Pyxie Remote Access Trojan Rat
Pyxie Remote Access Trojan Rat
(RAT)
02/20/2020
Report #: 202002201000
Agenda
• Overview
• Functionality
• Infection Stages
• Commands
• Cobalt Strike
• Historic Activity
• Industry Best Defense and Mitigations
• Indicators of Compromise (IOCs) Image source: ThreatVector
• Yara rule
• References
• Questions
Slides Key:
Non-Technical: managerial, strategic
and high-level (general audience)
Technical: Tactical / IOCs; requiring
in-depth knowledge (sysadmins, IRT)
• Python-based malware
• Utilizes .pyx file extension (instead of .py or
.pyc)
• Active since 2018
• Recent uptick in activity, targeting education
and healthcare
• Actors are unknown, described as a “sophisticated
cyber-criminal operation”; Possibly but not
confirmed to be Shifu operators
• Targets many industry verticals, ultimately
attempting to deliver ransomware – most recently
education and healthcare
COMMAND DESCRIPTION
!load Download and run an executable
!update Update
!update2 Update
!update3 Update
• Commercial penetration testing tool, described as “software for Adversary Simulations and Red Team
Operations”
• Capable of reconnaissance, phishing, keystroke logging, screenshots, file exfiltration, covert
communication, delivering additional payloads and reporting/logging
Develop and maintain policy on suspicious e-mails for end users; Ensure suspicious e-mails are reported. [10.S.A], [10.M.A]
Ensure emails originating from outside the organization are automatically marked before received. [1.S.A], [1.M.A]
Apply patches/updates immediately after release/testing; Develop/maintain patching program if necessary. [7.S.A], [7.M.D]
Implement whitelisting technology to ensure that only authorized software is allowed to execute. [2.S.A], [2.M.A], [2.L.E]
Implement access control based on the principal of least privilege. [3.S.A], [3.M.A], [3.L.C]
Disable the use of SMBv1 (and all other vulnerable services and protocols) and require at least SMBv2. [7.S.A], [7.M.D]
Please note several things about the indicators of compromise (IOCs) on the following slides:
• We have attempted to include a significant sample of indicators of compromise related to PyXie in this
presentation. However, there may be some available to the public not included here. Furthermore,
there are commercial cyber threat analysis companies that release IOCs, many are subscription-
based, to their paying customers. We recommend healthcare organizations consider IOCs that are
freely available as well as those with an associated cost.
• Upon being released to the public, IOCs may become “burned” which is to say that the attackers will
adjust their tactics, techniques and procedures (TTPs), weapons and infrastructure so that the public
IOCs are no longer used.
rule PyXie_RAT
{
meta:
description = "Detects PyXie RAT"
strings:
$mz = "MZ"
$op = {C6 06 68 89 46 01 C7 46 05 9C 81 74 24 C6 46 09 04 89 4E 0A 66 C7 46 0E 9D C3}
condition:
($mz at 0) and $op
}
Upcoming Briefs
• NIST Privacy Framework: A Tool for Improving Privacy through
Enterprise Risk Management
• Wearable Device Security
Product Evaluations
Recipients of this and other Healthcare Sector Cybersecurity Coordination Center (HC3) Threat Intelligence products
are highly encouraged to provide feedback to [email protected].
Products
Sector & Victim Notifications White Papers Threat Briefings & Webinar
Directed communications to victims or Document that provides in-depth information Briefing document and presentation that
potential victims of compromises, vulnerable on a cybersecurity topic to increase provides actionable information on health
equipment or PII/PHI theft and general comprehensive situational awareness and sector cybersecurity threats and mitigations.
notifications to the HPH about currently provide risk recommendations to a wide Analysts present current cybersecurity topics,
impacting threats via the HHS OIG audience. engage in discussions with participants on
current threats, and highlight best practices
and mitigation tactics.
Need information on a specific cybersecurity topic or want to join our listserv? Send your request for
information (RFI) to [email protected] or call us Monday-Friday, between 9am-5pm (EST), at (202) 691-2110.