Che237's picture
Upload cryptomining_detection dataset
8377638 verified
# Detecting Ursnif for Volatility
#
# LICENSE
# Please refer to the LICENSE.txt in the https://github.com/JPCERTCC/MalConfScan/
#
# How to use:
# 1. cd "Volatility Folder"
# 2. mv ursnifscan.py volatility/plugins/malware
# 3. python vol.py ursnifconfig -f images.mem --profile=Win7SP1x64
import volatility.plugins.taskmods as taskmods
import volatility.win32.tasks as tasks
import volatility.utils as utils
import volatility.debug as debug
import volatility.plugins.malware.malfind as malfind
import re
import pefile
from struct import unpack, unpack_from, pack
from collections import OrderedDict
try:
import yara
has_yara = True
except ImportError:
has_yara = False
try:
import aplib
has_aplib = True
except ImportError:
has_aplib = False
ursnif_sig = {
'namespace1' : 'rule Ursnif { \
strings: \
$a1 = "soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x"\
$b1 = "client.dll" fullword\
$c1 = "version=%u"\
$c2 = "user=%08x%08x%08x%08x"\
$c3 = "server=%u"\
$c4 = "id=%u"\
$c5 = "crc=%u"\
$c6 = "guid=%08x%08x%08x%08x"\
$c7 = "name=%s"\
$c8 = "soft=%u"\
$d1 = "%s://%s%s"\
$d2 = "PRI \x2A HTTP/2.0"\
$e1 = { A1 ?? ?? ?? 00 35 E7 F7 8A 40 50 }\
$e2 = { 56 56 56 6A 06 5? FF ?? ?? ?? ?? 00 }\
$f1 = { 56 57 BE ?? ?? ?? ?? 8D ?? ?? A5 A5 A5 }\
$f2 = { 35 8F E3 B7 3F }\
$f3 = { 35 0A 60 2E 51 }\
condition: $a1 or ($b1 and 3 of ($c*)) or (5 of ($c*)) or ($b1 and all of ($d*)) or all of ($e*) or all of ($f*)}'
}
# Magic pattern
magic = "J[1J]"
# Config pattern
CONFIG_PATTERNS = [
re.compile("\x3D\xB7\x00\x00\x00\x0F\x84(...)\x00\xA1(....)\xC7(..)(....)\xC6(..)(.)\xC7(.)(....)", re.DOTALL), # cmp eax, 0B7h ; jz loc_xxxx; mov eax, dword_xxxx; mov dword ptr, offset c2_table;
re.compile("\x3D\xB7\x00\x00\x00\x0F\x84(....)\x48\x8B\x05(....)\x48\x8D\x0D(....)(\x45\x8D)(..)\x48\x89(..)\x48\x8D\x0D(....)(\x33\xD2)", re.DOTALL), # 64bit
]
# RSA key pattern
RSA_PATTERNS = [
re.compile("\x68(....)\x8D\x85(....)\x50\xE8(....)\x68(....)\x8D\x85(....)\x50\xE8(....)\x6A\x11", re.DOTALL),
re.compile("\x57\x48\x83\xEC\x20\x4C\x8D\x0D(....)(\x4C\x8D)(...)\x48\x8B\xF1", re.DOTALL), # 64bit
]
DT_STR = 1
idx_list = {
0x0d20203c: ["lang_id", DT_STR],
0x11271c7f: ["sleep_time", DT_STR],
0x18a632bb: ["time_value", DT_STR],
0x31277bd5: ["SetWaitableTimer_value(CRC_TASKTIMEOUT)", DT_STR],
0x4b214f54: ["tor64_dll", DT_STR],
0x4fa8693e: ["serpent_key", DT_STR],
0x510f22d2: ["c2_tor_domain", DT_STR],
0x556aed8f: ["server", DT_STR],
0x584e5925: ["SetWaitableTimer_value", DT_STR],
0x602c2c26: ["capture_window_title?(CRC_KEYLOGLIST)", DT_STR],
0x656b798a: ["botnet", DT_STR],
0x6de85128: ["not_use(CRC_BCTIMEOUT)", DT_STR],
0x73177345: ["dga_base_url", DT_STR],
0x746ce763: ["movie_capture", DT_STR],
0x75e6145c: ["c2_domain", DT_STR],
0x758a4250: ["check_vm", DT_STR],
0x955879a6: ["SetWaitableTimer_value(CRC_SENDTIMEOUT)", DT_STR],
0x9fd13931: ["SOCKS_backconnect_server(CRC_BCSERVER)", DT_STR],
0xacc79a02: ["SetWaitableTimer_value(CRC_KNOCKERTIMEOUT)", DT_STR],
0xb892845a: ["tor_server3", DT_STR],
0xc61efa7a: ["dga_tld", DT_STR],
0xd0665bf6: ["c2_domain", DT_STR],
0xd7a003c9: ["SetWaitableTimer_value(CRC_CONFIGTIMEOUT)", DT_STR],
0xdf351e24: ["tor32_dll", DT_STR],
0xefc574ae: ["dga_seed", DT_STR],
0xec99df2e: ["ip_check_url", DT_STR],
0xea9ea760: ["p2p_bootstrap", DT_STR],
}
class ursnifConfig(taskmods.DllList):
"""Parse the Ursnif configuration"""
@staticmethod
def is_valid_profile(profile):
return (profile.metadata.get('os', 'unknown') == 'windows'), profile.metadata.get('memory_model', '32bit')
def get_vad_base(self, task, address):
for vad in task.VadRoot.traverse():
if address >= vad.Start and address < vad.End:
return vad.Start, vad.End
return None
def parse_config(self, data):
p_data = OrderedDict()
(count,) = unpack_from("<Q", data, 0x0)
#print("[+] config > number of elements : %d" % count)
for i in range(count):
(idx, flags, off, uid) = unpack_from("<LLQQ", data, 8 + i * 24)
field = "unknown"
off += 8 + i * 24
if idx in idx_list:
field = idx_list[idx][0]
else:
field = hex(idx)
p_data[field] = data[off:].split("\x00")[0]
return p_data
def decode_data(self, data, pe, offset):
xor_data = unpack("=H", data[offset:offset + 2])[0]
xor_data2 = 0xCAFA
data_len = xor_data ^ unpack("=H", data[offset + 2:offset + 4])[0]
offset += 4
result = ""
for i in range(0, data_len, 2):
work = xor_data ^ xor_data2 ^ unpack("=H", data[offset + i:offset + 2 + i])[0]
xor_data2 = (xor_data2 * (i + 2) ) & 0xffff
result += pack("H", (work & 0xffff))
result = result[:data_len]
return result
def pe_magic_check(self, data):
mz_magic = unpack_from("=2s", data, 0x0)[0]
nt_magic = unpack_from("<H", data, 0x3c)[0]
if mz_magic == "\x00\x00":
data = "\x4d\x5a" + data[2:]
data = data[:nt_magic] + "\x50\x45" + data[nt_magic + 2:]
return data
def parse_joinned_data(self, data):
data = self.pe_magic_check(data)
config_data = []
fnames = []
for m in re.finditer(magic + "\x00.", data):
xor_dword = 0
magic_dword = data[m.start():m.start() + 4]
if (magic_dword[0:1] == "J1" or magic_dword[3] == "\0"):
(flags, crc32_name, addr, size) = unpack_from("<LLLL", data, m.start() + 4)
print("[+] magic: {0} flags: 0x{1:X} crc32_name: 0x{2:X} addr: 0x{3:X} size: 0x{4:X}".format(
repr(magic_dword), flags, crc32_name, addr, size))
elif (magic_dword[0:1] == "JJ" or (ord(magic_dword[3]) & 1) == 1):
(xor_dword, crc32_name, addr, size) = unpack_from("<LLLL", data, m.start() + 4)
print("[+] magic: {0} xor: 0x{1:X} crc32_name: 0x{2:X} addr: 0x{3:X} size: 0x{4:X}".format(
repr(magic_dword), xor_dword, crc32_name, addr, size))
else:
break
if size > 0x80000:
print("[!] size is too large, skipped this entry")
continue
try:
offset = addr
except:
print("[!] This PE is old Ursnif (not DreamBot)")
(addr, size, crc32_name, flags) = unpack_from(
"<LLLL", data, m.start() + 4)
print("[+] magic: {0} addr: 0x{1:X} size: 0x{2:X} crc32_name: 0x{3:X} flags: 0x{4:X}".format(
repr(magic_dword), addr, size, crc32_name, flags))
offset = addr
try:
joined_res = data[offset:offset + size]
dec_data = aplib.decompress(joined_res).do()[0]
except:
pe = pefile.PE(data=data)
offset = pe.get_offset_from_rva(addr)
joined_res = data[offset:offset + size]
dec_data = aplib.decompress(joined_res).do()[0]
#print("[!] Cann't decode data.")
#continue
if (xor_dword != 0):
mod_data = ""
for i in range(min(4, size + 1)):
mod_data += chr(ord(dec_data[i]) ^ ((xor_dword >> 8 * i) & 0xff))
if (size >= 4):
mod_data += dec_data[4:]
dec_data = mod_data
if crc32_name in (0x4f75cea7, 0x9e154a0c):
fname = "ursnif_client32.bin"
open(fname, "wb").write(dec_data)
print("[+] dumped 32 bit client dll: {0}".format(fname))
fnames.append(dec_data)
elif crc32_name in (0x90f8aab4, 0x41982e1f):
fname = "ursnif_client64.bin"
open(fname, "wb").write(dec_data)
print("[+] dumped 64 bit client dll: {0}".format(fname))
# fnames.append(fname)
elif crc32_name in (0xe1285e64,):
fname = "ursnif_public_key.bin"
open(fname, "wb").write(dec_data)
print("[+] dumped public key: {0}".format(fname))
elif crc32_name in (0xd722afcb, 0x8365b957, 0x8fb1dde1):
fname = "ursnif_st_config.bin"
open(fname, "wb").write(dec_data)
print("[+] dumped static config: {0}".format(fname))
config_data.append(self.parse_config(dec_data))
else:
fname = "ursnif_" + hex(addr) + "_ap32_dec.bin"
open(fname, "wb").write(dec_data)
print("[+] dumped: {0}".format(fname))
for fname in fnames:
config_data = self.parse_joinned_data(fname)
return config_data
def calculate(self):
if not has_yara:
debug.error("Yara must be installed for this plugin")
if not has_aplib:
debug.error("Aplib must be installed for this plugin")
addr_space = utils.load_as(self._config)
os, memory_model = self.is_valid_profile(addr_space.profile)
if not os:
debug.error("This command does not support the selected profile.")
rules = yara.compile(sources=ursnif_sig)
for task in self.filter_tasks(tasks.pslist(addr_space)):
scanner = malfind.VadYaraScanner(task=task, rules=rules)
for hit, address in scanner.scan():
vad_base_addr, end = self.get_vad_base(task, address)
proc_addr_space = task.get_process_address_space()
data = proc_addr_space.zread(vad_base_addr, end - vad_base_addr)
config_data = []
# Parse standard Ursnif
config_data = self.parse_joinned_data(data)
# Parse static configuration type Ursnif
if not config_data:
p_data = OrderedDict()
data = self.pe_magic_check(data)
try:
pe = pefile.PE(data=data)
except:
continue
imagebase = pe.NT_HEADERS.OPTIONAL_HEADER.ImageBase
for pattern in CONFIG_PATTERNS:
m = re.search(pattern, data)
if m:
if pe.FILE_HEADER.Machine in (pefile.MACHINE_TYPE['IMAGE_FILE_MACHINE_IA64'], pefile.MACHINE_TYPE['IMAGE_FILE_MACHINE_AMD64']):
c2_num = unpack("b", data[m.start(7) + 19])[0]
else:
c2_num = unpack("b", data[m.start(6)])[0]
if c2_num >= 16:
c2_num = 1
for i in range(c2_num):
if pe.FILE_HEADER.Machine in (pefile.MACHINE_TYPE['IMAGE_FILE_MACHINE_IA64'], pefile.MACHINE_TYPE['IMAGE_FILE_MACHINE_AMD64']):
c2_addr = m.start(4) + unpack("=I", data[m.start(3):m.start(3) + 4])[0]
c2_table_offset = unpack("=Q", data[c2_addr + (8 * i):c2_addr + 8 + (8 * i)])[0] - imagebase
else:
c2_addr = unpack("=I", data[m.start(4):m.start(4) + 4])[0] - imagebase
c2_table_offset = unpack("=I", data[c2_addr + (4 * i):c2_addr + 4 + (4 * i)])[0] - imagebase
try:
c2 = self.decode_data(data, pe, c2_table_offset)
except:
c2 = "Decode fail"
p_data["Server " + str(i)] = c2
if pe.FILE_HEADER.Machine in (pefile.MACHINE_TYPE['IMAGE_FILE_MACHINE_IA64'], pefile.MACHINE_TYPE['IMAGE_FILE_MACHINE_AMD64']):
serpent_key_offset = m.start(8) + unpack("=I", data[m.start(7):m.start(7) + 4])[0]
else:
serpent_key_offset = unpack("=I", data[m.start(8):m.start(8) + 4])[0] - imagebase
try:
serpent_key = self.decode_data(data, pe, serpent_key_offset)
except:
serpent_key = "Decode fail"
p_data["Serpent key"] = serpent_key
for pattern in RSA_PATTERNS:
m = re.search(pattern, data)
if m:
if pe.FILE_HEADER.Machine in (pefile.MACHINE_TYPE['IMAGE_FILE_MACHINE_IA64'], pefile.MACHINE_TYPE['IMAGE_FILE_MACHINE_AMD64']):
rsa_key_offset = m.start(2) + unpack("=I", data[m.start(1):m.start(1) + 4])[0]
rsa_key = data[rsa_key_offset + 4:rsa_key_offset + 0x44]
rsa_mod = data[rsa_key_offset + 0x44:rsa_key_offset + 0x84]
else:
rsa_key_offset = unpack("=I", data[m.start(1):m.start(1) + 4])[0] - imagebase
rsa_key = data[rsa_key_offset:rsa_key_offset + 0x40]
mod_offset = unpack("=I", data[m.start(4):m.start(4) + 4])[0] - imagebase
rsa_mod = data[mod_offset:mod_offset + 0x40]
p_data["RSA key"] = rsa_key.encode("hex")
p_data["RSA modulus"] = rsa_mod.encode("hex")
config_data.append(p_data)
yield task, vad_base_addr, end, hit, memory_model, config_data
break
def render_text(self, outfd, data):
delim = '-' * 70
for task, start, end, malname, memory_model, config_data in data:
outfd.write("{0}\n".format(delim))
outfd.write("Process: {0} ({1})\n\n".format(task.ImageFileName, task.UniqueProcessId))
outfd.write("[Config Info]\n")
for p_data in config_data:
for id, param in p_data.items():
outfd.write("{0:<16}: {1}\n".format(id, param))