Aurora_report 218.00 KiB application/msword

TODO cover.
Jan 27, 2010
Foreword
Cyber Espionage is a critical issue. Over 80% of intellectual property is stored online digitally. The
computing infrastructure in a typical Enterprise is more vulnerable to attack than ever before. Current
security solutions are proving ineffective at stopping cyber espionage. Malware is the single greatest
problem in computer security today. Yet, malware represents only the tip of the spear. The true threat is
the human being who is operating the malware. This human, or the organization he represents, is the true
threat that is targeting information for the purposes of financial gain, theft of state secrets, and theft of
intellectual property. True threat intelligence requires reaching beyond malware infections to identify the
individuals, country of origin, and intent of the attacker. Every day, HBGary obtains 1.5 gigs of malware
that has struck the Internet in the last 24 hour period. This malware is automatically reverse engineered
using Digital DNA(tm) in conjunction with a large VMWare ESX server farm. Millions of data points
are obtained and stored in a database that can be analyzed using a variety of tools, including link-analysis
with Palantir(tm). HBGary's goal is to track the individual actors behind malware infections, and to map
this global theatre of cyber threats. This Malware Summary Report reflects information that has been
obtained and analyzed by HBGary regarding the so-called 'Aurora' operation. Talk about financial,
critical infrastructure, military reliance on cyber systems.
Malware Threat Assessment Report
Acknowledgements
HBGary would like to thank the XXXX
Table of Contents
Contents
Summary ....................................................................................................................................................... 1
Key findings .............................................................................................................................................. 1
Immediate Actions ........................................................................................................................................ 1
Technical Analysis ........................................................................................................................................ 1
Recent Activity ............................................................................................................................................. 1
Operational Analysis ..................................................................................................................................... 2
Operational Proposals ................................................................................................................................... 2
Summary
The aurora malware operation, as identified by XXXX, was revealed to the public press on XXX (ref).
This malware operation has been associated with potential intellectual property theft including XXX
companies (as revealed by Google in press release XXX). It remains in question if the aurora attack
represents a targeted attack sourced from China.
Key findings
Aspects of the threat that are critical to enumerate:
Social
- Authors, Users, Identified Intent, Places.
- Palantir Chart.
Communications
- C2, IPs, Exfil, etc.
- Palantir Chart.
Vehicle
- Exploit and Payload methods
Remediation
- What can be done to secure against this threat. Things to watch out for.
Technical Information
The attack consists of four components:

