Backoff: New Point Of Sale Malware (August 06,2014)

By

The Dell Sonicwall Threats Research team observed reports of a new POS bot family named Backoff versions 1.55 and 1.56 actively spreading in the wild. This is the second instance of an infostealer bot family that features popular Point-of-Sale Trojan Dexter like memory scrapping functionality. These variations have been seen as far back as October 2013 and continue to operate as of July 2014. Backoff malware typically has the capabilities such as scraping memory, injecting into explorer.exe and key logging functionality.

Infection Cycle:

The Trojan adds the following file to the file system:

    %APPDATA% OracleJava javaw.exe [Detected as GAV: Backoff.A (Trojan)]
    %APPDATA% OracleJava Log.txt [Logging keystrokes]

The Trojan adds the following key to the Windows registry to ensure persistence upon reboot:

    HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRun Windows NT Service “%APPDATA% OracleJava javaw.exe”

It will inject Import Address Table ( IAT Modification) of its own functions (1.55 “goo”)

KeyLogger:

Backoff has the Key logger function, it uses GetKeyState and GetKeyboardState to capture the pressed keys on target system and it’s logging all keys into following file:

    %APPDATA% OracleJava Log.txt

The malware uses GetForegroundWindow and GetWindowTextA to retrieve non-ASCII keys such as following list:

POS Memory Scraping:

The malware retrieve all processes lists and save it on its own memory, one of the injected malicious code threads is responsible for scraping the memory of active non-system processes on the infected machine for credit card information periodically. Backoff tries to enumerate Credit Card data from POS Software. For this process, attackers use API functions calls such as:

  • CreateToolhelp32Snapshot
  • Process32First
  • Process32Next
  • OpenProcess
  • ReadProcessMemory

The stolen information is then relayed back to the Command & Control server. Backoff (1.55 “goo”) uses some filtering memory scraping against some process in the following list:

  • explorer.exe
  • lsass.exe
  • spoolsv.exe
  • mysqld.exe
  • services.exe
  • wmiprvse.exe
  • LogonUI.exe
  • taskhost.exe
  • wuauclt.exe
  • smss.exe
  • csrss.exe
  • winlogon.exe
  • alg.exe
  • iexplore.exe
  • firefox.exe
  • chrome.exe
  • devenv.exe

Command and Control communication

During our analysis we saw that the following communication between the infected machine and the C2 server (1.55 “backoff” and 1.55 “goo”):

The ‘id’ parameter is stored in the following registry Key:

  • HKCUSOFTWAREMicrosoftWindowsCurrentVersionidentifier

    Backoff has the “data” code which is Base64 encoded/RC4 decrypted Card data; here is an example of encrypted card data which is scraped by malware.

    Backoff Variants on the Wild

    Backoof has the six variants such as following:

    • Backoff 1.4
    • 1.55 “backoff”
    • 1.55 “goo”
    • 1.55 “MAY”
    • 1.55 “net”
    • 1.56 “LAST”

    Backoff 1.4
    MD5: 927AE15DBF549BD60EDCDEAFB49B829E
    Install Path: %APPDATA%AdobeFlashPlayermswinsvc.exe
    Dropped Files:

    • %APPDATA%mskrnl
    • %APPDATA%winserv.exe
    • %APPDATA%AdobeFlashPlayermswinsvc.exe

    Registry Keys:

    • HKCUSOFTWAREMicrosoftWindowsCurrentVersionidentifier
    • HKCU SOFTWARE MicrosoftWindowsCurrentVersionRunWindows NT Service

    HTTP POST Request:

    • User-Agent: Mozilla/4.0
    • URI(s): /aircanada/dark.php
    • Static String on POST Request: zXqW9JdWLM4urgjRkX

    1.55 “backoff”
    MD5: F5B4786C28CCF43E569CB21A6122A97E
    Install Path: %APPDATA%AdobeFlashPlayermswinhost.exe
    Dropped Files:

    • %APPDATA%mskrnl
    • %APPDATA%winserv.exe
    • %APPDATA%AdobeFlashPlayermswinhost.exe
    • %APPDATA%AdobeFlashPlayerLog.txt

    Registry Keys:

    • HKCUSOFTWAREMicrosoftWindowsCurrentVersionidentifier
    • HKCU SOFTWARE MicrosoftWindowsCurrentVersionRunWindows NT Service

