text
stringlengths
4
429
f293c9640aa70b49f35627ef7fb58f15 32-bit exe 294 KB 2014-01-28 16:05:32 2014 sample
440802107441b03f09921138303ca9e9 32-bit driver 428 KB 2014-01-24 10:13:06 2014 sample
6406ad8833bafec59a32be842245c7dc 32-bit driver 277 KB 2013-03-29 07:51:34 Ultra3.sys,
Adaptec Windows Ultra3
Family Driver
c09fbf1f2150c1cc87c8f45bd788f91f 32-bit DLL 404 KB 2013-03-28 06:49:36 dropped DLL
mscpx32n.dll
5ce3455b85f2e8738a9aceb815b48aee 32-bit driver 280 KB 2013-03-29 07:44:26 Ultra3.sys,
Adaptec Windows Ultra3
Family Driver
b329095db961cf3b54d9acb48a3711da 32-bit DLL 412 Kb 2013-03-27 07:10:09 dropped DLL
kbdsmfno.dll
cfe0ef3d15f6a85cbd47e41340167e0b 32-bit dropper 363 KB 2012-12-18 08:22:47 mswint.exe,chset.exe
b86137fa5a232c614ec5405be4d13b37 32-bit DLL 223 KB 2012-12-18 08:22:43 libadcodec.dll
47f554745ef2a48baf3298a7aa2937e2 32-bit DLL 42 KB 2012-12-18 08:21:06 oleaut32.dll
ed785bbd156b61553aaf78b6f71fb37b
64-bit driver 435 KB 2011-06-24 07:47:59 A0009548.sys
1c18c3ef8717bb973c5091ce0bbf6428 32-bit exe 179 KB 2011-06-21 12:28:28 MSWAUDIT.EXE, utility
BAE Systems Applied Intelligence: Snake Rootkit Report 2014 28
APPENDIX C
Location Type Data
Memory Event
\BaseNamedObjects\{B93DFED5-9A3B-459b-A617-59FD9FAD693E}
\BaseNamedObjects\shell.{F21EDC09-85D3-4eb9-915F-1AFA2FF28153}
\BaseNamedObjects\wininet_activate
Memory Device
\Device\RawDisk1
\Device\RawDisk2
\Device\vstor32
Memory Antirootkit findings
unknown pages with executable code, that can't be mapped to any driver
presence of custom interrupt 0xC3 along with multiple hooks
hidden drivers Ultra3, ~ROOT, hidden file fdisk.sys
File system Volume
\\.\Hd1
\\.\Hd2
\\.\vd1
Registry Key
HKLM\System\CurrentControlSer\Services\Ultra3
HKLM\System\CurrentControlSer\Services\~ROOT
File system File
%windows%\$NtUninstallQ[random]$\mtmon.sdb
%windows%\$NtUninstallQ[random]$\mtmon_.sdb
%windows%\$NtUninstallQ[random]$\scmp.bin
%windows%\$NtUninstallQ[random]$\ucmp.bin
%windows%\$NtUninstallQ[random]$\isuninst.bin
%windows%\$NtUninstallQ[random]$\mswmpdat.tlb
%windows%\$NtUninstallQ[random]$\wmcache.nld
%windows%\$NtUninstallQ[random]$\SPUNINST\Temp
%system%\vtmon.bin
%windows%\$NtUninstallQ817473$\hotfix.dat
%windows%\$NtUninstallQ817473$\fdisk.sys
%windows%\$NtUninstallQ817473$\fdisk_mon.exe
%windows%\$NtUninstallQ817473$\rkng_inst.exe
Memory Named Pipe
\\.\Pipe\SP[COMPUTERNAME]
\\.\Pipe\UP[COMPUTERNAME]
\\.\Pipe\isapi_http
\\.\Pipe\isapi_log
\\.\Pipe\isapi_dg
\\.\Pipe\services_control
BAE Systems Applied Intelligence: Snake Rootkit Report 2014 29
APPENDIX D
Canditate SNORT rules:
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:
Snake rootkit, usermode-centric encrypted command from
server
; content:
|01 00 00 00 00 00 00 00|1dM3uu4j7Fw4sjnb
; content:
HTTP/1.1 200 OK
; flow:to_client, established;
sid:1000010;)
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:
Snake rootkit, usermode-centric client request
; content:
/1/6b-
558694705129b01c0
; content:
Connection: Keep-Alive|0d 0a|
; flow:to_server,established; sid:1000011;)
BAE Systems Applied Intelligence: Snake Rootkit Report 2014 30
FOR MORE INFORMATION CONTACT:
BAE Systems Applied Intelligence
www.baesysytems.com/ai
AUSTRALIA UK US
Level 6 Surrey Research Park 265 Franklin Street
62 Pitt St Guildford Boston
Sydney NSW 2000 Surrey, GU2 7RQ MA 02110
Australia United Kingdom USA
T: +61 (0) 1300 027 001 T: +44 (0) 1483 816000 T: +1 (617) 737 4170
MALAYSIA DUBAI
Unit 2B-12-1 Dubai Internet City
Jalan Stesen Sentral 5 Building 17
Kuala Lumpur Sentral Office Ground Floor 53
Kuala Lumpur, 50470 PO Box 500523
T: +603 2780 2052 Dubai
T: +971 4369 4369
Copyright