ISC StormCast for Tuesday, November 24th 2015 http://isc.sans.edu/podcastdetail.html?id=4759

Superfish 2.0: Dell Windows Systems Pre-Installed TLS Root CA

Published: 2015-11-24. Last Updated: 2015-11-24 03:19:27 UTC
by Johannes Ullrich (Version: 1)
4 comment(s)

Recently shipped Dell systems have been found to include a special Root CA Certificate and private key, "eDellRoot". All systems apparently use the same key and certificate. Using the "secret" key, anybody could create certificates for any domain, and Dell systems with this eDellRoot certificate would trust it. The key is part of "Dell Foundation Services".

To test if your system is affected, see: https://edell.tlsfun.de

To remove the certificate if you are affected:

- stop and disable Dell Foundation Services
- delete the eDellRoot CA (start certmgr.msc, select "Trusted Root Certification Authorities" and "Certificates". Look for eDellRoot)

For details about managing Root CAs see https://technet.microsoft.com/en-us/library/cc754841.aspx

In this case, it is not sufficient to just remove the CA. Dell Foundation Services will reinstall it. This is why you need to disable Dell Foundation Services first, or delete the Dell.Foundation.Agent.Plugins.eDell.dll.

---
Johannes B. Ullrich, Ph.D.
STI|Twitter|LinkedIn

Keywords:
4 comment(s)

BizCN gate actor sends CryptoWall 4.0

Published: 2015-11-24. Last Updated: 2015-11-24 00:00:15 UTC
by Brad Duncan (Version: 1)
9 comment(s)

Introduction

Earlier this month, the BizCN gate actor switched IP addresses for its gate domains to 46.172.83.0/24.  Also, as early as Friday 2015-11-20, this actor started sending CryptoWall 4.0 as one of its malware payloads from the Nuclear exploit kit (EK).  Until now, I've only associated CryptoWall 4.0 with malicious spam (malspam).  This is the first time I've noticed CryptoWall 4.0 sent by an EK.

This diary discusses the recent change in BizCN-registered gates, and we'll look at some examples of CryptoWall 4.0 sent by this actor.

The gates

Like some other groups, the BizCN gate actor uses another server to act as a "gate" between the compromised website and its EK server (I explained gate traffic in my previous diary here).  I've been calling this criminal group the "BizCN gate actor" because domains it uses for the gate have all been registered through the Chinese registrar BizCN, always with privacy protection [1, 2].  Since July 2015, the BizCN gate actor has most often used Nuclear EK to deliver its malware payloads [2].


Shown above:  Flow of infection traffic caused by the BizCN gate actor.

This actor uses dedicated servers for its gate domains.  These gate domains tend to stick with one particular hosting provider.  At times, the BizCN gate actor will switch hosting providers for its gates, and the IP address block for these gates will change.

Since February 2015, the BizCN gate actor has used a handful of IP addresses in the 136.243.0.0/16 block (Germany - TK Rustelekom LLC) for its gate domains.  Earlier this month, the gates moved to 46.172.83.0/24 (Ukraine - PE Fesenko Igor Mikolayovich).

URL patterns for BizCN-registered gate traffic are fairly distinctive, and I was able to find several examples as early as 2015-11-19.


Shown above:  Examples of BizCN-registered gate traffic from this actor.  Click here for a pcap of the traffic.

A successful infection chain

Let's look at some infection traffic from Saturday 2015-11-21 [3].  The first step in this infection chain?  You'll find injected script that points to the BizCN-registered gate in a web page from the compromised website.


Shown above:  Injected script in page from a compromised website.

URL patterns in HTTP GET requests to these gate domains are fairly distinctive.  What's the second step for this successful infection chain?  An HTTP GET request to the gate domain returned some javascript.


Shown above:  HTTP GET request to the BizCN-registered gate returns javascript.

The javascript was sent gzip-compressed, so you won't be able to read it in a pcap by following the TCP stream in Wireshark.  I normally get a decompressed copy from the pcap by exporting HTTP objects in Wireshark.


Shown above:  Decompressed view of javascript returned from the BizCN-registered gate.

In the above image, I've highlighted the unicode that represents a Nuclear EK landing page URL.  See the image below to see how I translated it.


Shown above:  Translating unicode from javascript returned by the BizCN-registered gate.

The final step of this infection chain?  Nuclear EK infects a vulnerable Windows host.


Shown above:  Landing page from Nuclear EK used by the BizCN gate actor.


Shown above:  Flash exploit from Nuclear EK used by the BizCN gate actor.


Shown above:  Malware payload from Nuclear EK used by the BizCN gate actor.

CryptoWall 4.0 sent by the BizCN gate actor

CryptoWall is not the only payload sent by the BizCN gate actor, but it's the most common.  On Thursday 2015-11-19 when the BizCN gate actor sent CryptoWall, it was version 3 [4].


Shown above:  CryptoWall 3.0 infection caused by the BizCN gate actor (up through Thursday 2015-11-19).

Less than 24 hours later on Friday 2015-11-20, there was a change in CryptoWall sent by this actor [5].  I didn't realize it until another infection the next day [3].  Malware characteristics fit what others have posted about CryptoWall 4.0 [6, 7, 8].


Shown above:  CryptoWall 4.0 infection caused by the BizCN gate actor (Friday 2015-11-20 and after).

Whether it's version 3.0 or 4.0, CryptoWall sent by the BizCN gate actor is different than CryptoWall sent by other actors.  This malware looks like an NSIS installer [9], and it leaves behind artifacts in the infected user's AppData\Local\Temp directory that I don't see from other samples of CryptoWall.


Shown above:  CryptoWall 4.0 samples sent by BizCN gate actor Nuclear EK.  (Icons were the same for CryptoWall 3.0).


Shown above:  Examples of the artifacts left behind by BizCN gate actor CryptoWall (3.0 and 4.0).

Final words

Although examples of CryptoWall 4.0 have been found since 2015-11-02 [10], these samples were associated with malicious spam.  Until now, I haven't noticed CryptoWall 4.0 from any EKs.  And now I've only seen it from the BizCN gate actor.

As recently as Monday 2015-11-23, I saw CryptoWall sent by Angler EK, but it was still at version 3 [9].  Except for Nuclear EK from the BizCN gate actor, none of the other EKs appear to be sending version 4.  At least, that's what I've found so far.  I fully expect to see CryptoWall 4.0 from other EKs sometime soon.

Below is a list of traffic seen from the BizCN gate actor since Thursday 2015-11-19.  It includes links for traffic and malware samples.

(Read: Date/time - Nuclear EK IP address - Nuclear EK domain name - Link)

  • 2015-11-19 03:10 UTC - 5.231.54.59 - 16953.falmuemb.xyz (CryptoWall 3.0) - Link
  • 2015-11-20 02:50 UTC - 5.231.54.59 - 51649.edindagodl.xyz (CryptoWall 4.0) - Link
  • 2015-11-21 02:26 UTC - 5.175.185.20 - 48637930475.kuputster.xyz (CryptoWall 4.0) - Link
  • 2015-11-22 18:17 UTC - 5.175.194.135 - 439520.13406.duco-or.xyz (not CryptoWall) - Link
  • 2015-11-23 00:40 UTC - 5.175.193.253 - 369504.6210.yani-et.xyz (CryptoWall 4.0) - Link

Since this information is now public, the BizCN gate actor may change tactics.  However, unless this actor initiates a drastic change, it can always be found again.  I (and other security professionals) will continue to track the BizCN gate actor.  Expect another diary on this subject if any significant changes occur.

---
Brad Duncan
Security Researcher at Rackspace
Blog: www.malware-traffic-analysis.net - Twitter: @malware_traffic

References:

[1] https://isc.sans.edu/forums/diary/BizCN+gate+actor+changes+from+Fiesta+to+Nuclear+exploit+kit/19875/
[2] https://isc.sans.edu/forums/diary/BizCN+gate+actor+update/20209/
[3] http://malware-traffic-analysis.net/2015/11/21/index.html
[4] http://malware-traffic-analysis.net/2015/11/19/index2.html
[5] http://malware-traffic-analysis.net/2015/11/20/index2.html
[6] http://www.bleepingcomputer.com/news/security/cryptowall-4-0-released-with-new-features-such-as-encrypted-file-names/
[7] http://researchcenter.paloaltonetworks.com/2015/11/cryptowall-v4-emerges-days-after-cyber-threat-alliance-report/
[8] https://heimdalsecurity.com/blog/security-alert-cryptowall-4-0-new-enhanced-and-more-difficult-to-detect/
[9] http://malware-traffic-analysis.net/2015/11/23/index2.html
[10] http://malware-traffic-analysis.net/2015/11/05/index2.html

Keywords:
9 comment(s)

Comments


Diary Archives