Javascript based exploit vector

Shellcode component

Secondary payload server

Payload packages
Forensic toolmarks left in the payload packages can be traced to Chinese-language only sources. Lets list
out what those toolmarks are plainly before explaining them. This indicates that the actors responsible for
compiling the malware package were, in fact, from Chinese origin. The payload package obtained from
www.qvodcom1.com is clearly an instance of a Chinese developed malware package known as 'NB'
(Netbot Attacker). We need to explain here in some detail why it is so clear, maybe restating
what appears obvious, but just so the reader doesn’t have to think. The author of this package is known as
bhenpei12. Some analysis of the author to explain his origins. Also some analysis of the payload
server, payload, and author. There are several operators of this malware. See attached Palantir analysis.
Can we illuminate the distribution channels, forums, etc. Maybe worth describing this a little bit between
author and operators.
The javascript based attack vector was published in the public domain in XXX. With medium technical
skills, it is possible for an attacker to rewrite key components of this javascript, most importantly, they
can customize the javascript to point at any secondary payload server of their choosing. Is the primary
payload server required for the attack? Why do we call it a secondary payload server if it can also serve a
primary function. This makes it difficult to attribute an aurora attack based only on the use of the
javascript.
The secondary payload server exists to serve a primary and secondary payload executable. The primary
executable is downloaded first, and this subsequently will download one or more secondary payloads.
These secondary payloads represent potential advanced persistent threats (APT). Markers for APT. How
can you tell the difference?
NOTE: On this payload, we did not detect APT. The bhenpei12 malware looks like a bot, but designed
for DDOS type attacks.
Immediate Actions
Due to the nature of the infection, and the ability for the malware to extend its capabilities in-field by
downloading additional tools, we suggest that any infected machine be taken offline immediately and the
only sound approach is to re-install the machine for a trusted gold image. No attempt should be made to
“remove” the malware – these attempts are likely to fail and the malware will remain on the machine.
Digital DNA(tm) : the following Digital DNA sequence can be used to detect the presence of this
malware payload. A search should be performed with an 80% match threshold.
00 00 00 00
Instructions for using Digital DNA with HBSS / ePolicy Orchastrator can be found in attachment XXXX.
The attack javascript in question has a very specific pattern. Perimeter security devices should be updated
to detect the following patterns:
XXXXX PHIL HAS THIS.
360/ie2.htm
360/what.jpg
Archived netflow data can be reviewed for the same.
The secondary payload servers are likely to be configured for rapid replacement as to resist black holes
and IP blacklists. Why do we think this? Elaborate. An updated blacklist of potential Aurora C&C
servers can be obtained via FEED from XXXXXX. (Can we highlight endgames data here?) IF WE
COULD PRIORITIZE THE FEED PROCESSOR ON LIKELY AURORA, WE COULD ACTIVELY
EXTRACT THESE FROM OUR DAILY DROP.
There are two servers involved in the drop and control steps. The drop itself will have a primary and
secondary download. Configure your perimeter security devices to search for the following pattern:
XXXXX
mm.exe
mm/1.exe
mm/06.exe
mm/3.exe
mm/05.exe
mm/001.exe
mm/3.exe
mm/ie.exe
mm/01.exe
mm/78.exe
mm/00.exe
mm/78.exe
The command and control is provided by a wholly distinct server system, with the IP and location in no
particular relation to the placement of the payload dropper server. The command and control server
operates on port XXX and will contain traffic similar to the following pattern:
XXXXX
Acoording to Dennis Fisher, the following is on the first 20 bytes of every C&C packet:
[ ff ff ff ff ff ff 00 00 fe ff ff ff ff ff ff ff ff ff 88 ff ]
And, the data sent from client to server is encoded with a logical NOT, and all data received from server
is XOR encoded with 0xCC.
Technical Analysis
The primary control logic can be found in module XXXX. This module has been written in
XXXLanguage, and public source intelligence reveals algorithms and methods that are only available on
Chinese language forums. The primary payload XX was not developed by the same individuals as the
dropper server or javascript attack component. Why do we say this? This suggests that multiple actors
are involved in the development of the final operational capability. This indicates that the primary module
XXX is likely a stand-alone cyber weapon component that is for sale in the black market, or was
developed by a specialized team servicing multiple groups within an agency or state-funded organization.
Thus, XXXX is probably available in the underground as a support-module add-on for existing malware
or malware in development.
The payload module in question uses older techniques, that have been in operation for at least XXX years.
The cutout sites used to communicate with the payload operate on a different server than the payload
dropper. SEE ATTACHED.
Recent Activity
Again, highlight endgames data if possible.
Operational Analysis
What follows are some of the analysis results obtained by link analysis and focused research within the
cyber social spaces of suspected actors related to this malware operation.
The above screenshot illustrates a subset of the data being tracked by HBGary. A description follows:
1. This is a dropper obtained from XXXX, which was directly accessed from the extracted shellcode
from Aurora-family javascript XXXX.
2. This node represents a forensic toolmark within the dropped executable. This toolmark was
obtained using physical memory assessment of the live executable, after it was allowed to unpack
itself in a virtual machine. This assessment was performed with HBGary Responder PRO.
3. The recovered toolmark(s) were researched against published source code artifacts on the
Internet. From this, a single posting was discovered with this exact toolmark, and this posting
exists only in one place and is of Chinese origin. From this, the author of the source code was
determined to be bhenpei12.
4. All social cyberspaces used by bhenpei12 were then enumerated. From this, postings in native
Chinese were discovered that confirm that bhenpei12 is the author and supplier of a malware
package known as 'NB' or 'Netbot Attacker'.
5. Within the social space around 'Netbot Attacker' are individuals who are testing and/or
asking for technical support regarding the malware package operation. These individuals have
been grouped within Palantir as 'technical support for bot'.
The above process, when carried further, produces many more social links. One or more operators of the
bhenpei12 malware package are clearly using the aurora-related javascript exploit package.
Operational Proposals
Maybe we should write a single more generic report about the APT that we update (like what Mandiant
did but better), this report is update quarterly. Then develop more specific reports on different types of
attacks, Aurora, Ghostnet. These reports inform about particular types of attacks, cyber and social
players, etc. These inform, provide the threat intelligence to defend more effectively against the attacks.
We need to have a QRC process for these so we can react quickly and provide them as near to the attack
as possible.
For the APT there are many things we can help set up. To combat this adversary takes significant
changes in how we conduct cyber operations. HBGary and HBGary Federal an both provide the
technology and expertise to carry out more effective cyber warfare.
It is suggested that HBGary begin a cover operation to locate and purchase XXXX from the black market,
and identify the seller by requesting specific technical upgrades we believe only the original developer w/
source code would be capable of. A second stage would be to offer to resell the XXXX component for
money and establish a long term working relationship. Finally, a third step to the operation would be to
offer partnership in business and make some substantial code contributions to the XXX source base,
establishing trust and partnership with the developer to a point where we are exposed to identity of buyers
for the technology, and potentially introducing plausibly deniable weaknesses into the architecture that
will allow backdoor access.
The same scenario could be applied to XXX, as we suspect this is a much lower developer on the food
chain, paid far less, and far less professional. This suggests it would be possible to lure them into
scenarios where we could extract a great deal of HUMINT from the individual for a much lower cost than
that required for the developer of XXXX.