| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| |
|
| | import volatility.plugins.taskmods as taskmods |
| | import volatility.win32.tasks as tasks |
| | import volatility.utils as utils |
| | import volatility.debug as debug |
| | import volatility.plugins.malware.malfind as malfind |
| | from struct import unpack, unpack_from |
| | from socket import inet_ntoa |
| | from collections import OrderedDict |
| |
|
| | try: |
| | import yara |
| | has_yara = True |
| | except ImportError: |
| | has_yara = False |
| |
|
| | plugx_sig = { |
| | 'namespace1' : 'rule plugx { \ |
| | strings: \ |
| | $v1 = { 47 55 4c 50 00 00 00 00 } \ |
| | $v2a = { 68 40 25 00 00 } \ |
| | $v2c = { 68 58 2D 00 00 } \ |
| | $v2b = { 68 a0 02 00 00 } \ |
| | $v2d = { 68 a4 36 00 00 } \ |
| | $v2e = { 8D 46 10 68 } \ |
| | $v2f = { 68 24 0D 00 00 } \ |
| | $v2g = { 68 a0 02 00 00 } \ |
| | $v2h = { 68 e4 0a 00 00 } \ |
| | $enc1 = { C1 E? 03 C1 E? 07 2B ?? } \ |
| | $enc2 = { 32 5? ?? 81 E? ?? ?? 00 00 2A 5? ?? 89 ?? ?? 32 ?? 2A ?? 32 5? ?? 2A 5? ?? 32 } \ |
| | $enc3 = { B? 33 33 33 33} \ |
| | $enc4 = { B? 44 44 44 44} \ |
| | condition: $v1 at 0 or ($v2a and $v2b and $enc1) or ($v2c and $v2b and $enc1) or ($v2d and $v2b and $enc2) or ($v2d and $v2e and $enc2) or ($v2f and $v2g and $enc3 and $enc4) or ($v2h and $v2g and $enc3 and $enc4)}' |
| | } |
| |
|
| | FLAG_ENABLE = 0xFFFFFFFF |
| |
|
| | HKEY_CLASSES_ROOT = 0x80000000 |
| | HKEY_CURRENT_USER = 0x80000001 |
| | HKEY_LOCAL_MACHINE = 0x80000002 |
| |
|
| |
|
| | class plugxConfig(taskmods.DllList): |
| | """Parse the PlugX configuration""" |
| |
|
| | @staticmethod |
| | def is_valid_profile(profile): |
| | return (profile.metadata.get('os', 'unknown') == 'windows'), profile.metadata.get('memory_model', '32bit') |
| |
|
| | def get_vad_base(self, task, address): |
| | for vad in task.VadRoot.traverse(): |
| | if address >= vad.Start and address < vad.End: |
| | return vad.Start, vad.End |
| |
|
| | return None |
| |
|
| | def parse_config(self, cfg_blob, cfg_sz, cfg_addr, vinfo): |
| | p_data = OrderedDict() |
| |
|
| | |
| | SleepTime = unpack_from('>I', cfg_blob, 0x34)[0] |
| | NetworkFlag = unpack_from('<672B', cfg_blob, 0x3c) |
| | ServerURL = unpack_from('<128s128s128s128s', cfg_blob, 0x3fc) |
| | if cfg_sz == 0x1d18: |
| | InstallFolder = unpack_from('<512s', cfg_blob, 0x910)[0] |
| | ServiceName = unpack_from('<512s', cfg_blob, 0xb10)[0] |
| | ServiceDisplayName = unpack_from('<512s', cfg_blob, 0xd10)[0] |
| | InjectionProcess = unpack_from('<512s', cfg_blob, 0x1518)[0] |
| | ServerID1 = unpack_from('<512s', cfg_blob, 0x1718)[0] |
| | ServerID2 = unpack_from('<512s', cfg_blob, 0x1918)[0] |
| | Mutex = unpack_from('<256s', cfg_blob, 0x1b18)[0] |
| | RunKey = unpack_from('<512s', cfg_blob, 0x1114)[0] |
| | RunKeyValu = unpack_from('<512s', cfg_blob, 0x1314)[0] |
| | elif cfg_sz == 0x1510 or cfg_sz == 0x150c: |
| | InstallFolder = unpack_from('<512s', cfg_blob, 0x90c)[0] |
| | ServiceName = unpack_from('<512s', cfg_blob, 0xb0c)[0] |
| | ServiceDisplayName = unpack_from('<512s', cfg_blob, 0xd0c)[0] |
| | ServerID1 = unpack_from('<512s', cfg_blob, 0x110c)[0] |
| | ServerID2 = unpack_from('<512s', cfg_blob, 0x130c)[0] |
| |
|
| | ServerData = [[0] * 3] * 4 |
| | proxy = [[0] * 5] * 4 |
| | if unpack_from('<I', cfg_blob, 0xc)[0] == FLAG_ENABLE: |
| | DLLremove_flag = 'Enable' |
| | else: |
| | DLLremove_flag = 'Disable' |
| |
|
| | if unpack_from('<I', cfg_blob, 0x28)[0] == FLAG_ENABLE: |
| | FileDelete_flag = 'Enable' |
| | else: |
| | FileDelete_flag = 'Disable' |
