- Contents
Transcription
- Contents
NSHC 2014. 04. 01 Malware Analysis Report assa [ iSpyware ] The variant of ‘Outlook Spyware’ is distributed for these days. It steals FTP and Email information like ‘Outlook Spyware’, also, it steals Internet Browser information. It’s disguised as PDF documents and uses a name that ‘payment receipt’. In the system that is suspected to be infected, countermeasures according to the action and treatment through A/V are required. Information Service about a new vulnerability Version 1.0 External © 2014 Red Alert. All Rights Reserved. Index 1. Malware Stub ............................................................................................3 2. Technical Details .................................................................................... 14 3. Opinion of Red Alert ............................................................................ 22 4. Removal Recommendations ............................................................... 22 5. Reference................................................................................................. 23 facebook.com/nshc.redalert © 2014 Red Alert. All Rights Reserved. 1 Confidentiality Agreements This report was written from the Red Alert team. There is no problem user for research purpose, but we don’t care about Legal responsibility. This code is a living document and will be updated from time to time. Please refer to the Red Alert SNS Page to download updates. (https://www.facebook.com/nshc.redalert) Analysis reports that are updated on Facebook, including other materials and article, sample can offer premium services the ISAC on the page. (https://isac.nshc.net). facebook.com/nshc.redalert © 2014 Red Alert. All Rights Reserved. 2 1. Malware Stub Malware Name File Size Compiled Date payment receipt (document 3.03.2104).exe 172,032 bytes MD5 2014.03.03 21:23:50 etc 5818F3CF9E776C306C71140471F0FE5D N/A Table 1. File info–1 Malware Name File Size Compiled Date [loaded module].dll 167,936 bytes MD5 N/A etc 6CB12C48A880FA7FF95C341DC2DB2FB3 N/A Table 2. File info-2 - http://malwaredb.*******.com/ Index Description OS Windows XP SP3 KR Browser Windows Internet Explorer 8 Table 3. Analysis Environment facebook.com/nshc.redalert © 2014 Red Alert. All Rights Reserved. 3 Figure 1. Drop flow facebook.com/nshc.redalert © 2014 Red Alert. All Rights Reserved. 4 Here is an IP information. Figure 2. IP info-1 Figure 3. IP info-2 facebook.com/nshc.redalert © 2014 Red Alert. All Rights Reserved. 5 Attacker runs the below web page. - http://****asit.su/ Figure 4. http://****asit.su/ The malware creates a new registry in the below path. - Path: HKCU\SOFTWARE Value Name: 6619057994651728 (Use random name) Value Data: Data in binary format (Refer to ‘Figure 4. Registry value’) Figure 5. Registry value facebook.com/nshc.redalert © 2014 Red Alert. All Rights Reserved. 6 It creates a ‘SUSPEND’ state’s thread named ‘wuauclt.exe’. - Command Line: C:\WINDOWS\system32\wuauclt.exe - Creation Flag: CREATE_SUSPEND Figure 6. Process creation Before executing the thread, it drops a DLL after copying a code. Figure 7. Copy code The dropped DLL enumerates the specified values in the below path. - Path: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall Value Name: UninstallString, DisplayName Figure 8. RegEnumKeyEx facebook.com/nshc.redalert © 2014 Red Alert. All Rights Reserved. 7 It searches the registry keys or files related on ‘FTP’, ‘E-mail’, and ‘Internet Browser’ using the below routine. Figure 9. Search routine The stolen information is sent to the server. Figure 10. Send information facebook.com/nshc.redalert © 2014 Red Alert. All Rights Reserved. 8 The stolen information is uploaded the following web page. - http://****asit.su/admin/db Figure 11. List of the infected system The stored information on this page is classified into the below types. - bot - email - ftp - http - RDP (Remote Desktop Protocol) Table 4. Information type facebook.com/nshc.redalert © 2014 Red Alert. All Rights Reserved. 9 There are type of OS, Bit, and country code in “bot”. Figure 12. Bot info There are email address, type of mail server, port number, user id, and user password in “email”. Figure 13. Email info facebook.com/nshc.redalert © 2014 Red Alert. All Rights Reserved. 10 There are ftp id, ftp password, and ftp address in “ftp”. Figure 14. FTP info ① FTP ID ② FTP PW ③ FTP address There are user id, user password, and site address in “http”. Figure 15. HTTP info facebook.com/nshc.redalert © 2014 Red Alert. All Rights Reserved. 11 ① User ID ② User PW ③ Web site address The attacker steals the information of Remote Desktop. Figure 16. RDP info ① RDP ID ② RDP PW ③ RDP address facebook.com/nshc.redalert © 2014 Red Alert. All Rights Reserved. 12 The attacker sets the country code in ‘geoip.inc; file in order to grasp the source of the collected information. Korea is set to ‘119’. Figure 17. Country code The major cities in each country also are set to the specified code. Figure 18. City code facebook.com/nshc.redalert © 2014 Red Alert. All Rights Reserved. 13 2. Technical Details The malware enumerates the user account information such as authority level and login information using ‘NetUserEnum’ function. Figure 19. NetUserEnum Also, it tries to access to the server like mail server, terminal server, and remote shell to set the ‘Logon Type’ to ‘LOGON32_LOGON_INTERACTIVE’ of ‘LogonUserA’ function. It uses user name and password the following lists. Figure 20. LogonUser Administrator ASPNET Guest HelpAssistant PC SUPPORT_388945a0 Table 5. User Name list facebook.com/nshc.redalert © 2014 Red Alert. All Rights Reserved. 14 Figure 21. PW List The malware steals FTP server information and user account information to abuse that Site Manager information is saved in plain text. Figure 22. Search registry key facebook.com/nshc.redalert © 2014 Red Alert. All Rights Reserved. 15 It searches the registry for stealing the server name, port number, user id, and password. Far - Software\far\plugins\ftp\hosts Far2 - Software\far2\plugins\ftp\hosts GlobalSCAPE - Software\GlobalSCAPE\ FileZilla- Software\FileZilla\Site Manage GHISLER – installPath\GHISLER\wcx_ftp.ini ws_ftp - Software\ipswitch\ws_ftp SmartFTP - <user name>\Application Data\SmartFTP\Client 2.0\Favorites TurboFTP - <user name>\Application Data\TurboFTP\addrbk.dat CoffeeCup Software - Software\CoffeeCup Software\Internet\Profiles FTP Commander - Software\Microsoft\Windows\CurrentVersion\Uninstall FTP Navigator - Software\Microsoft\Windows\CurrentVersion\Uninstall ALFTP - <user name>\Application Data\Estsoft\ALFTP\ESTdb2.dat FTPRush - Software\FTPRush\DataFolder UltraFXP - Software\UltraFXP FTPware - Software\FTPWare\CoreFTP\Sites SecureFX - Software\VanDyke\SecureFX\Config Path BlazeFTP – Software\FlashPeak\BlazeFtp\Settings Robo-FTP 3.7 – Sofware\Robo-FTP 3.7\FTPServers LinasFTP – Software\LinasFTP\Site Manager MAS-Soft – Software\MAS-Soft\TRPInfo Table 6. Path of registry-1 facebook.com/nshc.redalert © 2014 Red Alert. All Rights Reserved. 16 The malware enumerates the below registry to steal the information of Internet Explorer, Firefox, Chrome, and Opera. HKCU\Software\Opera software HKCU\Software\Mozilla HKCU\Software\Microsoft\Internet Explorer HKCU\Software\Google\Chrome HKCU\Software\ChromePlus HKCU\Software\Microsoft\Internet Explorer\IntelliForms\Storage2 Table 7. Registry info Internet Explorer stores two type of passwords, Autocomplete and HTTP basic authentication based passwords. Autocomplete passwords are normal website login passwords such as gmail, Facebook, LinkedIn, etc. HTTP basic authentication passwords are network login passwords for LANs, etc. 가. Autocomplete password With version 7 onwards, IE stores all the Autocomplete passwords in the following registry location in an encrypted format. - HKCU\Software\Microsoft\Internet Explorer\IntelliForms\Storage2 Each entry in the registry key corresponds to a hash of the website URL corresponding to the username / password for that URL. The malware steals those information after searching the value of registry. Figure 23. Search registry facebook.com/nshc.redalert © 2014 Red Alert. All Rights Reserved. 17 나. HTTP basic authentication password The HTTP basic authentication passwords are stored in the ‘Credentials Store’. The ‘Credentials Store’ is in the following location: Windows XP: - C:\Documents and Setting\[user name]\Application Data\Microsoft\Credentials Over Windows Vista: - C:\Users\[user name]\AppData\Roaming\Microsoft\Credentials The HTTP basic authentication passwords are encrypted using built in Windows Cryptography functions. For enumerating contents of ‘Credentials Store’, the malware uses ‘CredEnumerate’ function. Also it uses ‘CryptUnprotectData’ function for decrypting. Figure 24. Steal pwd facebook.com/nshc.redalert © 2014 Red Alert. All Rights Reserved. 18 Chrome stores usernames and passwords in a SQLite database called Login Data located in the following locations: Windows XP: - C:\DocumentsandSetting\[username]\LocalSettings\ApplicationData\Google\Chro me\User Data\Default Over Windows Vista: - C:\Users\[user name]\AppData\Local\Google\Chrome\User Data\Default For stealing user names and password, it enumerates the directory. Figure 25. Search file facebook.com/nshc.redalert © 2014 Red Alert. All Rights Reserved. 19 Firefox stores usernames and passwords in a SQLite database called signons.sqlite which can be found in the following folders: Windows XP: - C:\DocumentsandSetting\[username]\ApplicationData\Mozilla\Firefox\Profiles\[ra ndom_name].default Over Windows Vista: - C:\Users\[username]\AppData\Roaming\Mozilla\Firefox\Profiles\[random_name]. default The malware uses the below query for stealing information. Figure 26. DB query Opera stores the following information in an encrypted file called wand.dat: - Login URL - Main website URL - Username filed ID - Username - Password filed ID - Password Wand.dat is stored locally on your computer in the following locations: Windows XP: - C:\Documents and Settings\[username]\Application Data\Opera\Opera\wand.dat Over Windows Vista: - C:\users\[username]\AppData\Roaming\Opera\Opera\wand.dat The malware finds the information and sends it to the server. facebook.com/nshc.redalert © 2014 Red Alert. All Rights Reserved. 20 Figure 27. Search info It searches the registry for stealing account info of E-mail. Figure 28. Search registry key The registry path is as follows: HKCU\Software\Microsoft\Windows Live Mail HKCU\Software\Microsoft\Windows Mail HKCU\Software\Poco Systems Inc\accounts.ini HKCU\Software\IncrediMail\account.cfg HKCU\Software\Microsoft\Internet Account Manager\Accounts HKCU \Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts HKCU \Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem \Profiles\Microsoft Outlook Internet Settings HKCU \Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem \Profiles\Outlook Table 8. Path of registry-3 facebook.com/nshc.redalert © 2014 Red Alert. All Rights Reserved. 21 3. Opinion of Red Alert The variant of ‘Outlook Spyware’ is distributed for these days. It steals FTP and E-mail information like ‘Outlook Spyware’, also, it steals Internet Browser information. If the system is infected with the malware, the malware steals user information and sends it to the server. The stolen information can be occurred the secondary damage. Please change your password regularly and encrypt main files or directories. 4. Removal Recommendations Delete the file referring to the below path. - C:\payment receipt.exe - %Desktop%payment receipt(document 3.03.2104).exe Delete the registry related on the malware. - Subkey of HKCU\Software (Refer to ‘Figure 4. Registry value’) Change your password regularly. Set a password for protecting main documents and directories. Please get a thorough system examination by referring ‘Reference. [1] Virus Total’ and treat the malware through A/V. facebook.com/nshc.redalert © 2014 Red Alert. All Rights Reserved. 22 5. Reference [1] Virus Total https://www.virustotal.com/ko/file/942b5bff64bb44223be4956415f9b70b7022f220dd02b5894 a90a2841f646a9e/analysis/ [2] File Analyzer http://file-analyzer.net/analysis/2555/8663/0/html [3] Microsoft http://www.microsoft.com/security/portal/threat/encyclopedia/Entry.aspx?Name=PWS:Win32 /Fareit#tab=2 [4] Browser security http://excellenttips.wordpress.com/2012/07/12/browser-security-how-firefox-ms-internetexplorer-chrome-opera-safari-store-usernames-passwords-part-1-of-5/ facebook.com/nshc.redalert © 2014 Red Alert. All Rights Reserved. 23