The Latest in IT Security

Bamm Bamm, Rubble.

14
Sep
2011

The family selected for addition to MSRT this month is Win32/Bamital. Win32/Bamital was first discovered in September 2009 and was able to intercept and modify queries performed by search engines such as AltaVista, Bing, Google and Yahoo. Win32/Bamital has evolved over a number of generations, employing a varying range of system modifications to ensure that the malicious code is executed. Whilst the complexity of Win32/Bamital has increased over time, the core functionality of search hijacking has remained.

  For example, here is an extract from a current generation template Win32/Bamital employs to drive this functionality:   Bamital template

  Some of the modifications observed over time include the ability to generate domain names for command and control algorithmically, a technique also employed by other high-profile malware such as Win32/Sinowal and Win32/Conficker for example.   In this case, the Date header in the HTTP response from a simple request to google.com acts as the seed for this process.   Date: Wed, 14 Sep 2011 00:42:36 GMT   An MD5 hash is calculated on a portion of this string, prepending 10 different single characters.       MD5(%character%14 Sep 2011)   This currently provides an upper limit of 40 domain names per day by using four different suffixes.       %hash%.co.cc     %hash%.cz.cc     %hash%.info     %hash%.org   Here are a couple of examples for the small number of IP addresses to which the generated domain names resolve currently.   Name:     37C716B1EF8A468B4301314DCCE830FA.cz.cc Address:     178.238.36.7    (178-238-36-7.static.masterinter.net)   Name:     37C716B1EF8A468B4301314DCCE830FA.co.cc Addresses:     46.137.253.137  (ec2-46-137-253-137.ap-southeast-1.compute.amazonaws.com)     46.137.253.141  (ec2-46-137-253-141.ap-southeast-1.compute.amazonaws.com)     46.137.253.144  (ec2-46-137-253-144.ap-southeast-1.compute.amazonaws.com)     Interestingly, we can see that the authors of Win32/Bamital are employing the use of Amazon Web Services as part of their command and control infrastructure. We notified Amazon of the abuse and received confirmation that it is being investigated.   — Scott Molenkamp 

Leave a reply


Categories

TUESDAY, APRIL 23, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments