text
stringlengths 4
429
|
---|
There is no routine for Task 07.
|
Task 0x08
|
Modify registry configuration
|
AppleTlk
|
found in HKLM\Software
|
\Sun\1.1.2 information based on decrypted resource file.
|
Task 0x09
|
Modify registry configuration
|
IsoTp
|
found in HKLM\Software\Sun
|
\1.1.2, information based on decrypted resource file.
|
Other value
|
(Task 0x0a or more)
|
Command 0x06 Task 0x00
|
Task 0x01
|
Receive further commands.
|
There is no routine for Task 00.
|
Create a thread to perform the following:
|
1. Search file with conditions (date time created).
|
2. Send file to remote server
|
Task 0x02
|
Sends header data with the following values:
|
9 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 XX
|
0x00 = 0x0009; 0x04 = 0x0002; 0x08 = 0x0000; 0x0C = 0x0000;
|
0x10 = 0x00 0x12 = 0xXX (encryption key)
|
Other value
|
(Task 0x03 or more)
|
Command 0x07 Task 0x00 - 0x0a
|
Receive further commands.
|
Receive further commands.
|
CA ISBU-ISI WHITE PAPER: IN-DEPTH ANALYSIS OF HYDRAQ
|
Command 0x07
|
Task 0x0b
|
Create a thread to perform the following:
|
1. Load the library file %system%\acelpvc.dll.
|
2. Check for the presence of %system%\VedioDriver.dll. If not
|
found, download the file from the server and modify the time
|
attributes to be the same as legitimate system file.
|
Other value
|
(Task 0x0c or more)
|
Command 0x08 Task 0x00
|
Receive further commands.
|
Sends header data in this format:
|
C 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 XX
|
0x00 = 0x000C; 0x04 = 0x0000; 0x08 = 0x1000; 0x0C = 0x0000;
|
0x10 = 0x00 0x12 = 0xXX (encryption key)
|
Other value
|
(Task 0x01 or more)
|
Command 0x09 Task 0x00
|
Task 0x01
|
Receive further commands.
|
There is no routine for Task 00.
|
Read the information in the file %system%\drivers\etc\networks.ics
|
and send the content to the remote server.
|
Task 0x02
|
Delete the file %system%\drivers\etc\network.ics.
|
Other value
|
(Task 0x03 or more)
|
Receive further commands.
|
[Table 06 - Backdoor Command and Task Descriptions]
|
3.9 Backdoor Commands In Action
|
Primary goal of the attackers was accessing the Gmail accounts of Chinese human rights activist
|
- statement published in a Google blog post entitled
|
A new approach to China
|
Malware designed for spying and obtaining sensitive information must have the following offensive
|
capabilities:
|
1. Probing - the act of searching, exploring, and investigating.
|
2. Exfiltration of sensitive information.
|
3. Surveillance - the ability to capture images, audio and/or video.
|
4. Covert Communication Channel - is a hidden communication embedded into the header and/
|
or payload of an overt communication channel to avoid discovery of on-going attacks over the
|
network.
|
5. Covering Tracks - the ability to stay undetected and avoid forensic discovery.
|
s summarize and see what we have learned and discovered from Hydraq
|
s code.
|
CA ISBU-ISI WHITE PAPER: IN-DEPTH ANALYSIS OF HYDRAQ
|
3.9.1 Probing and exfiltration of sensitive information
|
The Windows Registry is the heart of the Windows Operating System. It stores users profile, installed applications, privileges for applications and folders, hardware profiles, current logged-on
|
information, mounted devices, the MRU list, wireless network information, LAN computers and
|
passwords [10].
|
Using Command 0x03 Task 0x00 and Task 0x01, a remote attacker using Hydraq can substantially extract useful information from Windows Registry.
|
Command 0x03
|
Task 0x00
|
Enumerate sub keys of a registry key and send the information back to
|
the client.
|
Task 0x01
|
Enumerate values of a registry key and send the information back to the client.
|
Using Command 0x01 Task 0x00, a remote attacker using Hydraq can find out the services that
|
are available on the compromised system. Windows services display what type of connections is
|
available that attackers can take advantage of to administer further attacks.
|
Command 0x01
|
Task 0x00
|
Enumerate service configuration and sends back to the client.
|
Using Command 0x04 Task 0x00, a remote attacker using Hydraq can determine all logical
|
drives and if the disk drive is a removable, fixed, CD-ROM, or network drive. (see Backdoor Command Reference Listing 13 for the captured communication of client-server)
|
The attacker can then execute Command 0x04 Task 0x07 to search a directory or Command
|
0x06 Task 0x01 to search a file.
|
Command 0x04
|
Task 0x00
|
Retrieves information about all logical drives, volume information, disk space
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.