains various techniques for bypassing UAC T1068 Exploitation for Privilege Escalation Space Pirates can exploit the CVE-2017-0213 vulnerability for privilege escalation Defense Evasion T1027.001 Obfuscated Files or Information: Binary Padding The RtlShare dropper adds random bytes to the extracted payload T1027.002 Obfuscated Files or Information: Software Packing One of the stages of the BH_A006 malware is obfuscated using an unknown protector T1036.004 Masquerading: Masquerade Task or Service Space Pirates uses legitimate-looking names when creating services T1036.005 Masquerading: Match Legitimate Name or Location Space Pirates masks its malware as legitimate software https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/space-pirates-a-look-into-the-group-s-unconventional-techniques-new-attack-vectors-and-tools/#id4 Page 21 of 40 T1055 Process Injection Space Pirates malware can inject shellcode into other processes T1055.001 Process Injection: Dynamic-link Library Injection Space Pirates malware can inject DLLs with payload into other processes T1078.002 Valid Accounts: Domain Accounts Space Pirates uses compromised privileged credentials T1112 Modify Registry Deed RAT stores all its data in the registry, including configuration and plugins T1140 Deobfuscate/Decode Files or Information Space Pirates malware uses various algorithms to encrypt configuration data and payload T1197 BITS Jobs Space Pirates uses BITS jobs to download malware T1218.011 Signed Binary Proxy Execution: Rundll32 Space Pirates can use rundll32.exe to run DLLs T1553.002 Subvert Trust Controls: Code Signing Space Pirates uses stolen certificates to sign some Zupdax instances T1564.001 Hide Artifacts: Hidden Files and Directories Space Pirates can store its malware in hidden folders at C:\ProgramData T1574.002 Hijack Execution Flow: DLL Side-LoadingSpace Pirates uses legitimate applications vulnerable to DLL side-loading T1620 Reflective Code Loading Space Pirates malware uses reflective loading to run payloads in memory Credential Access T1555.003 Credentials from Password Stores: Credentials from Web Browsers Space Pirates uses the Chromepass tool to retrieve passwords from Chrome browser storage T1003.001 OS Credential Dumping: LSASS Memory Space Pirates gets LSASS process dumps for further credential dumping T1040 Network Sniffing Deed RAT collects information about in-use proxies through network sniffing Discovery T1087.001 Account Discovery: Local Account Space Pirates collects information about users through the query user command https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/space-pirates-a-look-into-the-group-s-unconventional-techniques-new-attack-vectors-and-tools/#id4 Page 22 of 40 T1087.002 Account Discovery: Domain Account Space Pirates collects information about users in the domain through the legitimate CSVDE tool T1082 System Information Discovery Space Pirates malware collects system information, including OS version, CPU, memory, and disk information T1614.001 System Location Discovery: System Language Discovery Deed RAT gets the language code identifier (LCID) during system information collection T1016 System Network Configuration Discovery Space Pirates collects information about the network settings of the infected machine T1069.002 Permission Groups Discovery: Domain Groups Space Pirates collects information about groups in the domain