| |
|
| | if unpack_from('<I', cfg_blob, 0x2c)[0] == FLAG_ENABLE: |
| | KeyLog_flag = 'Enable' |
| | else: |
| | KeyLog_flag = 'Disable' |
| |
|
| | (dns1, dns2, dns3, dns4) = unpack_from("<4L", cfg_blob, 0x2dc) |
| | custom_dns = cfg_blob[0x2dc:0x2ec] |
| |
|
| | for i in xrange(4): |
| | if unpack_from('<B', cfg_blob, 0x2ec + (i * 68))[0] != 0x0: |
| | ServerData[i] = unpack_from('<HH64s', cfg_blob, 0x2ec + (i * 68)) |
| |
|
| | for i in xrange(4): |
| | proxy[i] = unpack_from('<2H64s64s64s', cfg_blob, 0x5fc + (i * 196)) |
| |
|
| | if unpack_from('>B', cfg_blob, 0x90c)[0] == 0: |
| | AutorunSetup = 'Service setup' |
| | elif unpack_from('>B', cfg_blob, 0x90c)[0] == 1: |
| | AutorunSetup = 'Run Registry' |
| | elif unpack_from('>B', cfg_blob, 0x90c)[0] == 2: |
| | AutorunSetup = 'Disable' |
| |
|
| | if unpack_from('<I', cfg_blob, 0x1110)[0] == HKEY_CLASSES_ROOT: |
| | RegistrySubkey = 'HKEY_CLASSES_ROOT' |
| | elif unpack_from('<I', cfg_blob, 0x1110)[0] == HKEY_CURRENT_USER: |
| | RegistrySubkey = 'HKEY_CURRENT_USER' |
| | elif unpack_from('<I', cfg_blob, 0x1110)[0] == HKEY_LOCAL_MACHINE: |
| | RegistrySubkey = 'HKEY_LOCAL_MACHINE' |
| | else: |
| | RegistrySubkey = unpack_from('<I', cfg_blob, 0x1110)[0] |
| |
|
| | if cfg_sz > 0x1510: |
| | if unpack_from('>B', cfg_blob, 0x1514)[0] == 0: |
| | InjectionFlag = 'Enable' |
| | else: |
| | InjectionFlag = 'Disable' |
| |
|
| | CnCDay = 'Everyday' |
| | for x in xrange(672): |
| | if NetworkFlag[x] == 0x0: |
| | CnCDay = 'Network Activity Flag Enable(Check config file!)' |
| |
|
| | |
| | p_data["Version"] = 1 |
| | p_data["Version Info"] = vinfo |
| | p_data["Config Size"] = "0x{0:X}".format(cfg_sz) |
| | p_data["Delete DLL list"] = DLLremove_flag |
| | p_data["File Delete"] = FileDelete_flag |
| | p_data["Key Logger"] = KeyLog_flag |
| | p_data["Sleep Time"] = SleepTime |
| | p_data["Network Activity"] = CnCDay |
| | if dns1 not in (0, 0xffffffff): |
| | p_data["Custom DNS 1"] = inet_ntoa(custom_dns[:4]) |
| | if dns2 not in (0, 0xffffffff): |
| | p_data["Custom DNS 2"] = inet_ntoa(custom_dns[4:8]) |
| | if dns3 not in (0, 0xffffffff): |
| | p_data["Custom DNS 3"] = inet_ntoa(custom_dns[8:12]) |
| | if dns4 not in (0, 0xffffffff): |
| | p_data["Custom DNS 4"] = inet_ntoa(custom_dns[12:16]) |
| |
|
| | for z in xrange(4): |
| | if ServerData[z][0]: |
| | p_data["Server {0}".format(z + 1)] = "{0}:{1} (Type {2})".format(ServerData[z][2].replace('\0', ''), ServerData[z][1], ServerData[z][0]) |
| |
|
| | for y in xrange(4): |
| | if ServerURL[y]: |
| | p_data["Server URL {0}".format(y + 1)] = ServerURL[y].replace('\0', '') |
| |
|
| | for k in xrange(4): |
| | if proxy[k][1] != 0: |
| | p_data["Proxy {0}".format(k + 1)] = "{0}:{1}".format(proxy[k][2].replace('\0', ''), proxy[k][1]) |
| | if proxy[k][3] != '\x00': |
| | p_data["Proxy credentials {0}".format(k + 1)] = "{0}:{1}".format(proxy[k][3].replace('\0', ''), proxy[k][4].replace('\0', '')) |
| |
|
| | p_data["Install Folder"] = InstallFolder.replace('\0', '') |
| | p_data["Service Name"] = ServiceName.replace('\0', '') |
| | p_data["Service Display Name"] = ServiceDisplayName.replace('\0', '') |
| | p_data["Server ID1"] = ServerID1.replace('\0', '') |
| | p_data["Server ID2"] = ServerID2.replace('\0', '') |
| | if cfg_sz == 0x1d18: |
| | p_data["Auto Start"] = AutorunSetup |
| | p_data["Registry Subkey"] = RegistrySubkey.replace('\0', '') |
| | p_data["Registry Key"] = RunKey.replace('\0', '') |
| | p_data["Registry Value"] = RunKeyValu.replace('\0', '') |
