Questions Ensure you document the procedures, tools and
methods used.
This allows the attacker to launch
coordinated attacks upon a victim from multiple sites (the compromised hosts)
on the Internet.
The
file is programed in Visual basic 6.0 and contain a string reference were is
written the version
The
Attack with distributed denial of
service (DDOS smurf) attack.
Upload
and download files.
The backdoor wait for the client
conexion to be commanded. When it is ready to use the backdoor commands:
--verbose verbose mode
--visible Are visible or invisible
--server server type
--commands Give commands
--cgipath Path of cgi
--cgiget cgi get
--cycles Number of cycles
--help Give help about it
--installdir Directory of installation
--noinstall Not install
--uninstall
Unistall the backdoor
--authors Give information and the name of the
authors
The
backdoor creates this entry in registry
HKLM\Software\Microsoft\Windows\CurrentVersion\Run . With this, it can run on startup.
Create
those directories:
C:\
C:\
C:\
And
this file that is a copy of the same file:
C:\
Use
a utility fupload.vbs for upload/donload from
“Copyright (C) 2001 Antonin Foller, PSTRUH Software”.
The backdoor can
Scan all classes of network (A,B and C):
http://192.168.
http://172.16.
And
get information with a SQL consult from the IP that the infected machine
SELECT
* FROM Win32_NetworkAdapterConfiguration WHERE IPEnabled = True
This returns a collection consisting of all the network adapter
configurations on the computer for which IP is enabled.
The
binary contains this mac addres inside the code:
00:0C:29:00:50:56:00:05:69:
First
of all , when the backdoor is executed try to connect to http://10.10.10.10/RaDa
To
read the backdoor configuration (
<TITLE>
<
……………………………….
</TITLE>
The
backdoor leave from a high port bigger than 1024 and conects to IP 10.10.10.10
in http (80) port.
The
snort signature to detect it is:
alert tcp
$HOME_NET any -> 10.10.10.10 $HTTP_PORTS (msg:"
1)The
file is packed with Upx, so we can’t see
the string references withot unpacked.
I
have use Ollydbg and Olly dump pluggin for unpacked:
2)The
backdoor check that the machine isn’t a infection machine (has VMware image)
for execute normaly, checking this registry entry that have all Vmware images
inside:
HKLM\Software\VMware, Inc.\VMware Tools\InstallPath
This
entry indicates the VMware tools installation path.
I
think that is a backdoor, because wait for client connection and can receive
orders to execute, as download/upload files , DDoS, etc ….
http://www.pestpatrol.com/pestinfo/s/spoofer_win32_vb_c.asp
Use smurf attack and is
programmed in Visual basic
http://pestpatrol.com/pestinfo/d/ddos_win32_smurf.asp
Use
Ddos smurf attack.
1)
I have developed my tool for
cleanning the infected system.
My own tool does the following:
-Kill the process
-Delete the file and
subdirectories
-Create a file C:\
HKLM\Software\VMware, Inc.\VMware Tools\InstallPath
2) Editing the file Hosts. and adding this line at the end of the file:
127.0.0.1 10.10.10.10
Note:
10.10.10.10 is the IP that the backdoor connect. With this line the backdoor
can’t connect to original IP of the backdoor because we have redirect to local
IP.
3) With the snort signature.
Bonus Question:
With
the command –authors see these:
Copyright
(C) 2004
Scan
Of The Month 32 (SotM) - September 2004
You
can learn a lot playing funny security challenges.
http://www.honeynet.org/scans/index.html
I
think that future versions can spread better (as a worm) using system
vulneratibilites as Rpc , Lsass, the actual.Jpg GDI+ exploit, etc …