through the legitimate CSVDE tool T1083 File and Directory Discovery Space Pirates collects information about .doc and .pdf files in the system T1033 System Owner/User Discovery Space Pirates collects information about users of compromised computers T1057 Process Discovery Space Pirates uses the tasklist.exe tool to retrieve process information Lateral Movement T1021.002 Remote Services: SMB/Windows Admin Shares Space Pirates uses the atexec.py and psexec.rb tools to move through the network Collection T1119 Automated Collection Space Pirates searches for and copies files with the masks *.doc and *.pdf T1560.001 Archive Collected Data: Archive via Utility Space Pirates zips stolen documents into password-protected archives using 7-Zip T1056.001 Input Capture: Keylogging Space Pirates malware can capture user input Command and Control T1071.001 Application Layer Protocol: Web Protocols Deed RAT может инкапсулировать свой протокол в HTTP и HTTPS https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/space-pirates-a-look-into-the-group-s-unconventional-techniques-new-attack-vectors-and-tools/#id4 Page 23 of 40 T1071.004: DNS Non-Application Layer Protocol T1095 Deed RAT can encapsulate its protocol in DNS T1132.001 Data Encoding: Standard Encoding Space Pirates malware can compress network messages using the LZNT1 and LZW algorithms T1573.001 Encrypted Channel: Symmetric Cryptography Space Pirates malware can encrypt network messages using symmetric algorithms T1008 Fallback Channels Space Pirates malware supports multiple C2s and can update the C2 list through web pages T1095 Non-Application Layer Protocol Space Pirates malware uses its own protocols to communicate with the C2 server T1102.002 Web Service: Bidirectional Communication Space Pirates malware uses a combination of the voidtools forum and GitHub as the C&C server T1105 Ingress Tool Transfer Space Pirates downloads additional utilities from the C2 server using the certutil tool T1571 Non-Standard Port Space Pirates uses non-standard ports, such as 8081, 5351, 63514, etc., to communicate with the C2 server T1572 Protocol Tunneling The Space Pirates group uses the dog-tunnel utility for traffic tunneling T1090.001 Proxy: Internal Proxy Deed RAT can discover and use proxies to connect to its C&C IOCs File indicators Deed RAT b6860214fcc1ef17937e82b1333672afa5fcf1c1b394a0c7c0447357477fe7c9 3f8ee1e875cbb01e145a09db7d857b6be22bdd92 972a1a6f17756d 212f750a1d38921b83e68e142ee4ae1c7b612bf11c99210da60775f17c85a83e f99f5f397fe1abb3fc25cc99fe95952fe24b6123 51ca39e3700e9e 6cfa8ce876c09f7e24af17bbe9baa97f089e9bf478a47d18417e399e64a18d40 1fb924ec4f0ab73a952f2a3cb624b94933275d1b b0b438bcb2a712 b7bb9b41298420d681d1a79765d7afb7ecf05d6f0baf0b29a07b8b1af20a8c97 2910415d483972cc17c76548e2b2aa5afd5bc59a 0fa4a2b8210500 f554ff7eb069f0ea5ebc49e015bde1e88d4cf83f6df21e4de2056716e83fedc6 067ca2d961b913cb2e6d6aaa92595345125d6683 804824203f31eb 7ee776272f7c51e41e10f5ffbd55c8c24ddb332e8c376e132e5a8cb72abd7397 1a6e675d82e67cc41493ff991f99da70316848c4 38c43e589e3dc6 https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/space-pirates-a-look-into-the-group-s-unconventional-techniques-new-attack-vectors-and-tools/#id4 Page 24 of 40 ece771ab5ae8372078c378fa0cf0a1ac055ea5cbe6091f890185c02caf0edc19 c055f30523028037f51cc62d25ce6d38334a531e ef6264abe29635 87a2176d8839e087100530ee79aa169f5078173acac2a5652527a35924ebf15e 