Hesperbot: analysis of a new banking trojan

Transcription

Hesperbot: analysis of a new banking trojan
Hesperbot: analysis of a new
banking trojan
Anton Cherepanov
[email protected]
The Discovery…
• Early testing variants: Turkey – April 2013
(Malware operators probably active even earlier)
• Peak activity in Turkey: July – September 2013
• Czech spreading campaigns: since August 8, 2013
ZeroNights 2013
The beginning of Czech campaign
ZeroNights 2013
Targeted Countries
United
Kingdom
•
•
•
•
tr-botnet
cz-botnet
pt-botnet
uk-botnet
Thailand
Portugal
Rest of
the world
+ few other test botnets
ZeroNights 2013
Win32/Spy.Hesperbot Architecture
Downloadable Modules
• x86 & x64 versions
ZeroNights 2013
Win32/Spy.Hesperbot Dropper
Injects core into explorer.exe
I. Spawn new explorer.exe, patch NtGetContextThread
II. “PowerLoader trick”:
Shell_TrayWnd / SetWindowLong /
SendNotifyMessage
III. Common CreateRemoteThread method
ZeroNights 2013
Win32/Spy.Hesperbot Core
• C&C communication (Hard-coded domain + DGA)
• Enumerating SmartCards
• Launch plug-in modules:
• socks, keylog, hvnc, sch, nethk, httphk, httpi
ZeroNights 2013
Network Traffic Interception
Intercepting HTTP and HTTPS:
• Form-grabbing
• Web-injects
The following browsers are affected:
• Internet Explorer, Mozilla Firefox, Google Chrome, Opera,
Safari, Yandex Browser, SeaMonkey, K-Meleon, Maxthon,
Avant Browser, Sleipnir, Deepnet Explorer
ZeroNights 2013
Network Traffic Interception
1. Creates local proxy
2. Hooks mswsock.dll functions
Embedded Certs for HTTPS:
• self-signed certificate
ZeroNights 2013
ZeroNights 2013
Certificate Pinning
ZeroNights 2013
Certificate Pinning
ZeroNights 2013
Bypassing Certificate Verification
Browser process
iexplore.exe
maxthon.exe
avant.exe
sleipnir.exe
webkit2webprocess.exe
browser.exe
chrome.exe
deepnet.exe
firefox.exe
seamonkey.exe
k-meleon.exe
Hooked functions
opera.exe
Function in opera.dll
CertVerifyCertificateChainPolicy and
CertGetCertificateChain in crypt32.dll
CERT_VerifyCertificate, CERT_VerifyCert,
CERT_VerifyCertificateNow,
CERT_VerifyCertNow and
CERT_VerifyCertName in nss3.dll
ZeroNights 2013
Network Traffic Interception
ZeroNights 2013
Example Configuration Files
ZeroNights 2013
Example Configuration Files
ZeroNights 2013
Example Configuration Files
ZeroNights 2013
Example Configuration Files
ZeroNights 2013
ZeroNights 2013
ZeroNights 2013
ZeroNights 2013
Mobile component
• Android
• BlackBerry
• Symbian
ZeroNights 2013
Comparison with Gataka
Web-injects
Supported browsers
Form-grabbing
Video capturing
Keylogger
Modular architecture
Configuration format
C&C communication
Remote access
Mobile component
Price
Most targeted
Gataka
Hesperbot
✔
✔
IE, Firefox, Chrome, Opera, + some less known
Safari
ones
Via web-injects
Through local proxy
✔
✔
✔
✔
✔
database
file
XOR encrypted
HTTPS
VNC
VNC
?
✔
~3300 EUR (Zutick)
?
Germany, Netherlands,
Turkey, Czech
Scandinavia
Republic, Portugal
ZeroNights 2013
Conclusion
• New code written from scratch
• Real money stolen
• On-going investigation
• Similar / Reusable web-inject format
• Monitoring botnet activity, tracking new versions…
• Strictly localized campaigns
ZeroNights 2013
Thank you!
[email protected]
[email protected]
WeLiveSecurity.com
Virusradar.com

Similar documents

overview of medications to treat addiction in primary care

overview of medications to treat addiction in primary care 16. Laaksonen E, et al. A randomized, multicentre, open-label, comparative trial of disulfiram, naltrexone and acamprosate in the treatment of alcohol dependence. Alcohol Alcohol. 2008 Jan-Feb;43(1...

More information