Skip to content

Hide Navigation Hide TOC

TwoFace (9334c430-0d83-4893-8982-66a1dc1a2b11)

While investigating a recent security incident, Unit 42 found a webshell that we believe was used by the threat actor to remotely access the network of a targeted Middle Eastern organization. The construction of the webshell was interesting by itself, as it was actually two separate webshells: an initial webshell that was responsible for saving and loading the second fully functional webshell. It is this second webshell that enabled the threat actor to run a variety of commands on the compromised server. Due to these two layers, we use the name TwoFace to track this webshell. During our analysis, we extracted the commands executed by the TwoFace webshell from the server logs on the compromised server. Our analysis shows that the commands issued by the threat actor date back to June 2016; this suggests that the actor had access to this shell for almost an entire year. The commands issued show the actor was interested in gathering credentials from the compromised server using the Mimikatz tool. We also saw the attacker using the TwoFace webshell to move laterally through the network by copying itself and other webshells to other servers.

Cluster A Galaxy A Cluster B Galaxy B Level
TwoFace (9334c430-0d83-4893-8982-66a1dc1a2b11) Tool TwoFace (a98a04e5-1f86-44b8-91ff-dbe1534782ba) Malpedia 1