2404ac00114cd2481099c52b879e1776dedb2d24 24ec73b4e18450 5c7f727c852819ae60182c4406c233f5b86962c1da3b933953058985d9f90722 ced02716f59a9a70c37eaf373c42796e6f3e93b0 d217fe96c7737a ceca49486dd7e5cf8af7b8f297d87efe65aba69124a3b61255c6f4a099c4a2ab e986b238cb5fe037718172d965a41c12c85bbdd0 633ccb76bd1728 4f84f4333dc9c42ae4ed55c4550ebb14c8079235ae7de9fef4191251537454fc 59239f73996a3f5a6260228cf7ca3c01e3a00822 77ef4bc2f23ef97 8c3e0fdddc2c53cf7961f770080e96332592c847839ccf84c280da555456baf0 84ca568879ca62448d035d56bec816a11188b831 8002cd74e579a4 85d190304accb34422d3e1d603c33b86b6b8c4e88cc4713b0e0c6d4fdee9d93e ac499c86012858f40eb78ecf3bcefae779527d73 d4e51120c368ee a3df5eb54f0a77cb52beccf1b2aa2caa427f80fcd047fc6be4c7aa849649e1b5 99cc3349b64188aae1c986afbcee7e776aa4b349 66e8f82a418923 f9e97776826f83278c63cda59910c49920b7316433d9d95570dd187e154fed0b 30ad2f4a758ab2c526b6439772c7cd7cee66ffc4 fb23fc474841502 74ac74ea85118fe3686f9d6774de2d63db7870dadb4f0ba0d119a77d6c11323a 0d0c026a1661923cd184b6d0fde647128be75488 99b86ad9bf6193 057a16008ce50c3d02c910eac697748eb157afb8a6e8573adefa4b75b495a778 20c83bcfd9fb45a8ba5922dbefb74d47cb361db7 4db33e5390bfeb 66bca22ba5fbd01758fde8e57e1e251191cd1c7bb599f0beb8dd0ffd661464ac e50dc750e7697ba5e28d6dde12e9a4d370076c0c dbb5995037745e 10d122833af8b8fec97ebdd843942bfc2bf237e3b8c01ae9f852eaca2e9cddc7 491248fdf1141e81d5ff23eb1e44d58b50339fe2 a94277fad94ca6f f0b8bf55a3e23379aefd9a95c556430e073ad206b4c39e0086f0a17d00ae64fe c58d5d36201cee88a01c9913d771723edde302e4 7aa890406a74a4 8a3aefd75501137f601d4b802959fb50b7cba2b135ce2ab2f1f5fa65b1a86159 0912822548e5983f8a2b6d77848994f6d929ffed 9faf04fc6e52205 3a1e67006fb1e761e0188a04361cb7a57329346e7d0a78ef909fbc5469e3c08b af71956b59b9c05acdcd7badecc232ca6237cc8d 1a04af6c3abe8f6 e88c7dd128c456a34804a36459f32cdf97fe30a5642caa3072ff31cda07f29e2 bfe05003730d79f0004cc41e09f48944df6f68fe 6d52d0e7f49817 a2d7255cf7c8710cdec62c01b3e2c9d22600441b20914d73eb8f8af3245a9806 19da36d73e0a72f65c8a9f6fc2e2504ed599b57d 8e3217391e11ca bfa3c91767c333a97d6849a3f885f4ed2205f24882bffbbfc916624b2601a9b7 6e0c406d07206b588652729a271e054c416b5c90 97c00cee887279 241d1ab6a0da9dfcbc9c565d1ff948743cd7673ed334e5906a1428055cab6c82 338881ff10434b523feb63a8a66370f444378cc7 5d0aa944ce19e0 c8c3b639c6e880d7e01cba8cb019087f0c4d2cf4dcdfa712a18054b78e525a47 f4a5778b74b73745a533f22d33a65880f2968705 1d07e53969cd1c 5e712e78736bde2d3ed507fb730be3a9d55d2b4ee3f7ff827f961fcada4e4e0b 57792f875625fec78bea22af46010bd34dff863a 81a93165b338dd https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/space-pirates-a-look-into-the-group-s-unconventional-techniques-new-attack-vectors-and-tools/#id4 Page 25 of 40 c4e023110216481d0ccb09787ccc5ea46879fdf331f5d2fda2b1f33719a35104 a24d306d0ed0061485cb05901cf9fc9d5f07c097 a2221a72d42b97 ef17d44cde003c17c28137c6d4692eb4a1b42f86e5d6995f2f06a05e363f044a c321233155af13a53ecd746eaab84cc6ac69d510 c1be341ffc0f58b 42ef77391f20ffc1751ded79da25376bc20a007d03e501049fff37f781df5403 6f8cc7abbf3185a085aa43186c5da332b04c3156 9a6b1bd3b7f13d cae7622a5f1ed791d317db0b3bc791a8ab71a9c68837282435f5db6bab540615 a7de9de3774ad507e7d1ddfcce4924625a600434 ab6a57e40ba741 2707602481a025da29438d01e894cfc9742389d419a5b08aa96ddc76bde38cba 493e89a70c4176dcec50f34b79eaa4f910e50800 7949b560ecf606 5311e4fd3329945496962c6417b74da919f5e50ae20ba7ab0d5983012c956f4b ab64d32da52a1e516b0c874aad006db404f9c21e 81de205ac5e44e dc3c1df20d73a62e8219ed6193ecf1229845dd0a6e42d32eb11cbaee04cfa7df