text
stringlengths
4
429
There is no routine for Task 07.
Task 0x08
Modify registry configuration
AppleTlk
found in HKLM\Software
\Sun\1.1.2 information based on decrypted resource file.
Task 0x09
Modify registry configuration
IsoTp
found in HKLM\Software\Sun
\1.1.2, information based on decrypted resource file.
Other value
(Task 0x0a or more)
Command 0x06 Task 0x00
Task 0x01
Receive further commands.
There is no routine for Task 00.
Create a thread to perform the following:
1. Search file with conditions (date time created).
2. Send file to remote server
Task 0x02
Sends header data with the following values:
9 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 XX
0x00 = 0x0009; 0x04 = 0x0002; 0x08 = 0x0000; 0x0C = 0x0000;
0x10 = 0x00 0x12 = 0xXX (encryption key)
Other value
(Task 0x03 or more)
Command 0x07 Task 0x00 - 0x0a
Receive further commands.
Receive further commands.
CA ISBU-ISI WHITE PAPER: IN-DEPTH ANALYSIS OF HYDRAQ
Command 0x07
Task 0x0b
Create a thread to perform the following:
1. Load the library file %system%\acelpvc.dll.
2. Check for the presence of %system%\VedioDriver.dll. If not
found, download the file from the server and modify the time
attributes to be the same as legitimate system file.
Other value
(Task 0x0c or more)
Command 0x08 Task 0x00
Receive further commands.
Sends header data in this format:
C 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 XX
0x00 = 0x000C; 0x04 = 0x0000; 0x08 = 0x1000; 0x0C = 0x0000;
0x10 = 0x00 0x12 = 0xXX (encryption key)
Other value
(Task 0x01 or more)
Command 0x09 Task 0x00
Task 0x01
Receive further commands.
There is no routine for Task 00.
Read the information in the file %system%\drivers\etc\networks.ics
and send the content to the remote server.
Task 0x02
Delete the file %system%\drivers\etc\network.ics.
Other value
(Task 0x03 or more)
Receive further commands.
[Table 06 - Backdoor Command and Task Descriptions]
3.9 Backdoor Commands In Action
Primary goal of the attackers was accessing the Gmail accounts of Chinese human rights activist
- statement published in a Google blog post entitled
A new approach to China
Malware designed for spying and obtaining sensitive information must have the following offensive
capabilities:
1. Probing - the act of searching, exploring, and investigating.
2. Exfiltration of sensitive information.
3. Surveillance - the ability to capture images, audio and/or video.
4. Covert Communication Channel - is a hidden communication embedded into the header and/
or payload of an overt communication channel to avoid discovery of on-going attacks over the
network.
5. Covering Tracks - the ability to stay undetected and avoid forensic discovery.
s summarize and see what we have learned and discovered from Hydraq
s code.
CA ISBU-ISI WHITE PAPER: IN-DEPTH ANALYSIS OF HYDRAQ
3.9.1 Probing and exfiltration of sensitive information
The Windows Registry is the heart of the Windows Operating System. It stores users profile, installed applications, privileges for applications and folders, hardware profiles, current logged-on
information, mounted devices, the MRU list, wireless network information, LAN computers and
passwords [10].
Using Command 0x03 Task 0x00 and Task 0x01, a remote attacker using Hydraq can substantially extract useful information from Windows Registry.
Command 0x03
Task 0x00
Enumerate sub keys of a registry key and send the information back to
the client.
Task 0x01
Enumerate values of a registry key and send the information back to the client.
Using Command 0x01 Task 0x00, a remote attacker using Hydraq can find out the services that
are available on the compromised system. Windows services display what type of connections is
available that attackers can take advantage of to administer further attacks.
Command 0x01
Task 0x00
Enumerate service configuration and sends back to the client.
Using Command 0x04 Task 0x00, a remote attacker using Hydraq can determine all logical
drives and if the disk drive is a removable, fixed, CD-ROM, or network drive. (see Backdoor Command Reference Listing 13 for the captured communication of client-server)
The attacker can then execute Command 0x04 Task 0x07 to search a directory or Command
0x06 Task 0x01 to search a file.
Command 0x04
Task 0x00
Retrieves information about all logical drives, volume information, disk space