text
stringlengths 4
429
|
---|
mswmpdat.tlb, wmcache.nld, winview.ocx. |
CONCLUSION |
The cyber-espionage operation behind the Snake rootkit is well established, a sample comiled in January 2006 indicates that |
the activity would have begun in at least 2005. It is also sophisticated, using complex techniques for evading host defences and |
providing the attackers covert communication channels. Toolmarks left behind by the authors |
vlad |
gilg |
, leave tantalizing clues |
as to the personas behind this. |
From a technical perspective, Snake demonstrates two very different approaches to the task of building a cyber-espionage toolkit. |
One approach is to delegate the network communication engine to usermode code, backed up by a usermode rootkit. Another |
approach is to carry out all of the communications from the kernel-mode driver, which is a very challenging task by itself. |
The complexity of the usermode-centric approach is on par with Rustock rootkit - it uses similar techniques. It |
s an old well-polished |
technology that evolved over the years and demonstrated its resilience and survivability under the stress of security counter- |
measures. The complexity of the kernel-centric architecture of Snake is quite unique. This architecture is designed to grant Snake |
as much flexibility as possible. When most of the infected hosts are cut off from the outside world, it only needs one host to be |
connected online. The traffic is then routed through that host to make external control and data exfiltration still possible. |
The presence of the reconnaissance tool in the Snake operators |
framework suggests the existence of an arsenal of infiltration |
tools, designed to compromise a system, then find a way to replicate into other hosts, infect them, and spread the infection |
even further. As demonstrated, the backdoor commands allow Snake to provide remote attackers with full remote access to the |
compromised system. Its ability to hibernate, staying fully inactive for a number of days, makes its detection during that time very |
difficult. |
The analysed code suggests that even file system and registry operations can be delegated by an infected module to another |
module in order to stay unnoticed by behaviour analysis engines of the antivirus products, and to overcome account restrictions of |
the browser processes so that the injected module could still write into files and into the sensitive registry hives. |
The logs and dumps it creates on the hidden virtual volumes contributes to its stealthiness too. A great deal of attention has also |
been given to keep its network communications as quiet as possible. Its ability to generate malicious traffic whenever the user |
goes online and start loading the web pages allows it to |
blend in |
with the legitimate communications. |
We expect much more will be uncovered by researchers in the coming weeks as the capabilities of this operation are further fleshed |
out. However, as we implied in the opening section, we view this threat to be a permanent feature of the landscape. Whether they |
dismantle this toolset and start from scratch, or continue using tools which have been exposed, remains to be seen. For their |
targets though the considerable challenge of keeping secrets safe on sensitive networks will certainly continue for years to come. |
RECOMMENDATIONS |
Search logs for connections to Snake |
s command and control servers (see Appendix A) |
Search for MD5 hashes of the known samples (see Appendix B) |
Use Indicators of Compromise for building host-based rules (see Appendix C) |
Deploy SNORT rules for network based detection of Snake (see Appendix D) |
BAE Systems Applied Intelligence: Snake Rootkit Report 2014 26 |
APPENDIX A |
