User Tools

Site Tools


squid:alerts:et_trojan_dns_reply_sinkhole_-_anubis_-_195.22.26.192_26

Squid - Alerts - ET TROJAN DNS Reply Sinkhole - Anubis - 195.22.26.192/26

About the Anubis Sinkhole

What is a Sinkhole?

When you type a domain name like “google.com” into your browser’s address bar, your computer generates a DNS request to turn that name into an IP address.

The same process happens when your computer is infected with a malicious program, and that program wants to communicate with the control server by domain name.

A sinkhole is where a defender has successfully taken control of the the malicious domain name, and redirected it to a benign server that gathers information about the infected system.

The Anubis Networks Sinkhole is one such server.

You may see an infected host attempting to resolve eksyghskgsbakrys[.]com, and then we see the response points at 195.22.26.248.


AnubisNetworks Sinkhole

A search of this IP address returns no clear result as to the identity of this sinkhole.

João Gouveia, CTO of AnubisNetworks reveals that not every host sinkholed at this particular IP address is malicious, whereas connections to other IP addresses owned by Anubis Networks sinkhole could be considered 100% malicious.

Furthermore, he reveals that the sinkhole sets a cookie (snkz=), as well as deploys custom HTML/JS to collect browser metadata.

You can find more information from João in an interview with BitSight about the sinkhole infrastructure.


Sinkhole IDS Events

The following alerts can be triggered when a system attempts to interact with a sinkholed system or domain:

ET TROJAN Connection to AnubisNetworks Sinkhole IP (Possible Infected Host)
ET TROJAN AnubisNetworks Sinkhole HTTP Response - 195.22.26.192/26
ET TROJAN AnubisNetworks Sinkhole TCP Connection
ET TROJAN AnubisNetworks Sinkhole UDP Connection
ET TROJAN AnubisNetworks Sinkhole SSL Cert lolcat - specific IPs
ET TROJAN DNS Reply Sinkhole - Anubis - 195.22.26.192/26
ET TROJAN Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz

These alerts can be tricky to investigate for a couple of reasons. Firstly, the system that generates the DNS request can be the infected system, but it can also be a DNS server making the request on behalf of the infected system.

Secondly, some rules fire on the query response, so an alert may have 8.8.8.8, 8.8.4.4, or another popular public resolver as the src IP.

You may also find the src/dst IP is your DNS server or perhaps even a domain controller, so you’ll need to investigate the systems that use your DNS server.


In closing

Anubis Networks have been a security vendor for a long time, and experience has shown that the domains sinkholed by them are malicious, and always worthy of further investigation.

There are other sinkholes in operation, and overall they provide an excellent defense and high fidelity alerts to blue teams.


References

squid/alerts/et_trojan_dns_reply_sinkhole_-_anubis_-_195.22.26.192_26.txt · Last modified: 2020/07/15 09:30 by 127.0.0.1

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki