text
stringlengths 4
429
|
---|
acelpvc.dll
|
Additional File
|
wuauclt.exe
|
Additional File
|
jucheck.exe
|
Additional File
|
AdobeUpdateManager.exe
|
Additional File
|
zf32.dll
|
The above screenshot illustrates a REcon
|
trace on the
|
malware dropper and subsequent service creation. Location
|
A. represents the dropper program, which unpacks itself
|
and decompresses a file to the system32 directory. Point B.
|
represents the initial svchost.exe startup, which is loading the
|
malware payload. Location C. is the actual execution of the
|
malware service, which remains persistent. At points E. and F.
|
you can see the malware checking in with the command and
|
control server. Finally, location D. represents the dissolvable
|
batch file which deletes the initial dropper and then itself.
|
CAPABILITY
|
The malware has generic and flexible capabilities. There are
|
distinct command handlers in the malware that allow files to
|
be stolen and remote commands to be executed. The command
|
handler is illustrated in Figure 2. At location A. the command
|
number is checked. At locations marked B. are each individual
|
command handler, as controlled by the C&C server and command
|
February 10, 2010 7
|
number in the C&C packet. Location C. is where the result of
|
each command is sent back to the C&C server.
|
At location 1. is a dropper obtained from an exploit server
|
directly accessed from the extracted shellcode from a MS10002 JavaScript vector. Location 2. represents a forensic
|
toolmark within the dropped executable. This toolmark
|
was obtained using physical memory assessment of the live
|
executable, after it was allowed to unpack itself in a virtual
|
machine. This assessment was performed with HBGary
|
Responder
|
. At location 3., the recovered toolmark(s) were
|
researched against published source code artifacts on the
|
Internet. From this, a single posting was discovered with
|
this exact toolmark, and this posting exists only in one place
|
and is of Chinese origin. From this, the author of the source
|
code was determined to be XXXXXXXX. At location 4., all
|
social cyberspaces used by XXXXXXX were then enumerated.
|
From this, postings in Traditional and Simplified Chinese
|
were discovered that confirm that XXXXXX is the author
|
and supplier of a malware package known as
|
or
|
Netbot
|
Attacker
|
. Within the social space around
|
Netbot Attacker
|
are individuals who are testing and/or asking for technical
|
support regarding the malware package operation. These
|
individuals have been grouped within Palantir
|
as
|
technical
|
support for bot
|
at location 5.
|
Figure 2. C&C Command Parser
|
COPYCATS AND VARIANTS
|
With the release of MS10-002, and the subsequent
|
integration with Metasploit, the exploit vector used with
|
Aurora has been adopted laterally within the malware
|
development economy. Therefore, the use of MS10-002
|
should not be construed as an Aurora infection without
|
further analysis of the dropped payload. Forensic toolmarks
|
and link analysis have revealed several different threat
|
groups who are employing common IE exploit vectors.
|
HBGary is currently tracking several groups who operate
|
malware systems of this nature.
|
HBGary is using forensic toolmarks to trace the source
|
code origins of binary malware samples dropped in
|
conjunction with the MS10-002 exploit vector. For example,
|
in Figure 3, link analysis is being used to track the identity
|
of a threat actor in conjunction with his known Digital
|
. HBGary
|
s Digital DNA
|
database not only codifies the
|
behavior of software, but also the coding idioms, algorithms,
|
and methods of individual developers. In this way, individual
|
threat actors can be tracked with Digital DNA
|
In the example, link analysis is provided by Palantir
|
. The
|
screenshot illustrates only a subset of the data being tracked
|
by HBGary, and sensitive information has been redacted.
|
Figure 3. Link Analysis of Malware Actors using Palantir
|
The above process, when carried further, produces many
|
more social links. Attribution such as this allows resolution
|
and visibility into the intent of individual threat groups.
|
HB GARY THREAT REPORT: OPERATION AURORA
|
RESPOND
|
Several Enterprise products have the capability to scan
|
for and potentially remove the Aurora malware. Detection of
|
the malware is covered in detail, from multiple aspects, in
|
the Detect section above. When using a Digital DNA
|
capable
|
platform such as McAfee ePO, you can search the Enterprise
|
for the following Digital DNA sequence (recommend a tight
|
match, 90% or higher).
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.