| | p_data["Injection"] = InjectionFlag |
| | p_data["Injection Process"] = InjectionProcess.replace('\0', '') |
| | p_data["Mutex"] = Mutex.replace('\0', '') |
| |
|
| | return p_data |
| |
|
| | def parse_config2(self, cfg_blob, cfg_sz, cfg_addr, vinfo): |
| | p_data = OrderedDict() |
| |
|
| | |
| | SleepTime = unpack_from('>I', cfg_blob, 0x34)[0] |
| | NetworkFlag = unpack_from('>672B', cfg_blob, 0x3c) |
| | ServerURL = unpack_from('<128s128s128s128s', cfg_blob, 0x3fc) |
| | InstallFolder = unpack_from('<512s', cfg_blob, 0x910)[0] |
| | ServiceName = unpack_from('<512s', cfg_blob, 0xb10)[0] |
| | ServiceDisplayName = unpack_from('<512s', cfg_blob, 0xd10)[0] |
| | InjectionProcess1 = unpack_from('<512s', cfg_blob, 0x1518)[0] |
| | InjectionProcess2 = unpack_from('<512s', cfg_blob, 0x1718)[0] |
| | InjectionProcess3 = unpack_from('<512s', cfg_blob, 0x1918)[0] |
| | InjectionProcess4 = unpack_from('<512s', cfg_blob, 0x1B18)[0] |
| | if cfg_sz == 0x2540: |
| | ServerID1 = unpack_from('<512s', cfg_blob, 0x1d18)[0] |
| | ServerID2 = unpack_from('<512s', cfg_blob, 0x1f18)[0] |
| | Mutex = unpack_from('<256s', cfg_blob, 0x2118)[0] |
| | ScreenCapFolder = unpack_from('<512s', cfg_blob, 0x2330)[0] |
| | else: |
| | ServerID1 = unpack_from('<512s', cfg_blob, 0x251c)[0] |
| | ServerID2 = unpack_from('<512s', cfg_blob, 0x271c)[0] |
| | Mutex = unpack_from('<256s', cfg_blob, 0x291c)[0] |
| | ScreenCapFolder = unpack_from('<512s', cfg_blob, 0x2b34)[0] |
| | RunKey = unpack_from('<512s', cfg_blob, 0x1114)[0] |
| | RunKeyValu = unpack_from('<512s', cfg_blob, 0x1314)[0] |
| |
|
| | ServerData = [[0] * 3] * 4 |
| | proxy = [[0] * 5] * 4 |
| | if unpack_from('<I', cfg_blob, 0xc)[0] == FLAG_ENABLE: |
| | DLLremove_flag = 'Enable' |
| | else: |
| | DLLremove_flag = 'Disable' |
| |
|
| | if unpack_from('<I', cfg_blob, 0x28)[0] == FLAG_ENABLE: |
| | FileDelete_flag = 'Enable' |
| | else: |
| | FileDelete_flag = 'Disable' |
| |
|
| | if unpack_from('<I', cfg_blob, 0x2c)[0] == FLAG_ENABLE: |
| | KeyLog_flag = 'Enable' |
| | else: |
| | KeyLog_flag = 'Disable' |
| |
|
| | (dns1, dns2, dns3, dns4) = unpack_from("<4L", cfg_blob, 0x2dc) |
| | custom_dns = cfg_blob[0x2dc:0x2ec] |
| |
|
| | for i in xrange(4): |
| | if unpack_from('<B', cfg_blob, 0x2ec + (i * 68))[0] != 0x0: |
| | ServerData[i] = unpack_from('<HH64s', cfg_blob, 0x2ec + (i * 68)) |
| |
|
| | for i in xrange(4): |
| | proxy[i] = unpack_from('<2H64s64s64s', cfg_blob, 0x5fc + (i * 196)) |
| |
|
| | if unpack_from('>B', cfg_blob, 0x90c)[0] == 0: |
| | AutorunSetup = 'Run Registry or Service setup' |
| | elif unpack_from('>B', cfg_blob, 0x90c)[0] == 1: |
| | AutorunSetup = 'Service setup' |
| | elif unpack_from('>B', cfg_blob, 0x90c)[0] == 2: |
| | AutorunSetup = 'Run Registry' |
| | elif unpack_from('>B', cfg_blob, 0x90c)[0] == 3: |
| | AutorunSetup = 'Disable' |
| |
|
| | if unpack_from('<I', cfg_blob, 0x1110)[0] == HKEY_CLASSES_ROOT: |
| | RegistrySubkey = 'HKEY_CLASSES_ROOT' |
| | elif unpack_from('<I', cfg_blob, 0x1110)[0] == HKEY_CURRENT_USER: |
| | RegistrySubkey = 'HKEY_CURRENT_USER' |
| | elif unpack_from('<I', cfg_blob, 0x1110)[0] == HKEY_LOCAL_MACHINE: |
| | RegistrySubkey = 'HKEY_LOCAL_MACHINE' |
| | else: |
| | RegistrySubkey = unpack_from('<I', cfg_blob, 0x1110)[0] |
| |
|
| | if unpack_from('>B', cfg_blob, 0x1514)[0] == 0: |
| | InjectionFlag = 'Enable' |
| | else: |
| | InjectionFlag = 'Disable' |
| |
|
| | if cfg_sz == 0x2540: |
| | if unpack_from('>B', cfg_blob, 0x2318)[0] == 0: |
| | ScCapFlug = 'Disable' |
| | else: |
| | ScCapFlug = 'Enable' |
| | else: |
| | if unpack_from('>B', cfg_blob, 0x2b1c)[0] == 0: |
| | ScCapFlug = 'Disable' |
| | else: |
| | ScCapFlug = 'Enable' |
| |
|
| | CnCDay = 'Everyday' |
| | for x in xrange(672): |
| | if NetworkFlag[x] == 0x0: |
| | CnCDay = 'Network Activity Flag Enable(Check config file!)' |
| |
|
| | |
| | p_data["Version"] = 2 |
| | p_data["Version Info"] = vinfo |
| | p_data["Config Size"] = "0x{0:X}".format(cfg_sz) |
| | p_data["Delete DLL list"] = DLLremove_flag |
| | p_data["File Delete"] = FileDelete_flag |
| | p_data["Key Logger"] = KeyLog_flag |
| | p_data["Sleep Time"] = SleepTime |
| | p_data["Network Activity"] = CnCDay |
| | if dns1 not in (0, 0xffffffff): |
| | p_data["Custom DNS 1"] = inet_ntoa(custom_dns[:4]) |
| | if dns2 not in (0, 0xffffffff): |
| | p_data["Custom DNS 2"] = inet_ntoa(custom_dns[4:8]) |
| | if dns3 not in (0, 0xffffffff): |
| | p_data["Custom DNS 3"] = inet_ntoa(custom_dns[8:12]) |
| | if dns4 not in (0, 0xffffffff): |
| | p_data["Custom DNS 4"] = inet_ntoa(custom_dns[12:16]) |
| |
|
| | for z in xrange(4): |
| | if ServerData[z][0]: |
| | p_data["Server {0}".format(z + 1)] = "{0}:{1} (Type {2})".format(ServerData[z][2].replace('\0', ''), ServerData[z][1], ServerData[z][0]) |
| |
|
| | for y in xrange(4): |
| | if ServerURL[y]: |
| | p_data["Server URL {0}".format(y + 1)] = ServerURL[y].replace('\0', '') |
| |
|
| | for k in xrange(4): |
| | if proxy[k][1] != 0: |
| | p_data["Proxy {0}".format(k + 1)] = "{0}:{1}".format(proxy[k][2].replace('\0', ''), proxy[k][1]) |
| | if proxy[k][3] != '\x00': |
| | p_data["Proxy credentials {0}".format(k + 1)] = "{0}:{1}".format(proxy[k][3].replace('\0', ''), proxy[k][4].replace('\0', '')) |
| |
|
| | p_data["Auto Start"] = AutorunSetup |
| | p_data["Install Folder"] = InstallFolder.replace('\0', '') |
| | p_data["Service Name"] = ServiceName.replace('\0', '') |
| | p_data["Service Display Name"] = ServiceDisplayName.replace('\0', '') |
| | p_data["Registry Subkey"] = RegistrySubkey |
| | p_data["Registry Key"] = RunKey.replace('\0', '') |
| | p_data["Registry Value"] = RunKeyValu.replace('\0', '') |
| | p_data["Injection"] = InjectionFlag |
| | p_data["Injection Process1"] = InjectionProcess1.replace('\0', '') |
| | p_data["Injection Process2"] = InjectionProcess2.replace('\0', '') |
| | p_data["Injection Process3"] = InjectionProcess3.replace('\0', '') |
| | p_data["Injection Process4"] = InjectionProcess4.replace('\0', '') |
| | p_data["Server ID1"] = ServerID1.replace('\0', '') |
| | p_data["Server ID2"] = ServerID2.replace('\0', '') |
| | p_data["Mutex"] = Mutex.replace('\0', '') |
| | p_data["Screen Capture"] = ScCapFlug |
| | p_data["Screen Capture Folder"] = ScreenCapFolder.replace('\0', '') |
| |
|
| | return p_data |
| |
|
| | def parse_config3(self, cfg_blob, cfg_sz, cfg_addr, vinfo): |
| | p_data = OrderedDict() |
| |
|
| | |
| | timer1 = unpack_from('4B', cfg_blob, 0x28) |
| | SleepTime1 = "" |
| | if timer1[0] != 0: |
| | SleepTime1 += "%d days, " % timer1[0] |
| | if timer1[1] != 0: |
| | SleepTime1 += "%d hours, " % timer1[1] |
| | if timer1[2] != 0: |
| | SleepTime1 += "%d mins, " % timer1[2] |
| | SleepTime1 += "%d secs" % timer1[3] |
| |
|
| | timer2 = unpack_from('4B', cfg_blob, 0x2c) |
| | SleepTime2 = "" |
| | if timer2[0] != 0: |
| | SleepTime2 += "%d days, " % timer2[0] |
| | if timer2[1] != 0: |
| | SleepTime2 += "%d hours, " % timer2[1] |
| | if timer2[2] != 0: |
| | SleepTime2 += "%d mins, " % timer2[2] |
| | SleepTime2 += "%d secs" % timer2[3] |
| |
|
| | NetworkFlag = unpack_from('>672B', cfg_blob, 0x30) |
| | ServerURL = unpack_from('<128s128s128s128s128s128s128s128s128s128s128s128s128s128s128s128s', cfg_blob, 0x720) |
| | InstallFolder = unpack_from('<512s', cfg_blob, 0x1234)[0] |
| | ServiceName = unpack_from('<512s', cfg_blob, 0x1434)[0] |
| | ServiceDisplayName = unpack_from('<512s', cfg_blob, 0x1634)[0] |
| | ServiceComment = unpack_from('<512s', cfg_blob, 0x1834)[0] |
| | InjectionProcess1 = unpack_from('<512s', cfg_blob, 0x1e3c)[0] |
| | InjectionProcess2 = unpack_from('<512s', cfg_blob, 0x203c)[0] |
| | InjectionProcess3 = unpack_from('<512s', cfg_blob, 0x223c)[0] |
| | InjectionProcess4 = unpack_from('<512s', cfg_blob, 0x243c)[0] |
| | BypassProcess1 = unpack_from('<512s', cfg_blob, 0x2640)[0] |
| | BypassProcess2 = unpack_from('<512s', cfg_blob, 0x2840)[0] |
| | BypassProcess3 = unpack_from('<512s', cfg_blob, 0x2a40)[0] |
| | BypassProcess4 = unpack_from('<512s', cfg_blob, 0x2c40)[0] |
| | ServerID1 = unpack_from('<512s', cfg_blob, 0x2e40)[0] |
| | ServerID2 = unpack_from('<512s', cfg_blob, 0x3040)[0] |
| | Mutex = unpack_from('<256s', cfg_blob, 0x3240)[0] |
| | ScreenCapFolder = unpack_from('<512s', cfg_blob, 0x3458)[0] |
| | RunKey = unpack_from('<512s', cfg_blob, 0x1a38)[0] |
| | RunKeyValu = unpack_from('<512s', cfg_blob, 0x1c38)[0] |
| |
|
| | ServerData = [[0] * 3] * 16 |
| | proxy = [[0] * 5] * 6 |
| | if unpack_from('<I', cfg_blob, 0x0)[0] == FLAG_ENABLE: |
| | DLLremove_flag = 'Enable' |
| | else: |
| | DLLremove_flag = 'Disable' |
| |
|
| | if unpack_from('<I', cfg_blob, 0x14)[0] == FLAG_ENABLE: |
| | FileDelete_flag = 'Enable' |
| | else: |
| | FileDelete_flag = 'Disable' |
| |
|
| | if unpack_from('<I', cfg_blob, 0x18)[0] == FLAG_ENABLE: |
| | KeyLog_flag = 'Enable' |
| | else: |
| | KeyLog_flag = 'Disable' |
| |
|
| | if unpack_from('<I', cfg_blob, 0x20)[0] == 0: |
| | Unknown_flag = 'Disable' |
| | else: |
| | Unknown_flag = 'Enable' |
| |
|
| | if unpack_from('<I', cfg_blob, 0x263c)[0] == 0: |
| | BypassProcess_flag = 'Disable' |
| | else: |
| | BypassProcess_flag = 'Enable' |
| |
|
| | (dns1, dns2, dns3, dns4) = unpack_from("<4L", cfg_blob, 0x2d0) |
| | custom_dns = cfg_blob[0x2d0:0x2e0] |
| |
|
| | for i in xrange(16): |
| | if unpack_from('<B', cfg_blob, 0x2e0 + (i * 68))[0] != 0x0: |
| | ServerData[i] = unpack_from('<HH64s', cfg_blob, 0x2e0 + (i * 68)) |
| |
|
| | for i in xrange(4): |
| | proxy[i] = unpack_from('<2H64s64s64s', cfg_blob, 0xf20 + (i * 196)) |
| |
|
| | if unpack_from('>B', cfg_blob, 0x1230)[0] == 0: |
| | AutorunSetup = 'Run Registry or Service setup' |
| | elif unpack_from('>B', cfg_blob, 0x1230)[0] == 1: |
| | AutorunSetup = 'Service setup' |
| | elif unpack_from('>B', cfg_blob, 0x1230)[0] == 2: |
| | AutorunSetup = 'Run Registry' |
| | elif unpack_from('>B', cfg_blob, 0x1230)[0] == 3: |
| | AutorunSetup = 'Disable' |
| |
|
| | if unpack_from('<I', cfg_blob, 0x1a34)[0] == HKEY_CLASSES_ROOT: |
| | RegistrySubkey = 'HKEY_CLASSES_ROOT' |
| | elif unpack_from('<I', cfg_blob, 0x1a34)[0] == HKEY_CURRENT_USER: |
| | RegistrySubkey = 'HKEY_CURRENT_USER' |
| | elif unpack_from('<I', cfg_blob, 0x1a34)[0] == HKEY_LOCAL_MACHINE: |
| | RegistrySubkey = 'HKEY_LOCAL_MACHINE' |
| | else: |
| | RegistrySubkey = unpack_from('<I', cfg_blob, 0x1110)[0] |
| |
|
| | if unpack_from('>B', cfg_blob, 0x1e38)[0] == 0: |
| | InjectionFlag = 'Disable' |
| | else: |
| | InjectionFlag = 'Enable' |
| |
|
| | if unpack_from('>B', cfg_blob, 0x3440)[0] == 0: |
| | ScCapFlug = 'Disable' |
| | else: |
| | ScCapFlug = 'Enable' |
| |
|
| | CnCDay = 'Everyday' |
| | for x in xrange(672): |
| | if NetworkFlag[x] == 0x0: |
| | CnCDay = 'Network Activity Flag Enable(Check config file!)' |
| |
|
| | IPscanValu1 = unpack_from('<I', cfg_blob, 0x3658)[0] |
| | IPscanValu2 = unpack_from('<I', cfg_blob, 0x3660)[0] |
| | IPscanValu3 = unpack_from('<I', cfg_blob, 0x3668)[0] |
| | IPscanValu4 = unpack_from('<I', cfg_blob, 0x3670)[0] |
| | IPscanPort1 = unpack_from('<H', cfg_blob, 0x365c)[0] |
| | IPscanPort2 = unpack_from('<H', cfg_blob, 0x3664)[0] |
| | IPscanPort3 = unpack_from('<H', cfg_blob, 0x366c)[0] |
| | IPscanPort4 = unpack_from('<H', cfg_blob, 0x3674)[0] |
| | (ip1, ip2, ip3, ip4) = unpack_from("<4L", cfg_blob, 0x367c) |
| | scanip = cfg_blob[0x367c:0x369c] |
| |
|
| | if unpack_from('<I', cfg_blob, 0x3678)[0] == 0: |
| | IPscan_flag = 'Disable' |
| | else: |
| | IPscan_flag = 'Enable' |
| |
|
| | |
| | p_data["Version"] = 3 |
| | p_data["Version Info"] = vinfo |
| | p_data["Config Size"] = "0x{0:X}".format(cfg_sz) |
| | p_data["Delete DLL list"] = DLLremove_flag |
| | p_data["File Delete"] = FileDelete_flag |
| | p_data["Key Logger"] = KeyLog_flag |
| | p_data["Unknown Flag"] = Unknown_flag |
| | p_data["Sleep Time1"] = SleepTime1 |
| | p_data["Sleep Time2"] = SleepTime2 |
| | p_data["Network Activity"] = CnCDay |
| | if dns1 not in (0, 0xffffffff): |
| | p_data["Custom DNS 1"] = inet_ntoa(custom_dns[:4]) |
| | if dns2 not in (0, 0xffffffff): |
| | p_data["Custom DNS 2"] = inet_ntoa(custom_dns[4:8]) |
| | if dns3 not in (0, 0xffffffff): |
| | p_data["Custom DNS 3"] = inet_ntoa(custom_dns[8:12]) |
| | if dns4 not in (0, 0xffffffff): |
| | p_data["Custom DNS 4"] = inet_ntoa(custom_dns[12:16]) |
| |
|
| | for z in xrange(16): |
| | if ServerData[z][0]: |
| | p_data["Server {0}".format(z + 1)] = "{0}:{1} (Type {2})".format(ServerData[z][2].replace('\0', ''), ServerData[z][1], ServerData[z][0]) |
| |
|
| | for y in xrange(16): |
| | if ServerURL[y]: |
| | p_data["Server URL {0}".format(y + 1)] = ServerURL[y].replace('\0', '') |
| |
|
| | for k in xrange(4): |
| | if proxy[k][1] != 0: |
| | p_data["Proxy {0}".format(k + 1)] = "{0}:{1}".format(proxy[k][2].replace('\0', ''), proxy[k][1]) |
| | if proxy[k][3] != '\x00': |
| | p_data["Proxy credentials {0}".format(k + 1)] = "{0}:{1}".format(proxy[k][3].replace('\0', ''), proxy[k][4].replace('\0', '')) |
| |
|
| | p_data["Auto Start"] = AutorunSetup |
| | p_data["Install Folder"] = InstallFolder.replace('\0', '') |
| | p_data["Service Name"] = ServiceName.replace('\0', '') |
| | p_data["Service Display Name"] = ServiceDisplayName.replace('\0', '') |
| | p_data["Service Comment"] = ServiceComment.replace('\0', '') |
| | p_data["Registry Subkey"] = RegistrySubkey |
| | p_data["Registry Key"] = RunKey.replace('\0', '') |
| | p_data["Registry Value"] = RunKeyValu.replace('\0', '') |
| | p_data["Injection"] = InjectionFlag |
| | p_data["Injection Process1"] = InjectionProcess1.replace('\0', '') |
| | p_data["Injection Process2"] = InjectionProcess2.replace('\0', '') |
| | p_data["Injection Process3"] = InjectionProcess3.replace('\0', '') |
| | p_data["Injection Process4"] = InjectionProcess4.replace('\0', '') |
| | p_data["UACBypass"] = BypassProcess_flag |
| | p_data["UACBypass Process1"] = BypassProcess1.replace('\0', '') |
| | p_data["UACBypass Process2"] = BypassProcess2.replace('\0', '') |
| | p_data["UACBypass Process3"] = BypassProcess3.replace('\0', '') |
| | p_data["UACBypass Process4"] = BypassProcess4.replace('\0', '') |
| | p_data["Server ID1"] = ServerID1.replace('\0', '') |
| | p_data["Server ID2"] = ServerID2.replace('\0', '') |
| | p_data["Mutex"] = Mutex.replace('\0', '') |
| | p_data["Screen Capture"] = ScCapFlug |
| | p_data["Screen Capture Folder"] = ScreenCapFolder.replace('\0', '') |
| | p_data["IP Scan"] = IPscan_flag |
| | if IPscan_flag == "Enable": |
| | p_data["IP Scan value 1"] = IPscanValu1 |
| | p_data["IP Scan port 1"] = IPscanPort1 |
| | p_data["IP Scan value 2"] = IPscanValu2 |
| | p_data["IP Scan port 2"] = IPscanPort2 |
| | p_data["IP Scan value 3"] = IPscanValu3 |
| | p_data["IP Scan port 3"] = IPscanPort3 |
| | p_data["IP Scan value 4"] = IPscanValu4 |
| | p_data["IP Scan port 4"] = IPscanPort4 |
| |
|
| | if ip1 not in (0, 0xffffffff): |
| | p_data["Scan IP 1"] = "{0} - {1}".format(inet_ntoa(scanip[:4]), (inet_ntoa(scanip[16:20]))) |
| | if ip2 not in (0, 0xffffffff): |
| | p_data["Scan IP 2"] = "{0} - {1}".format(inet_ntoa(scanip[4:8]), (inet_ntoa(scanip[20:24]))) |
| | if ip3 not in (0, 0xffffffff): |
| | p_data["Scan IP 3"] = "{0} - {1}".format(inet_ntoa(scanip[8:12]), (inet_ntoa(scanip[24:28]))) |
| | if ip4 not in (0, 0xffffffff): |
| | p_data["Scan IP 4"] = "{0} - {1}".format(inet_ntoa(scanip[12:16]), (inet_ntoa(scanip[28:32]))) |
| |
|
| | return p_data |
| |
|
| | def parse_config_winnti(self, cfg_blob, cfg_sz, cfg_addr, vinfo): |
| | p_data = OrderedDict() |
| |
|
| | |
| | SleepTime = unpack_from('>I', cfg_blob, 0x0c)[0] |
| | NetworkFlag = unpack_from('<672B', cfg_blob, 0x14) |
| |
|
| | if cfg_sz == 0xd24: |
| | InstallDll = unpack_from('<32s', cfg_blob, 0xae4)[0] |
| | InstallData = unpack_from('<32s', cfg_blob, 0xb04)[0] |
| | ServiceName = unpack_from('<32s', cfg_blob, 0xb24)[0] |
| | ServiceDisplayName = unpack_from('<256s', cfg_blob, 0xc24)[0] |
| |
|
| | ServerData = [[0] * 3] * 4 |
| | if unpack_from('<I', cfg_blob, 0xc)[0] == FLAG_ENABLE: |
| | unknown_flag = 'Enable' |
| | else: |
| | unknown_flag = 'Disable' |
| |
|
| | (dns1, dns2, dns3, dns4) = unpack_from("<4L", cfg_blob, 0x2b4) |
| | custom_dns = cfg_blob[0x2b4:0x2c4] |
| |
|
| | for i in xrange(4): |
| | if unpack_from('<B', cfg_blob, 0x2c4 + (i * 68))[0] != 0x0: |
| | ServerData[i] = unpack_from('<HH64s', cfg_blob, 0x2c4 + (i * 68)) |
| |
|
| | CnCDay = 'Everyday' |
| | for x in xrange(672): |
| | if NetworkFlag[x] == 0x0: |
| | CnCDay = 'Network Activity Flag Enable(Check config file!)' |
| |
|
| | |
| | p_data["Version"] = "winnti" |
| | p_data["Version Info"] = vinfo |
| | p_data["Config Size"] = "0x{0:X}".format(cfg_sz) |
| | p_data["Unknown Flag"] = unknown_flag |
| | p_data["Sleep Time"] = SleepTime |
| | p_data["Network Activity"] = CnCDay |
| | if dns1 not in (0, 0xffffffff): |
| | p_data["Custom DNS 1"] = inet_ntoa(custom_dns[:4]) |
| | if dns2 not in (0, 0xffffffff): |
| | p_data["Custom DNS 2"] = inet_ntoa(custom_dns[4:8]) |
| | if dns3 not in (0, 0xffffffff): |
| | p_data["Custom DNS 3"] = inet_ntoa(custom_dns[8:12]) |
| | if dns4 not in (0, 0xffffffff): |
| | p_data["Custom DNS 4"] = inet_ntoa(custom_dns[12:16]) |
| |
|
| | for z in xrange(4): |
| | if ServerData[z][0]: |
| | p_data["Server {0}".format(z + 1)] = "{0}:{1} (Type {2})".format(ServerData[z][2].replace('\0', ''), ServerData[z][1], ServerData[z][0]) |
| |
|
| | if cfg_sz == 0xd24: |
| | p_data["Install DLL"] = InstallDll.replace('\0', '') |
| | p_data["Install Data"] = InstallData.replace('\0', '') |
| | p_data["Service Name"] = ServiceName.replace('\0', '') |
| | p_data["Service Display Name"] = ServiceDisplayName.replace('\0', '') |
| |
|
| | return p_data |
| |
|
| | def calculate(self): |
| |
|
| | if not has_yara: |
