Noodle RAT: Evaluation of the Recent Backdoor Utilized by Mandarin-Speaking Groups

Access Point Instructions
Throughout our examination, we unearthed varying kinds of Win.NOODLERAT that execute different command categorizations.

Noodle RAT: Reviewing the New Backdoor Used by Chinese-Speaking Groups

Access Point Instructions

Throughout our examination, we unearthed varying kinds of Win.NOODLERAT that execute different command categorizations. Through one of the commands received post-successful validation by the C&C server, we segregated them into two groups: Type 0x03A2 and Type 0x132A. The backdoor functionality is executed employing a blend of main-ID and non-obligatory sub-ID. Provided below is Table 1 detailing the backdoor commands:
 

Activities

Type 0x03A2

Type 0x132A

Main-ID

Sub-ID

Main-ID

Sub-ID

Authorized successfully

0x03A2

0x132A

End of command message

0x0AC3

0x1AC3

Initialize metadata module

0x194C

0x294C

Retrieve module information

0x1AF2

0x2AC8

Initiate module without pipe

0x1397

0x230E

Remove module metadata

0x1D50

0x2D06

Transfer file to C&C server

0x390A

0x35C3 & 0x35C4 & 0x3013

0x590A

0x55C3 & 0x55C4 & 0x5013

Enumerate directories recursively

0x390A

0x35C5

0x590A

0x55C5

Table 1. Run-through of Win.NOODLERAT’s backdoor instructions

The first type, Type 0x03A2, encompasses the majority of commands except for the final one, self-deletion. This variant of Win.NOODLERAT was utilized by Iron Tiger and various unspecified clusters for surveillance purposes, hinting at a potential shared iteration of the software.

The second type, Type 0x132A, incorporates all functionalities. Specifically adopted by Calypso APT, this version of Win.NOODLERAT is perceived to be an exclusive release.

When comparing the command IDs, we noticed resemblances amidst some. For example, the command IDs for file uploading to the C&C server are 0x390A and 0x590A respectively; this parallelism might suggest versioning but lacks concrete evidence to support such a claim.

Linux.NOODLERAT

Linux.NOODLERAT is an ELF adaptation of Noodle RAT, albeit with a distinct blueprint. This backdoor has been harnessed by diverse factions for various motives, including Rocke (Iron Cybercrime Group) for fiscal gains

Cloud Snooper Campaign for espionage, and an unidentified group for espionage objectives. Given its distinct design, the backdoor capabilities of Linux.NOODLERAT also differ slightly:

  • Remote shell
  • Retrieve & Dispatch files
  • Execution scheduling
  • SOCKS tunneling

Initialization

Typically, Linux.NOODLERAT was deployed as an added payload of an exploit targeting public-facing applications. Post-deployment, the backdoor duplicates itself to /tmp/CCCCCCCC and engages in process name obfuscation by overwriting “argv.” It then decrypts the embedded config using RC4 with the hardcoded key, “r0st@#$.” The decrypted config is structured as depicted in the diagram below; Linux.NOODLERAT will connect to the designated C&C server based on the config.

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.