a3225a0bbb66b5babf52466ae23a1538407f0cef 4fdb78de4da91c 70e43da5c5b6a8cfea8fcad768a2e5cfdf532b49b5ac87ec8ca9d05d83e0e915 c5c844582c0590cdc901c253a121568251154c61 2ec55245fbe57ca 1473fcf2297376a819b6cccd50dc709fb61f48f70dc9a0eaff741c893b33d670 e49d21f1e66268715efc6003c4e2d3b98cee666a ffc18496b2b1563 67f7faf0161fdac7ebb619a2aa0c73a4a08def05d7752dfdd698d24410d9989e 28ed17b046e0bed3d1cde67eccf241ecf01fe3c4 ef4d35b1780cb1 7c11eecc2fef6a2ad2e5d80156946d7bdcb9c345d542781c3116141f10eb490f aa42f3758dc599e6184894a2911e774c2e16b92d 01b596051d1fa4 e2735841dd8ae66a825182d6d06629821c49aca44357e5980c3bfb97ace7ebf0 57b138f2bb4731b1c50a034aff3013bce735267c 54c7f04fc541855 374fff9a48949254d72bfe34b9b62129da1cfafb74623d187791ada09d976e7d f95deea8d824ee681341f9457e0a86129ec4eb91 824fbfa8b35f191 Voidoor 86c17c549433223f3b59f5ee3e4f2694ebf4e6aabd66508a9a6fec1bdf830c61 1749f99443b345860dd037940505421c45156950 48097e614cdf1f9c PlugX 22c6d07b64d40811ef31113faac7293348845ab6a06f7319a653ca694c26e94a a8808089c37faacebc19bafd2677ba011afffc49 3cf999dd950af82c 8c8f9fd17d1c28b471bcc4c870ab53a3b4b260ae2fd123b0ef2a2a819ce1cc78 154da55173f97c50e41e48157bc94515cc6146ec 6d3ce5d4003ce4c9 USB stealer ff9a833d34ff89660c1c5f3fa71d4d88c287c183235f714e03ccbdec7a3a6b17 89375a28a96286584e321401915bff2860190470 b33e5e2e14b0fbe31 Stowaway https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/space-pirates-a-look-into-the-group-s-unconventional-techniques-new-attack-vectors-and-tools/#id4 Page 26 of 40 87d36c48bf6d1d9a3b157aaab45ae162b78b79b0c956383a670dcc7d9d7c14e8 3caf909e6590a4ae2db99ae577d5585d854ad15e 8ec966f8b441fa2 0992aa7f311e51cf84ac3ed7303b82664d7f2576598bf852dbf55d62cb101601 7abf05ccdf0709aacae2ebe07b7104c81b19abe1 3381df84cf05826 8756f0619caff132b0d4dfefad4387b8d5ea134b8706f345757b92658e6e50ff fc6b59571353c74d4d8cbd254ea7b216f8449208 8a7b4985db84e90 aafb0a46610064cd88ba99672e0f18456ed827cf46b2d3064487c45bac75637a b85fec5a965785830af1cf5534ef6a3b437542c2 5e25310d2ada344 50c34013472f3848abb0fb280254d0514e83a65c1ce289ae199389795dcfb575 8ef130998044df15395dcf50123e5a1d8f6ce208 0c19d2e8bc1429f CHAOS f3f122aee9cd682074cdc757844dfd4e65d6268c2a71430d77265cf369deb774 ec5394b93c376e359a8a2c380622e3a9d033d0de d0ea84204096109 Network indicators 0077.x24hr.com alex.dnset.com amazon-corp.wikaba.com api.microft.dynssl.com apple-corp.changeip.org as.amazon-corp.wikaba.com asd.powergame.0077.x24hr.com bamo.ocry.com chdsjjkrazomg.dhcp.biz comein.journal.itsaol.com elienceso.kozow.com eset.zzux.com fgjhkergvlimdfg2.wikaba.com findanswer123.tk freewula.strangled.net fssprus.dns04.com ftp.microft.dynssl.com goon.oldvideo.longmusic.com journal.itsaol.com js.journal.itsaol.com lck.gigabitdate.com loge.otzo.com mail.playdr2.com miche.justdied.com https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/space-pirates-a-look-into-the-group-s-unconventional-techniques-new-attack-vectors-and-tools/#id4 Page 27 of 40 micro.dns04.com microft.dynssl.com mktoon.ftp1.biz news.flashplayeractivex.info noon.dns04.com ns2.gamepoer7.com ns9.mcafee-update.com oldvideo.longmusic.com pop.playdr2.com reportsearch.dynamic-dns.net rt.ftp1.biz ruclient.dns04.com serviechelp.changeip.us shareddocs.microft.dynssl.com srv.xxxy.biz staticd.dynamic-dns.net szuunet.strangled.net tombstone.kozow.com toogasd.www.oldvideo.longmusic.com toon.mrbasic.com update.flashplayeractivex.info web.miscrosaft.com