text
stringlengths 4
429
|
---|
#### is a number)
|
Potential variation
|
SYSTEM\CurrentControlSet\Services\
|
RaS???\Parameters\
|
Value: ServiceDLL
|
Data: %temp%\c_1758.nls
|
PAYLOAD
|
The payload uses
|
two-stage installation. GLANCE UNDER THE HOOD
|
buffer after phase one XOR:
|
During stage one, the
|
mJ2bhcPExs7excLThcjExqurnauYq
|
dropper will install the
|
buffer after base64 decoding:
|
payload as a service
|
running under the
|
name Ups??? (where
|
??? are three random characters). Once executing, the
|
payload will immediately delete the first service and enter
|
stage-two. During stage-two, the payload will register a new,
|
second service under the name RaS??? (where ??? are three
|
random characters). This new service will point to the same
|
backdoor DLL, no new files are involved. Note: the three
|
character prefixes Ups and RaS can easily be modified by
|
the attacker.
|
Once the new service is registered, the payload will access
|
an embedded resource that is encrypted. The decryption goes
|
through several phases. The encrypted data block contains
|
the DNS name for the command and control server (homeunix.
|
com, etc). This data block is configurable before the malware
|
is deployed. The data block length is hard-coded (0x150 or
|
336 bytes). During phase one, this data block is fed through
|
a simple XOR (0x99), resulting in an ASCII-string. Next, the
|
resulting ASCII-string is fed into a base64 decoding function,
|
producing a binary string. Finally, the resulting base64
|
decoded binary string is fed through another XOR (0xAB),
|
resulting in clear-text. The three primary encryption loops are
|
colored and marked in Figure 1. The resulting clear-text buffer
|
contains several fields in both ASCII and UNICODE, including
|
the C&C server address.
|
Figure 1. Base64 and XOR Encryption Scheme
|
HB GARY THREAT REPORT: OPERATION AURORA
|
ACTIONABLE INTELLIGENCE
|
PATTERN
|
C&C Server DNS
|
* .homeunix.com
|
(where * is any subdomain)
|
* .homelinux.com
|
* .ourhobby.com
|
COMMAND AND CONTROL
|
The payload communicates with its command and control
|
server over port 443. The source port is randomly selected.
|
While outbound traffic appears to be HTTPS, the actual traffic
|
uses a weak custom encryption scheme. The command and
|
control packets have a very specific format.iv
|
* .3322.org
|
* .2288.org
|
command
|
parms
|
0x00000001
|
payload len CRC KEY payload
|
* .8866.org
|
* .ath.cx
|
* .33iqst.com
|
* .dyndns.org
|
* .linode.com
|
* .ftpaccess.cc
|
* .filoups.info
|
* .blogsite.org
|
The payload will create additional registry keys.
|
ACTIONABLE INTELLIGENCE
|
PATTERN
|
Additional Key
|
HKLM\Software\Sun\1.1.2\IsoTp
|
Additional Key
|
HKLM\Software\Sun\1.1.2\AppleTlk
|
The payload section is encrypted with a key selected by
|
using GetTickCount. This means each infected node has its own
|
key. The key is embedded in the header of the packet, and is
|
easily recovered.
|
DIAGNOSE
|
HOW THE MALWARE WORKS
|
The primary control logic can be found in the module
|
registered under the service key (rasmon.dll, etc.). This
|
module has been written in c and includes several specific
|
methods and encodings that provide forensic track-ability.
|
Other potential dropped files, as reported by McAfee:
|
ACTIONABLE INTELLIGENCE
|
PATTERN
|
Additional File
|
securmon.dll
|
Additional File
|
AppMgmt.dll
|
Additional File
|
A0029670.dll (A00#####.dll)
|
Additional File
|
msconfig32.sys
|
Additional File
|
VedioDriver.dll
|
Additional File
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.