Hesperbot: Analysis of a New Banking Trojan

Hesperbot: Analysis of a New Banking Trojan

Hesperbot: analysis of a new banking trojan Anton Cherepanov [email protected] The Discovery… • Early testing variants: Turkey – April 2013 (Malware operators probably active even earlier) • Peak activity in Turkey: July – September 2013 • Czech spreading campaigns: since August 8, 2013 ZeroNights 2013 The beginning of Czech campaign ZeroNights 2013 Targeted Countries United Kingdom Portugal Rest of Thailand the world • tr-botnet • cz-botnet • pt-botnet • uk-botnet + few other test botnets ZeroNights 2013 Win32/Spy.Hesperbot Architecture Downloadable Modules • x86 & x64 versions ZeroNights 2013 Win32/Spy.Hesperbot Dropper Injects core into explorer.exe I. Spawn new explorer.exe, patch NtGetContextThread II. “PowerLoader trick”: Shell_TrayWnd / SetWindowLong / SendNotifyMessage III. Common CreateRemoteThread method ZeroNights 2013 Win32/Spy.Hesperbot Core • C&C communication (Hard-coded domain + DGA) • Enumerating SmartCards • Launch plug-in modules: • socks, keylog, hvnc, sch, nethk, httphk, httpi ZeroNights 2013 Network Traffic Interception Intercepting HTTP and HTTPS: • Form-grabbing • Web-injects The following browsers are affected: • Internet Explorer, Mozilla Firefox, Google Chrome, Opera, Safari, Yandex Browser, SeaMonkey, K-Meleon, Maxthon, Avant Browser, Sleipnir, Deepnet Explorer ZeroNights 2013 Network Traffic Interception 1. Creates local proxy 2. Hooks mswsock.dll functions Embedded Certs for HTTPS: • self-signed certificate ZeroNights 2013 ZeroNights 2013 Certificate Pinning ZeroNights 2013 Certificate Pinning ZeroNights 2013 Bypassing Certificate Verification Browser process Hooked functions iexplore.exe maxthon.exe avant.exe sleipnir.exe CertVerifyCertificateChainPolicy and webkit2webprocess.exe CertGetCertificateChain in crypt32.dll browser.exe chrome.exe deepnet.exe firefox.exe CERT_VerifyCertificate, CERT_VerifyCert, seamonkey.exe CERT_VerifyCertificateNow, k-meleon.exe CERT_VerifyCertNow and CERT_VerifyCertName in nss3.dll opera.exe Function in opera.dll ZeroNights 2013 Network Traffic Interception ZeroNights 2013 Example Configuration Files ZeroNights 2013 Example Configuration Files ZeroNights 2013 Example Configuration Files ZeroNights 2013 Example Configuration Files ZeroNights 2013 ZeroNights 2013 ZeroNights 2013 ZeroNights 2013 Mobile component • Android • BlackBerry • Symbian ZeroNights 2013 Comparison with Gataka Gataka Hesperbot Web-injects ✔ ✔ Supported browsers IE, Firefox, Chrome, Opera, + some less known Safari ones Form-grabbing Via web-injects Through local proxy Video capturing ✔ ✔ Keylogger ✔ Modular architecture ✔ ✔ Configuration format database file C&C communication XOR encrypted HTTPS Remote access VNC VNC Mobile component ? ✔ Price ~3300 EUR (Zutick) ? Most targeted Germany, Netherlands, Turkey, Czech Scandinavia Republic, Portugal ZeroNights 2013 Conclusion • New code written from scratch • Real money stolen • On-going investigation • Similar / Reusable web-inject format • Monitoring botnet activity, tracking new versions… • Strictly localized campaigns ZeroNights 2013 Thank you! [email protected] WeLiveSecurity.com [email protected] Virusradar.com .

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    25 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us