This website uses cookies. By clicking Accept, you consent to the use of cookies. Click Here to learn more about how we use cookies.
Accept
Reject

NetWitness Community

  • Home
  • Products
    • NetWitness Platform
      • Advisories
      • Documentation
        • Platform Documentation
        • Known Issues
        • Security Fixes
        • Hardware Documentation
        • Threat Content
        • Unified Data Model
        • Videos
      • Downloads
      • Integrations
      • Knowledge Base
    • NetWitness Cloud SIEM
      • Advisories
      • Documentation
      • Knowledge Base
    • NetWitness Detect AI
      • Advisories
      • Documentation
      • Knowledge Base
    • NetWitness Investigator
    • NetWitness Orchestrator
      • Advisories
      • Documentation
      • Knowledge Base
      • Legacy NetWitness Orchestrator
        • Advisories
        • Documentation
  • Community
    • Blog
    • Discussions
    • Events
    • Idea Exchange
  • Support
    • Case Portal
      • Create New Case
      • View My Cases
      • View My Team's Cases
    • Community Support
      • Getting Started
      • News & Announcements
      • Community Support Forum
      • Community Support Articles
    • Product Life Cycle
    • Support Information
    • General Security Advisories
  • Training
    • Blog
    • Certification Program
    • Course Catalog
      • Netwitness XDR
      • EC-Council Training
    • New Product Readiness
    • On-Demand Subscriptions
    • Student Resources
    • Upcoming Events
    • Role-Based Training
  • Technology Partners
  • Trust Center
Sign InRegister Now
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
NetWitness Discussions
  • NetWitness Community
  • Discussions
  • New TDSS Rootkit Variant Has Detectable Beaconing
  • Options
    • Subscribe to RSS Feed
    • Mark Topic as New
    • Mark Topic as Read
    • Float this Topic for Current User
    • Bookmark
    • Subscribe
    • Mute
    • Printer Friendly Page

New TDSS Rootkit Variant Has Detectable Beaconing

RSAAdmin
RSAAdmin Beginner
Beginner
Options
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Report Inappropriate Content

‎2013-08-29 03:21 PM

FirstWatch has discovered a new variant of TDSS Rootkit that beacons to specific online hosts.  We will dissect the behavior in a moment, but first everyone should run this Custom query back to the middle of August to look for hits:

 

alias.host begins update,report && filename='<none>' && directory='/' && query exists && query length 100-u

 

This looks for hostnames that begin with update or report, with no filename, in a root directory with a query length of 100 characters or longer.  You should also convert this query to a rule to push to your decoders.  Call it TDSS Botnet Notification Beaconing. If you got hits on this, you might want to quarantine your victim hosts.  Good luck with that.

 

Now let's take a look at what we've found, and discuss its utter weirdness.

 

In our sandbox, beginning on August 19, we started seeing unusual update servers with a rotating Alias.Host name.  There are no two hostnames alike.  Here is a screenshot using the custom drill above:

 

tdss-rootkit.JPG.jpg

If you try to resolve any of these update servers via DNS, you will find that none of them return an IP.  We suspect that these hostnames are generated on the TDSS infected host by modifying a local hosts table- and the randomized characters in the hostname are likely unique identifiers representing time, host, or something more.

 

Make no mistake, these hosts are indeed communicating over port 80 to these hosts.  But if you try to connect to the host via destination IP directly on port 80, you are blocked.  The hosts in question, screenshotted below, are preventing researchers, web crawlers and everyone OTHER than the TDSS bots to connect to it.  I'm not sure how they manage to do this, but there is a hardcoded user-agent string of a beta version of Firefox that each of the above connections have in common.  Perhaps the hosts at the destination IP addresses are using a rotating .htaccess file to only allow a specific UA string, or maybe it validates the hostname format in the inbound connection.  I'm not sure.

 

destinationIPs.JPG.jpg

 

Even URLQuery has seen this activity and they also have no screenshot of a valid connection.  They also don't know what it is.  Maybe someone should tell them it's TDSS rootkit.

 

So we know this is TDSS rootkit because we were able to pull the source files from our sandbox.  VirusTotal agrees that this is a TDSS Variant.  The first time they saw this file was on August 24th, about a week after we spotted it.

 

Next, check out the queries from the beaconing.  Normal HTTP traffic only performs queries against a file, like a PHP file, and then passes a query to a backend database.  In this instance, there is no filename being called.  The query is actually against the root directory.  This oddness also helped this traffic stand out against normal activity.

 

tdss-query.JPG.jpg

In summary, this new botnet beaconing from a rootkit is doing its best to hide from researchers.  You can't browse the destination host.  Each hostname is different, rendering watchlists and feeds void.  The queries are wildly varying, making it very difficult to write a signature for detection.  But with RSA's Security Analytics, you can still write a simple rule capturing the hostname beginnings, the filename, directory, and a query length, and you can detect this malicious traffic.

 

By the way, the destinations are now part of NWLive, so all clients subscribing to RSA FirstWatch content will have detection capability.

 

Happy Hunting!

  • beaconing
  • botnet
  • Community Thread
  • Discussion
  • evasion
  • Forum Thread
  • Malware
  • NetWitness
  • NW
  • NWP
  • rootkit
  • RSA NetWitness
  • RSA NetWitness Platform
  • security_analytics
  • tdss
1 Like
Reply
  • All forum topics
  • Previous Topic
  • Next Topic
4 REPLIES 4

RSAAdmin
RSAAdmin Beginner
Beginner
Options
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Report Inappropriate Content

‎2013-08-30 09:02 AM

Let us know if anyone has used this rule to detect this threat on their network!

0 Likes
Reply

Anonymous
Not applicable
In response to RSAAdmin
Options
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Report Inappropriate Content

‎2013-09-01 09:38 AM

Thanks for the information.

Ran the query and got the result but did not get client application as mentioned above.

The domain begins with update I found all well known domains. Did not get anything malicious as such.

0 Likes
Reply

ThomasSchaub
ThomasSchaub Beginner
Beginner
Options
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Report Inappropriate Content

‎2013-09-10 08:15 PM

Hi Fielder -

 

I might have a hit on this, but it could be a false positive.  I'd like your analysis but prefer not to post it for all to see at this point in time.  Can you follow me / message me directly so I can send it to you for further analysis? Tnx, TwoPutt

0 Likes
Reply

RSAAdmin
RSAAdmin Beginner
Beginner
Options
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Report Inappropriate Content

‎2013-10-01 02:05 PM

I stumbled onto another good rule to detect a TDSS variant.  Although the destination server no longer seems to be hosting the update packages, the malware still beacons to the site to grab the update.

 

Make a rule.  Call it:

TDSS Update Beacon

 

Rule Content:

alias.host='update1.sysupdate-n3.xorg.pl','update2.sysupdt-n2.xorg.pl'

0 Likes
Reply
Powered by Khoros
  • Blog
  • Events
  • Discussions
  • Idea Exchange
  • Knowledge Base
  • Case Portal
  • Community Support
  • Product Life Cycle
  • Support Information
  • About the Community
  • Terms & Conditions
  • Privacy Statement
  • Acceptable Use Policy
  • Employee Login
© 2022 RSA Security LLC or its affiliates. All rights reserved.