REPOST - ORIGINALLY POSTED NOVEMBER 4, 2010

Recent reports from various sources in the security industry show that a large takedown of servers associated with the “Bredolab” trojan occurred within the past few weeks. While most of the reports have focused around the idea that this infrastructure was solely related to the command and control of Bredolab, our research shows that these servers were used as an all-purpose hosting infrastructure for criminal activity.

This criminal system came to our attention in July 2010, when NetWitness analysts were asked to investigate a hacked wordpress blog.

We found that the following obfuscated script had been injected into all .html and php pages on the site:

obfuscated_script.png

When decoded, this script created a redirect to the following location:

hxxp://bakedonlion.ru:8080/google.com/pcpop.com/torrentdownloads.net.php

Further investigation revealed an injection of the script into victim webpages via FTP:

ftplogins.png

These IPs all connected to the victim website within a 20-minute period on May 8th, and when plotted on a map, it becomes obvious that this is likely a botnet.

botnet.png

Down the Rabbit-hole

Once we established the source of the website compromise, we began back-tracking into the criminal infrastructure to help develop intelligence that would assist our customers.  What we found was the following:

The initial injected script:

bakedonion.ru:8080/google.com/pcpop.com/torrentdownloads.net.php

redirects to obfuscated scripts:

bakedonion.ru:8080/index.php?pid=1&home=1

then:

bakedonion.ru:8080/jquery.jxx?ver=2.1.5

which ultimately result in exploit code being delivered to the visiting browser.   If successful, the following GET occurs which causes the download of the bredolab malware.

bakedonion.ru:8080/welcome.php?id=6&pid=1&hello=503

Discovery of this infection sequence began a 3-month monitoring activity from June to August 2010.

More on Bredolab

Bredolab rose to prominence in the malware community around the middle of 2009.   Trend Micro has a very good report on the malware’s specifics.

In this particular instance, this Bredolab variant downloaded both Fake AV and ZeuS, which are two well-known malware threats.

1) Fake AV – Installs a fake antivirus program that reports non-existent infections on the host workstation.  The option to “clean” the host is given if the user agrees to pay a fee for the “pro” or “advanced” version of the software.  This particular combination of social engineering and malware has been very popular in the past few years as it has a three-part punch:

  1. The miscreant establishes a foothold on the compromised PC.
  2. The miscreant makes money from those users that pay the “upgrade” fee.
  3. The miscreant has access to the payment method of the user after he or she makes payment (credit card, paypal,etc), which can be used for further fraud.

2) ZeuS – An all-purpose information stealer that has historically been focused on financial fraud.   Because online hosts often have the ability to use a web-based client to remotely manage files and folder on a host, this may likely be one of the sources for the stolen FTP credentials used in script injection. 

Although not part of the campaign detailed here, Bredolab has been observed downloading other malware families, which provided evidence that the operator used the system in pay-per-install affiliate programs or provided install services to other miscreants.

Further into the infrastructure

Shortly after our initial investigation began, open source research in the security community into common paths on the miscreant servers revealed active Apache Server Status pages, a feature in the Apache webserver that allows you to monitor performance of your installation.  This finding allowed us to log and further develop intelligence based on the page visits that we observed on the miscreant servers.

With this bit of information, we were able to take the previously known infection sequence, and expand it:

1) The initial directory sequence observed in the original injected script:

“google.com/pcpop.com/torrentdownloads.net.php”

was only one of many variations, some of which are as follows:

  • GET /google.com/gazeta.pl/orkut.com.php HTTP/1.0
  • GET /google.com/amazonaws.com/tudou.com.php HTTP/1.0
  • GET /dangdang-com/google.com/bing.com.php HTTP/1.0
  • GET /elpais-com/google.com/telegraph.co.uk.php HTTP/1.0
  • GET /focus-cn/google.com/startimes2.com.php HTTP/1.0
  • GET /verizonwireless-com/google.com/blogbus.com.php HTTP/1.0
  • GET /vmn-net/google.com/godaddy.com.php HTTP/1.0

We surmised that this seemingly random combination of high-traffic sites served two purposes: 

  • Establish “legitimacy” during casual inspection.
  • Make the creation of intrusion detection signatures on this particular phase difficult.

2) Specific paths to exploit artifacts, which included: 

  • GET /Notes1.pdf HTTP/1.0
  • GET /Notes2.pdf HTTP/1.0
  • GET /Notes3.pdf HTTP/1.0
  • GET /Notes4.pdf HTTP/1.0
  • GET /Notes5.pdf HTTP/1.0
  • GET /Notes6.pdf HTTP/1.0
  • GET /Notes7.pdf HTTP/1.0
  • GET /Notes8.pdf HTTP/1.0
  • GET /Notes9.pdf HTTP/1.0
  • GET /Notes10.pdf HTTP/1.0
  • GET /NewGames.jar HTTP/1.0
  • GET /Games.jar HTTP/1.0
  • GET /Applet1.html HTTP/1.0
  • GET /Applet4.html HTTP/1.0
  • GET /Applet10.html HTTP/1.0

3)   Additional Malware Downloads: 

  • GET /images/gr_old_cr.exe HTTP/1.0

Examining Exploits

By taking a closer look at one of the exploits used in this particular campaign during the observed time period, we saw a common theme that is being used by most criminal elements in the current threat environment.

  • Client-side vulnerabilities in third-party software

Criminal elements have learned that organizations typically have OS-level patching under control, but the patching of third-party applications is often outside of the capabilities of most organizations.  This is usually due to both the complication of centralizing third-party patching, but more so because of the linking of commodity technologies, such as PDF readers, into mission-critical business processes that may be interrupted by upgraded versions and require lengthy testing prior to extensive deployment. 

In this case, we see the following exploits being used in the exploit PDFs:

Which, when successful, calls out to the previously observed urls: 

http://anyscent.ru:8080/welcome.php?id=6&pid=2&hello=503

While we did see multiple versions of this pdf file (1-10), they were all structurally identical, with slight changes to change the file enough to bypass antivirus detection.

A change of tactics

On or around June 11th, we observed a tactics change by the miscreants, based on the previously observed exploit-cycle. The previously seen requests, such as:

  • GET /google.com/y8.com/ynet.com.php HTTP/1.0

Stopped occurring, and we began seeing requests formatted as follows:

  • GET /E-mail.js HTTP/1.0
  • GET /Filename.js HTTP/1.0
  • GET /Gnutella.js HTTP/1.0

These requests were made to the same servers, but on port 80 (rather than the previously observed 8080).    While it wasn’t immediately apparent at the time, this change signified a significant shift from a single domain based compromise structure to a multi-domain system that assigned specific roles to domains according to their desired use. 

An Intelligence Breakthrough

At this point in the investigation, we began linking like servers together based on community reports and our own field work with indicators such as malware and exploit filenames.   Since they all had available server status pages, this again expanded our ability to collect intelligence on this system. A breakthrough occurred when we observed one of the exploit servers transferring a tgz archive from one of the other servers in the system via HTTP. With the proper path, we were then able to retrieve this file directly from the exploit server and further explore it. This archive contained a series of DNS zone configuration files that detailed the infrastructure with labels and allowed us completely map the system as it was updated.  We surmised that the configuration files were used by the criminal miscreants to update their exploit system in an automated fashion.  This would allow quick updates when security researcher activity caused a takedown of a suspect domain.  With this discovery, we began logging changes to the infrastructure on a daily basis.

zonefile2.png

Mapping the Infrastructure

With the zone information and other monitoring, we observed 114 IP addresses resolving to known malicious domains in this system.

