7.7 DDoS : Unknown Secrets and Botnet Counter-Attack. www.issuemakerslab.com sionics & kaientt



Similar documents
Seminar Computer Security

Botnets. Botnets and Spam. Joining the IRC Channel. Command and Control. Tadayoshi Kohno

Acquia Cloud Edge Protect Powered by CloudFlare

CSE 3482 Introduction to Computer Security. Denial of Service (DoS) Attacks

CloudFlare advanced DDoS protection

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

DDoS Attacks Can Take Down Your Online Services

CS5008: Internet Computing

DDoS Attacks & Defenses

Detecting Botnets with NetFlow

DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest

Radware Security Research. Reverse Engineering a Sophisticated DDoS Attack Bot. Author: Zeev Ravid

Sophos for Microsoft SharePoint Help

[ X OR DDoS T h r e a t A d v i sory] akamai.com

Denial of Service Attacks

CS 356 Lecture 16 Denial of Service. Spring 2013

DDoS Attacks & Mitigation

Inside the Storm: Protocols and Encryption of the Storm Botnet

Sophos for Microsoft SharePoint Help. Product version: 2.0

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

From Georgia, with Love Win32/Georbot. Is someone trying to spy on Georgians?

Introduction. Two levels of security vulnerabilities:

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015

How to create an

2010 Carnegie Mellon University. Malware and Malicious Traffic

How To Stop A Ddos Attack On A Website From Being Successful

Operation Liberpy : Keyloggers and information theft in Latin America

Wharf T&T Limited DDoS Mitigation Service Customer Portal User Guide

Web. Services. Web Technologies. Today. Web. Technologies. Internet WWW. Protocols TCP/IP HTTP. Apache. Next Time. Lecture # Apache.

Abstract. Introduction. Section I. What is Denial of Service Attack?

DNS amplification attacks

Networks and Security Lab. Network Forensics

Firewalls and Intrusion Detection

D m i t r y S l i n k o v, C I S M SWISS C Y B E R S TO R M Black market of cybercrime in Russia

Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík

HIDING THE NETWORK BEHIND THE NETWORK. BOTNET PROXY BUSINESS MODEL Alexandru Maximciuc, Cristina Vatamanu & Razvan Benchea Bitdefender, Romania

Overview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms

DRDoS Attacks: Latest Threats and Countermeasures. Larry J. Blunk Spring 2014 MJTS 4/1/2014

Storm Worm & Botnet Analysis

Korea s experience of massive DDoS attacks from Botnet

Protect your network: planning for (DDoS), Distributed Denial of Service attacks

Network attack and defense

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Phone.com. Communicate Better

v2.0 Document Server v2.0 v2.0 v2.0 advanced document sharing platform robust document management user-friendly administration SOFTWARE SOLUTIONS

Configuring Health Monitoring

document sharing platform advanced document management user-friendly administration SOFTWARE SOLUTIONS

SECURING APACHE : DOS & DDOS ATTACKS - I

McAfee Labs Threat Advisory W32/Autorun.worm.aaeb-h

Security: Attack and Defense

DDoS Protecion Total AnnihilationD. DDoS Mitigation Lab

Course Content: Session 1. Ethics & Hacking

For IT Infrastructure, Mobile and Cloud Computing - Why and how

IDS and Penetration Testing Lab IIIa

CARA v3.5 Sept 2013 Major new features. Set your users free

Firewalls. configuring a sophisticated GNU/Linux firewall involves understanding

A43. Modern Hacking Techniques and IP Security. By Shawn Mullen. Las Vegas, NV IBM TRAINING. IBM Corporation 2006

- Basic Router Security -

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

Chinese Chicken: Multiplatform DDoS botnets

Firewalls Netasq. Security Management by NETASQ

How To Classify A Dnet Attack

A perspective to incident response or another set of recommendations for malware authors

IxLoad-Attack: Network Security Testing

Using the Trash to Restore Files and Folders. Recovering Items. Accessing the Trash

Secure Network Access System (SNAS) Indigenous Next Generation Network Security Solutions

Targeted(Attacks(Against( Civil(Society(in(Asia. Or(why(you(should(check(the(md5( before(opening(this(deck.

CLE202 Introduction to ServerIron ADX Application Switching and Load Balancing

IptabLes/IptabLex DDoS Bots

SonicOS 5.9 / / 6.2 Log Events Reference Guide with Enhanced Logging

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important

Minimal network traffic is the result of SiteAudit s design. The information below explains why network traffic is minimized.

CIT 480: Securing Computer Systems. Firewalls

A Critical Investigation of Botnet

How to launch and defend against a DDoS

How To Attack A Website With An Asymmetric Attack

SECURING APACHE : DOS & DDOS ATTACKS - II

Denial of Service (DoS)

BlackEnergy DDoS Bot Analysis

SIM Configuration Guide. February 2015 Version 1 Document Reference: 8127

How To Protect A Dns Authority Server From A Flood Attack

WildFire Overview. WildFire Administrator s Guide 1. Copyright Palo Alto Networks

Why to talk about Botnets

Understanding & Preventing DDoS Attacks (Distributed Denial of Service) A Report For Small Business

Security A to Z the most important terms

The Value of Physical Memory for Incident Response

Detecting peer-to-peer botnets

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

Latest update 17/12/2015

Cullen Jennings July 2015

Malicious Programs. CEN 448 Security and Internet Protocols Chapter 19 Malicious Software

Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks

N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work

Transcription:

7.7 DDoS : Unknown Secrets and Botnet Counter-Attack sionics & kaientt

Contents Overview Botnet Structure 7.7 DDoS Bot Malware Analysis Botnet Counter-Attack Demo

Overview 7.7 DDoS Attack Cyber attack against major government, news media, and financial websites of South Korea and US

Re-Collection Server C&C Master Server hacked Web Hard sites (spreading malware) C&C IP Relay Server IP Relay Distributed C&C Server DDoS Target Websites DDoS Attack Zombie Bot Distributed Support Server (HDD Destroy Malware) Attacker flash.gif Main Support Server (HDD Destroy Malware)

Botnet Begins! Encryption Protocol Filename Port X Y send: + 0x28) ^ 0x47 recv: ^ 0x47) - 0x28 send: ^ 0x92) + 0x61 recv: - 0x61) ^ 0x92 dvcmgmt.exe 131 ntdsbcli.exe 143 ntdcmgt.exe 339 inetsvc.exe 112, 125, 133 perfmon.exe 112, 125, 133 tasksc.exe 128, 125, 133 A B C Encryption Protocol XOR 0xCC XOR 0xFC XOR Ramdom 8 Bytes C&C Master Server??? ntmssvc.exe??? Re-Collection Server????????? Distributed C&C Server netlmgr.exe ntmpcsvc.exe??? 213.33.116.41:53 75.144.115.102:53 98.118.201.35:443 C&C IP Relay Server 216.199.83.203:80 67.69.18.51:53 93.104.211.61:53 213.23.243.210:443 220.250.64.246:443 116.68.144.212:80

Botnet Begins!

Structure of Botnet Composed in hierarchical structure C&C Server was operated as a distributed server by more than thousands of units through hacking. Re-Collection Server C&C Master Server C&C IP Relay Server IP Relay Distributed C&C Server

File Information Stealing Malware The hackers first circulated malwares that collect file information beforehand. These are estimated to have been circulated through various ways. The malwares collected information about the files that exist in the directories such as Recent, My Documents, Favorites and etc. from Victim s PCs and sent it to the C&C Server.

3 Types of Malware A B C Encryption Protocol XOR 0xCC XOR 0xFC XOR Ramdom 8 Bytes DDoS Malware (July ~) Beginning msiexec?.exe (= ntdll.exe) wimgat.exe dhcp32.exe (= ntdll.exe) C&C IP Relay Server Information msiexec?.exe (= ntdll.exe) wimgat.exe vol32.css DDoS wmiconf.dll ntscfg.dll perfvwr.dll Config File pxdrv.nls atv04nt5.img svrms.nls Spam HDD MBR Destroy wmcfg.exe mstimer.dll wversion.exe File Information Stealing Malware (May ~) netlmgr.dll ntmpsvc.dll ssdpupd.dll sysvmd.dll (early: sysenv.dll) regscm.dll (early: rasmcv.dll) Config File perfb093.dat drmkf.inf maus.dl

msiexec?.exe (= ntdll.exe) Checks c_10986.nls file Drops file and decompresses (inflate) Creates Service called WmiConfig Communicates with C&C IP Relay Server and creates pxdrv.nls file Removes the previous version of the services and config files

