text
stringlengths 4
429
|
---|
july.mypressonline.com
|
toolsthem.xp3.biz
|
softprog.freeoda.com
|
euassociate.6te.net
|
As seen in the traffic dump above, the malware first resolves the domain name of its C&C.
|
Next, it fetches a file /D/pub.txt, and expects the server to respond with a string
|
, acknowledging it
|
s active:
|
03:52:06 1336: Connect swim.onlinewebshop.net type(0)... OK
|
03:52:06 1336: GET /D/pub.txt
|
03:52:07 1336: Http status: 200
|
03:52:07 1336: recv 1/1
|
03:52:07 DownLoad 1 command(s)
|
Once acknowledged, it asks the server for a command, and the server returns a new command to execute:
|
03:52:11 1404: Connect swim.onlinewebshop.net type(0)... OK
|
03:52:11 1404: GET /D/77568289
|
03:52:12 1404: Http status: 200
|
03:52:12 1404: Command for all
|
03:52:12 1404: recv 346/346
|
03:52:12 Command Id:303149772662877808(130201837456870000)[13:42:25 05/08/2013]
|
BAE Systems Applied Intelligence: Snake Rootkit Report 2014 9
|
The command it receives from C&C above (swim.onlinewebshop.net) is encrypted. In order to decrypt it, the malware first
|
applies the XOR mask to the bytes that start from offset 0x40:
|
1dM3uu4j7Fw4sjnbcwlDqet4F7JyuUi4m5Imnxl1pzxI6as80cbLnmz54cs5Ldn4ri3do5L6g
|
s923HL34x2f5cvd0fk6c1a0s
|
An identical XOR mask was also used by Agent.BTZ.
|
Next, it calculates and confirms a CRC32 checksum within the command, further decrypts the data by using the Number Theory
|
Library (NTL), and makes sure the command is destined to the current host by matching the ID field in it.
|
0 1 2 3 4 5 6 7 8 9 A B C D E F 0123456789ABCDEF
|
00000000 74 E4 7E F4 9E 8E D8 65 B3 06 EB B3 08 EA 3E 84 t.~....e......>.
|
00000010 D5 A1 D2 ED 5D 0C 89 91 65 DE 4E B6 0C E2 2C 39 ....]...e.N...,9
|
00000020 A9 8A 3D B9 0B C0 E6 12 E9 F9 81 0A CF C3 D9 0C ..=.............
|
00000030 5A 6A 15 B4 00 00 00 00 01 00 00 00 00 00 00 00 Zj..............
|
00000040 31 64 4D 33 75 75 34 6A 37 46 77 34 73 6A 6E 62 1dM3uu4j7Fw4sjnb
|
00000050 13 3D D4 DA 90 F4 BA 35 1C 36 4A 79 69 96 B1 D4 .=.....5.6Jyi...
|
00000060 D8 F1 07 6F 7B CC C4 68 9D B7 86 3E 4B 6F BA FB ...o{..h...>Ko..
|
00000070 6E AB 7B 29 32 FD 7C 75 B9 DF 7F C0 0C 81 2D 14 n.{)2.|u......-.
|
00000080 23 F9 A4 DF D3 F1 18 97 4D CD 71 D0 52 D6 A2 E9 #.......M.q.R...
|
00000090 FF 58 30 3D A8 8A DD 4D 3F DB AE 9A F5 07 3B 21 .X0=...M?.....;!
|
000000A0 67 5A 34 22 AD 60 CB DD A4 E2 B5 77 A1 6A 4C 2E gZ4
|
.`.....w.jL.
|
000000B0 C8 75 91 01 CA 5B B3 28 3E 55 C8 68 B2 2C 40 E4 .u...[.(>U.h.,@.
|
000000C0 02 A9 64 8B 80 BD 0E AB 58 25 00 40 6E AB DD 5B ..d.....X%.@n..[
|
000000D0 D1 0A 32 AE 4A E2 60 79 BE 47 10 AE 73 35 4C 65 ..2.J.`y.G..s5Le
|
000000E0 06 3C AA D8 F0 49 52 DB 22 A5 0D 7B 2B 4D 8A D1 .<...IR.