| | debug.error("Yara must be installed for this plugin") |
| |
|
| | addr_space = utils.load_as(self._config) |
| |
|
| | os, memory_model = self.is_valid_profile(addr_space.profile) |
| | if not os: |
| | debug.error("This command does not support the selected profile.") |
| |
|
| | rules = yara.compile(sources=plugx_sig) |
| |
|
| | for task in self.filter_tasks(tasks.pslist(addr_space)): |
| | scanner = malfind.VadYaraScanner(task=task, rules=rules) |
| |
|
| | for hit, address in scanner.scan(): |
| |
|
| | vad_base_addr, end = self.get_vad_base(task, address) |
| | proc_addr_space = task.get_process_address_space() |
| | data = proc_addr_space.zread(vad_base_addr, end - vad_base_addr) |
| |
|
| | config_data = [] |
| | offset1 = data.find("\xFF\x68\xa0\x02\x00\x00\x47\x57\x68") |
| | offset2 = data.find("\x00\x68\xa0\x02\x00\x00\x50") |
| | offset3 = data.find("\xF6\x68\xa0\x02\x00\x00\x46\x56\x68") |
| | offset4 = data.find("\xDB\x68\xa0\x02\x00\x00\x43\x53\x68") |
| | offset5 = data.find("\x83\xc4\x0c\x68\x10\x27\x00\x00") |
| | offset6 = data.find("\x00\x68\xa0\x02\x00\x00\xB0") |
| |
|
| | if offset1 > 0: |
| | offset = offset1 |
| | elif offset2 > 0: |
| | offset = offset2 |
| | elif offset3 > 0: |
| | offset = offset3 |
| | elif offset4 > 0: |
| | offset = offset4 |
| | elif offset5 > 0: |
| | offset = offset5 |
| | elif offset6 > 0: |
| | offset = offset6 |
| | else: |
| | continue |
| |
|
| | while not (data[offset] == "\x68" and (data[offset + 5] == "\xe8" or data[offset + 6] == "\xe8")) and offset > 0: |
| | offset -= 1 |
| | if data[offset] != "\x68": |
| | continue |
| |
|
| | |
| | |
| | |
| | (config_addr, ) = unpack("=I", data[offset + 1:offset + 5]) |
| |
|
| | |
| | offset -= 1 |
| | while not data[offset] == "\x68": |
| | offset -= 1 |
| | if data[offset] != "\x68": |
| | continue |
| |
|
| | |
| | info_start = data.find('\\work\\') |
| | if info_start > 0: |
| | info_end = data.find('\\', info_start + 6) |
| | version_info = str(data[info_start + 6: info_end]).decode("utf-8", "replace") |
| | else: |
| | version_info = "Null" |
| |
|
| | (config_size, ) = unpack("=I", data[offset + 1:offset + 5]) |
| |
|
| | config_addr -= vad_base_addr |
| | if config_size == 0x1510: |
| | config_addr = config_addr + 4 |
| |
|
| | config_blob = data[config_addr:config_addr + config_size] |
| | if config_size == 0xd24 or config_size == 0xae4: |
| | config_data.append(self.parse_config_winnti(config_blob, config_size, config_addr, version_info)) |
| | elif config_size == 0x2540: |
| | config_data.append(self.parse_config2(config_blob, config_size, config_addr, version_info)) |
| | elif config_size == 0x2d58: |
| | config_data.append(self.parse_config2(config_blob, config_size, config_addr, version_info)) |
| | elif config_size == 0x36A4: |
| | config_data.append(self.parse_config3(config_blob, config_size, config_addr, version_info)) |
| | else: |
| | config_data.append(self.parse_config(config_blob, config_size, config_addr, version_info)) |
| |
|
| | yield task, vad_base_addr, end, hit, memory_model, config_data |
| | break |
| |
|
| | def render_text(self, outfd, data): |
| |
|
| | delim = '-' * 70 |
| |
|
| | for task, start, end, malname, memory_model, config_data in data: |
| | outfd.write("{0}\n".format(delim)) |
| | outfd.write("Process: {0} ({1})\n\n".format(task.ImageFileName, task.UniqueProcessId)) |
| |
|
| | outfd.write("[Config Info]\n") |
| | for p_data in config_data: |
| | for id, param in p_data.items(): |
| | outfd.write("{0:<25}: {1}\n".format(id, param)) |
| |
|