|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
import volatility.plugins.taskmods as taskmods |
|
|
import volatility.win32.tasks as tasks |
|
|
import volatility.utils as utils |
|
|
import volatility.debug as debug |
|
|
import volatility.plugins.malware.malfind as malfind |
|
|
import re |
|
|
import pefile |
|
|
from struct import unpack, unpack_from |
|
|
from socket import inet_ntoa |
|
|
from collections import OrderedDict |
|
|
|
|
|
try: |
|
|
import yara |
|
|
has_yara = True |
|
|
except ImportError: |
|
|
has_yara = False |
|
|
|
|
|
remcos_sig = { |
|
|
'namespace1' : 'rule Remcos { \ |
|
|
strings: \ |
|
|
$remcos = "Remcos" ascii fullword \ |
|
|
$url1 = "Breaking-Security.Net" ascii fullword \ |
|
|
$url2 = "BreakingSecurity.Net" ascii fullword \ |
|
|
$resource = "SETTINGS" ascii wide fullword \ |
|
|
condition: 1 of ($url*) and $remcos and $resource}' |
|
|
} |
|
|
|
|
|
|
|
|
MZ_HEADER = b"\x4D\x5A\x90\x00" |
|
|
|
|
|
|
|
|
RESOURCE_PATTERNS = [re.compile("\xE0\x00\x00\x07\xE0\x00\x00\x07\xFF\xFF\xFF\xFF", re.DOTALL)] |
|
|
|
|
|
|
|
|
FLAG = {"\x00": "Disable", "\x01": "Enable"} |
|
|
|
|
|
idx_list = { |
|
|
0: "Host:Port:Password", |
|
|
1: "Assigned name", |
|
|
2: "Connect interval", |
|
|
3: "Install flag", |
|
|
4: "Setup HKCU\\Run", |
|
|
5: "Setup HKLM\\Run", |
|
|
6: "Setup HKLM\\Explorer\\Run", |
|
|
7: "Setup HKLM\\Winlogon\\Shell", |
|
|
8: "Setup HKLM\\Winlogon\\Userinit", |
|
|
9: "Install path", |
|
|
10: "Copy file", |
|
|
11: "Startup value", |
|
|
12: "Hide file", |
|
|
13: "Unknown13", |
|
|
14: "Mutex", |
|
|
15: "Keylog flag", |
|
|
16: "Keylog path", |
|
|
17: "Keylog file", |
|
|
18: "Keylog crypt", |
|
|
19: "Hide keylog file", |
|
|
20: "Screenshot flag", |
|
|
21: "Screenshot time", |
|
|
22: "Take Screenshot option", |
|
|
23: "Take screenshot title", |
|
|
24: "Take screenshot time", |
|
|
25: "Screenshot path", |
|
|
26: "Screenshot file", |
|
|
27: "Screenshot crypt", |
|
|
28: "Mouse option", |
|
|
29: "Unknown29", |
|
|
30: "Delete file", |
|
|
31: "Unknown31", |
|
|
32: "Unknown32", |
|
|
33: "Unknown33", |
|
|
34: "Unknown34", |
|
|
35: "Unknown35", |
|
|
36: "Audio record time", |
|
|
37: "Audio path", |
|
|
38: "Audio folder", |
|
|
39: "Unknown39", |
|
|
40: "Unknown40", |
|
|
41: "Connect delay", |
|
|
42: "Unknown42", |
|
|
43: "Unknown43", |
|
|
44: "Unknown44", |
|
|
45: "Unknown45", |
|
|
46: "Unknown46", |
|
|
47: "Unknown47", |
|
|
48: "Copy folder", |
|
|
49: "Keylog folder", |
|
|
50: "Unknown50", |
|
|
51: "Unknown51", |
|
|
52: "Unknown52", |
|
|
53: "Unknown53", |
|
|
54: "Keylog file max size", |
|
|
55: "Unknown55", |
|
|
} |
|
|
|
|
|
setup_list = { |
|
|
0: "Temp", |
|
|
2: "Root", |
|
|
3: "Windows", |
|
|
4: "System32", |
|
|
5: "Program Files", |
|
|
6: "AppData", |
|
|
7: "User Profile", |
|
|
8: "Application path", |
|
|
} |
|
|
|
|
|
class remcosConfig(taskmods.DllList): |
|
|
"""Parse the Remcos configuration""" |
|
|
|
|
|
@staticmethod |
|
|
def is_valid_profile(profile): |
|
|
return (profile.metadata.get('os', 'unknown') == 'windows'), profile.metadata.get('memory_model', '32bit') |
|
|
|
|
|
def get_vad_base(self, task, address): |
|
|
for vad in task.VadRoot.traverse(): |
|
|
if address >= vad.Start and address < vad.End: |
|
|
return vad.Start, vad.End |
|
|
|
|
|
return None |
|
|
|
|
|
|
|
|
def rc4(self, data, key): |
|
|
x = 0 |
|
|
box = range(256) |
|
|
for i in range(256): |
|
|
x = (x + box[i] + ord(key[i % len(key)])) % 256 |
|
|
box[i], box[x] = box[x], box[i] |
|
|
x = 0 |
|
|
y = 0 |
|
|
out = [] |
|
|
for char in data: |
|
|
x = (x + 1) % 256 |
|
|
y = (y + box[x]) % 256 |
|
|
box[x], box[y] = box[y], box[x] |
|
|
out.append(chr(ord(char) ^ box[(box[x] + box[y]) % 256])) |
|
|
|
|
|
return ''.join(out) |
|
|
|
|
|
def parse_config(self, data): |
|
|
p_data = OrderedDict() |
|
|
|
|
|
key_len = ord(data[0]) |
|
|
key = data[1:key_len + 1] |
|
|
enc_data = data[key_len + 1:] |
|
|
config = self.rc4(enc_data, key) |
|
|
|
|
|
|
|
|
configs = re.split("\x1E|@@", config) |
|
|
|
|
|
for i, cont in enumerate(configs): |
|
|
if cont == "\x00" or cont == "\x01": |
|
|
p_data[idx_list[i]] = FLAG[cont] |
|
|
else: |
|
|
if i in [9, 16, 25, 37]: |
|
|
p_data[idx_list[i]] = setup_list[int(cont)] |
|
|
else: |
|
|
p_data[idx_list[i]] = cont |
|
|
|
|
|
return p_data |
|
|
|
|
|
def calculate(self): |
|
|
|
|
|
if not has_yara: |
|
|
debug.error("Yara must be installed for this plugin") |
|
|
|
|
|
addr_space = utils.load_as(self._config) |
|
|
|
|
|
os, memory_model = self.is_valid_profile(addr_space.profile) |
|
|
if not os: |
|
|
debug.error("This command does not support the selected profile.") |
|
|
|
|
|
rules = yara.compile(sources=remcos_sig) |
|
|
|
|
|
for task in self.filter_tasks(tasks.pslist(addr_space)): |
|
|
scanner = malfind.VadYaraScanner(task=task, rules=rules) |
|
|
|
|
|
for hit, address in scanner.scan(): |
|
|
|
|
|
vad_base_addr, end = self.get_vad_base(task, address) |
|
|
proc_addr_space = task.get_process_address_space() |
|
|
data = proc_addr_space.zread(vad_base_addr, end - vad_base_addr) |
|
|
|
|
|
config_data = [] |
|
|
|
|
|
|
|
|
dll_index = data.rfind(MZ_HEADER) |
|
|
dll_data = data[dll_index:] |
|
|
|
|
|
try: |
|
|
pe = pefile.PE(data=dll_data) |
|
|
except: |
|
|
outfd.write("[!] Can't mapped PE.\n") |
|
|
continue |
|
|
|
|
|
rc_data = "" |
|
|
for idx in pe.DIRECTORY_ENTRY_RESOURCE.entries: |
|
|
for entry in idx.directory.entries: |
|
|
if str(entry.name) in "SETTINGS": |
|
|
try: |
|
|
data_rva = entry.directory.entries[0].data.struct.OffsetToData |
|
|
size = entry.directory.entries[0].data.struct.Size |
|
|
rc_data = dll_data[data_rva:data_rva + size] |
|
|
print("[*] Found SETTINGS resource.") |
|
|
except: |
|
|
debug.error("Faild to load SETTINGS resource.") |
|
|
|
|
|
if not len(rc_data): |
|
|
for pattern in RESOURCE_PATTERNS: |
|
|
mc = re.search(pattern, dll_data) |
|
|
if mc: |
|
|
try: |
|
|
config_end = mc.end() + 1 |
|
|
while dll_data[config_end:config_end + 2] != "\x00\x00": |
|
|
config_end += 1 |
|
|
rc_data = dll_data[mc.end():config_end - 1] |
|
|
except: |
|
|
debug.error("Remcos resource not found.") |
|
|
|
|
|
config_data.append(self.parse_config(rc_data)) |
|
|
|
|
|
yield task, vad_base_addr, end, hit, memory_model, config_data |
|
|
break |
|
|
|
|
|
def render_text(self, outfd, data): |
|
|
|
|
|
delim = '-' * 70 |
|
|
|
|
|
for task, start, end, malname, memory_model, config_data in data: |
|
|
outfd.write("{0}\n".format(delim)) |
|
|
outfd.write("Process: {0} ({1})\n\n".format(task.ImageFileName, task.UniqueProcessId)) |
|
|
|
|
|
outfd.write("[Config Info]\n") |
|
|
for p_data in config_data: |
|
|
for id, param in p_data.items(): |
|
|
outfd.write("{0:<16}: {1}\n".format(id, param)) |
|
|
|