text
stringlengths 4
429
|
---|
(CHINANET Chongqing) |
(FDC Servers, US Chicago) |
(Level 3, US Washington) |
The pattern of these lookups suggests that the author was performing testing, and had access to two |
different transits (e.g., a school network and an ISP). |
CnC_Domain.2 |
The first query for the CnC_Domain.2 domain came from Google |
s Mountain View recursive. |
2009-12-17 22:39:09 |
2009-12-18 06:27:58 |
2009-12-18 06:27:58 |
2009-12-18 18:15:18 |
2009-12-18 18:15:18 |
2009-12-18 18:15:18 |
2009-12-18 18:19:30 |
2009-12-18 18:19:30 |
AAAA |
AAAA |
AAAA |
(Google Mountain View) |
(Google Mountain View) |
(Google Mountain View) |
(Comcast; San Jose) |
(Comcast; San Jose) |
(Comcast; San Jose) |
(Google-IT) |
(Google-IT) |
The CnC_Domain.2 CnC domain is also notable because it witnessed queries from many other |
networks outside of Google before the public news broke. This domain has never been identified |
publicly as part of Aurora. Networks performing queries up to January 10, 2010 include numerous ISPs. |
Observed Loss of Queries |
When a botnet is remediated at the DNS level, the associated victims continue to query the authority |
DNS server. Unless and until the local network cleans the hosts or imposes network blocks, victim |
traffic to the authority will continue. A sudden loss of network traffic from a country, however, can be |
unusual, particularly where the victims are spread over disparate (heterogeneous policy) networks. |
That is, it is unlikely that many different networks would simultaneously remediate hosts. Thus, while it |
may seem likely that all victims in a single network disappear (e.g., as when a network operator |
deploys a firewall rule), it is remarkable when all victims in diverse policy boundaries also disappear. |
Such centralized control speaks to the management of the botnet, and gives clues as to the policy |
preferences of the botmaster to attack/not attack a given suite of networks or countries. |
Hosts performing DNS queries exhibited a random pattern of A queries. The TTL periods for the CnC |
domains was always short, meaning there was only a short period of time during which a stub query |
could be answered from cache, and not recorded at the authority. This behavior is typical of fast flux |
Page 16 |
The Command Structure of the Aurora Botnet |
networks. An increase in TTL from 60 to 360 seconds was identified, which signifies the cut over from |
the default zone TTL to the SOA.minimum used for wildcarded domains. Thus, the DDNS domains |
used in the attack appear to have been deregistered before December 18 and remained |
open |
for |
anyone in the world to register until the first week of January 2010. |
The Malware Evolution |
Aurora malware families date as far back as August of 2009. This trail helps determine the evolution |
and common characteristics of malware used by Operation Aurora, as well as a common modus |
operandi on the bot agents deployed as part of the attacks. The result is more than just an analysis of |
individual malware families. Rather, it helps profile the criminal operators behind Aurora via: |
Malware Delivery Method |
How does the malware get into the system? Is there a common |
delivery method or is it random? |
System Behavior |
Are the symptoms evident in the system common to all Aurora malware |
families or do they differ? Do the families use the same infection techniques, protection |
mechanisms and/or AV evasion techniques? |
Network Behavior |
Do the malware families exhibit the same network behavior? |
CnC Server Trials Powered by Zero-Day Malware Variants |
The table below lists significant events in the deployment and use of one of the Aurora botnet CnC |
servers known to the public, filoups.info, based on our data mining and analysis of malware |
samples and network traffic collected by Damballa. Several initial trials were conducted by the botnet |
operator prior to the |
production |
use of this CnC server. |
The first set of CnC domains appeared in a FakeAV Trojan malware family1-a in the beginning of May |
2009. There were several variants of the family1 malware in the wild in 2009. The second set of CnC |
domains was used by a new family1-b malware variant in October 2009. By leveraging new Zero-Day |
malware variants, the botnet operator(s) could easily evade AV product detection and experiment |
with different CnC domain construction and communication. For example, different combinations of |
CnC domains were tried by both family1-c and family1-d malware variants in late October 2009. |
Finally, the CnC domain filoups.info was deployed and used by malware family1-e in November 2009. |
Domain |
mcsmc.org |
thcway.info |
miecros.info |
mnprfix.cn |
micronetsys.org |
filoups.info |
family1-a |
family1-b |
family1-c |
family1-d |
family1-e |
Date |
5/2/2009 |
8/18/2009 |
10/20/2009 |
10/22/2009 |
11/26/2009 |
Table 5: Botnet CnC trial evolution powered by Zero-Day malware variants. |
Page 17 |
The Command Structure of the Aurora Botnet |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.