text
stringlengths
4
429
amd[dot]homeunix[dot]com
amt1[dot]homelinux[dot]com
amt1[dot]homeunix[dot]org
aop01[dot]homeunix[dot]com
aop1[dot]homelinux[dot]com
asic1[dot]homeunix[dot]com
bdc[dot]homeunix[dot]com
corel[dot]ftpaccess[dot]cc
ddd1[dot]homelinux[dot]com
demo1[dot]ftpaccess[dot]cc
du1[dot]homeunix[dot]com
fl12[dot]ftpaccess[dot]cc
ftp1[dot]ftpaccess[dot]cc
patch[dot]homeunix[dot]org
up1[dot]mine[dot]nu
hho1[dot]homeunix[dot]com
hp1[dot]homelinux[dot]org
i1024[dot]homeunix[dot]org
i1024[dot]homelinux[dot]com
ice[dot]game-host[dot]org
il01[dot]servebbs[dot]com
il01[dot]homeunix[dot]com
il02[dot]servebbs[dot]com
il03[dot]servebbs[dot]com
lih001[dot]webhop[dot]net
lih002[dot]webhop[dot]net
lih003[dot]webhop[dot]net
list1[dot]homelinux[dot]org
live1[dot]webhop[dot]org
patch1[dot]gotdns[dot]org
patch1[dot]ath[dot]cx
patch1[dot]homelinux[dot]org
ppp1[dot]ftpaccess[dot]cc
sc01[dot]webhop[dot]biz
temp1[dot]homeunix[dot]com
tor[dot]homeunix[dot]com
ttt1[dot]homelinux[dot]org
up01[dot]homelinux[dot]com
up1[dot]homelinux[dot]org
up1[dot]serveftp[dot]net
up2[dot]mine[dot]nu
update1[dot]homelinux[dot]org
update1[dot]merseine[dot]nu
jlop[dot]homeunix[dot]com
on1[dot]homeunix[dot]com
vm01[dot]homeunix[dot]com
vvpatch[dot]homelinux[dot]org
war1[dot]game-host[dot]org
xil[dot]homeunix[dot]com
*In the names above,
[dot]
is substituted for
protect users from accidentally clicking and launching
malicious domains.
We recommend searching for outbound
requests for, at minimum, the 12/10/09 to
1/6/10 timeframe. The above domains and
file names and hashes may not be all
inclusive of all those associated with Aurora
but give a reasonable representation. If you
see Web communication to any of the
above sites you should analyze the
origination machine immediately and reach
out to McAfee Foundstone for onsite
Incident Response Services.
McAfee and/or other noted McAfee related products contained herein are registered trademarks or trademarks of McAfee, Inc., and/or
its affiliates in the U.S. and/or other countries. McAfee Red in connection with security is distinctive of McAfee brand products. Any other
non-McAfee related products, registered and/or unregistered trademarks contained herein is only by reference and are the sole property
of their respective owners.
2009 McAfee, Inc. All rights reserved.
CA Internet Security Business Unit | Internet Security Intelligence
In-depth Analysis of Hydraq
The face of cyberwar enemies unfolds
Zarestel Ferrer and Methusela Cebrian Ferrer
CA ISBU Senior Researchers, Melbourne Australia
Abstract
There are thousands of undetected online threats and malware attacks from around the world
every day. Most of these attacks take place in cyberspace, where unsuspecting people fall prey to
various forms of cybercrime. Common cyber criminal activity involves stealing sensitive information such as credit card details, online login credentials, browsing history and email addresses.
However, notable skilled attacks occur when the target is in possession of highly-valuable information that could be leveraged as a weapon for warfare.
Hydraq is a family of threats used in highly sophisticated, coordinated attacks against large and
high-profile corporate networks. It is referred to as Operation Aurora, Google Hack Attack and
Microsoft Internet Explorer 0-day (CVE-2010-0249). An in-depth code investigation and analysis
will highlight Hydraq features and capabilities, and as it unfolds, questions will unravel on to
whether the discovery of this threat is just the beginning of a global arms race against cyberwarfare.
Table of Contents
Introduction
Anatomy of an Attack
1. How Hackers Gain Access
1.1 Reconnaissance
1.2 0Day Hack Attack
1.3 MS10-002 (CVE-2010-049) Analysis
1.4 Hydraq Binary Shellcode
2. How Hackers Maintain Access
2.1 Win32/Hydraq (EXE) Dropper: Generating Random Service
2.2 Win32/Hydraq (DLL) Backdoor: Method of Installation
3. Cyber Spy In Control
3.1 Initialization of the Backdoor Configuration
3.2 Command and Control
3.3 Backdoor Configuration: Resource Section and Registry Key