text
stringlengths 4
429
|
---|
The Command Structure of the Aurora Botnet |
Domains |
filoups.info |
miecros.info |
The dropped samples do not listen to the same CnC most of the |
time. Each listens to a different CnC using a different port. |
Protection |
Mechanism |
The main dropper also utilizes |
Malware Self Preservation |
doing the following before it self-destructs: |
google.homeunix.com |
yahoo.blogdns.net |
voanews.ath.cx |
ymail.ath.cx |
None observed. |
Hides the location of the malware dropped files by setting |
the location folder as hidden and the dropped files |
themselves as hidden. |
Disables |
Folder Options |
in Windows Explorer |
Disables |
Show hidden files and folders |
in Windows |
Explorer |
Hides Internet Explorer |
s Menu Bar and Toolbar |
Disables System Restore |
Disables Registry editing |
AV Evasion |
Techniques |
No two dropped files are the same. The malware uses |
GetTickCount to generate random keys to randomize the hex |
structure of dropped files. |
None observed. |
One dropped file (273a51aada271e5a4a91321a3126c767) is |
packed using FSG v1.3.3. |
Intent |
Money generation through pop-up ads and Web site redirection |
Keylogging and spyware. |
Information |
Samples Collected/Discovered by Damballa ITW: |
Samples Collected/Discovered by Damballa ITW: |
02677a0770268a20f7ef0d9bd7e8eef1 |
9803c22252a028b050f6257e7a67d4b7 |
69ef60094052321d91c0094efd832b92 |
6e245522d710ca1564e6873a3a0e82bd |
0c091b4f6b23b450ccc3d37ccff6cdd6 |
994a379ff057724248d8435c9be45c1f |
b5b7146b07b0a0804b36b8056f316722 |
65510cda14bcefd2419eb1262a6d6829 |
a4a63756c39e345e31f1e8e698ea03a6 |
2794cacb3f177f340dee0aa2a71bdf1c |
2f6c8d68392839cb4615c455cd25fc9c |
20ddc972f71c8e584ed2c43254eb811b |
1326879b25dd0d7452d7a4b674165a5a |
(*) denotes that no Rich signature present in the file |
(^) encrypted |
Page 23 |
The Command Structure of the Aurora Botnet |
01b9c2c916e6d9a82bfc5912348a231f |
0b4872a4f20760739b0007c6b2dc08bd |
253f59417c6c784d6c0e5565736d1815 |
273a51aada271e5a4a91321a3126c767*^ |
325566e0871ac3d4fccfbb0b4efd8d07 |
38ee6476ffe7473707520ef7f5ed5ecb |
62686fd8a1c24abfb7a621e5629ce4ab |
69ef60094052321d91c0094efd832b92 |
6e245522d710ca1564e6873a3a0e82bd |
73a88fa854e766d5d3e712db8291bcc8 |
863a096685354b2730ad9dfd7e91e942 |
b8a177d99854ccc71e94a4a6645e85e7 |
d112a2ed6c675158295acb4824b481d8 |
feb88ea662de113dcafbe45bdece82fc |
(*) denotes that no Rich signature present in the file |
(^) encrypted |
Malware |
Diagram |
Page 24 |
The Command Structure of the Aurora Botnet |
Malware Summary of Findings and Analysis |
The predecessor Aurora malware comes from two different families. The newer family came |
immediately 2 months after the older family, and there was no overlap in their prevalence. For the |
older family, there was neither an observable protection mechanism nor an AV evasion technique. It |
was simply a dropper for keylogger files. The newer family has some protection mechanisms and AV |
evasion techniques. However, it lacks the sophistication found in other botnet malware families. |
Below is a summary of the findings of the two malware families that were analyzed. |
Common characteristics: |
Served through fake AV hosting Web sites (no longer available) |
Common autostart techniques |
Common older stealth techniques |
Multiple malware server domains to improve resiliency |
Droppers and dropped files (EXE and DLLs) were compiled using Microsoft compilers |
Differences: |
1. Main malware component: |
a. November 2009 Family |
uses DLL file as one of its components |
b. August 2009 Family |
uses VXD and SYS files |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.