GhostRedirector: 65+ Windows Servers Compromised to Run SEO-Fraud IIS Malware
ESET uncovered a new threat cluster dubbed GhostRedirector that compromised at least 65 Windows servers (mainly in Brazil, Thailand, and Vietnam) to install a passive C++ backdoor (“Rungan”) and a malicious IIS module (“Gamshen”). The goal wasn’t ransomware—it was SEO fraud as-a-service: the IIS module quietly altered HTTP responses only for Googlebot, creating artificial backlinks to boost third-party (likely gambling) sites. Initial access likely came from SQL injection, followed by PowerShell-delivered tools, local privilege escalation using BadPotato/EfsPotato, and creation of rogue admin users for persistence. ESET assesses medium confidence the actor is China-aligned (hard-coded Chinese strings, China code-signing cert, “huang” password).
What happened (Key Points)
-
Scope: ≥65 Windows servers compromised; victims span education, healthcare, insurance, transport, tech, retail; activity seen since Aug–Dec 2024 and measured in June 2025 scans.
Malware duo:
-
Rungan – passive C/C++ backdoor that waits for specific HTTP patterns and then executes attacker commands.
-
Gamshen – native IIS module that modifies responses for Googlebot to manipulate rankings (SEO fraud).
Access & Persistence: Probable SQLi → PowerShell download from 868id[.]com; BadPotato/EfsPotato for LPE; GoToHTTP for remote access; rogue admin users
- Attribution: New cluster (not previously named), assessed China-aligned (Chinese strings, TrustAsia-signed tools, password “huang”).
Technical Analysis
Initial Access & Tool Delivery
- Likely vector: SQL injection against public-facing apps, evidenced by PowerShell executions originating from
sqlserver.exe/xp_cmdshell. Downloads pulled from a staging domain: 868id[.]com (subdomainsxz/xzs). CertUtil sometimes used.
Privilege Escalation & Persistence
-
LPE: BadPotato / EfsPotato variants, often .NET Reactor-obfuscated, sometimes code-signed by TrustAsia RSA Code Signing CA G3 for Shenzhen Diyuan Technology Co., Ltd. (thumbprint BE2AC4A5156DBD9FFA7A9F053F8FA4AF5885BE3C).
Backdoor: “Rungan”
-
Install path:
C:\ProgramData\Microsoft\DRM\log\miniscreen.dll C2 trigger: registers
http://+:80/v1.0/8888/sys.htmlvia HTTP Server API (bypasses IIS).-
Config file (optional):
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\1033\vbskui.dll(adds more URL patterns). -
Core cmds:
mkuser,listfolder(unfinished),addurl,cmd(usesCreateProcessA). -
Crypto: AES-CBC for string decryption (hard-coded key/IV noted by ESET).
IIS Malware: “Gamshen”
-
Type: Native IIS module (C/C++) in the “Group 13” family of IIS malware.
-
Behavior: Intercepts requests and alters responses only for Googlebot, creating backlinks—similar in concept to IISerpent.
Auxiliary Tools
-
GoToHTTP (legit remote-access tool) for browser-based access.
-
Zunput / SitePuts.exe: enumerates IIS sites and drops multi-language web shells (ASP, PHP, JS) with randomized names and uncommon extensions (e.g., .cer, .pjp).
-
Web shell names observed:
C1.php,Cmd.aspx,Error.aspx,K32.asxp,K64.aspx,LandGrey.asp; randomized names likeXml,Ajax,Sync,Loadapi,Loadhelp,Code,Jsload,Loadcss,Loadjs,Pop3,Imap,Apiwith.cer/.pjp/.asp/.aspx.
Victimology & Intent
-
Countries: Heaviest in Brazil, Thailand, Vietnam; also Peru, U.S. (hosting), Canada, Finland, India, Netherlands, Philippines, Singapore.
-
Sectors: Broad and opportunistic.
-
Monetization: SEO fraud pushing gambling sites.
MITRE ATT&CK (selected)
-
Initial Access: Exploit Public-Facing App (T1190) – likely SQLi.
-
Execution: Command Shell / PowerShell (T1059).
-
Privilege Escalation: Exploitation for Privilege Escalation (T1068) via BadPotato/EfsPotato.
-
Persistence: Create Account (T1136); Server-Side Component (IIS module) (T1505).
-
Defense Evasion: Signed Binary/Code Signing (T1553.002); Obfuscated/Compressed Files (T1027).
-
Command & Control: Web Protocols / application-layer over HTTP (Rungan’s passive trigger).
-
Discovery/Lateral: Website enumeration and shell dropping (tool “Zunput”).
Indicators of Compromise (IOCs)
Network / Domains
-
Staging:
-
868id[.]com(and subdomainsxz.868id[.]com,xzs.868id[.]com) -
cs01[.]shop(hardcoded in Comdai component)
-
-
Rungan passive URL pattern:
-
http://+:80/v1.0/8888/sys.html(HTTP Server API listener)
-
Usernames / Strings
-
Created/modified users:
MysqlServiceEx,MysqlServiceEx2,Admin, sometimesGuestpassword reset + RID hijack -
Pipe name:
salamander_pipe -
Password string observed in samples: “huang” (not to be used defensively alone).
Filenames / Paths
-
C:\ProgramData\Microsoft\DRM\log\miniscreen.dll(Rungan backdoor) -
C:\ProgramData\Microsoft\DRM\log\ManagedEngine64.dll(Gamshen IIS module) -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\1033\vbskui.dll(Rungan config) -
Downloaded LPE tools & helpers in
C:\ProgramData\*.exe Web shells dropped into IIS site physical paths; extensions may include
.cer,.pjp,.asp,.aspx.
Hashes / Samples (SHA-1, per ESET)
-
Rungan backdoor:
28140A5A29EBA098BC6215DDAC8E56EACBB29B69 -
Comdai (Common.Global.DLL):
049C343A9DAAF3A93756562ED73375082192F5A8 -
Zunput / SitePuts.exe:
EE22BA5453ED577F8664CA390EB311D067E47786 -
EfsNetAutoUser.exe (EfsPotato-based):
677B3F9D780BE184528DE5967936693584D9769A -
NetAutoUser.exe (BadPotato-based):
5D4D7C96A9E302053BDFAF2449F9A2AB3C806E63 -
Aug-2024 related sample:
21E877AB2430B72E3DB12881D878F78E0989BB7F -
Alt LPE/web-shell dropper:
9DD282184DDFA796204C1D90A46CAA117F46C8E1 -
Guest-password variant:
5A01981D3F31AF47614E51E6C216BED70D921D60
Certificates
-
TrustAsia RSA Code Signing CA G3 → Shenzhen Diyuan Technology Co., Ltd.
Thumbprint: BE2AC4A5156DBD9FFA7A9F053F8FA4AF5885BE3C
Hardening (short term)
-
Disable
xp_cmdshellunless absolutely required; enforce least privilege for SQL service accounts. -
Patch/virtual-patch SQL injection vectors; place WAF rules for common SQLi patterns.
-
Block unsigned PowerShell; enable Script Block Logging (4104) and Module Logging (4103); alert on
powershellorcertutilpulling from 868id[.]com. -
CI/CD and admin policy to ban non-approved IIS modules; integrity monitor
%windir%\System32\inetsrv\and IIS config.
Longer-term
-
Application security: robust input validation, parameterized queries, DAST+SAST, and RASP where feasible.
-
Certificate control: treat unexpected TrustAsia-signed admin tools as malicious in your environment.
-
SEO hygiene: if you host public sites, monitor for suspicious backlink bursts or crawler-only content

Comments
Post a Comment