Skip to main content

KuGou trojan backdoor campaign aim RDP on HFS panels

Medium
Published: Mon May 18 2020 (05/18/2020, 00:00:00 UTC)
Source: CIRCL
Vendor/Project: tlp
Product: white

Description

KuGou trojan backdoor campaign aim RDP on HFS panels

AI-Powered Analysis

AILast updated: 06/19/2025, 14:17:40 UTC

Technical Analysis

The KuGou trojan backdoor campaign targets Remote Desktop Protocol (RDP) services on HTTP File Server (HFS) panels, deploying a trojan downloader and backdoor malware. This campaign leverages HFS, a lightweight web server often used for file sharing, as a vector to distribute malicious payloads. The attack involves delivering payloads through compromised or maliciously controlled HFS instances, with distribution infrastructure observed primarily via IP addresses located in the USA. The malware establishes command and control (C2) communication channels using domains such as a222222.f3322.net and moqi.f3322.net, and an identified C2 IP address 111.229.231.218. Payloads are identified by multiple hashes and filenames including '1521' and 'NetSyst96.dl'. The trojan functions as both a downloader and a backdoor, enabling attackers to remotely control infected systems, potentially escalating privileges, exfiltrating data, or pivoting within networks. The campaign does not have known exploits in the wild beyond the initial infection vector, and no patches are currently available to directly remediate the threat. The attack requires exploitation of exposed RDP services on systems running HFS panels, which may be misconfigured or inadequately secured. The threat level is assessed as medium, reflecting moderate risk due to the targeted nature of the attack and the reliance on RDP access, which often requires valid credentials or weak authentication mechanisms. Indicators of compromise include specific IP addresses, domains, and file hashes that can be used for detection and response efforts.

Potential Impact

For European organizations, the KuGou trojan backdoor campaign poses a risk primarily to systems exposing RDP services integrated with HFS panels, which may be used in internal file sharing or administrative functions. Successful compromise could lead to unauthorized remote access, allowing attackers to execute arbitrary commands, move laterally, and potentially exfiltrate sensitive data. The impact on confidentiality is moderate, as attackers could access files and credentials stored on compromised systems. Integrity could be affected if attackers modify or delete files or system configurations. Availability impact is likely limited to targeted systems but could include service disruptions if attackers deploy further payloads or ransomware. Given the campaign's use of backdoor functionality, persistent access could be maintained, complicating incident response. However, the absence of widespread exploitation and the requirement for exposed RDP services limit the overall scope. European organizations with poor RDP security practices or those using HFS panels for file sharing are at higher risk. The campaign could also serve as a foothold for more advanced attacks, especially in sectors with critical infrastructure or sensitive data, such as finance, manufacturing, or government agencies.

Mitigation Recommendations

1. Restrict and monitor RDP access: Implement network-level restrictions such as VPNs or jump hosts to limit RDP exposure to trusted users only. 2. Enforce strong authentication: Use multi-factor authentication (MFA) for all RDP sessions to prevent unauthorized access via stolen or weak credentials. 3. Harden HFS configurations: Disable or restrict HFS panels from public internet exposure; ensure they are updated to the latest versions and configured securely with strong access controls. 4. Network segmentation: Isolate systems running HFS and RDP services from critical network segments to limit lateral movement. 5. Deploy endpoint detection and response (EDR): Use EDR solutions to detect known payload hashes and suspicious network activity related to the identified C2 domains and IPs. 6. Monitor network traffic: Set up alerts for connections to the known C2 domains (a222222.f3322.net, moqi.f3322.net) and IP addresses, and investigate any anomalies. 7. Regularly audit and update credentials: Rotate passwords for RDP accounts and disable unused accounts to reduce attack surface. 8. Incident response readiness: Prepare playbooks for detecting and responding to backdoor infections, including forensic analysis of affected systems. 9. User awareness: Train administrators and users on risks of exposing RDP and using insecure file sharing services like HFS without proper security controls. 10. Consider alternative secure file sharing solutions that provide better security controls and logging.

Need more detailed analysis?Get Pro

Technical Details

Threat Level
2
Analysis
1
Uuid
5ec2382b-1f78-40cf-b07b-4d5d950d210f
Original Timestamp
1589787453

Indicators of Compromise

Ip

ValueDescriptionCopy
ip192.161.86.218
Payload distribution in HFS via USA network (as TTP)
ip162.209.193.211
Payload distribution in HFS via USA network (as TTP)
ip111.229.231.218
C2 IPv4

Domain

ValueDescriptionCopy
domaina222222.f3322.net
C2
domainmoqi.f3322.net
C2

Hash

ValueDescriptionCopy
hashca3f461b313f3daec1f01a901b56c24e
payloads
hashd5a36d65adf01a8bbad1546c3e113695
payloads
hash27ce0cd60fd409023e84fcbd03b113c0
payloads
hash8c19d83ff359a1b77cb06939c2e5f0cb
payloads
hash1444bebbb5deb71e3243aec2ac0d78e5
payloads

File

ValueDescriptionCopy
file1521
Payload filenames
fileNetSyst96.dl
Payload filenames

Link

ValueDescriptionCopy
linkhttps://twitter.com/malwaremustd1e/status/1262274362872229888
Threat anouncement w/screenshots

Threat ID: 682c7adde3e6de8ceb778a23

Added to database: 5/20/2025, 12:51:41 PM

Last enriched: 6/19/2025, 2:17:40 PM

Last updated: 8/12/2025, 10:30:41 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats