You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The Storm-2603 actor created a **dual-channel C2 ("AK47C2")** that abuses *only* outbound **DNS** and **plain HTTP POST** traffic – two protocols that are rarely blocked on corporate networks.
548
+
549
+
1.**DNS mode (AK47DNS)**
550
+
• Generates a random 5-character SessionID (e.g. `H4T14`).
551
+
• Prepends `1` for *task requests* or `2` for *results* and concatenates different fields (flags, SessionID, computer name).
552
+
• Each field is **XOR-encrypted with the ASCII key `VHBD@H`**, hex-encoded, and glued together with dots – finally ending with the attacker-controlled domain:
• The whole blob is XOR-`VHBD@H` → hex → sent as the body of a **`POST /`** with header `Content-Type: text/plain`.
568
+
• The reply follows the same encoding and the `cmd` field is executed with `cmd.exe /c <command> 2>&1`.
569
+
570
+
Blue Team notes
571
+
• Look for unusual **TXT queries** whose first label is long hexadecimal and always end in one rare domain.
572
+
• A constant XOR key followed by ASCII-hex is easy to detect with YARA: `6?56484244?484` (`VHBD@H` in hex).
573
+
• For HTTP, flag text/plain POST bodies that are pure hex and multiple of two bytes.
574
+
575
+
{{#note}}
576
+
The entire channel fits inside **standard RFC-compliant queries** and keeps each sub-domain label under 63 bytes, making it stealthy in most DNS logs.
577
+
{{#endnote}}
578
+
545
579
## ICMP Tunneling
546
580
547
581
### Hans
@@ -792,6 +826,7 @@ Because Tiny Core is stateless, attackers usually:
792
826
## References
793
827
794
828
- [Hiding in the Shadows: Covert Tunnels via QEMU Virtualization](https://trustedsec.com/blog/hiding-in-the-shadows-covert-tunnels-via-qemu-virtualization)
829
+
- [Check Point Research – Before ToolShell: Exploring Storm-2603’s Previous Ransomware Operations](https://research.checkpoint.com/2025/before-toolshell-exploring-storm-2603s-previous-ransomware-operations/)
## Bring Your Own Vulnerable Driver (BYOVD) – Killing AV/EDR From Kernel Space
643
+
644
+
Storm-2603 leveraged a tiny console utility known as **Antivirus Terminator** to disable endpoint protections before dropping ransomware. The tool brings its **own vulnerable but *signed* driver** and abuses it to issue privileged kernel operations that even Protected-Process-Light (PPL) AV services cannot block.
645
+
646
+
Key take-aways
647
+
1.**Signed driver**: The file delivered to disk is `ServiceMouse.sys`, but the binary is the legitimately signed driver `AToolsKrnl64.sys` from Antiy Labs’ “System In-Depth Analysis Toolkit”. Because the driver bears a valid Microsoft signature it loads even when Driver-Signature-Enforcement (DSE) is enabled.
4. **Why it works**: BYOVD skips user-mode protections entirely; code that executes in the kernel can open *protected* processes, terminate them, or tamper with kernel objects irrespective of PPL/PP, ELAM or other hardening features.
674
+
675
+
Detection / Mitigation
676
+
• Enable Microsoft’s vulnerable-driver block list (`HVCI`, `Smart App Control`) so Windows refuses to load `AToolsKrnl64.sys`.
677
+
• Monitor creations of new *kernel* services and alert when a driver is loaded from a world-writable directory or not present on the allow-list.
678
+
• Watch for user-mode handles to custom device objects followed by suspicious `DeviceIoControl` calls.
679
+
680
+
## References
681
+
682
+
- [Check Point Research – Before ToolShell: Exploring Storm-2603’s Previous Ransomware Operations](https://research.checkpoint.com/2025/before-toolshell-exploring-storm-2603s-previous-ransomware-operations/)
0 commit comments