text
stringlengths 4
429
|
---|
same time, Snake exposed a flexibility to conduct its operations by engaging these noticeably different architectures. |
In the first model, the network communications are carried out from the userland - i.e. the area of the computer system where |
application software executes. In another model, the network communications are handled by a kernel mode driver - i.e. the area |
where lower level system code such as device drivers run. The choice of what architecture should be used may depend on a specific |
target |
s environment, allowing the Snake operators to choose the most suitable architecture to be deployed. |
In both architectures there is a kernel mode driver installed and a usermode DLL injected by the driver into the system processes. |
In both architectures, there is both 32-bit and 64-bit code involved. In order to distinguish between these architectures, we will call |
them the usermode-centric and the kernel-centric architectures respectively. |
The remainder of this report gives a detailed explanation of how the two Snake architectures embed themselves in the target |
system and communicate with the outside world. We have also provided a set of technical indicators in the Appendix to enable |
organisations and the security research community to identify compromises. |
ERROR: type should be string, got " https://www.gdata.de/rdk/dl-en-rp-Uroburos" |
BAE Systems Applied Intelligence: Snake Rootkit Report 2014 5 |
SNAKE SAMPLES |
In total we have collected over 100 unique files related to this espionage toolkit. Many of these were submitted to online malware |
analysis websites by victims and investigators over several years. In many cases the source country information of the submission |
is available. These allow us to visualise the distribution of countries where this malware has been seen: |
#Samples Submission Year |
Source country 2010 2011 2012 2013 2014 Total |
Ukraine 1 3 6 8 14 32 |
Lithuania 9 2 11 |
Great Britain 4 4 |
Belgium 2 2 |
Georgia 2 2 |
United States 1 1 2 |
Romania 1 1 |
Hungary 1 1 |
Italy 1 1 |
Total 1 4 7 24 20 56 |
Whilst this view is likely to only be the tip of the iceberg, it does give us an initial insight into the profile of targets for the Snake |
operations. |
Other useful visualisations of the operations come from the compile timestamps. Below is shown a table with a count of the |
number of files in our sample set from recent years. Two samples compiled in late January 2014 show that this activity is ongoing. |
#Samples by compile month |
Year 01 02 03 04 05 06 07 08 09 10 11 12 Total |
2006 1 3 4 |
2007 1 1 1 3 |
2008 2 1 2 1 2 8 |
2009 1 1 1 3 2 2 10 |
2010 1 1 1 1 1 2 7 |
2011 1 4 1 3 1 3 13 |
2012 2 1 1 1 2 7 14 |
2013 1 13 5 2 5 4 3 2 1 2 1 39 |
2014 2 2 |
Total 8 15 9 4 9 13 6 2 1 11 10 12 100 |
Plotting the day of the week in which the samples were compiled shows a now familiar pattern for analysts of modern cyber-attacks. |
The creators of the malware operate a working week, just like any other professional. The single sample in our set which was |
compiled on a Saturday is an outlier, but doesn |
t alter the conclusion. Similarly, plotting the hour of the day in which the samples |
were compiled reveals another human pattern |
the working day. This has been adjusted to UTC+4 to show a possible fit to the |
operators |
local time. |
#Samples compiled per day of the week #Samples compiled by hour of the day |
(adjusted to UTC+4) |
Mon Tue Wed Thu Fri Sat Sun |
BAE Systems Applied Intelligence: Snake Rootkit Report 2014 6 |
USERMODE-CENTRIC ARCHITECTURE |
The usermode-centric architecture of Snake is known to have been used from 2011 till 2014, with the most recent sample compiled |
on January 28, 2014. |
With this architecture, the Snake driver is mainly used to load the DLL module into the usermode processes, and then use that |
module for the communications. |
One of the analysed samples exposed multiple debug messages and source control check-in logs. It is not clear why those |
messages were allowed in the deployed driver - possibly an operational security lapse. However, they give some insight into the |
internal structure of the source code. |
For example, the analysed driver gave away the following source file names: |
d:\proj\cn\fa64\common\loadlib\common/loadlib_helpers.c |
d:\proj\cn\fa64\common\loadlib\win/loadlib.c |
d:\proj\cn\fa64\uroboros\rk_common\libhook\common/libunhook.c |
d:\proj\cn\fa64\uroboros\rk_common\libhook\ntsystem/libhook.c |
d:\proj\cn\fa64\uroboros\rk_common\libhook\common/hook_helpers.c |
d:\proj\cn\fa64\uroboros\rk_common\libhook\common/libhook.c |
d:\proj\cn\fa64\uroboros\rk_common\libhook\common/idthook.c |
.\rk_ntsystem.c |
..\common\helpers\interface_s.c |
..\k2\fa_registry.c |
..\k2\syshook.c |
The source control check-in log examples, showing the names of the developers to be |
vlad |
and |
gilg |
$Id: snake_config.c 5204 2007-01-04 10:28:19Z vlad $ |
$Id: mime64.c 12892 2010-06-24 14:31:59Z vlad $ |
$Id: event.c 14097 2010-11-01 14:46:27Z gilg $ |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.