text
stringlengths 4
429
|
---|
f293c9640aa70b49f35627ef7fb58f15 32-bit exe 294 KB 2014-01-28 16:05:32 2014 sample |
440802107441b03f09921138303ca9e9 32-bit driver 428 KB 2014-01-24 10:13:06 2014 sample |
6406ad8833bafec59a32be842245c7dc 32-bit driver 277 KB 2013-03-29 07:51:34 Ultra3.sys, |
Adaptec Windows Ultra3 |
Family Driver |
c09fbf1f2150c1cc87c8f45bd788f91f 32-bit DLL 404 KB 2013-03-28 06:49:36 dropped DLL |
mscpx32n.dll |
5ce3455b85f2e8738a9aceb815b48aee 32-bit driver 280 KB 2013-03-29 07:44:26 Ultra3.sys, |
Adaptec Windows Ultra3 |
Family Driver |
b329095db961cf3b54d9acb48a3711da 32-bit DLL 412 Kb 2013-03-27 07:10:09 dropped DLL |
kbdsmfno.dll |
cfe0ef3d15f6a85cbd47e41340167e0b 32-bit dropper 363 KB 2012-12-18 08:22:47 mswint.exe,chset.exe |
b86137fa5a232c614ec5405be4d13b37 32-bit DLL 223 KB 2012-12-18 08:22:43 libadcodec.dll |
47f554745ef2a48baf3298a7aa2937e2 32-bit DLL 42 KB 2012-12-18 08:21:06 oleaut32.dll |
ed785bbd156b61553aaf78b6f71fb37b |
64-bit driver 435 KB 2011-06-24 07:47:59 A0009548.sys |
1c18c3ef8717bb973c5091ce0bbf6428 32-bit exe 179 KB 2011-06-21 12:28:28 MSWAUDIT.EXE, utility |
BAE Systems Applied Intelligence: Snake Rootkit Report 2014 28 |
APPENDIX C |
Location Type Data |
Memory Event |
\BaseNamedObjects\{B93DFED5-9A3B-459b-A617-59FD9FAD693E} |
\BaseNamedObjects\shell.{F21EDC09-85D3-4eb9-915F-1AFA2FF28153} |
\BaseNamedObjects\wininet_activate |
Memory Device |
\Device\RawDisk1 |
\Device\RawDisk2 |
\Device\vstor32 |
Memory Antirootkit findings |
unknown pages with executable code, that can't be mapped to any driver |
presence of custom interrupt 0xC3 along with multiple hooks |
hidden drivers Ultra3, ~ROOT, hidden file fdisk.sys |
File system Volume |
\\.\Hd1 |
\\.\Hd2 |
\\.\vd1 |
Registry Key |
HKLM\System\CurrentControlSer\Services\Ultra3 |
HKLM\System\CurrentControlSer\Services\~ROOT |
File system File |
%windows%\$NtUninstallQ[random]$\mtmon.sdb |
%windows%\$NtUninstallQ[random]$\mtmon_.sdb |
%windows%\$NtUninstallQ[random]$\scmp.bin |
%windows%\$NtUninstallQ[random]$\ucmp.bin |
%windows%\$NtUninstallQ[random]$\isuninst.bin |
%windows%\$NtUninstallQ[random]$\mswmpdat.tlb |
%windows%\$NtUninstallQ[random]$\wmcache.nld |
%windows%\$NtUninstallQ[random]$\SPUNINST\Temp |
%system%\vtmon.bin |
%windows%\$NtUninstallQ817473$\hotfix.dat |
%windows%\$NtUninstallQ817473$\fdisk.sys |
%windows%\$NtUninstallQ817473$\fdisk_mon.exe |
%windows%\$NtUninstallQ817473$\rkng_inst.exe |
Memory Named Pipe |
\\.\Pipe\SP[COMPUTERNAME] |
\\.\Pipe\UP[COMPUTERNAME] |
\\.\Pipe\isapi_http |
\\.\Pipe\isapi_log |
\\.\Pipe\isapi_dg |
\\.\Pipe\services_control |
BAE Systems Applied Intelligence: Snake Rootkit Report 2014 29 |
APPENDIX D |
Canditate SNORT rules: |
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg: |
Snake rootkit, usermode-centric encrypted command from |
server |
; content: |
|01 00 00 00 00 00 00 00|1dM3uu4j7Fw4sjnb |
; content: |
HTTP/1.1 200 OK |
; flow:to_client, established; |
sid:1000010;) |
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg: |
Snake rootkit, usermode-centric client request |
; content: |
/1/6b- |
558694705129b01c0 |
; content: |
Connection: Keep-Alive|0d 0a| |
; flow:to_server,established; sid:1000011;) |
BAE Systems Applied Intelligence: Snake Rootkit Report 2014 30 |
FOR MORE INFORMATION CONTACT: |
BAE Systems Applied Intelligence |
www.baesysytems.com/ai |
AUSTRALIA UK US |
Level 6 Surrey Research Park 265 Franklin Street |
62 Pitt St Guildford Boston |
Sydney NSW 2000 Surrey, GU2 7RQ MA 02110 |
Australia United Kingdom USA |
T: +61 (0) 1300 027 001 T: +44 (0) 1483 816000 T: +1 (617) 737 4170 |
MALAYSIA DUBAI |
Unit 2B-12-1 Dubai Internet City |
Jalan Stesen Sentral 5 Building 17 |
Kuala Lumpur Sentral Office Ground Floor 53 |
Kuala Lumpur, 50470 PO Box 500523 |
T: +603 2780 2052 Dubai |
T: +971 4369 4369 |
Copyright |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.