Skip to main content

OSINT - OilRig Deploys “ALMA Communicator” – DNS Tunneling Trojan

Low
Published: Wed Nov 08 2017 (11/08/2017, 00:00:00 UTC)
Source: CIRCL
Vendor/Project: misp-galaxy
Product: threat-actor

Description

Unit 42 has been closely tracking the OilRig threat group since May 2016. One technique we’ve been tracking with this threat group is their use of the Clayslide delivery document as attachments to spear-phishing emails in attacks since May 2016. In our April 2017 posting OilRig Actors Provide a Glimpse into Development and Testing Efforts we showed how we observed the OilRig threat group developing and refining these Clayside delivery documents.

AI-Powered Analysis

AILast updated: 06/18/2025, 19:36:05 UTC

Technical Analysis

The OilRig threat group, tracked since May 2016, is known for its targeted spear-phishing campaigns primarily using Clayslide delivery documents as attachments. These documents serve as the initial infection vector, enabling the deployment of malware onto victim systems. A notable development in their toolkit is the deployment of the “ALMA Communicator,” a DNS tunneling Trojan. DNS tunneling is a technique that encodes data within DNS queries and responses, allowing malware to bypass traditional network security controls by blending malicious traffic with legitimate DNS traffic. This method facilitates stealthy command and control (C2) communication and data exfiltration. The use of DNS tunneling by OilRig indicates a sophisticated approach to maintaining persistence and covert communication channels within compromised networks. Although the publicly available information does not specify affected software versions or detailed technical indicators, the historical use of spear-phishing with weaponized documents suggests that the initial compromise relies heavily on social engineering and exploitation of user trust. The Trojan’s reliance on DNS tunneling also implies that network monitoring and traditional signature-based detection may be insufficient without specialized DNS traffic analysis. The threat level assigned by the source is low, reflecting perhaps the targeted nature of the attacks and the absence of widespread exploitation. However, the stealth and persistence capabilities of the ALMA Communicator Trojan pose a significant risk to targeted organizations.

Potential Impact

For European organizations, the OilRig group’s use of DNS tunneling malware like ALMA Communicator can lead to significant confidentiality breaches due to covert data exfiltration. The Trojan’s stealthy communication channel can evade conventional network defenses, allowing attackers to maintain long-term access and potentially escalate privileges or move laterally within networks. This can result in intellectual property theft, exposure of sensitive personal or corporate data, and disruption of business operations. Given the spear-phishing vector, employees are at risk of targeted social engineering attacks, which can compromise endpoints and internal systems. The impact is particularly critical for sectors with sensitive information such as government, defense, energy, and critical infrastructure, where OilRig has historically focused. Although the severity is rated low overall, the potential for undetected persistent access and data leakage presents a medium to high risk for affected organizations if not properly mitigated.

Mitigation Recommendations

1. Implement advanced DNS monitoring and anomaly detection tools capable of identifying unusual DNS query patterns indicative of tunneling activity. 2. Employ network segmentation to limit lateral movement if a breach occurs. 3. Harden email security by deploying robust anti-phishing solutions, including sandboxing of attachments and URL rewriting to detect malicious payloads. 4. Conduct regular user awareness training focused on spear-phishing recognition and safe handling of email attachments. 5. Utilize endpoint detection and response (EDR) solutions with behavioral analytics to detect suspicious processes related to document exploitation and DNS tunneling. 6. Enforce strict egress filtering on DNS traffic, allowing DNS queries only to authorized resolvers and blocking direct external DNS queries from endpoints. 7. Maintain up-to-date patching of all software, especially document readers and email clients, to reduce exploitation vectors. 8. Establish incident response playbooks specifically addressing DNS tunneling detection and containment. 9. Regularly review and audit DNS logs and network traffic for signs of covert channels. These measures go beyond generic advice by focusing on the unique characteristics of DNS tunneling and spear-phishing delivery methods used by OilRig.

Need more detailed analysis?Get Pro

Technical Details

Threat Level
3
Analysis
2
Uuid
5a04081b-1654-407b-80f9-46a9950d210f
Original Timestamp
1510215719

Indicators of Compromise

Link

ValueDescriptionCopy
linkhttps://researchcenter.paloaltonetworks.com/2017/11/unit42-oilrig-deploys-alma-communicator-dns-tunneling-trojan/
linkhttps://www.virustotal.com/file/f37b1bbf5a07759f10e0298b861b354cee13f325bc76fbddfaacd1ea7505e111/analysis/1510205105/
Clayslide - Xchecked via VT: f37b1bbf5a07759f10e0298b861b354cee13f325bc76fbddfaacd1ea7505e111

Comment

ValueDescriptionCopy
commentUnit 42 has been closely tracking the OilRig threat group since May 2016. One technique we’ve been tracking with this threat group is their use of the Clayslide delivery document as attachments to spear-phishing emails in attacks since May 2016. In our April 2017 posting OilRig Actors Provide a Glimpse into Development and Testing Efforts we showed how we observed the OilRig threat group developing and refining these Clayside delivery documents.

Hash

ValueDescriptionCopy
hashf37b1bbf5a07759f10e0298b861b354cee13f325bc76fbddfaacd1ea7505e111
Clayslide
hashfdf5cda685a6adee0cb8afb8e080f1de472effda
Clayslide - Xchecked via VT: f37b1bbf5a07759f10e0298b861b354cee13f325bc76fbddfaacd1ea7505e111
hashf4de44ed5e6c4c6f19fba5856f0dac40
Clayslide - Xchecked via VT: f37b1bbf5a07759f10e0298b861b354cee13f325bc76fbddfaacd1ea7505e111
hash2fc7810a316863a5a5076bf3078ac6fad246bc8773a5fb835e0993609e5bb62e
hash2d6f06d8ee0da16d2335f26eb18cd1f620c4db3e880efa6a5999eff53b12415c

Domain

ValueDescriptionCopy
domainprosalar.com

File

ValueDescriptionCopy
filecfg
file_DnsInit.bat
fileSystemSyncs.exe
filem6.e

Ip

ValueDescriptionCopy
ip36.37.94.33
ip33.33.94.94

Text

ValueDescriptionCopy
textHarmless

Threat ID: 682b810a8ee1a77b717bdef7

Added to database: 5/19/2025, 7:05:46 PM

Last enriched: 6/18/2025, 7:36:05 PM

Last updated: 8/15/2025, 5:58:14 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats