All Projects → fox-it → Operation Wocao

fox-it / Operation Wocao

Operation Wocao - Indicators of Compromise

Projects that are alternatives of or similar to Operation Wocao

S1EM
This project is a SIEM with SIRP and Threat Intel, all in one.
Stars: ✭ 270 (+831.03%)
Mutual labels:  suricata, yara
Ghidra scripts
Scripts for the Ghidra software reverse engineering suite.
Stars: ✭ 732 (+2424.14%)
Mutual labels:  yara
Stoq
An open source framework for enterprise level automated analysis.
Stars: ✭ 352 (+1113.79%)
Mutual labels:  yara
Multiscanner
Modular file scanning/analysis framework
Stars: ✭ 494 (+1603.45%)
Mutual labels:  yara
Strelka
Real-time, container-based file scanning at enterprise scale
Stars: ✭ 387 (+1234.48%)
Mutual labels:  yara
Die Engine
DIE engine
Stars: ✭ 648 (+2134.48%)
Mutual labels:  yara
Qnsm
QNSM is network security monitoring framework based on DPDK.
Stars: ✭ 334 (+1051.72%)
Mutual labels:  suricata
Didierstevenssuite
Please no pull requests for this repository. Thanks!
Stars: ✭ 856 (+2851.72%)
Mutual labels:  yara
Selks
A Suricata based IDS/IPS distro
Stars: ✭ 707 (+2337.93%)
Mutual labels:  suricata
Yara
The pattern matching swiss knife
Stars: ✭ 5,209 (+17862.07%)
Mutual labels:  yara
Peframe
PEframe is a open source tool to perform static analysis on Portable Executable malware and malicious MS Office documents.
Stars: ✭ 472 (+1527.59%)
Mutual labels:  yara
Suricata Rules
Suricata IDS rules 用来检测红队渗透/恶意行为等,支持检测CobaltStrike/MSF/Empire/DNS隧道/Weevely/菜刀/冰蝎/挖矿/反弹shell/ICMP隧道等
Stars: ✭ 397 (+1268.97%)
Mutual labels:  suricata
Mitigating Web Shells
Guidance for mitigation web shells. #nsacyber
Stars: ✭ 698 (+2306.9%)
Mutual labels:  yara
Yara Python
The Python interface for YARA
Stars: ✭ 368 (+1168.97%)
Mutual labels:  yara
Yargen
yarGen is a generator for YARA rules
Stars: ✭ 795 (+2641.38%)
Mutual labels:  yara
Pulledpork
Pulled Pork for Snort and Suricata rule management (from Google code)
Stars: ✭ 339 (+1068.97%)
Mutual labels:  suricata
Threatingestor
Extract and aggregate threat intelligence.
Stars: ✭ 439 (+1413.79%)
Mutual labels:  yara
Sunburst countermeasures
Stars: ✭ 519 (+1689.66%)
Mutual labels:  yara
Iocs
IoC's, PCRE's, YARA's etc
Stars: ✭ 15 (-48.28%)
Mutual labels:  yara
Holmes Totem
Investigation Planner for fast running analysis with predictable execution time. For example, static analysis.
Stars: ✭ 25 (-13.79%)
Mutual labels:  yara

Operation Wocao - Indicators of Compromise

This repository contains the indicators of compromise related to the Operation Wocao report.

Operation Wocao (我操, “Wǒ cāo”, used as “shit” or “damn”) is the name that Fox-IT uses to describe the hacking activities of a Chinese based hacking group.

The full report can be found here:

Available IOCs

Filename Description
ips.txt The various IPs obversed, either as C2 or as operator IPs.
hashes.txt The hashes for various malicious scripts and binaries.

Available signatures

Filename Description
yara.yar Contains Yara signatures to detect various malicious scripts and binaries.
suricata.rules Contains Suricata signatures to detect XServer and other malicious traffic.

Context for IP addresses

IP Hoster Active period Description
185.244.150.236 Host Sailor 2018 Identified in the memory dump of a compromised machine. Used as a command line argument for a PowerShell backdoor. Also used to access webshells.
217.182.129.156 OVH 2018-2019 Back-connect used by the agent backdoor. Identified based on compromised machines connecting to this IP with a known suspicious client hello value in the TLS handshake. IP is hardcoded.
23.254.211.108 Hostwinds 2018-2019 Used to connect to a VPN concentrator with stolen credentials.
108.61.179.160 Choopa / Vultr 2018-2019 Used to connect to a VPN concentrator with stolen credentials.
198.46.140.26 ColoCrossing 2018-2019 Used to connect to a VPN concentrator with stolen credentials.
31.222.185.215 Rackspace 2018-2019 Used to access webshells.
45.77.229.10 Choopa / Vultr 2018-2019 Used to access webshells.
46.101.153.58 Digital Ocean 2018-2019 Used to access webshells.
62.141.37.236 myLoc 2018-2019 Used to access webshells.
95.179.161.243 Vultr 2018-2019 Used to access webshells.
138.68.144.161 Digital Ocean 2018-2019 Used to access webshells.
185.191.228.108 Cogent Communications 2018-2019 Used to access webshells.
209.97.140.206 Alameda 2018-2019 Used to access webshells.
46.182.106.190 Tor exit node * Used to access webshells.
141.255.162.36 Tor exit node * Used to access webshells.
185.220.101.0 Tor exit node * Used to access webshells.
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].