text
stringlengths
4
429
DIGITAL DNA SEQUENCE FOR AURORA MALWARE
01 B4 EE 00 AE DA 00 8C 16 00 89 22 00 46 73 00 C6 49 00 0B AE 01 E7 9F
04 05 81 01 0E DF 01 79 D8 00 25 6A 00 15 49 00 47 22 00 4B 67 0F 2D CC
01 29 67 01 35 99
To thwart command and control and prevent data loss,
known C&C domains should be blocked at the egress firewall.
The domains listed in the Detect section represent a
significant set of those currently known to be operating. IDS
signatures similar to the one illustrated in the Detect section
should be used to detect inbound exploit attempts, and
machines accepting this data should be scanned for potential
infections. Many A/V products now contain signatures for the
Aurora exploit and will be effective in detection and removal.
However, the attackers that represent the threat will not be
deterred, and variants of the attack are nearly assured.
FACTORS
DESCRIPTION
C&C protocol
If a variant is developed, it will very
likely use the same C&C protocol, but
may change the header of the packet
and the constants used for connection
setup. This will evade IDS / Firewall
rules designed to detect the current
scheme. It is unlikely the attackers will
change the encryption setup, however.
Installation and Deployment
The method used to install the service
is highly effective. Although the
filenames will likely change, the actual
method will likely remain.
INOCULATION
DIGITAL DNA INOCULATION SHOT
HBGary has prepared an inoculation shot for this malware.
The inoculation shot is a small, signed binary that will allow
you to scan for, and optionally remove, this malware from
your Enterprise network. The aurora innoculation shot can be
downloaded from www.hbgary.com.
When the aurora innoculation shot is executed it will query
the user for authentication credentials. Optionally the user
can just hit
cancel
to use the currently logged on USER
authentication token. Some sample usages are listed below.
To scan a single machine:
AuroraInnoculation.exe -scan 192.168.0.1
AuroraInnoculation.exe -scan MYBOXNAME
To scan multiple machines:
AuroraInnoculation.exe -range 192.168.0.1 192.168.0.254
To automatically attempt a clean operation:
AuroraInnoculation.exe -range 192.168.0.1 192.168.0.254 -clean
To scan a list of machines in a .txt file:
AuroraInnoculation.exe -list targets.txt
MCAFEE EPO CUSTOMERS
DETECTION OF AURORA THREATS WITH DIGITAL DNA FOR EPO
Customers of McAfee ePolicy Orchastrator, integrated
with Digital DNA, can detect emerging advanced persistent
threats. To detect Aurora, users should perform a Digital
DNA Sequence search with the above mentioned sequence
for Aurora, and set a fuzzy match of 90% or greater. Once
machines are detected, the user is encouraged to use the
freely available inoculation shot to remove the infection.
MORE INFORMATION
ABOUT HBGARY, INC
HBGary, Inc is the leading provider of solutions to detect,
diagnose and respond to advance malware threats in a
thorough and forensically sound manner. We provide the
active intelligence that is critical to understanding the intent
of the threat, the traits associated with the malware and
information that will help make your existing investment in
your security infrastructure more valuable.
Web:
www.hbgary.com
Corporate Address:
3604 Fair Oaks Blvd Suite 250
Sacramento, CA 95762
Phone: 916-459-4727
Fax 916-481-1460
REFERENCES
http://siblog.mcafee.com/cto/operation-%E2%80%9Caurora%E2%80%9Dhit-google-others/
ii http://www.thetechherald.com/article.php/201004/
5151/Was-Operation-Aurora-nothing-more-than-a-conventional-attack
iii http://www.fjbmcu.com/chengxu/crcsuan.htm
(via: http://www.secureworks.com/research/blog/index.php/2010/01/20/
operation-aurora-clues-in-the-code/)
iv http://www.avertlabs.com/research/blog/index.php/2010/01/18/aninsight-into-the-auroracommunication-protocol/
http://www.symantec.com/connect/blogs/trojanhydraq-incident-analysisaurora-0-day-exploit
CORPORATE OFFICE
3604 Fair Oaks Blvd. Ste. 250
Sacramento, CA 95864
916.459.4727 Phone
CONTACT INFORMATION
support @hbgary.com
www.hbgary.com
MSUpdater
Trojan
Ongoing
Targeted