    HTTP POST Request:

    • User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:24.0) Gecko/20100101 Firefox/24.0
    • URI(s): /aero2/fly.php
    • Static String on POST Request: ihasd3jasdhkas

    1.55 “goo”

    MD5: 17E1173F6FC7E920405F8DBDE8C9ECAC
    Install Path: %APPDATA%OracleJavajavaw.exe
    Dropped Files:

    • %APPDATA%nsskrnl
    • %APPDATA%winserv.exe
    • %APPDATA%OracleJavajavaw.exe
    • %APPDATA%OracleJavaLog.txt

    Registry Keys:

    • HKCUSOFTWAREMicrosoftWindowsCurrentVersionidentifier
    • HKCU SOFTWARE MicrosoftWindowsCurrentVersionRunWindows NT Service

    HTTP POST Request:

    • URI(s): /windows/updcheck.php
    • Static String on POST Request: jhgtsd7fjmytkr

    1.55 “MAY”
    MD5: 21E61EB9F5C1E1226F9D69CBFD1BF61B
    Install Path: %APPDATA%OracleJavajavaw.exe
    Dropped Files:

    • %APPDATA%nsskrnl
    • %APPDATA%winserv.exe
    • %APPDATA%OracleJavajavaw.exe
    • %APPDATA%OracleJavaLog.txt

    Registry Keys:

    • HKCUSOFTWAREMicrosoftWindowsCurrentVersionidentifier
    • HKCU SOFTWARE MicrosoftWindowsCurrentVersionRunWindows NT Service

    HTTP POST Request:

    • URI(s): /windowsxp/updcheck.php
    • Static String on POST Request: jhgtsd7fjmytkr

    1.55 “net”
    MD5: 0607CE9793EEA0A42819957528D92B02
    Install Path: %APPDATA%AdobeFlashPlayermswinhost.exe
    Dropped Files:

    • %APPDATA%AdobeFlashPlayermswinhost.exe
    • %APPDATA%AdobeFlashPlayerLog.txt

    Registry Keys:

    • HKCUSOFTWAREMicrosoftWindowsCurrentVersionidentifier
    • HKCU SOFTWARE MicrosoftWindowsCurrentVersionRunWindows NT Service

    HTTP POST Request:

    • URI(s): /windowsxp/updcheck.php
    • Static String on POST Request: ihasd3jasdhkas9

    1.56 “LAST”
    MD5: 12C9C0BC18FDF98189457A9D112EEBFC
    Install Path: %APPDATA%OracleJavajavaw.exe
    Dropped Files:

    • %APPDATA%nsskrnl
    • %APPDATA%winserv.exe
    • %APPDATA%OracleJavajavaw.exe
    • %APPDATA%OracleJavaLog.txt

    Registry Keys:

    • HKCUSOFTWAREMicrosoftWindowsCurrentVersionidentifier
    • HKCU SOFTWARE MicrosoftWindowsCurrentVersionRunWindows NT Service
    • HKLM SOFTWARE MicrosoftWindowsCurrentVersionRunWindows NT Service
    • HKCUSOFTWARE\MicrosoftActive SetupInstalled Components{B3DB0D62-B481-4929-888B-49F426C1A136}StubPath
    • HKLMSOFTWARE\MicrosoftActive SetupInstalled Components{B3DB0D62-B481-4929-888B-49F426C1A136}StubPath

    HTTP POST Request:

    • User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:24.0) Gecko/20100101 Firefox/24.0
    • URI(s): /windebug/updcheck.php
    • Static String on POST Request: jhgtsd7fjmytkr

    SonicWALL Gateway AntiVirus provides protection against this threat via the following signatures:

    • GAV: Backoff.A (Trojan)
    • GAV: Backoff.A_2 (Trojan)
    Security News
    The SonicWall Capture Labs Threat Research Team gathers, analyzes and vets cross-vector threat information from the SonicWall Capture Threat network, consisting of global devices and resources, including more than 1 million security sensors in nearly 200 countries and territories. The research team identifies, analyzes, and mitigates critical vulnerabilities and malware daily through in-depth research, which drives protection for all SonicWall customers. In addition to safeguarding networks globally, the research team supports the larger threat intelligence community by releasing weekly deep technical analyses of the most critical threats to small businesses, providing critical knowledge that defenders need to protect their networks.