text
stringlengths 4
429
|
---|
Resource decryption - Resource size is 0x158.
|
The malware does not modify the first 8 bytes of the resource and decodes the remaining
|
0x150 bytes using bitwise XOR on the 0x150 byte of the resource with 0x99 as the key. The
|
following decoding logic is used:
|
CA ISBU-ISI WHITE PAPER: IN-DEPTH ANALYSIS OF HYDRAQ
|
//----->Start decoding code
|
int k = 0;
|
//used for output buffer - decode result
|
for(int i = 0; i < 0x150; i+=4)
|
for(int j = 0; j < 0x04; j++)
|
rsrc_buffer[i+j] = rsrc_buffer[i+j] ^ 0x99;
|
if (rsrc_buffer[i+j] >= 0x41 && rsrc_buffer[i+j] =< 0x5A ) //0x41 = 'A' | 0x5A = Z
|
rsrc_buffer[i+j] = rsrc_buffer[i+j] - 0x41;
|
else if (rsrc_buffer[i+j] >= 0x61 && rsrc_buffer[i+j] =< 0x7A ) //0x61 = 'a' | 0x7A = 'z'
|
rsrc_buffer[i+j] = rsrc_buffer[i+j] - 0x47;
|
else if (rsrc_buffer[i+j] >= 0x30 && rsrc_buffer[i+j] =< 0x39) //0x30 = '0' | 0x39 = '9'
|
rsrc_buffer[i+j] = rsrc_buffer[i+j] + 0x04;
|
else if (rsrc_buffer[i+j] == 0x2B) // 0x2B = '+'
|
rsrc_buffer[i+j] = 0x3E; // 0x3E = '>'
|
else if (rsrc_buffer[i+j] == 0x2F) // 0x2F = '/'
|
rsrc_buffer[i+j] = 0x3F; // 0x3F = '?'
|
else if (rsrc_buffer[i+j] == 0x3D) // 0x2F = '='
|
rsrc_buffer[i+j] = 0x00;
|
}//for(int j = 0; j < 0x04; j++)
|
rsrc_buffer[i+1] = rsrc_buffer[i+1] >> 0x04
|
rsrc_buffer[i] = rsrc_buffer[i] << 0x02
|
rsrc_buffer[i+1] = rsrc_buffer[i] | rsrc_buffer[i+1]
|
[rsrc_result + k] = rsrc_buffer[i+1]
|
rsrc_buffer[i+1] = rsrc_buffer[i+1] << 0x04
|
rsrc_buffer[i+2] = rsrc_buffer[i+2] >> 0x02
|
rsrc_buffer[i+2] = rsrc_buffer[i+2] | rsrc_buffer[i+1]
|
rsrc_buffer[i+1] = rsrc_buffer[i+2]
|
rsrc_buffer[i+1] = rsrc_buffer[i+1] << 0x06
|
rsrc_buffer[i+1] = rsrc_buffer[i+1] | rsrc_buffer[i+3]
|
[rsrc_result + k + 1] = rsrc_buffer[i+2]
|
[rsrc_result + k + 2] = rsrc_buffer[i+1]
|
k+=3;
|
//for(int i = 0; i < 0x150; i+=4)
|
//----->End decoding code
|
CA ISBU-ISI WHITE PAPER: IN-DEPTH ANALYSIS OF HYDRAQ
|
Appendix D - Real-time Graphical Control
|
The Hydraq backdoor client can initiate real-time graphical control through the installation of Virtual Network Computing (VNC). Based on the malware code, the VNC DLL component can be
|
installed in this sequence:
|
1. Client sends Command 0x04 Task 0x08 to upload the file acelpvc.dll.
|
2. Client initiates Command 0x07 Task 0x0B.
|
a. Get the file attributes of the file %System%\acelpvc.dll,
|
check if it is directory or file,
|
exit if its a directory.
|
b. Get address of acelpvc.dll
|
s export function
|
EntryMain
|
c. Get the file attribute of the file %System%\VedioDriver.dll,
|
check if it is directory or file,
|
exit if its a directory.
|
3.1 If %System%\VedioDriver.dll exists,
|
a. Load acelpvc.dll in the memory space of the malware.
|
b. Execute acelpvc.dll
|
s EntryMain export function with the server IP address and port
|
as the parameter. The client is expected to have a VNC client to receive the framebuffer [9] from the server.
|
3.2 If %System%\VedioDriver.dll does NOT exist,
|
a. Contact the client to download VedioDriver.dll
|
b. The Server receives VedioDriver.dll from the client.
|
c. Verify the CRC value of the created file from the server, and delete if it is different.
|
d. Modify the file
|
s date and time attributes to be the same as the system file,
|
user32.dll.
|
[Appendix D Figure 01 - Acelpvc.dll list of APIs used in the Import Table]
|
CA ISBU-ISI WHITE PAPER: IN-DEPTH ANALYSIS OF HYDRAQ
|
[Appendix D Figure 02 - VedioDriver.dll Export Functions]
|
Appendix E - Domain Name List
|
360.homeunix.com
|
www.ccmp1.com
|
blog1.servebeer.com
|
sl1.homelinux.org
|
update.ourhobby.com
|
ftp2.homeunix.com
|
Complete List as published at http://www.security.nl/files/aurorafiles.txt
|
69.164.192.4
|
alt1.homelinux.com
|
amt1.homelinux.com
|
aop1.homelinux.com
|
app1.homelinux.com
|
blogspot.blogsite.org
|
filoups.info
|
ftpaccess.cc
|
google.homeunix.com
|
members.linode.com
|
tyuqwer.dyndns.org
|
voanews.ath.cx
|
webswan.33iqst.com:4000
|
yahoo.8866.org
|
ymail.ath.cx
|
yahooo.8866.org
|
connectproxy.3322.org
|
csport.2288.org
|
CA ISBU-ISI WHITE PAPER: IN-DEPTH ANALYSIS OF HYDRAQ
|
Reference
|
[1] http://googleblog.blogspot.com/2010/01/new-approach-to-china.html
|
[2] http://www.state.gov/secretary/rm/2010/01/135519.htm
|
[3] http://www.dni.gov/testimonies/20100202_testimony.pdf
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.