werwesf.dynamic-dns.net wwa1we.wbew.amazon-corp.wikaba.com www.0077.x24hr.com www.omgod.org ybcps4.freeddns.org beachdrivingfun.com 123q4wfbs.staticd.dynamic-dns.net 1cnet.changeip.co aace.zzux.com ablank.ddnsfree.com accountsupport.ftp1.biz ace1.dynamic-dns.net add.srv.xxxy.biz ade.aace.zzux.com adm.outlook.onmypc.net adn.aace.zzux.com aeo.dotnet.almostmy.com aep.winsvr.lflinkup.org https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/space-pirates-a-look-into-the-group-s-unconventional-techniques-new-attack-vectors-and-tools/#id4 Page 28 of 40 afa.aace.zzux.com afd.aace.zzux.com afm.dotnet.almostmy.com afp.anp.ddns.ms agdfyvkiyrgyauhfjdf.journal.itsaol.com am.jex.ddns.us another.journal.itsaol.com anp.aace.zzux.com anp.ddns.ms ans.itissohard.journal.itsaol.com apd.anp.ddns.ms api.reportsearch.dynamic-dns.net app.anp.ddns.ms areyoufuckingkiddingme.staticd.dynamic-dns.net aro.noon.wikaba.com asb.anp.ddns.ms asd3.as.amazon-corp.wikaba.com asdfas.w3.oldvideo.longmusic.com asrweer.amazon-corp.wikaba.com asu.noon.wikaba.com atec.dnset.com ato.dotnet.almostmy.com ato.jex.ddns.us au.dotnet.almostmy.com au.serviechelp.changeip.us auca.py.dns04.com ava.anp.ddns.ms azx.aace.zzux.com ba.tu.qpoe.com back.serviechelp.changeip.us bba.dns04.com bca.aace.zzux.com beachdrivingfun.com bel.dynamicdns.edns.biz bin.anp.ddns.ms bin.bba.dns04.com bin.faz.dynamic-dns.net bit.chdsjjkrazomg.dhcp.biz blog.beachdrivingfun.com brenken.dotnet.almostmy.com https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/space-pirates-a-look-into-the-group-s-unconventional-techniques-new-attack-vectors-and-tools/#id4 Page 29 of 40 brrkst.dynamic-dns.net bz.py.dns04.com cai.wulatula.xxxy.biz cba.anp.ddns.ms cch.noon.xxxy.biz cchp.aace.zzux.com cchp.wulatula.xxxy.biz cdnsvc.microft.dynssl.com chip.noon.dns04.com chip.serviechelp.changeip.us chrome.py.dns04.com ciii.chdsjjkrazomg.dhcp.biz cloud.noon.dns04.com cmax.amazon-corp.wikaba.com coa.noon.wikaba.com com.loge.otzo.com com.ruclient.dns04.com community.reportsearch.dynamic-dns.net conhost.reportsearch.dynamic-dns.net contact.chdsjjkrazomg.dhcp.biz cood.serviechelp.changeip.us crc.jex.ddns.us crc.noon.wikaba.com crc.noon.xxxy.biz cro.src.ssl443.org cstg.jmjejij.otzo.com cstg.tu.wwwhost.us cstg.wula.zzux.com cumulative.dotnet.almostmy.com dba.aace.zzux.com dbb.anp.ddns.ms didle.staticd.dynamic-dns.net digital.brrkst.dynamic-dns.net dm.jex.ddns.us dmz.jex.ddns.us dnmd.0077.x24hr.com dns04.com.ruclient.dns04.com dnsfind.reportsearch.dynamic-dns.net dnsinfo.microft.dynssl.com docs.ace1.dynamic-dns.net https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/space-pirates-a-look-into-the-group-s-unconventional-techniques-new-attack-vectors-and-tools/#id4 Page 30 of 40 docs.atec.dnset.com docs.bba.dns04.com docs.jmjejij.otzo.com docs.microft.dynssl.com dotnet.almostmy.com dr.journal.itsaol.com dt.staticd.dynamic-dns.net dttd.chdsjjkrazomg.dhcp.biz dttd.serviechelp.changeip.us dwm.dotnet.almostmy.com dynamicdns.edns.biz edge.microft.dynssl.com edu.jex.ddns.us ee.chdsjjkrazomg.dhcp.biz ee.mktoon.ftp1.biz eeee.chdsjjkrazomg.dhcp.biz eeee.mktoon.ftp1.biz emv1.beachdrivingfun.com erdcserver.microft.dynssl.com erdserver.microft.dynssl.com etonlkk.chdsjjkrazomg.dhcp.biz exam.bba.dns04.com exam.faz.dynamic-dns.net exam.reportsearch.dynamic-dns.net exec.anp.ddns.ms exowa.microft.dynssl.com fa.anp.ddns.ms fand.faz.dynamic-dns.net fas.anp.ddns.ms faugi.1cnet.changeip.co faugi.py.dns04.com faz.dynamic-dns.net faz.faz.dynamic-dns.net fcc.noon.xxxy.biz fcc.src.ssl443.org fera.aace.zzux.com fileserverrt.reportsearch.dynamic-dns.net final.staticd.dynamic-dns.net finallyd.youthinkyouaredecent.oldvideo.longmusic.com find.mktoon.ftp1.biz https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/space-pirates-a-look-into-the-group-s-unconventional-techniques-new-attack-vectors-and-tools/#id4 Page 31 of 40 find.serviechelp.changeip.us first.srv.xxxy.biz fly.chdsjjkrazomg.dhcp.biz flyme.oldvideo.longmusic.com foc.jex.ddns.us follme.www.amazon-corp.wikaba.com forgodsake.oldvideo.longmusic.com forsafeconcern.journal.itsaol.com ftp.1cnet.changeip.co ftp.aace.zzux.com ftp.accountsupport.ftp1.biz ftp.amazon-corp.wikaba.com ftp.anp.ddns.ms ftp.apple-corp.changeip.org ftp.bba.dns04.com ftp.dotnet.almostmy.com ftp.faz.dynamic-dns.net ftp.jmjejij.otzo.com ftp.journal.itsaol.com ftp.miche.justdied.com ftp.nvidia.freewww.biz ftp.oldvideo.longmusic.com ftp.rt.ftp1.biz ftp.staticd.dynamic-dns.net ftp.werwesf.dynamic-dns.net ftp.winsvr.lflinkup.org ftp.wula.zzux.com fucker.www.amazon-corp.wikaba.com fuckinglifs.journal.itsaol.com fx.anp.ddns.ms ggt.jmjejij.otzo.com ggt.wula.zzux.com go.staticd.dynamic-dns.net gofuckyourself.amazon-corp.wikaba.com google.ace1.dynamic-dns.net google.atec.dnset.com google.winsvr.lflinkup.org google.wula.zzux.com google.wulatula.xxxy.biz goole.faz.dynamic-dns.net https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/space-pirates-a-look-into-the-group-s-unconventional-techniques-new-attack-vectors-and-tools/#id4 Page 32 of 40 gooz.noon.dns04.com gov.ace1.dynamic-dns.net gov.atec.dnset.com gov.jmjejij.otzo.com gov.noon.xxxy.biz gov.winsvr.lflinkup.org gov.wula.zzux.com gov.wulatula.xxxy.biz govnmer.0077.x24hr.com grcc.winsvr.lflinkup.org h.mktoon.ftp1.biz heavsick.staticd.dynamic-dns.net hello.noon.dns04.com hello.serviechelp.changeip.us help.chdsjjkrazomg.dhcp.biz help.mktoon.ftp1.biz help.noon.dns04.com help.noon.xxxy.biz hignland.oldvideo.longmusic.com homeportal.reportsearch.dynamic-dns.net hop.mktoon.ftp1.biz hostname.reportsearch.dynamic-dns.net hq.faz.dynamic-dns.net httpproxy.reportsearch.dynamic-dns.net hug.noon.dns04.com hv.dotnet.almostmy.com hyataung.duckdns.org int.jex.ddns.us int.noon.wikaba.com it.jmjejij.otzo.com itissohard.journal.itsaol.com jc.chdsjjkrazomg.dhcp.biz jex.ddns.us jinj.faz.dynamic-dns.net jjton.srv.xxxy.biz jmjejij.otzo.com join.chdsjjkrazomg.dhcp.biz join.mktoon.ftp1.biz join.noon.dns04.com join.srv.xxxy.biz https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/space-pirates-a-look-into-the-group-s-unconventional-techniques-new-attack-vectors-and-tools/#id4 Page 33 of 40 joodte.serviechelp.changeip.us juice.mktoon.ftp1.biz jujic.dotnet.almostmy.com ka.wula.zzux.com kami.atec.dnset.com kami.wulatula.xxxy.biz kamishi.wulatula.xxxy.biz kana.mktoon.ftp1.biz kana.serviechelp.changeip.us katana.serviechelp.changeip.us kingkong.amazon-corp.wikaba.com knowledge.reportsearch.dynamic-dns.net kono.noon.dns04.com kv.aace.zzux.com ladyboy.journal.itsaol.com lan.anp.ddns.ms lan.faz.dynamic-dns.net lan.noon.dns04.com lan.src.ssl443.org land.faz.dynamic-dns.net last.mktoon.ftp1.biz lb.brrkst.dynamic-dns.net lcd.noon.xxxy.biz le.bba.dns04.com life.serviechelp.changeip.us like.serviechelp.changeip.us like.srv.xxxy.biz likeit.chdsjjkrazomg.dhcp.biz lin.aace.zzux.com lin.bba.dns04.com