malware most wanted: evil bunny

37

Upload: cyphort

Post on 14-Jul-2015

431 views

Category:

Technology


5 download

TRANSCRIPT

Page 1: Malware Most Wanted: Evil Bunny
Page 2: Malware Most Wanted: Evil Bunny

EvilBunny MalwareMarion Marschalek

Security Researcher at Cyphort Labs

Page 3: Malware Most Wanted: Evil Bunny

Your speakers today

Marion MarschalekSecurity Researcher

Cyphort Labs

Shelendra SharmaProduct Marketing Director

Page 4: Malware Most Wanted: Evil Bunny

Agenda

o Modern Threat Landscape

o Wrap-up and Q&A

Cyp

ho

rt L

abs

T-sh

irt

Page 5: Malware Most Wanted: Evil Bunny

Threat Monitoring & Research team

________

24X7 monitoring for malware events

________

Assist customers with their Forensics and Incident Response

We enhance malware detection accuracy

________

False positives/negatives________

Deep-dive research

We work with the security ecosystem

________

Contribute to and learn from malware KB

________

Best of 3rd Party threat data

Page 6: Malware Most Wanted: Evil Bunny

The Modern Threat Landscape

Page 7: Malware Most Wanted: Evil Bunny

http://www.mirror.co.uk/

OFFENDERS

Page 8: Malware Most Wanted: Evil Bunny

http://www.moviepilot.com

DEFENDERS

Page 9: Malware Most Wanted: Evil Bunny

http://www.screenrant.com/

SOPHISTICATEDWEAPONRY

Page 10: Malware Most Wanted: Evil Bunny

http://www.fanpop.com/

SOPHISTICATEDWEAPONRY WITH SUPERPOWERS

Page 11: Malware Most Wanted: Evil Bunny

o You don‘t see your adversary

o You don‘t know whose death star it is there on your machine

o You probably won‘t even find the death star on your machine

http://glee.wikia.com

Page 12: Malware Most Wanted: Evil Bunny

o Intellectual property being stolen

o Political opponents put to jail

o Internet communication being blocked

o Vendor finding a new exploit

o Same time, hacker writes 5 more

o Control of media

o Enterprises loosing customer data

o Nation states spying on their citizens

o Nation states being hacked

o Little paul loosing his homework

Page 13: Malware Most Wanted: Evil Bunny

Bunny Offenders

Page 14: Malware Most Wanted: Evil Bunny

SAMPLE #1

o Filesize:192512

o CompileTime: 2010:05:06

o C&C: callientefever.info

o HTTP Accept-Language: fr

Page 15: Malware Most Wanted: Evil Bunny

TFC

o Dynamic API loading by name hash

Page 16: Malware Most Wanted: Evil Bunny

TFC

o PING

o EXEC

o HTTPF

o ASPFLOOD

o TCPFLOOD

o WEBFLOOD

o POSTFLOOD

ATCLEAR

STATISTICS

KILL

SET

UPLOAD

UPDATE

PLUGIN

FLO

OD

IN

G

EV

ER

YT

HIN

G

Page 17: Malware Most Wanted: Evil Bunny

TFC command and control

Page 18: Malware Most Wanted: Evil Bunny

SAMPLES #[2-4]

o FileSize: 184320

o CodeSize: 139264

o CompileTime: 2010:02:16 18:05:54+01:00

o FileSize: 184320

o CodeSize: 139264

o CompileTime: 2010:03:11 17:55:03+01:00

o FileSize: 792064

o CodeSize: 583680

o CompileTime: 2011:10:25 20:28:39+01:00

Page 19: Malware Most Wanted: Evil Bunny

EvilBunny

o FileSize: 792064

o CompileTime: 2011:10:25 20:28:39+01:00

o API name hashing key AB34CD77h

o http://1.9.32.11/bunny/test.php?rec=nvista

o Anti-Analysis | Threads & Files | CPU Data | C&C Commands | LUA

Page 20: Malware Most Wanted: Evil Bunny

Not funny.

