You Have Got a New Audio Message - Guest Diary by Pasquale Stirparo

Published: 2016-01-13. Last Updated: 2016-01-13 15:00:03 UTC
by Alex Stanford (Version: 1)
2 comment(s)

[Guest Diary by Pasquale Stirparo]

Few weeks ago we witnessed a quite significant wave of email carrying with them a zip file containing an executable.

The only common thing among all the emails was that the sender name (not the sender email address) appeared to be "Whatsapp" or "Facebook" all the times, while the subject was always referring, in different languages (and sometimes terms), that "You got a new audio (or video) message". Some of the subjects I saw are:

  • Subject: Sie haben einen Videohinweis erhalten!
  • Subject: Ein Hörbeleg ist versäumt worden!
  • Subject: Di recente, hai raccolto un avviso video
  • Subject: Du hast eine Hörakte.
  • Subject: You recently got an audible message!
  • Subject: Ein akustisches Dokument wurde bloß übergetragen

On the sample side, the extracted exe has usually the name of a person like jack.exe or brent.exe and the malware seems to be a variant of Nivdort [1](also named Bayrob in some reports), which once installed it allows backdoor access. This malware family is not new (it has been around since April 2013 [2]), but anti-virus tools were apparently lagging behind this last Nidvort email wave, and most did not provide realtime protection. However, once installed it should be still relatively easy to detect, here some indicators:

  • Once executed, it creates a random folder under C:\, where it drops several executables, also them with random alphanumeric names, e.g.:

  • It then tries to resolve about 40/50 domain names (on average), >90% of which appeared to be not registered. If not yet done, you may want to have in place some alerts when one of your clients fails so many DNS requests in a row
  • When connecting to the C2, it performs HTTP requests to /index.php

  • Do not get fooled by the eventual "404" reply you may see in your logs. The 404 reply comes with a body, which turns out to be in json format and containing Base64 encoded instructions on where to connect for the next stage


the Base64 encoded value contains the information for the next address to contact via POST request, in the previous case we can easily decode it

Incidentally this very same response, as well as the server IP to contact, appears also in the report of "f0xy" malware, a CPU miner uncovered last year by WebSense [3]. However, the two samples are completely different.

  • The malware will later upload some information about the files dropped and the email address of the victim, again base64 encoded.

In case any of you may want to try to analyze the sample, be aware that the binary will also implement some anti-debugging techniques as detected also by running Yara against the Yara Rules from the official repository [4]

I'm not sharing MD5 of the samples collected since all of them are different and would not be a much actionable information. However, you can find below a list of C2 domains which the samples tried to contact. Looking at them one may think that Nivdort does not use any DGA, instead it does use a particular DGA based on a dictionary, which makes the domains not looking random and able to bypass many DGA checks used by some filters. If you are interested to know more about it, there is a nice write up by NeutralizeThreat [5] who reverse engineered the sample and described its functionalities in details.

Happy Hunting,

Pasquale

 

C2 Domains:

againstangry.net
againstarticle.net
againstdried.net
againstfifteen.net
betterbehind.net
betterbroad.net
betterbutter.net
betterunderstand.net
breadbehind.net
breadbroad.net
breadbutter.net
breadunderstand.net
captainangry.net
captainarticle.net
captainbehind.net
captaindried.net
captainfifteen.net
decideangry.net
decidearticle.net
decidedried.net
decidefifteen.net
doubtangry.net
doubtarticle.net
doubtdried.net
doubtfifteen.net
electricbehind.net
electricbroad.net
electricbutter.net
electricdried.net
electricunderstand.net
flierbehind.net
flierbroad.net
flierbutter.net
flierunderstand.net
gatherbehind.net
gatherbroad.net
gatherbutter.net
gatherunderstand.net
largeangry.net
largearticle.net
largebutter.net
largedried.net
largefifteen.net
nightangry.net
nightarticle.net
nightdried.net
nightfifteen.net
quietbehind.net
quietbroad.net
quietbutter.net
quietunderstand.net
recordbehind.net
recordbroad.net
recordbutter.net
recorddried.net
recordunderstand.net
seasonbehind.net
seasonbroad.net
seasonbutter.net
seasondried.net
seasonunderstand.net
streetbehind.net
streetbroad.net
streetbutter.net
streetunderstand.net
tradebehind.net
tradebroad.net
tradebutter.net

Reference:
[1] https://www.microsoft.com/security/portal/threat/encyclopedia/Entry.aspx?Name=TrojanSpy:Win32/Nivdort.AL#tab-link-3 
[2] https://www.microsoft.com/security/portal/threat/encyclopedia/entry.aspx?Name=TrojanSpy:Win32/Nivdort.A
[3] http://community.websense.com/blogs/securitylabs/archive/2015/01/30/new-f0xy-malware-employs-cunning-stealth-amp-trickery.aspx
[4] https://github.com/Yara-Rules/rules/
[5] http://www.neutralizethreat.com/2015/12/nivdort-code-obfuscation-and-dga.html

-- 
Alex Stanford - GIAC GWEB & GSEC,
Research Operations Manager,
SANS Internet Storm Center
/in/alexstanford

2 comment(s)
ISC StormCast for Wednesday, January 13th 2016 http://isc.sans.edu/podcastdetail.html?id=4821

Comments


Diary Archives