link.serviechelp.changeip.us live.serviechelp.changeip.us localmsk.reportsearch.dynamic-dns.net log.mktoon.ftp1.biz lonely.chdsjjkrazomg.dhcp.biz lt.wulatula.xxxy.biz mail.0077.x24hr.com mail.anp.ddns.ms mail.mktoon.ftp1.biz mail.serviechelp.changeip.us https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/space-pirates-a-look-into-the-group-s-unconventional-techniques-new-attack-vectors-and-tools/#id4 Page 34 of 40 mail.werwesf.dynamic-dns.net mail1.serviechelp.changeip.us mail2.serviechelp.changeip.us mailend.dotnet.almostmy.com mailend.srv.xxxy.biz make.bba.dns04.com mcc.brrkst.dynamic-dns.net mcx.jex.ddns.us mdt.srv.xxxy.biz mf.noon.xxxy.biz mgi.faz.dynamic-dns.net mgimo.1cnet.changeip.co mgo.bba.dns04.com mgo.dynamicdns.edns.biz mgo.jex.ddns.us min.brrkst.dynamic-dns.net mjejij.otzo.com mmmg.chdsjjkrazomg.dhcp.biz mohana.casacam.net moon.mktoon.ftp1.biz mor.noon.wikaba.com mp.noon.dns04.com msk.chdsjjkrazomg.dhcp.biz msk.noon.dns04.com msk.serviechelp.changeip.us msu.anp.ddns.ms nb.dotnet.almostmy.com neg.src.ssl443.org nei.ace1.dynamic-dns.net nei.jmjejij.otzo.com ng.noon.xxxy.biz noo.noon.wikaba.com noon.wikaba.com noon.xxxy.biz npl.dynamicdns.edns.biz ns.mktoon.ftp1.biz ns02.dynamicdns.edns.biz ns05.reportsearch.dynamic-dns.net nvidia.freewww.biz nvidia.nvidia.freewww.biz https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/space-pirates-a-look-into-the-group-s-unconventional-techniques-new-attack-vectors-and-tools/#id4 Page 35 of 40 nz.wulatula.xxxy.biz ohk.journal.itsaol.com ohyeah.dnmd.0077.x24hr.com ohyigaga.oldvideo.longmusic.com oka.faz.dynamic-dns.net oldfucl.oldvideo.longmusic.com olga.winsvr.lflinkup.org one.bba.dns04.com onetwo.mktoon.ftp1.biz opk.anp.ddns.ms opt.bba.dns04.com orl.jex.ddns.us outlook.onmypc.net pdd.jmjejij.otzo.com person.serviechelp.changeip.us pgs.dotnet.almostmy.com pornhub.journal.itsaol.com powergame.0077.x24hr.com ppt.jmjejij.otzo.com pre.noon.wikaba.com prime.1cnet.changeip.co pro.winsvr.lflinkup.org proryv2020.1cnet.changeip.co psq.jex.ddns.us pul.dynamicdns.edns.biz py.dns04.com ram.noon.wikaba.com rest.bba.dns04.com rid.serviechelp.changeip.us romis.wulatula.xxxy.biz rosgvard.py.dns04.com rov.anp.ddns.ms rov.dotnet.almostmy.com rov.noon.dns04.com rov.noon.wikaba.com rov.noon.xxxy.biz rox.noon.wikaba.com roz.noon.wikaba.com ru.serviechelp.changeip.us ru5.fljsm.com https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/space-pirates-a-look-into-the-group-s-unconventional-techniques-new-attack-vectors-and-tools/#id4 Page 36 of 40 ruclient.dns04.com.ruclient.dns04.com sacere.youthinkyouaredecent.oldvideo.longmusic.com sdo.microft.dynssl.com seao.jex.ddns.us search.microft.dynssl.com secured02b-support.ftp1.biz serv.mktoon.ftp1.biz serv.serviechelp.changeip.us server.chdsjjkrazomg.dhcp.biz service.mktoon.ftp1.biz service.noon.dns04.com service.serviechelp.changeip.us seven.chdsjjkrazomg.dhcp.biz shirt.ftp1.biz sim.anp.ddns.ms skvm.serviechelp.changeip.us sms.serviechelp.changeip.us smsreport.microft.dynssl.com somuch.amazon-corp.wikaba.com south.chdsjjkrazomg.dhcp.biz spb.winsvr.lflinkup.org speedtest.reportsearch.dynamic-dns.net sprfilet.microft.dynssl.com src.ssl443.org srcier0wqesj1.microft.dynssl.com sslvpn.microft.dynssl.com stmspeedtest.reportsearch.dynamic-dns.net stp.noon.xxxy.biz surender.mktoon.ftp1.biz svhostlit.reportsearch.dynamic-dns.net sy.noon.wikaba.com ta.noon.xxxy.biz