Page 21: Malware Most Wanted: Evil Bunny

SRSLY?

Page 22: Malware Most Wanted: Evil Bunny

Evil Bunny

AV Product Enumeration

Firewall Product Enumeration

Sandbox Check "klavme", "myapp", "TESTAPP",

"afyjevmv.exe“, Timing Condition

SELECT * FROM ANTIVIRUSPRODUCT

SELECT * FROM FIREWALLPRODUCT

Page 23: Malware Most Wanted: Evil Bunny

Big Boss

Worker2

Worker1

Worker0

Worker3

MainThread

PerfMon

CommandParsing

ScriptExecution

ManageWorkerThreads

FileMan/Inet

EvilBunny

Page 24: Malware Most Wanted: Evil Bunny

LUA Thread

Cmd Parsing

Execute Command

Start LUA Thread

AdvancedCommandand ScriptParsing

Lua magic

Page 25: Malware Most Wanted: Evil Bunny

AdvancedCommandand ScriptParsing

Lua magic

o 4 worker threads

o Executing Lua scripts

o Lua 5.1 + C/Invoke code

o Callback from LUA to C++

Page 26: Malware Most Wanted: Evil Bunny

C&c servers

o Config stored in HKLM\Software\Microsoft\Ipsec

o http://le-progres.net/images/php/test.php?rec=11206-01

o http://ghatreh.com/skins/php/test.php?rec=11206-01

o http://www.usthb-dz.org/includes/php/test.php?rec=11206-01

Page 27: Malware Most Wanted: Evil Bunny

Location Remote Host Port Number

Oakville, Canada 69.90.160.65 80

Montréal, Canada 70.38.107.13 80

Montréal, Canada 70.38.12.10 80

http://www.threatexpert.com/report.aspx?md5=c40e3ee23cf95d992b7cd0b7c01b8599

C&c servers

Page 28: Malware Most Wanted: Evil Bunny

GETCONFIG

FTPPUT

FTPGET

SENDFILE

GETFILE

UNINSTALL

RESTARTHEARER

RESTART

CLEANHEARER

COMMANDS

CRONTASKA

CRONTASKR

CRONTASKL

MAXPOSTDAT

SETURL

STOP

SETCPULIMIT

TIMEOUT

WAITFOR

UPDATEDIETIME

Page 29: Malware Most Wanted: Evil Bunny

Infection Vector

http://blog.9bplus.com/analyzing-cve-2011-4369-part-one/

Page 30: Malware Most Wanted: Evil Bunny

CVE-2011-4369

o Adobe Reader vulnerability

o Discovered December 2011

o Original release date: Dec. 16, 2011

o Documented Bunny infection: Dec. 20, 2011

Page 31: Malware Most Wanted: Evil Bunny

WRAPPING UPTHE RABBIT

Page 32: Malware Most Wanted: Evil Bunny

TRAITS OF SOPHISTICATED MALWARE

o Tricking of security solutions

o Showing uncommon features

o Vast resources being used in development and spreading

o Advanced stealth mechanisms

Page 33: Malware Most Wanted: Evil Bunny

BUNNY ORIGINS

o Project named bunny, version 2.3.2

o DDoS botnet operators

o Accept-Language: fr

o C&C Servers hosted in Canada

o C&C domains resemble French/Iranian websites

o Related to recently revealed Babar malware

Page 34: Malware Most Wanted: Evil Bunny

THE HIDDEN LINK

o Shared code

o Proxy bypass

o Anti-virus enumeration

o Similar API obfuscation

o Same level of complexity

o Middle-eastern domain names

Page 35: Malware Most Wanted: Evil Bunny

Q&A

Page 36: Malware Most Wanted: Evil Bunny

Thank You!

Page 37: Malware Most Wanted: Evil Bunny