Domain IP Address Country Contact Email Nameserver |
arctic-zone.bbsindex.com 124.248.207.50 HK [email protected] NS1.DTDNS.COM |
cars-online.zapto.org 124.248.207.50 HK [email protected] NF1.NO-IP.COM |
eunews-online.zapto.org 124.248.207.50 HK [email protected] NF1.NO-IP.COM |
fifa-rules.25u.com 124.248.207.50 HK [email protected] NS1.CHANGEIP.ORG |
forum.sytes.net 124.248.207.50 HK [email protected] NF1.NO-IP.COM |
franceonline.sytes.net 124.248.207.50 HK [email protected] NF1.NO-IP.COM |
freeutils.3utilities.com 124.248.207.50 HK [email protected] NF1.NO-IP.COM |
health-everyday.faqserv.com 124.248.207.50 HK [email protected] NS1.CHANGEIP.ORG |
nhl-blog.servegame.com 124.248.207.50 HK [email protected] NF1.NO-IP.COM |
olympik-blog.4dq.com 124.248.207.50 HK [email protected] NS1.CHANGEIP.ORG |
pockerroom.servebeer.com 124.248.207.50 HK [email protected] NF1.NO-IP.COM |
pressforum.serveblog.net 124.248.207.50 HK [email protected] NF1.NO-IP.COM |
scandinavia-facts.sytes.net 124.248.207.50 HK [email protected] NF1.NO-IP.COM |
sportmusic.servemp3.com 124.248.207.50 HK [email protected] NF1.NO-IP.COM |
stockholm-blog.hopto.org 124.248.207.50 HK [email protected] NF1.NO-IP.COM |
supernews.sytes.net 124.248.207.50 HK [email protected] NF1.NO-IP.COM |
sweeden-history.zapto.org 124.248.207.50 HK [email protected] NF1.NO-IP.COM |
tiger.got-game.org 124.248.207.50 HK [email protected] NS1.CHANGEIP.ORG |
top-facts.sytes.net 124.248.207.50 HK [email protected] NF1.NO-IP.COM |
weather-online.hopto.org 124.248.207.50 HK [email protected] NF1.NO-IP.COM |
wintersport.sytes.net 124.248.207.50 HK [email protected] NF1.NO-IP.COM |
x-files.zapto.org 124.248.207.50 HK [email protected] NF1.NO-IP.COM |
forum.4dq.com 203.117.122.51 SG [email protected] NS1.CHANGEIP.ORG |
forum.acmetoy.com 203.117.122.51 SG [email protected] NS1.CHANGEIP.ORG |
marketplace.servehttp.com 59.125.160.178 TW [email protected] NF1.NO-IP.COM |
music-world.servemp3.com 80.152.223.171 DE [email protected] NF1.NO-IP.COM |
newutils.3utilities.com 80.152.223.171 DE [email protected] NF1.NO-IP.COM |
interesting-news.zapto.org 80.152.223.171 DE [email protected] NF1.NO-IP.COM |
north-area.bbsindex.com [email protected] NS1.DTDNS.COM |
academyawards.effers.com [email protected] NS1.DTDNS.COM |
cheapflights.etowns.net [email protected] NS1.DTDNS.COM |
toolsthem.xp3.biz [email protected] NS2.FREETZI.COM |
softprog.freeoda.com [email protected] NS1.ORGFREE.COM |
euassociate.6te.net [email protected] NS1.6TE.NET |
euland.freevar.com [email protected] NS1.UEUO.COM |
communityeu.xp3.biz [email protected] NS2.FREETZI.COM |
swim.onlinewebshop.net [email protected] NS1.RUNHOSTING.COM |
july.mypressonline.com [email protected] NS1.RUNHOSTING.COM |
winter.site11.com [email protected] NS1.000WEBHOST.COM |
eu-sciffi.99k.org [email protected] NF1.99K.ORG |
BAE Systems Applied Intelligence: Snake Rootkit Report 2014 27 |
APPENDIX B |
MD5 Hash File Type FileSize Compile Time Notes |
Kernel-centric architecture |
f4f192004df1a4723cb9a8b4a9eb2fbf 32-bit driver 206 KB 2011-06-24 07:49:41 fdisk.sys, Ultra3.sys |
626576e5f0f85d77c460a322a92bb267 32-bit dropper 1,669 KB 2013-02-04 13:19:21 fdisk_mon.exe |
90478f6ed92664e0a6e6a25ecfa8e395 64-bit driver 584 KB 2013-02-04 13:17:56 fdisk.sys, Ultra3.sys |
1c6c857fa17ef0aa3373ff16084f2f1c 32-bit driver 219 KB 2013-02-04 13:20:00 fdisk.sys, Ultra3.sys |
Usermode-centric architecture |
973fce2d142e1323156ff1ad3735e50d 32-bit driver 673 KB 2013-08-29 07:34:54 msw32.sys, |
cmbawt.sys |
2eb233a759642abaae2e3b29b7c85b89 32-bit DLL 416 KB 2013-07-25 05:58:47 dropped DLL |
Reconnaissance tool |
c82c631bf739936810c0297d31b15519 32-bit exe 176 KB 2013-03-27 08:25:43 wextract.exe |
Other analysed samples |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.