일부 자료 삭제

Dropping and inflating file Bot Malware Analysis

일부 자료 삭제

Communication Protocol with C&C IP Relay Server

pxdrv.nls file format

wmiconf.dll decodes pxdrv.nls file connects Distributed C&C Server and receives 10 Distributed C&C Server IP receives the file(~cgf????.tmp) after sending the time(saved in pxdrv.nls) parses the received file and executes reads attack targets in uregvs.nls, and starts DDoS attack

일부 자료 삭제

Communication Protocol with Distributed C&C Server

~CGF????.tmp file format A : Compare Time B : Command Code1 C : Start Time D : End Time E : Command Code2 F : File Size G : File Data

uregvs.nls file format Bot Malware Analysis

uregvs.nls file format A : Unknown time B : Total Target URL Count C : URL number D : Target URL E : Resolved IP address F : Total resolved IP address Count G : Target Port H : Exponent MAX NUM count I : Modular value J : Time of starting the attack K : Time of ending the attack L : Related Query Performance Counter value M : Sleep term (between target) N : Total thread count per Target URL O : Related http connection time P : R's length Q : Allocated memory address of R R : Target URL; Port; Attack Type(get, post); Request path;;

DDoS Packet Type 일부 자료 삭제

DDoS Attack Packet Type and Order circling "packet per thread Source IP Destination IP Attack Type ETC 1 Orginal Target SYN 2 Spoofing Target SYN 3 Original Target ACK 4 Spoofing Target ACK 5 Original Target UDP 6 Spoofing Target UDP 7 Original Target ICMP 8 Spoofing Target ICMP 9 Target Broadcast ICMP smurfing 10 Original Target HTTP GET User-Agent Random(5) 11 Original Target HTTP GET User-Agent Random(5) Cache-Control

일부 자료 삭제

일부 자료 삭제

wmcfg.exe wmcfg.exe is executed only when the msvcr90.dll (Microsoft C Runtime Library) file exists. drops the following files: %System%\config\SERVICES %System%\config\SERVICES.LOG %System%\mstimer.dll %System%\wversion.exe starts the following service: mstimer deletes itself

mstimer.dll decodes SERVICES.LOG file attempts to connect the 8 Distributed Support Servers randomly and requests the flash.gif file. http://200.6.218.194/flash.gif http://92.63.2.118/flash.gif http://163.19.209.22/flash.gif http://202.14.70.116/flash.gif http://75.151.32.182/flash.gif http://122.155.5.196/shop/images/flash.gif http://201.116.58.131/xampp/img/flash.gif http://newrozfm.com/img/glyph/flash.gif

mstimer.dll sends the binary at the front part of flash.gif through spam mails to other users. However, because the binary is damaged file, the users who received the spam mails don t suffer from any damages substantially.

flash.gif file format

~AX?.tmp executed by mstimer.dll drops the following file: wversion.exe (HDD MBR Destroyer) records the time of execution for wversion.exe in win.ini deletes itself

wversion.exe (HDD MBR Destroyer) executed by mstimer.dll after midnight on July 10. initializes the HDD MBR by 0x55 and inserts the string, "Memory of the Independence Day" In addition, in the case of the following extension, it makes the file unavailable by setting a random password and compressing into gz. (zip, pas, c, cpp, java, jsp, aspx, asp, php, rar, gho, alz, xml, pst, eml, kwp, gul, hna, hwp, txt, rtf, dbf, db, accdb, pdf, pptx, ppt, mdb, xlsx, xls, wri, wpx, wpd, docm, docx, doc) deletes itself

Botnet Counter-Attack

Botnet Counter-Attack

Botnet Counter-Attack

Botnet Counter-Attack

Demo It's Showtime!

Q & A Questions? contact us via e-mail sionics 0x40 issuemakerslab.com kaientt 0x40 issuemakerslab.com