The world is abuzz this week with some flaming malware — well "Flame" is the family name if you want to be precise. The malware package itself is considerably larger than what you'll typically bump into on average, but the interest it is garnering with the media and antivirus vendors has more to do with the kinds of victims that have sprung up — victims mostly in the Middle East, including Iran — and a couple of vendors claiming the malware as being related to Stuxnet and Duku.
A technical report on sKyWIper was released by the Laboratory of Cryptography and Systems Security (CrySys Lab) over at the Budapest University of Technology and Economics yesterday covering their analysis of the malware — discovered earlier in May 2012 — and they also drew the conclusion that this threat is related (if not identical) to the malware described by the Iran National CERT (MAHER) — referred to as Flamer. Meanwhile, Kaspersky released some of their own analysis of "Flame" on Monday and created a FAQ based upon their interpretation of the malware's functionality and motivations.
There is of course some debate starting about the first detection of Flamer. Given the malware's size and number of constituent components it shouldn't be surprising to hear that some pieces of it may have been detected as far back as March 1st 2010 — such as the file "~ZFF042.TMP" (also seen as MSSECMGR.OCX and 07568402.TMP) — a nalyzed by Webroot and attributed to a system in Iran.
While it's practically a certainty that the malware was created and infected a number of victims before it was "detected" in May, I'd caution against some of the jumps people are making related to the attribution of the threat.
Firstly, this behemoth of a malware pack is constructed of a lot of different files — many of which are not malicious; with the package including common library files (such as those necessary for handling compression and video capture) as well as the Lua virtual machine. Secondly, when you're limited to an 8.3 file naming convention, even malicious files are likely to have name collisions — resulting in many spurious associations with past, unrelated, threats if you're googling for relationships. And finally, why build everything from scratch? — it's not like malware authors feel honor bound to adhere to copyright restrictions or steal code from other malware authors — nowadays we see an awful lot of code recycling and simple theft as criminals hijack the best features from one another.
As you'd expect from a bloated malware package developed by even a marginally capable hacker, there are a lot of useful features included within. It's rare to see so many features inside a single malware sample (or family), but not exceptional. As Vitaly Kamluk of Kaspersky stated — "Once a system is infected, Flame begins a complex set of operations, including sniffing the network traffic, taking screenshots, recording audio conversations, intercepting the keyboard, and so on," — which is more typical of an attack kit rather than a piece of malware. What do I mean by "attack kit"? Basically a collection of favorite tools and scripts used by hackers to navigate a compromised host or network. In the commercial pentesting game, the consultant will normally have a compressed file (i.e. the "attack kit") that he can shuttle across the network and drop on any hosts he gains access to. That file contains all of the tools they're going to need to unravel the security of the (newly) compromised host and harvest the additional information they'll need to navigate onto the next targeted device. It's not rocket science, but it works just fine.
I'm sure some people will be asking whether the malware does anything unique. From what I can tell (without having performed an exhaustive blow-by-blow analysis of the 20Mb malware file), the collection of files doesn't point to anything not already seen in most common banking Trojans or everyday hacking tools. That doesn't make it less dangerous — it merely reflects the state of malware development, where "advanced" features are standard components and can be incorporated through check-box-like selection options at compile time.
For malware of this ilk, automated propagation of infections (and infectious material) is important. Flame includes a number of them — including the commonly encountered USB-based autorun and .lnk vulnerabilities observed in malware families like Stuxnet (and just about every other piece of malware since the disclosure of the successful .lnk infection vector), and that odd print spooler vulnerability — which helps date the malware packaged. By that I mean it helps date the samples that have been recovered — as there is currently no evidence of what the malware package employed prior to these recent disclosures, or what other variants that are circulating in the wild (and not been detected by antivirus products today).
Are these exploits being used for propagation evidence that Stuxnet, Duku and Flame were created and operated by the same organization? Honestly, there's nothing particularly tangible here to reach that conclusion. Like I said before, criminals are only too happy to steal and recycle others code — and this is incredibly common when it comes to the use of exploits. More importantly, these kinds of exploits are incorporated as updates into distributable libraries, which are then consumed by malware and penetration tool kits alike. Attack kits similar to Flame are constantly being updated with new and better tool components — which is why it will be difficult to draw out a timeline for the specific phases of the threat.
That all said, if the malware isn't so special — and it's a hodgepodge of various public (known) malicious components — why has it eluded antivirus products in the victim regions for so long? It would be simple to argue that these regions aren't known for employing cutting-edge antimalware defenses and aren't well served with local-language versions of the most capable desktop antivirus suites, but I think the answer is a little simpler than that — the actors behind this threat have successfully managed their targets and victims — keeping a low profile and not going for the masses or complex setups.
This management aspect is clearly reflected in the kill module of the malware package. For example, there seems to be a module named "browse32″ that's designed to search for all evidence of compromise (e.g. malware components, screenshots, stolen data, breadcrumbs, etc.) and carefully remove them. While many malware families employ a cleanup capability to hide the initial infection, few include the capability of removing all evidence on the host (beyond trashing the entire computer). This, to my mind, is more reflective of a tool set designed for human interactive control — i.e. for targeted attacks.
At Damballa Labs we're looking at the C&C infrastructure and relationships with other criminal campaigns and targeted attacks. I'm hoping to get some of the analysis out this week — assuming that there's anything interesting there...
|Cybersquatting||Policy & Regulation|
|DNS Security||Registry Services|
|IP Addressing||White Space|
Minds + Machines