New Dorkbot variant targeting skype users (Oct 19, 2012)

Dell SonicWALL Threats Research team came across a new variant of the Dorkbot worm specifically targeting Skype users. Dorkbot also known as Ngrbot is known to spread through instant messengers, social networking websites, and removable drives. However, this is the first instance we saw that targets Skype users as well by hooking to Skype APIs.

The malware executable is named as Skype_(Date)_(img or foto).exe and uses Skype’s official icons for disguise as seen below:

screenshot

Infection Cycle

  • The new variant when executed, drops a copy of itself in the user’s Application Data directory and also modifies registry to ensure that it runs on system reboot:
    • Dropped File – (Application Data)Whzkzg.exe (copy of itself)
    • Registry – HKCUSoftwareMicrosoftWindowsCurrentVersionRunWhzkzg: “%AppData%Whzkzg.exe”
  • Connects to api.wipmania.com to determine the public IP address of the infected system.
  • It was found to be actively sending out Skype IMs to the infected user’s Skype contacts. The message is sent in local default language of the infected system and consists of a shortened URL that leads to the download of the Skype Dorkbot variant as seen below:
  • screenshot

    Statistics of clicks registered for the shortened malicious URL (courtesy Google) shows that it has received more than 200,000 visits in past one month:

    screenshot

  • It is also capable of spreading via MSN Messenger, removable drives, and various social networking sites by posting comments. Below is the list of propagation vectors:
  • screenshot

  • The Dorkbot variant we analyzed connects to one of the following domains on TCP port 1863:
    • mars.dothome.pl
    • venus.timeinfo.pl
    • photobeat.su

    It also contains a hardcoded command and control IP address: 188.40.15.29 that it connects on TCP port 1863 if the above mentioned domains fail to resolve.

  • Dorkbot is also known to download and install other malware family payloads as part of Pay Per Install scheme where the author gets paid for every successful install. In our analysis we found that the sample downloaded two different payloads from the file sharing service hotfile.com:
    • hotfile.com/dl/1765672(REMOVED).html -> (Application Data)4C.exe [Backdoor Trojan detected as GAV: Simda.FFK (Trojan)]
    • hotfile.com/dl/1765679(REMOVED).html -> (Application Data)4D.exe [Ransomware detected as GAV: PornoAsset.ANHR (Trojan)]

    It utilizes the Ruskill feature to install these downloaded malware files, which is known to keep track of system file and registry changes. The Ruskill feature also ensures that these files are removed upon system reboot.

  • It also contains modules for ftpgrab, formgrab, popgrab, and HTML injection, which are used in monitoring following URLs to steal user credentials:
  • screenshot

  • The bot is also capable of performing DDoS attacks via following three modules:
    • slowloris flood
    • UDP flood
    • SYN flood

Dell SonicWALL Gateway AntiVirus provides protection against this threat via following signatures:

  • GAV: Dorkbot.SKP (Trojan)
  • GAV: Dorkbot.SKP_2 (Trojan)

Neglemir performs DDOS attacks on selected targets (Oct 12, 2012)

Dell SonicWALL Threats Research team discovered a new Trojan spreading through drive-by downloads from malicious links. This Trojan called Neglemir was found reporting to a Botnet infrastructure and performing DDOS (Distributed Denial of Service) attacks on selected targets in China. During our analysis we found it targeting various servers belonging to China Telecom as well as websites selling tools for an online game called “The Legend of Mir”. The Trojan cloaks itself as Windows help service to prevent suspicion and it was also found disabling a number of Antivirus softwares.

Infection Cycle

The Trojan when executed creates a copy of itself in

%windir%Helpwinhelp.exe [Detected as GAV: Neglemir.A_4 (Trojan)]

It starts itself as a service and ensures that it automatically starts on system reboot

It checks for the following processes associated with various Antivirus softwares and disables them:

  • avp.exe
  • ccenter.exe
  • kvsrvxp.exe
  • sndsrvc.exe
  • ekrn.exe
  • kavsvc.exe
  • 360sd.exe
  • 360tray.exe
  • avgaurd.exe
  • pccmain.exe
  • rtvscan.exe
  • mcsysmon.exe

It reports infection to a remote C&C (Command and Control) server over port 8080. It uses the MAC address of the system to uniquely identify the infected node and it is sent as a part of the request. It also reports its version as ‘v13’ to the remote server.

It receives commands over Port 82. Port 82 is commonly used by XFER utility for DNS zone transfers but in this case, it is abused by Neglemir to receive commands from the C&C server. The commands use ‘#’ and ‘!’ markers to indicate the beginning and the end of commands. We observed the following commands being received from the C&C server:

  • #102/{Target IP}/{Target Port}/{Count}/{Threads}/! : Floods on specified IP and Port
  • #109/! : Sleep
  • #113/{HTTP target}/{IP Address of HTTP target}/{Count}/! : Floods on HTTP Port
  • #114/all! Stops all flooding activities
  • #147/{HTTP Server}/{IP Address of HTTP server}/{Count}/{Threads}//{File containing targets}! : Floods targets specified in a file
  • #149/{Public IP}! : Return public IP address of infected machine
  • #1105/nowVer: V13! : Returns current version of the Trojan

It sends the following string repeatedly when it successfully connects to a remote target in order to overwhelm it:

It mimics the User Agent string of Baidu search engine when reporting to its C&C server and also when performing DDOS attacks over HTTP ports

SonicWALL Gateway AntiVirus provides protection against this threat via the following signature:

  • GAV:Neglemir.A_4 (Trojan)

Microsoft Security Bulletin Coverage (Oct 9, 2012)

Dell SonicWALL has analyzed and addressed Microsoft’s security advisories for the month of October, 2012. A list of issues reported, along with Dell SonicWALL coverage information follows:

MS12-064 Vulnerabilities in Microsoft Word Could Allow Remote Code Execution (2742319)

  • CVE-2012-0182 Word PAPX Section Corruption Vulnerability
    File based vulnerability. No known exploits exist in the wild.
  • CVE-2012-2528 RTF File listid Use-After-Free Vulnerability
    IPS:8931 – Malformed RTF File 1

MS12-065 Vulnerability in Microsoft Works Could Allow Remote Code Execution (KB2754670)

  • CVE-2012-2550 Works Heap Vulnerability
    IPS:8932 – Malformed Word Document 11

MS12-066 Vulnerability in HTML Sanitization Component Could Allow Elevation of Privilege (2741517)

  • CVE-2012-2520 HTML Sanitization Vulnerability
    IPS:8932 – Malformed Word Document 11

MS12-067 Vulnerabilities in FAST Search Server 2010 for SharePoint Parsing Could Allow Remote Code Execution (2742321)

  • CVE-2012-1766 Oracle Outside In contains multiple exploitable vulnerabilities
    No known exploits exist.
  • CVE-2012-1767 Oracle Outside In contains multiple exploitable vulnerabilities
    No known exploits exist.
  • CVE-2012-1768 Oracle Outside In contains multiple exploitable vulnerabilities
    No known exploits exist.
  • CVE-2012-1769 Oracle Outside In contains multiple exploitable vulnerabilities
    GAV:Malformed.jpg.TL.3
    GAV:Malformed.jpg.TL.4
  • CVE-2012-1770 Oracle Outside In contains multiple exploitable vulnerabilities
    No known exploits exist.
  • CVE-2012-1771 Oracle Outside In contains multiple exploitable vulnerabilities
    No known exploits exist.
  • CVE-2012-1772 Oracle Outside In contains multiple exploitable vulnerabilities
    No known exploits exist.
  • CVE-2012-1773 Oracle Outside In contains multiple exploitable vulnerabilities
    No known exploits exist.
  • CVE-2012-3106 Oracle Outside In contains multiple exploitable vulnerabilities
    No known exploits exist.
  • CVE-2012-3107 Oracle Outside In contains multiple exploitable vulnerabilities
    No known exploits exist.
  • CVE-2012-3108 Oracle Outside In contains multiple exploitable vulnerabilities
    No known exploits exist.
  • CVE-2012-3109 Oracle Outside In contains multiple exploitable vulnerabilities
    No known exploits exist.
  • CVE-2012-3110 Oracle Outside In contains multiple exploitable vulnerabilities
    No known exploits exist.

MS12-068 Vulnerability in Windows Kernel Could Allow Elevation of Privilege (2724197)

  • CVE-2012-2529 Windows Kernel Integer Overflow Vulnerability
    This is a local EoP vulnerability. Detection on the wire is not possible.

MS12-069 Vulnerability in Kerberos Could Allow Denial of Service (2743555)

  • CVE-2012-2551 Kerberos NULL Dereference Vulnerability
    Detection on the wire is not practical.

MS12-070 Vulnerability in SQL Server Could Allow Elevation of Privilege (2754849)

  • CVE-2012-2552 Reflected XSS Vulnerability
    IPS: 1369 – Cross-Site Scripting (XSS) Attempt 1

This LuckyCat wont bring you any luck (September 14, 2012)

Dell Sonicwall UTM research team received reports of a new prevalent Android Backdoor Trojan spreading in the wild. The Trojan when executed reads and writes to the file system, sends device information to a remote server and opens a backdoor. The backdoor allows the attacker remote access to the device while remaining undetected, thus bypassing the whole security mechanism of the android device.

The application requests the following permissions from the user:

  • Read Phone State
  • Access Internet and WiFi State
  • Read owner Data
  • Write to external storage

Upon installation the application sits on the device as testService. When clicked the application simply displays a message “Service Start Ok” and it appears to the user as being idle but performs malicious activities in the background.

screenshot

Flow of the application
The flow of the applicaiton is as below:

screenshot

A brief explanation of each of the critical components is discussed below:

  1. Command and Control
    Among the components present in the code, two specific components give an indication of what the applicaiton does.

    screenshot

    CMainControl contains the configuration, logic and the rules of how the applicaiton behaves on the victims device. It contains the following C&C (Command and Control) commands:

    • AR_DIRBROSOW – Browse through the directories of the device
    • AR_FILEDOWNLOAD – Download a file from the device
    • AR_FILEUPLOAD – Upload a file on the device
    • AR_ONLINEREPORT – Send some sort of report to the C&C about the device
    • AR_REMOTESHELL – Spawn a remote shell which C&C can use to interact with the device

    It has the following hardcoded C&C domain and port:

    screenshot

  2. Reporting module
    The function mSendReport uses IP and phone number further in its reporting feature. This function adds a string ejsi2ksz into an array and appends the phone number and IP to it. Lastly it appends a number 369 at the end of this string.

    screenshot

  3. SIM state grabbing module
    The applicaiton can capture and send SIM related information; this can be seen in the code below:

    screenshot

    The table below translates the different states of the SIM which are identified

    screenshot

  4. Encryption mechanism
    The applicaiton uses an encryption mechanism to encrypt the communication between itself and the server. It performs XOR using two specific values 0x5 and 0x27.

    screenshot

Runtime behavior
When we run the application after installation we simply see a “Service Start Ok” message. However in the background the applicaiton connects to greenfuns.332.org at port number 54321 sends back information about the device and listens for commands which may be issued by the server.
We intercepted the information which is sent by the application to the server and is as below:

screenshot

Similar to what was discovered in the code, the applicaiton sends the phone number (15555215554) and the IP address (127.0.0.1) of the infected device. It appends the strings ejsi2ksz and 369 before and after the information.

Dell SonicWALL Gateway AntiVirus provides protection against this threat via the following signature:

  • GAV:Luckycat.A (Trojan)

This system protection software won't protect you from itself. (October 5, 2012)

Dell SonicWALL Threats research team received reports of a fake antivirus(AV) malware which was actively spreading in the wild. FakeAV software of this nature continues to be a steady growing trend and has been covered in some of our previous SonicALERTs. Once infected, this software will disable the antivirus notifications and lower the security settings. It will then proceed with its campaign to claim that the system is infected with malware and try to sell the software to the user.

The sample we received was spreading by the name of Delta_A_Ticket_Print_Document

screenshot

Infection Cycle

  • Upon execution it starts communicating with the remote Command & Control (C&C) server

    screenshot

  • The response to this is a command to stay idle until further notice

    screenshot

  • Further we see instructions to download an executable file from a link. We saw multiple links in our analysis session

    screenshot
    screenshot

  • We saw a command c=run&u=(URL to malicious executable) following which it downloads a new variant of Fake AV – SystemProgressiveProtection
  • We discovered the following commands being used by the C&C server during our analysis:
    • Idl
    • Run
    • Rem
    • Rdl
    • Red
    • Upd
  • We observed the executable communicating with the following C&C servers:
    • 175.41.28.157
    • 178.162.174.134
  • The original executable is a downloader/dropper that downloads and runs the FakeAV on the system, it deletes itself and makes a copy in %AllUsers%AppData folder with a random name

    screenshot

  • The executable begins by creating a svchost.exe process and injecting it with malicious code. We also see an empty text file opened through Notepad and a malicious executable being opened. This executable triggers the FakeAV

    screenshot

  • The malware adds entries to the registry ensuring it runs each time the system starts
    HKCUSoftwareMicrosoftWindowsCurrentVersionRunOnce[Random Characters]
  • The malware modifies the following registry entries to lower the internet security settings HKCUSoftwareMicrosoftWindowsCurrentVersionInternetSettingsZoneMapProxyBypass
    HKCUSoftwareMicrosoftWindowsCurrentVersionInternetSettingsZoneMapIntranetName
    HKCUSoftwareMicrosoftWindowsCurrentVersionInternetSettingsZoneMapUNCAsIntranet
  • We see the Fake AV supposedly scan the system and falsely state that the system is infected with different kinds of malware.

    screenshot

FakeAV – System Progressive Protection
Once the FakeAV screen appears on the system the following is observed:

  • Most of the executing programs are closed
  • TaskManager is disabled
  • No easy way to close this application as taskmanager is disabled, the user cannot run programs which can kill this process. It even disables right click on its icon in taskbar
  • Closes any application which the user opens claiming that its infected
  • screenshot

  • Notification about system infection keeps popping up at regular intervals if the user closes the main window
  • screenshot

  • User gets a warning message when he tries to open any site. In this example we got a message saying google.com is a potentially dangerous site
  • screenshot

Dell SonicWALL Gateway AntiVirus provides protection against this threat as well as the downloaded executable via the following signatures:

  • GAV: Bredolab.CBE (Trojan)
  • GAV: FakeAV.SSP (Trojan)
  • GAV: Papras.FRY (Trojan)
  • Trend Micro Control Manager SQL Injection (October 05, 2012)

    Trend Micro Control Manager is a centralized security outbreak management console. It is meant to consolidate the coordination of actions and the management of Trend Micro products and services. It is a central command center for the management of viral infections and security vulnerabilities.

    The Control Manager allows the administrator to access and manipulate it through a web interface. The web interface is composed of various Java applets, ASP pages, static HTML pages, as well as several ISAPI dynamically linked libraries. Active Server Pages (ASP) is Microsoft’s primary server side scripting language for generating dynamic content. The parameters passed to ASP scripts are passed via the name-value pairs in the HTTP request URI. Parameters are found following the ‘?’ character in the URI and each pair is separated by an ampersand “&” character. An example of parameters being passed in a URI follows:

      http://www.test.com/test.aspx?name1=value1&name2=value2

    The Control Manager includes an SQL database which stores managed product configurations and logs. It also includes an HTTP server that hosts the Control Manger web console. Username credentials for the web console are also stored in the SQL database. The server contains various ASP pages that interface with the SQL database server by building and executing SQL queries on it.

    An SQL injection vulnerability exists in Trend Micro Control Manager. The vulnerability exists due to a failure to properly verify input data when handling parameters to a particular ASP page. One parameter expected to be passed to the affected script is directly used to build an SQL query. If the parameter value contains a single quote “‘” character, the literal value in the generated SQL query will be terminated, and anything that follows will be interpreted as a separate SQL query. In turn, all resulting queries will be executed by the Control Manager server. This allows for complete SQL queries to be injected and consequently executed by the backend SQL server.

    An attacker can exploit this vulnerability by sending a request to the affected ASP page with carefully crafted parameters, resulting in injection of SQL queries. Successful exploitation could result in arbitrary execution of SQL queries with DB Administrator privileges. Note that a user must first authenticate successfully in order to exploit this flaw.

    Dell SonicWall has released two IPS signatures that address this flaw. The following signatures were released:

    • 8803 – CONVERT NVARCHAR Statement 1 (Possible SQL Injection)
    • 8804 – CONVERT NVARCHAR Statement 2 (Possible SQL Injection)

    The vulnerability has been assigned CVE-2012-2998 by mitre.
    The vendor has released an advisory regarding this issue.

    Research Paper: Blackhole Exploit Kit – Rise and Evolution (Sep 17, 2012)

    Dell SonicWALL UTM Research team has released a research paper containing the analysis of Blackhole Exploit kit.

    In this paper we explore the inner workings of the Blackhole Exploit kit. We analyze the design, functionality, evolution and mode of the operation of this kit. We study the model of the infection routines and delve in to the working of exploit payloads. The geographical distribution of hosting servers and infections attributed to this kit are studied and plotted in this paper. We also explore the possible connections to other cybercrime rings such as Cutwail, Zeus, Cridex, and others.

    Full version of the paper can be viewed here: Blackhole Exploit Kit – Rise & Evolution

    CrimeSpider Botnet serves up explicit webpages (Sep 28, 2012)

    Dell Sonicwall Threats research team have discovered a new Trojan in the wild called CrimeSpider. The Trojan’s primary objective appears to be aimed at displaying webpages that contain explicit content on the compromised machine.

    Upon infection the Trojan periodically brings up various pornographic webpages in fullscreen mode:

    The pages lead to explicit pay-per-access video chat rooms.

    The Trojan creates the following file on the filesystem:

    • %APPDATA%jusched.exe [Detected as GAV: CSpider (Trojan)]

    The Trojan creates the following key in the Windows registry to enable startup after reboot:

    • HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRun Java(TM) Platform SE Auto Updater “%APPDATA%jusched.exe start 4038-6D81”

    Below is a sample of DNS requests made by the Trojan:

    • dl.dropbox.com
    • brio.jp
    • www.cameraboys.com
    • www.joyourself.com
    • www.a-cameraboys.com
    • www.a-joyourself.com
    • www.livejasmin.com
    • www.mycams.com
    • www.xxxtrance.com
    • brokenelastihear.a-cameraboys.com
    • bu5inka.a-cameraboys.com
    • carmelgoddess.a-cameraboys.com
    • cassiana_nl.a-cameraboys.com
    • cherrylipss.a-cameraboys.com
    • notmarye.a-joyourself.com
    • crazyduo20.a-joyourself.com
    • denisa_nl.a-joyourself.com
    • d31qbv1cthcecs.cloudfront.net

    The Trojan obtains a list of C&C servers from a dropbox user account:

    Once the list of C&C servers has been obtained it contacts each server to report infection and to request webpages to display on the compromised machine:

    Below is a list of action requests made to C&C servers:

        action=reg&key=
        action=update
        action=uplink
        action=geturl&key=
        action=status
        action=apu&url=
        action=uu&url=

