The best Etumbot APT Backdoor review

The Arbor Networks has published a report on the Etumbot APT Backdoor. The Etumbot APT Backdoor is used in targeted cyber-attacks.

The first time the Etumbot was seen was in March, 2011.

The Arbor Network report provides insight in the capabilities and techniques which are used by the Etumbot APT Backdoor.

The authors of the Arbor Network report explain that the Etumbot APT Backdoor name might confuse a lot of people. This is because of the reason which is mentioned below:

The variety of names for this malware could lead to some confusion about the actual threat. ASERT has associated Etumbot with IXESHE, and therefore Numbered Panda, based on similar system and network
artifacts that are common between the malware families.

The mentioned malware families use the same log files: 

  • ka4281x3.log
  • kb71271.log

The Etumbot APT report explains that both the families have been using the same command and control servers. These command and control servers are used to target specific victim populations with the malware attack methodologies.

Primary components in the Etumbot APT backdoor malware

  • Dropper
  • Distraction file

The Arbor Network researchers explain that the Etumbot APT backdoor works in various stages:

Stage one has been seen to leverage the Unicode Right to Left Override trick combined with convincing icons for various types of PDFs or Microsoft Office documents to convince the user to click and therefore execute the malware, which then runs the backdoor and displays the distraction file. As with the IXESHE malware, Etumbot has been observed dropping documents of interest to a Taiwanese and Japanese target population.

The second stage is the Distraction stage

The Etumbot APT Backdoor uses GET requests to control the availability of the Command and Control server. The Etumbot APT Backdoor does this 39 times in 61 million HTTP requests.

The beacon takes the form of a GET  request to /home/index.asp?typeid=N where N is a randomly selected odd number between 1 and 13. If
the C&C is online, the decoded response payload will contain the RC4 key that is used to encrypt subsequent communication. If the C&C does not send a valid response, the bot will re-send the initial request every 45 seconds.

Distraction stage of the Etumbot APT backdoor
Distraction stage of the Etumbot APT backdoor

Md5 hashes from the Etumbot APT Backdoor

  • ca838b98ca0f516858a8a523dcd1338d
  • 986937eb4052562cdd3960dd8fffc481
  • 5ef508d0ca7759ecf602192521fff287
  • d08c54ed480c9cd8b35eab2f278e7a28
  • 82d4850a02375a7447d2d0381b642a72
  • 4c703a8cfeded7f889872a86fb7c70cf
  • 063b6076c69ce3ba4f116d1ad51da2b5
  • 232b659e28c5e06ad5466c01aec35cb6
  • 1e8fba674761371cb9e88962dcb851c0
  • 7a698acebcf19b55170f05388a2f7fe0
  • ff5a7a610746ab5492cc6ab284138852
  • cd33c5467d425f662f57672531701d89
  • 1ce47f76fca26b94b0b1d74610a734a4
  • ac22aa007081caeb8970aefba7eddfcf
  • 1498c9761fc819d496171c71604c2128
  • 2b3a8734a57604e98e6c996f94776086
  • 9b42968e9a7646feb7db318713271718
  • 04908c6853cb5c9d7dccaf15fb5fd3bb
  • d444be30d2773b23de38ead1f2c6d117
  • 86ef188537f5e4637df24336c9b21cb0
  • e7d960060d602deb53c7d49d2002c4a4
  • 5340fcfb3d2fa263c280e9659d13ba93
  • a6b4b679a51627ce279d5107c20dd078
  • 88653dde22f723934ea9806e76a1f546
  • b3830791b0a397bea2ad943d151f856b
  • beb16ac99642f5c9382686fd8ee73e00

Download the Arbor Networks Etumbot APT report from the official website

MIRROR on Cyberwarzone:

Share this information