text
stringlengths 4
429
|
---|
tc_read_request_pipe |
tr_alloc |
tc_send_request_bufs |
tc_send_request |
t_close |
tr_write_pipe |
tc_socket |
snake_modules_command |
snake_free |
t_setoptbin |
snake_alloc |
The inj_snake_Win32.dll/inj_snake_x64.dll module exports 61 functions. It is designed to perform the high-level tasks |
such as: |
manage the configuration data (by using a queue) |
exfiltrate data by using Windows Internet (WinINet) APIs or Windows Sockets 2 (Winsock) APIs: |
communicate with the C&C server and receive commands to execute |
submit logs to the C&C server and other reports |
When the DLL activates, it reads configuration parameters from the configuration queue, that the driver creates on a virtual volume. |
One of the parameters defines the pipe name(s) that the DLL should use for its communications. |
The remote commands received by this Snake DLL module are designed to set up various communication parameters: |
http_log |
redir_str |
http_no_pragma_cache |
http_max_opt |
http_no_accept |
http_option |
proxy_useragent |
http_uri |
proxy_bypass |
no_server_hijack |
proxy_server |
imp_level |
proxy_discover |
net_password |
proxy_passwd |
net_user |
proxy_user |
write_peer_nfo |
check_inet |
read_peer_nfo |
To post the data, the DLL can use the following User-Agent string |
Mozilla/4.0 (compatible; MSIE 6.0) |
It may rely on the following Internet Media types (MIME types) for data exfiltration: |
application/x-shockwave-flash |
image/gif |
image/pjpeg |
application/msword |
image/jpeg |
application/vnd.ms-excel |
image/x-xbitmap |
application/vnd.ms-powerpoint |
Request type it uses can either be POST of GET, and C&C server resource name is /default.asp. |
BAE Systems Applied Intelligence: Snake Rootkit Report 2014 24 |
RECONNAISSANCE TOOL |
One of the Snake components that could have been downloaded from a remote C&C server, was identified as a network |
reconnaissance tool. |
When run as a command line tool, with its logic defined with the command line switches, this tool enumerates other network hosts |
and detects what Windows RPC services are enabled at the endpoints. It carries a list of interface identifiers associated with |
the named pipes. It then uses these identifiers to write a message to and read a message from the associated named pipes. By |
knowing what RPC services are running, it can successfully fingerprint all network hosts by mimicking the Metasploit |
s logic of OS |
fingerprinting via SMB. The fingerprinting allows it to reveal the following characteristics for each host found in the network: |
the version of the operating system |
version of the service pack |
the installed network services |
The data it retrieves is encrypted and saved into a configuration file %system%\vtmon.bin. This file is then further encrypted with |
an NTL-based (Number Theory Library) algorithm and is uploaded by the usermode-centric Snake rootkit to the C&C server, along |
with other configuration files, such as mtmon.sdb, mtmon32.sdb, gstatsnd.bin, gstat.bin, gstat32.bin, and other log |
files found in the %windows%\$NtUninstallQ[random]$ directory. |
By using this function the remote attacker can identify any potentially exploitable hosts located in the same network as the victim. |
The attacker may then craft an exploit against those hosts, possibly by using the Metasploit framework, and then deliver the |
generated shellcode back to the reconnaissance tool to be applied against the identified hosts by running the tool with the |
exp_os |
switch. |
If the tool successfully delivers the payload and exploits the remote host(s), it will replicate the infection across the network, taking |
control over new hosts, thus repeating the infection cycle all over again and spreading the infection further. Unlike traditional worm |
techniques, this process is rather manual, but its danger is in the fact that the attacker can flexibly craft new attack methods, |
adjusting them to the hosts present within the network, thus preying on the weakest (least updated, most vulnerable) victims along |
its path. |
BAE Systems Applied Intelligence: Snake Rootkit Report 2014 25 |
RELATIONSHIP TO AGENT.BTZ |
As seen from the check-in logs found within one of the recent samples, the time span covers almost 6 years from January 2007 till |
December 2012, which is aligned with the first reports of Agent.BTZ. It |
s worth noting that Agent.BTZ used the same XOR key for its |
logs as the most recent variants: |
1dM3uu4j7Fw4sjnbcwlDqet4F7JyuUi4m5Imnxl1pzxI6as80cbLnmz54cs5Ldn4ri3do5L6gs923HL34x2f5cvd0fk6c1a0s |
Log files created by the latest samples of Snake, compiled in 2013 and 2014, were successfully decrypted with the same XOR key. |
Other similarities include the usage of the virtual partition \\.\Vd1, the temporary file named FA.tmp, usage of files named |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.