    Below is a list of status messages that are returned from C&C servers:

        CrimeSpider.Reg.OK
        CrimeSpider.URL.Missing
        CrimeSpider.URL.Error
        CrimeSpider.URL
        CrimeSpider.BH
        CrimeSpider.HL
        CrimeSpider.Active

    SonicWALL Gateway AntiVirus provides protection against this threat via the following signature:

    • GAV: CSpider (Trojan)

    HP SiteScope Directory Traversal Vulnerability (Sept 27, 2012)

    HP SiteScope is an agentless monitoring software focused on monitoring the availability and performance of distributed IT infrastructures, including servers, operating systems, network and Internet services, applications and application components. HP SiteScope tests a web page or a series of web pages using synthetic monitoring. However, it is not limited to web applications and can be used to monitor database servers (Oracle Database, Microsoft SQL Server, etc.), Unix servers, Microsoft Windows servers and many other types of hardware and software.

    HP SiteScope incorporates Apache Tomcat to help serve its custom web applications. Apache Tomcat is an open source web server and servlet container. Tomcat implements the Java Servlet and the Java Server Pages (JSP) specifications from Sun Microsystems, and provides a “pure Java” HTTP web server environment for Java code to run. In such a relationship, Apache receives all of the HTTP requests made to the Web application. Apache then recognizes which requests are intended for Servlets/JSPs, and passes these requests to Tomcat. Tomcat fulfills the request and passes the response back to Apache, which then returns the response to the requester. Two web applications UploadManagerServlet and DownloadManagerServlet are included with a HP SiteScope server installation that provide file upload and download services. These services are available at the following URIs:

    • /SiteScope/upload
    • /SiteScope/download

    A directory traversal vulnerability exists in the HP SiteScope server. Specifically, an authenticated user can directly access the UploadManagerServlet and the DownloadManagerServlet web applications and supply an arbitrary file path for upload and download. An authenticated remote attacker can leverage this vulnerability to upload and execute arbitrary code on the vulnerable target under the privileges of Administrators.

    Dell SonicWALL UTM has researched this vulnerability and released the following IPS signature to detect and prevent the attacks addressing this issue:

    • 8708 HP SiteScope Directory Traversal

    This vulnerability was not assigned with a CVE ID.

    GroupWise Client Addressbook Integer Overflow (Sept 21, 2012)

    GroupWise is a messaging and collaborative software platform from Novell that supports email, calendaring, personal information management, instant messaging, and document management. The platform consists of the client software, which is available for Windows, Mac OS X, and Linux, and the server software, which is supported on Windows Server, NetWare, and Linux. The latest generation of the platform is GroupWise 2012 which only supports Windows and Linux on Servers.

    Novell GroupWise Client and a separate application Addressbook, which is bundled with the client, can import and export address book entries in .nab files. These files are similar to CSV (comma-separated values) files. The structure of the file is shown below:

     	Field					Description 	---------------------------------------------------- 					3-byte magic bytes 	TOKEN,"TOKEN", ... 		Header or data line 	... 

    An integer-overflow vulnerability exists in Novell GroupWise Client and its bundled Addressbook application. When parsing tokens in a .nab file, the vulnerable codes assume the user supplied contents is within a limited size, and allocate a fixed buffer to copy the contents. If the size of the contents supplied by user is over that limit, the vulnerable code will calculate the size incorrectly, and cause an integer overflow. Remote attackers can exploit this vulnerability by enticing the target user to open a maliciously crafted .nab file. Successful exploitation would allow injection and execution of arbitrary code within the context of the currently logged-on user. Unsuccessful attack attempts will terminate the vulnerable program leading to a denial-of-service condition.

    Dell SonicWALL UTM team has researched this vulnerability and provided a generic shellcode signature to detect the attacks addressing this issue:

    • 4297 Client Application Shellcode Exploit 1

    This vulnerability has been assigned by CVE as CVE-2012-0418.