|
..{+M..
|
000000F0 21 5C 62 11 E6 13 E2 CA AF A5 4F 5A 9E 1C AF AE !\b.......OZ....
|
00000100 C4 1C 36 4D A0 E4 72 3A CD 07 A3 01 AE E6 0A 84 ..6M..r:........
|
00000110 D4 8B 03 FB 0D 68 19 FD 86 71 8E FD FC 2D C3 5C .....h...q...-.\
|
00000120 49 A4 E3 40 9B 77 16 BA 86 4A DD 0D 15 7D B1 BD [email protected]...}..
|
00000130 A9 54 C3 F6 E4 05 72 B1 E6 B7 A5 A7 31 CE 29 8B .T....r.....1.).
|
00000140 EF 95 58 2A 2E 48 0E 7A BD B8 B7 CE 48 32 E2 48 ..X*.H.z....H2.H
|
00000150 2E E2 94 65 F0 19 FC F5 ED 1B ...e......
|
Traffic is decrypted
|
0 1 2 3 4 5 6 7 8 9 A B C D E F 0123456789ABCDEF
|
00000000 49 44 33 30 33 31 34 39 37 37 32 36 36 30 38 34 ID30314977266084
|
00000010 37 38 30 38 23 30 36 20 26 6D 61 72 6B 65 74 70 7808#06 &marketp
|
00000020 6C 61 63 65 2E 73 65 72 76 65 68 74 74 70 2E 63 lace.servehttp.c
|
00000030 6F 6D 26 2F 55 50 44 41 54 45 2F 26 63 65 72 74 om&/UPDATE/&cert
|
00000040 31 30 32 34 26 55 6E 37 37 6B 6F 23 73 26 26 26 1024&Un77ko#s&&&
|
00000050 0A .
|
Once decrypted, the malware interprets the received command, as reflected in the malware log below (the new C&C server address
|
is highlighted in it):
|
03:52:12 Del after 0
|
03:52:12 Run instruction: 6 ID:303149772147483647(13:41:34 05/08/2013)
|
03:52:12 Add address &marketplace.servehttp.com&/UPDATE/&cert1024&Un77ko#s&&&
|
03:52:12 Finish run instruction.
|
After that, the malware connects to the new C&C, asking it for another command:
|
03:52:13 1400: Connect marketplace.servehttp.com type(0)... OK
|
03:52:13 1400: GET /IMAGE/pub.html
|
03:52:15 1400: Http status: 200
|
03:52:16 1400: recv 1/1
|
03:52:16 DownLoad 1 command(s).
|
BAE Systems Applied Intelligence: Snake Rootkit Report 2014 10
|
The command it receives is called UpLoad, so it uploads all the collected logs to the server, and then cleans out those logs:
|
03:52:16 UpLoad: http upload 4 file(s).
|
03:52:17 652: Connect marketplace.servehttp.com type(0)... OK
|
03:52:17 652: GET test file /IMAGE/pub.html
|
03:52:17 652: POST /IMAGE/2/55198739672286404661840843638320033
|
03:52:18 652: C:\WINDOWS\$NtUninstallQ812589$\gstat32.bin 310[B]
|
03:52:19 652: Http Status:200
|
03:52:19 652: POST /IMAGE/2/32773318678423920155243775957661252
|
03:52:19 652: result.xml 1278[B]
|
03:52:20 652: Http Status:200
|
03:52:21 652: POST /IMAGE/2/41535327538451061594793127961089611
|
03:52:21 652: C:\WINDOWS\$NtUninstallQ812589$\mtmon32.sdb 655[B]
|
03:52:22 652: Http Status:200
|
03:52:22 652: POST /IMAGE/2/35192812459183876172895945534862460
|
03:52:22 652: C:\WINDOWS\$NtUninstallQ812589$\mtmon.sdb 748[B]
|
03:52:23 652: Http Status:200
|
The files it uploads are stored inside its home directory %windows%\$NtUninstallQ[random]$,
|
where [random] is a random number.
|
For example, Snake
|
s home directory could be C:\WINDOWS\$NtUninstallQ812589$.
|
The files within that directory are used by the rootkit to store configuration and log data.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.