text
stringlengths 4
429
|
---|
By Rohit Varma, McAfee Labs
|
Contents
|
Overview ............................................................................................................................. 2
|
McAfee detection names for Aurora................................................................................... 3
|
Exploit-Comele ........................................................................................................... 3
|
Roarur.dr ..................................................................................................................... 3
|
Roarur.dll .................................................................................................................... 3
|
Symptoms ........................................................................................................................... 5
|
Characteristics ..................................................................................................................... 5
|
Common filenames and hashes ........................................................................................... 6
|
McAfee product coverage for Aurora ................................................................................. 7
|
Common URLs accessed. ................................................................................................. 10
|
Appendix A: Useful URLs related to Aurora ................................................................... 11
|
Combating Aurora
|
Overview
|
Operation Aurora,
|
released the week of January 11, exploits the recent Microsoft
|
Internet Explorer vulnerability. The attack was initially targeted at several large
|
companies, including Google. It is now public and is available on the web. The public
|
release significantly increases the possibility of widespread attacks exploiting the
|
vulnerability, putting Internet Explorer users at potentially serious risk.
|
Microsoft is aware of the targeted attacks and lists the following combinations as
|
vulnerable: Internet Explorer 6 Service Pack 1 on Microsoft Windows 2000 Service Pack
|
4, and Internet Explorer 6, Internet Explorer 7 and Internet Explorer 8 on supported
|
editions of Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008,
|
Windows 7, and Windows Server 2008 R2.
|
http://www.microsoft.com/technet/security/advisory/979352.mspx
|
Below we have a summary of McAfee
|
s assessment of Internet Explorer and platform
|
risks:
|
* DEP
|
Data Execution Prevention (DEP) is a set of hardware and software technologies that
|
perform additional checks on memory to help prevent malicious code from running
|
on a system. In Microsoft Windows XP Service Pack 2 (SP2) and Microsoft
|
Windows XP Tablet PC Edition 2005, DEP is enforced by hardware and by software.
|
The primary benefit of DEP is to help prevent code execution from data pages.
|
Typically, code is not executed from the default heap and the stack. Hardwareenforced DEP detects code that is running from these locations and raises an
|
exception when execution occurs. Software-enforced DEP can help prevent malicious
|
code from taking advantage of exception-handling mechanisms in Windows.
|
McAfee detection names for Aurora
|
Exploit-Comele
|
This maliciously crafted script attempts to exploit the vulnerability when Internet
|
Explorer handles certain DOM operations.
|
An attacker may exploit this issue to execute remote code.
|
http://vil.nai.com/vil/content/v_253210.htm
|
Roarur.dr
|
This Trojan drops further malicious files onto the victim
|
s computer.
|
http://vil.nai.com/vil/content/v_253415.htm
|
Roarur.dll
|
This Trojan is dropped by the roarur.dr Trojan.
|
The dll creates an additional service on the victim
|
s computer and checks for certain files
|
on the system. The files it looks for are
|
acelpvc.dll (presence of this file does not necessarily imply an infection ) . acelpvc.dll
|
is used to stream live desktop feeds to the attacker
|
VedioDriver.dll (presence of this file does not necessarily imply an infection )- Helper
|
dll for acelpvc.dll
|
http://vil.nai.com/vil/content/v_253416.htm
|
Aliases
|
Trojan.Hydraq
|
Symptoms
|
Outbound network connections to
|
hxxp://demo[remove].jpg
|
The presence of the following files:
|
%SystemDir%\Rasmon.dll
|
%SYSDIR%\DFS.bat
|
The presence of the following registry keys:
|
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RaS[%
|
random 4 chars %]
|
"ImagePath" = %SystemRoot%\svchost.exe -k netsvcs
|
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RaS[%
|
random 4 chars %]
|
"Start"= 02, 00, 00, 00
|
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RaS[%
|
random 4 chars %]\Parameters "ServiceDll" = %SystemRoot%\rasmon.dll
|
Characteristics
|
Aurora demonstrates these four infection characteristics:
|
Common filenames and hashes
|
securmon.dll:
|
E3798C71D25816611A4CAB031AE3C27A
|
Rasmon.dll:
|
0F9C5408335833E72FE73E6166B5A01B
|
a.exe:
|
CD36A3071A315C3BE6AC3366D80BB59C
|
b.exe
|
9F880AC607CBD7CDFFFA609C5883C708
|
AppMgmt.dll
|
6A89FBE7B0D526E3D97B0DA8418BF851
|
A0029670.dll
|
3A33013A47C5DD8D1B92A4CFDCDA3765
|
msconfig32.sys
|
7A62295F70642FEDF0D5A5637FEB7986
|
VedioDriver.dll
|
467EEF090DEB3517F05A48310FCFD4EE
|
acelpvc.dll
|
4A47404FC21FFF4A1BC492F9CD23139C
|
wuauclt.exe
|
69BAF3C6D3A8D41B789526BA72C79C2D
|
jucheck.exe
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.