Skip to content

IOC Data Obtained From Karakurt Hacking Team's Internal Infrastructure

License

Notifications You must be signed in to change notification settings

infinitumitlabs/Karakurt-Hacking-Team-CTI

Repository files navigation

Karakurt Hacking Team Indicators of Compromise (IOC)

These IOCs were released as part of CTI team research by Infinitum IT. The full report is available here

One of the most valuable pieces of threat intelligence we discovered during this CTI investigation was the the IP address of the data storage and Command and Control Servers used by Karakurt / Conti.

Domain IP
karakurt.co 209.222.98.19
stok-061153.stokermate.com 104.238.61.153

Real IP Address of Onion site used by Karakurt Hacking Team as a public leak page

Onion site IP
lhxxtrqraokn63f3nubhbjrzxkrgduq3qogp3yr424tkpvh3z7n4kcyd.onion 104.243.34.214

Karakurt Leak Site

Data_Karakurt

Following table contains the authentication logs of the subject Karakurt servers with IP 209.222.98.19 and 104.238.61.153

Detected TCP Connections on Karakurt Servers
45.8.119.60
212.220.115.145
5.45.83.32
31.14.40.64
95.170.133.54
1.116.139.11
45.141.84.126
185.5.251.35
49.232.93.149
61.177.173.17
80.93.19.227
139.219.4.103
61.19.125.2
159.65.140.76
23.99.177.202
109.169.14.109
104.243.34.214
37.252.0.143
46.166.143.114

Durring our CTI research on Karakurt / Conti Servers we are able to identify the use of SOCKS proxy pivoting technique with a open source tool called Ligolo-ng against multiple victims.

Following table contains the Ligolo-ng Agent and Command and Control Server used by Karakurt Hacking Team Members

Ligolo-ng Agent and Command and Control Servers
104.194.9.238/download/lig.ext
104.194.9.238:455/download/lig2.ext
104.238.61.153

Source Code of Data Leak Page Used by Karakurt Threat Group [ Update - Published ]

When we connected to the Karakurt Blog Web Server, we saw that all of the stolen data had been categorized by a Software that was being developed by Karakurt members. sQ5iK5_L

Cobalt Strike Server and Malware Samples [Update - Published]

This data has been obtanied from an Encrypted ZIP folder inside Karakurt C2 Server

IP Domian Name
108.177.235.127 kisizo[.]com
VT Link
https://www.virustotal.com/gui/file/b7ae3b6f2c04a8d05478509b5047bf50bd880d32125923f093b2ea65fe48fac1/relations
https://www.virustotal.com/gui/file/8cfdb99185fba9abd91d915425826ca9c6ce360fe68f4c8430c358ceab0acf24/relations

About

IOC Data Obtained From Karakurt Hacking Team's Internal Infrastructure

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published