tach.anp.ddns.ms talk.noon.dns04.com task.noon.dns04.com tataka.chdsjjkrazomg.dhcp.biz tax.noon.xxxy.biz tc.chdsjjkrazomg.dhcp.biz tellmesomesotry.oldvideo.longmusic.com test.beachdrivingfun.com https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/space-pirates-a-look-into-the-group-s-unconventional-techniques-new-attack-vectors-and-tools/#id4 Page 37 of 40 test.mktoon.ftp1.biz test.noon.wikaba.com third.srv.xxxy.biz three.brrkst.dynamic-dns.net three.dotnet.almostmy.com tim.bba.dns04.com tom.bba.dns04.com tongton.noon.dns04.com toomuch.brrkst.dynamic-dns.net toon.brrkst.dynamic-dns.net top.noon.dns04.com touch.brrkst.dynamic-dns.net touch.noon.dns04.com tracertoute.reportsearch.dynamic-dns.net tre.dynamicdns.edns.biz tt.oldvideo.longmusic.com tu.wula.zzux.com two.aace.zzux.com tx.wula.zzux.com udp.aace.zzux.com udp.tu.qpoe.com uis.noon.wikaba.com uisp.noon.xxxy.biz up.serviechelp.changeip.us upi.jex.ddns.us usi.jex.ddns.us uua.jex.ddns.us uuee.dotnet.almostmy.com val.mktoon.ftp1.biz veejayofficeds.synology.me vimdoc.reportsearch.dynamic-dns.net vipnet.1cnet.changeip.co vo.wula.zzux.com vo.wulatula.xxxy.biz vris.chdsjjkrazomg.dhcp.biz warp.whatzsofun.com wbbb.oldvideo.longmusic.com wch.anp.ddns.ms web.winsvr.lflinkup.org webdocsshare.microft.dynssl.com https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/space-pirates-a-look-into-the-group-s-unconventional-techniques-new-attack-vectors-and-tools/#id4 Page 38 of 40 webservice.reportsearch.dynamic-dns.net webtest.reportsearch.dynamic-dns.net wifi48-2.loyno.edu wiki.noon.wikaba.com win.outlook.onmypc.net winsvr.lflinkup.org wl.oldvideo.longmusic.com wold.chdsjjkrazomg.dhcp.biz woldt.srv.xxxy.biz wood.chdsjjkrazomg.dhcp.biz wordpress.beachdrivingfun.com world.winsvr.lflinkup.org wserver1.microft.dynssl.com wula.zzux.com wulatula.xxxy.biz www.1cnet.changeip.co www.aace.zzux.com www.accountsupport.ftp1.biz www.alex.dnset.com www.amazon-corp.wikaba.com www.anp.ddns.ms www.bamo.ocry.com www.bba.dns04.com www.beachdrivingfun.com www.dotnet.almostmy.com www.elienceso.kozow.com www.fgjhkergvlimdfg2.wikaba.com www.journal.itsaol.com www.loge.otzo.com www.miche.justdied.com www.microft.dynssl.com www.news.flashplayeractivex.info www.nvidia.freewww.biz www.oldvideo.longmusic.com www.reportsearch.dynamic-dns.net www.rt.ftp1.biz www.secured02b-support.ftp1.biz www.update.flashplayeractivex.info www.veejayofficeds.synology.me www.winsvr.lflinkup.org https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/space-pirates-a-look-into-the-group-s-unconventional-techniques-new-attack-vectors-and-tools/#id4 Page 39 of 40 xdd.wulatula.xxxy.biz xsy.tu.qpoe.com xts.reportsearch.dynamic-dns.net xx.wulatula.xxxy.biz yand.anp.ddns.ms yd.wulatula.xxxy.biz youthinkyouaredecent.oldvideo.longmusic.com yt.journal.itsaol.com yy.jmjejij.otzo.com za.anp.ddns.ms zai.aace.zzux.com zap.bba.dns04.com zhi.aace.zzux.com zim.faz.dynamic-dns.net zip.faz.dynamic-dns.net ziz.faz.dynamic-dns.net zmaiewrdtgfhnn.www.amazon-corp.wikaba.com zmain.www.amazon-corp.wikaba.com zt.wulatula.xxxy.biz zzp.bba.dns04.com Source: https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/space-pirates-a-look-into-the-group-s-unconventional-techniques-new-attack -vectors-and-tools/#id4 https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/space-pirates-a-look-into-the-group-s-unconventional-techniques-new-attack-vectors-and-tools/#id4 Page 40 of 40