12312 62.27.51.163 ECOTEL ecotel communication ag
12322 88.191.47.83 PROXAD Free SAS
12322 88.191.79.158 PROXAD Free SAS
12322 88.191.79.223 PROXAD Free SAS
13213 83.170.113.88 UK2NET-AS UK-2 Ltd Autonomous System
13727 216.8.179.23 ND-CA-ASN – NEXT DIMENSION INC
15418 77.68.52.52 FASTHOSTS-INTERNET Fasthosts Internet Ltd. Gloucester
15685 217.11.254.41 CASABLANCA-AS Casablanca INT Autonomous system
15830 217.20.47.85 TELECITY-LON TELECITYGROUP INTERNATIONAL LIMITED
16265 85.17.137.40 LEASEWEB LEASEWEB AS
16265 85.17.19.26 LEASEWEB LEASEWEB AS
16265 94.75.243.6 LEASEWEB LEASEWEB AS
16276 178.32.1.70 OVH OVH
16276 188.165.124.185 OVH OVH
16276 188.165.159.139 OVH OVH
16276 188.165.192.22 OVH OVH
16276 188.165.196.19 OVH OVH
16276 188.165.204.115 OVH OVH
16276 188.165.61.44 OVH OVH
16276 188.165.95.132 OVH OVH
16276 188.165.95.133 OVH OVH
16276 213.186.47.177 OVH OVH
16276 213.251.164.84 OVH OVH
16276 87.98.149.171 OVH OVH
16276 91.121.108.38 OVH OVH
16276 91.121.11.69 OVH OVH
16276 91.121.15.168 OVH OVH
16276 91.121.162.65 OVH OVH
16276 91.121.163.43 OVH OVH
16276 91.121.167.167 OVH OVH
16276 91.121.174.152 OVH OVH
16276 91.121.182.209 OVH OVH
16276 91.121.226.19 OVH OVH
16276 91.121.27.197 OVH OVH
16276 91.121.3.80 OVH OVH
16276 91.121.74.88 OVH OVH
16276 94.23.110.107 OVH OVH
16276 94.23.12.62 OVH OVH
16276 94.23.158.31 OVH OVH
16276 94.23.198.9 OVH OVH
16276 94.23.220.163 OVH OVH
16276 94.23.220.194 OVH OVH
16276 94.23.224.132 OVH OVH
16276 94.23.228.40 OVH OVH
16276 94.23.229.220 OVH OVH
16276 94.23.24.66 OVH OVH
16276 94.23.28.143 OVH OVH
16276 94.23.34.93 OVH OVH
16276 94.23.35.107 OVH OVH
16276 94.23.92.35 OVH OVH
16582 66.185.162.248 NEXTLEVELINTERNET – NEXTLEVEL INTERNET
174 82.138.98.27 COGENT Cogent/PSI
20773 87.230.53.82 HOSTEUROPE-AS AS of Hosteurope Germany / Cologne
20773 87.230.55.58 HOSTEUROPE-AS AS of Hosteurope Germany / Cologne
20773 87.230.73.52 HOSTEUROPE-AS AS of Hosteurope Germany / Cologne
20877 87.237.106.195 DATEK DATEK Telecom SRL
20912 212.66.100.194 ASN-PANSERVICE Panservice
23136 74.213.179.183 ONX – OnX Enterprise Solutions Inc.
24806 81.2.210.98 INTERNET-CZ INTERNET CZ
24940 188.40.81.119 HETZNER-AS Hetzner Online AG RZ
24940 88.198.14.169 HETZNER-AS Hetzner Online AG RZ
24940 88.198.35.214 HETZNER-AS Hetzner Online AG RZ
24940 88.198.49.197 HETZNER-AS Hetzner Online AG RZ
24940 88.198.55.175 HETZNER-AS Hetzner Online AG RZ
24989 88.84.145.36 IXEUROPE-DE-FRANKFURT-ASN IX Europe Germany AS
27699 200.168.150.223 TELECOMUNICACOES DE SAO PAULO S/A – TELESP
2860 194.79.88.121 NOVIS Novis Telecom
28677 62.193.208.175 AMEN AMEN Network
28753 188.72.211.253 NETDIRECT AS NETDIRECT Frankfurt
28753 188.72.212.104 NETDIRECT AS NETDIRECT Frankfurt
29073 94.102.54.11 ECATEL-AS AS29073
29131 109.169.29.144 RAPIDSWITCH-AS RapidSwitch
2914 198.64.133.214 NTT-COMMUNICATIONS-2914 – NTT America
29321 217.195.160.74 CENTRONETAS Centronet
29550 92.48.119.94 SIMPLYTRANSIT Simply Transit Ltd
29550 94.76.254.248 SIMPLYTRANSIT Simply Transit Ltd
29873 67.223.233.101 BIZLAND-SD – The Endurance International Group
31333 83.151.21.150 VOLLMAR-AS AS31333
31365 85.153.38.2 SGSTELEKOM SGS Telekom Autonomous System
32244 67.225.181.217 LIQUID-WEB-INC – Liquid Web
3301 213.180.79.146 TELIANET-SWEDEN TeliaNet Sweden
3356 62.67.246.113 LEVEL3 Level 3 Communications
34265 213.108.72.158 SILVERTELECOM-AS SilverTelecom Ltd
34762 77.241.80.228 COMBELL-AS Combell group NV
34779 93.103.5.146 T-2-AS AS set propagated by T-2
34779 93.103.5.156 T-2-AS AS set propagated by T-2
35228 87.194.123.116 BEUNLIMITED Avatar Broadband Limited
35830 80.248.221.213 SIVIT-AS SIVIT Network – http://www.sivit.net/
36057 174.137.179.244 WEBAIR-AMS Webair Internet Development Inc
39326 93.89.80.117 GOSCOMB-AS Goscomb Technologies Limited
39582 89.106.8.40 GRID Grid Bilisim Teknolojileri A.S.
41044 194.24.228.81 THYA-AS Thya AS Number
4134 61.177.120.254 CHINANET-BACKBONE No.31
42926 213.128.83.18 RADORE Radore Hosting Telekomunikasyon Hizmetleri San. ve Tic. Ltd. Sti.
43350 77.247.180.40 NFORCE NForce Entertainment B.V.
43413 78.41.22.130 ASNEW NEW TELEKOM
43541 93.185.105.74 VSHOSTING VSHosting s.r.o.
44112 77.222.43.78 SWEB-AS SpaceWeb JSC
44976 91.204.116.114 IONOD-AS AZNet Autonomous System
4766 218.145.56.55 KIXS-AS-KR Korea Telecom
4766 222.122.81.54 KIXS-AS-KR Korea Telecom
48539 91.198.106.6 OXILION-AS Oxilion B.V.
49981 217.23.7.112 WORLDSTREAM WorldStream
5577 212.117.161.3 ROOT root SA
6724 85.214.22.200 STRATO STRATO AG
6908 78.41.156.236 DATAHOP Datahop Ltd
7992 72.38.223.96 COGECOWAVE – Cogeco Cable
8001 69.164.212.94 NET-ACCESS-CORP – Net Access Corporation
8399 81.93.5.49 ORNIS-AS RISC GROUP IT SOLUTIONS S.A.
8560 87.106.99.134 ONEANDONE-AS 1&1 Internet AG
8935 212.19.216.11 INTOUCH-CS-AS Amsterdam
8972 62.75.161.249 PLUSSERVER-AS PlusServer AG
8972 62.75.162.196 PLUSSERVER-AS PlusServer AG
8972 85.25.152.176 PLUSSERVER-AS PlusServer AG

Which, when plotted on a map, looks like:

servers_map.png

This map example shows the high concentration of compromised servers in the OVH autonomous system, a large hosting company located in France.  While this shouldn’t specifically illustrate that OVH is overtly malicious, it does show that their hosting strategies are permissive to cybercrime (or at least, they are not staffed or equipped to handle abuse requests in a timely manner.).  This data also doesn’t take into account sink-holing activity, in which a security researcher will register a known malicious domain and redirect its traffic to a friendly server for intelligence or defensive purposes.

Historically, however, OVH has been highly ranked in most “malicious organization lists” which include the following:

With our new found intelligence in hand, we began mapping the infrastructure according to labels and descriptions that were part of the zone files.   What we found was a tiered infrastructure that spread domains across specific functions. 

A Tiered-Criminal Infrastructure

After analyzing the DNS configuration over the observed time-period, we classified the servers into four distinct “functions”

These were:

  • Command and Control – Domains used for command and control functions
  • Traffic – Domains used in script injection tasks
  • Exploit – Domains used to exploit visiting browsers
  • Supporting – Domains used to support other cybercrime ventures

Command and Control Domains 

During our observation, we tracked 23 domains specifically devoted to C2 activity, which were then sub-divided into other categories:

afterspan.ru Bredolab Command and Control
alesolo.ru Bredolab Command and Control
armyerror.ru
Topic: