2024-07-06
Unmasking potential 8Base infra and ACH. We identified a potential 8Base infrastructure and analyzed using ACH to determine its association with the ransomware group.
Recent victims include multiple Japanese companies. Active since March 2022. First known ransom demand: 2023-05-23.
services.http.response.headers: (key: Set-Cookie and value.headers: 8base_session*)
Single IP identified: 92.118.36.204
First seen:
Can this be the ip address hosting 8base contents?
| Indicator | Details |
|---|---|
| IP | 92.118.36.204 |
| ASN | 209132 (Alviva Holding Limited) |
| Ports1 | 22/SSH, 53/DNS, 80/HTTP, 3389/RDP, 5985/HTTP, 5358/HTTP |
| Historical activity | Port scanning: 2022-04-07 to 2022-09-16 |
| Cookies | 8base_session, fakeIP |
The ip was running RDP on port 33891.
Remote Desktop Protocol
\x03\x00\x00\x13\x0e\xd0\x00\x00\x124\x00\x02\x1f\x08\x00\x08\x00\x00\x00
Flag: PROTOCOL_HYBRID_EX
Target_Name: WIN-9Q7DGOLE4A8
Product_Version: 10.0.17763 Ntlm 15
OS: Windows Server 2019, Version 1809/Windows 10, Version 1809
NetBIOS_Domain_Name: WIN-9Q7DGOLE4A8
NetBIOS_Computer_Name: WIN-9Q7DGOLE4A8
DNS_Domain_Name: WIN-9Q7DGOLE4A8
DNS_Computer_Name: WIN-9Q7DGOLE4A8
System_Time: 2023-04-17 16:51:20 +0000 UTC
Analysis of Competing Hypotheses (ACH) is a structured analytical technique for evaluating multiple explanations for observed intelligence data.
8base_sessionfakeIP92.118.36.203 2| Evidences | Weight | H1. 8Base infrastructure | H2. Clone/similar operation | H3. 8Base victim |
|---|---|---|---|---|
| E1. IP hosts the 8base resource | HIGH | ++ | + | - |
E2. Uses cookie 8base_session |
HIGH | ++ | + | - |
E3. Uses cookie fakeIP |
MEDIUM | ++ | + | - |
| E4. Doesn’t have onion header | LOW | - | + | N |
| E5. Has RDP with hostname WIN-9Q7DGOLE4A8 | MEDIUM | + | + | ++ |
| E6. Located in ASN 209132 (Alviva Holding Limited) | LOW | N | N | N |
| E7. Hosting since 2023-11-08 | MEDIUM | + | + | - |
| E8. First known ransom is 2023-05-23 | LOW | N | N | N |
| E9. Historical port scanning (2022-04-07 to 2022-09-16) | MEDIUM | - | + | - |
| E10. Running Windows Server 2019/Windows 10 | LOW | N | N | + |
| E11. System time: 2023-04-17 16:51:20 UTC | LOW | N | N | N |
| E12. Nearby Cobalt Strike server | LOW | N | + | - |
Legend: ++ Strong support, + Support, N Neutral, - Contradict
This analysis suggests 92.118.36.204 is likely 8Base infrastructure, but clone operation remains a possibility.
With ❤️, Jeremie Wolff (cdmMPvpP1zZytZw1qB2UkESatsIlnxR40b3KsML6lx)
Ports 22 and 80 are still active (2024-07-06). 3389/RDP, 5985/HTTP, 5358/HTTP were last active at 2023-04-16.↩︎
https://www.virustotal.com/gui/ip-address/92.118.36.203/community↩︎