# Detecting PlugX for Volatility # # LICENSE # Please refer to the LICENSE.txt in the https://github.com/JPCERTCC/MalConfScan/ # # How to use: # 1. cd "Volatility Folder" # 2. mv plugxscan.py volatility/plugins/malware # 3. python vol.py [ plugxscan | plugxconfig ] -f images.mem --profile=Win7SP1x64 import volatility.plugins.taskmods as taskmods import volatility.win32.tasks as tasks import volatility.utils as utils import volatility.debug as debug import volatility.plugins.malware.malfind as malfind from struct import unpack, unpack_from from socket import inet_ntoa from collections import OrderedDict try: import yara has_yara = True except ImportError: has_yara = False plugx_sig = { 'namespace1' : 'rule plugx { \ strings: \ $v1 = { 47 55 4c 50 00 00 00 00 } \ $v2a = { 68 40 25 00 00 } \ $v2c = { 68 58 2D 00 00 } \ $v2b = { 68 a0 02 00 00 } \ $v2d = { 68 a4 36 00 00 } \ $v2e = { 8D 46 10 68 } \ $v2f = { 68 24 0D 00 00 } \ $v2g = { 68 a0 02 00 00 } \ $v2h = { 68 e4 0a 00 00 } \ $enc1 = { C1 E? 03 C1 E? 07 2B ?? } \ $enc2 = { 32 5? ?? 81 E? ?? ?? 00 00 2A 5? ?? 89 ?? ?? 32 ?? 2A ?? 32 5? ?? 2A 5? ?? 32 } \ $enc3 = { B? 33 33 33 33} \ $enc4 = { B? 44 44 44 44} \ condition: $v1 at 0 or ($v2a and $v2b and $enc1) or ($v2c and $v2b and $enc1) or ($v2d and $v2b and $enc2) or ($v2d and $v2e and $enc2) or ($v2f and $v2g and $enc3 and $enc4) or ($v2h and $v2g and $enc3 and $enc4)}' } FLAG_ENABLE = 0xFFFFFFFF HKEY_CLASSES_ROOT = 0x80000000 HKEY_CURRENT_USER = 0x80000001 HKEY_LOCAL_MACHINE = 0x80000002 class plugxConfig(taskmods.DllList): """Parse the PlugX configuration""" @staticmethod def is_valid_profile(profile): return (profile.metadata.get('os', 'unknown') == 'windows'), profile.metadata.get('memory_model', '32bit') def get_vad_base(self, task, address): for vad in task.VadRoot.traverse(): if address >= vad.Start and address < vad.End: return vad.Start, vad.End return None def parse_config(self, cfg_blob, cfg_sz, cfg_addr, vinfo): p_data = OrderedDict() # config parsing SleepTime = unpack_from('>I', cfg_blob, 0x34)[0] NetworkFlag = unpack_from('<672B', cfg_blob, 0x3c) ServerURL = unpack_from('<128s128s128s128s', cfg_blob, 0x3fc) if cfg_sz == 0x1d18: InstallFolder = unpack_from('<512s', cfg_blob, 0x910)[0] ServiceName = unpack_from('<512s', cfg_blob, 0xb10)[0] ServiceDisplayName = unpack_from('<512s', cfg_blob, 0xd10)[0] InjectionProcess = unpack_from('<512s', cfg_blob, 0x1518)[0] ServerID1 = unpack_from('<512s', cfg_blob, 0x1718)[0] ServerID2 = unpack_from('<512s', cfg_blob, 0x1918)[0] Mutex = unpack_from('<256s', cfg_blob, 0x1b18)[0] RunKey = unpack_from('<512s', cfg_blob, 0x1114)[0] RunKeyValu = unpack_from('<512s', cfg_blob, 0x1314)[0] elif cfg_sz == 0x1510 or cfg_sz == 0x150c: InstallFolder = unpack_from('<512s', cfg_blob, 0x90c)[0] ServiceName = unpack_from('<512s', cfg_blob, 0xb0c)[0] ServiceDisplayName = unpack_from('<512s', cfg_blob, 0xd0c)[0] ServerID1 = unpack_from('<512s', cfg_blob, 0x110c)[0] ServerID2 = unpack_from('<512s', cfg_blob, 0x130c)[0] ServerData = [[0] * 3] * 4 proxy = [[0] * 5] * 4 if unpack_from('B', cfg_blob, 0x90c)[0] == 0: AutorunSetup = 'Service setup' elif unpack_from('>B', cfg_blob, 0x90c)[0] == 1: AutorunSetup = 'Run Registry' elif unpack_from('>B', cfg_blob, 0x90c)[0] == 2: AutorunSetup = 'Disable' if unpack_from(' 0x1510: if unpack_from('>B', cfg_blob, 0x1514)[0] == 0: InjectionFlag = 'Enable' else: InjectionFlag = 'Disable' CnCDay = 'Everyday' for x in xrange(672): if NetworkFlag[x] == 0x0: CnCDay = 'Network Activity Flag Enable(Check config file!)' # config write file p_data["Version"] = 1 p_data["Version Info"] = vinfo p_data["Config Size"] = "0x{0:X}".format(cfg_sz) p_data["Delete DLL list"] = DLLremove_flag p_data["File Delete"] = FileDelete_flag p_data["Key Logger"] = KeyLog_flag p_data["Sleep Time"] = SleepTime p_data["Network Activity"] = CnCDay if dns1 not in (0, 0xffffffff): p_data["Custom DNS 1"] = inet_ntoa(custom_dns[:4]) if dns2 not in (0, 0xffffffff): p_data["Custom DNS 2"] = inet_ntoa(custom_dns[4:8]) if dns3 not in (0, 0xffffffff): p_data["Custom DNS 3"] = inet_ntoa(custom_dns[8:12]) if dns4 not in (0, 0xffffffff): p_data["Custom DNS 4"] = inet_ntoa(custom_dns[12:16]) for z in xrange(4): if ServerData[z][0]: p_data["Server {0}".format(z + 1)] = "{0}:{1} (Type {2})".format(ServerData[z][2].replace('\0', ''), ServerData[z][1], ServerData[z][0]) for y in xrange(4): if ServerURL[y]: p_data["Server URL {0}".format(y + 1)] = ServerURL[y].replace('\0', '') for k in xrange(4): if proxy[k][1] != 0: p_data["Proxy {0}".format(k + 1)] = "{0}:{1}".format(proxy[k][2].replace('\0', ''), proxy[k][1]) if proxy[k][3] != '\x00': p_data["Proxy credentials {0}".format(k + 1)] = "{0}:{1}".format(proxy[k][3].replace('\0', ''), proxy[k][4].replace('\0', '')) p_data["Install Folder"] = InstallFolder.replace('\0', '') p_data["Service Name"] = ServiceName.replace('\0', '') p_data["Service Display Name"] = ServiceDisplayName.replace('\0', '') p_data["Server ID1"] = ServerID1.replace('\0', '') p_data["Server ID2"] = ServerID2.replace('\0', '') if cfg_sz == 0x1d18: p_data["Auto Start"] = AutorunSetup p_data["Registry Subkey"] = RegistrySubkey.replace('\0', '') p_data["Registry Key"] = RunKey.replace('\0', '') p_data["Registry Value"] = RunKeyValu.replace('\0', '') p_data["Injection"] = InjectionFlag p_data["Injection Process"] = InjectionProcess.replace('\0', '') p_data["Mutex"] = Mutex.replace('\0', '') return p_data def parse_config2(self, cfg_blob, cfg_sz, cfg_addr, vinfo): p_data = OrderedDict() # config parsing SleepTime = unpack_from('>I', cfg_blob, 0x34)[0] NetworkFlag = unpack_from('>672B', cfg_blob, 0x3c) ServerURL = unpack_from('<128s128s128s128s', cfg_blob, 0x3fc) InstallFolder = unpack_from('<512s', cfg_blob, 0x910)[0] ServiceName = unpack_from('<512s', cfg_blob, 0xb10)[0] ServiceDisplayName = unpack_from('<512s', cfg_blob, 0xd10)[0] InjectionProcess1 = unpack_from('<512s', cfg_blob, 0x1518)[0] InjectionProcess2 = unpack_from('<512s', cfg_blob, 0x1718)[0] InjectionProcess3 = unpack_from('<512s', cfg_blob, 0x1918)[0] InjectionProcess4 = unpack_from('<512s', cfg_blob, 0x1B18)[0] if cfg_sz == 0x2540: ServerID1 = unpack_from('<512s', cfg_blob, 0x1d18)[0] ServerID2 = unpack_from('<512s', cfg_blob, 0x1f18)[0] Mutex = unpack_from('<256s', cfg_blob, 0x2118)[0] ScreenCapFolder = unpack_from('<512s', cfg_blob, 0x2330)[0] else: ServerID1 = unpack_from('<512s', cfg_blob, 0x251c)[0] ServerID2 = unpack_from('<512s', cfg_blob, 0x271c)[0] Mutex = unpack_from('<256s', cfg_blob, 0x291c)[0] ScreenCapFolder = unpack_from('<512s', cfg_blob, 0x2b34)[0] RunKey = unpack_from('<512s', cfg_blob, 0x1114)[0] RunKeyValu = unpack_from('<512s', cfg_blob, 0x1314)[0] ServerData = [[0] * 3] * 4 proxy = [[0] * 5] * 4 if unpack_from('B', cfg_blob, 0x90c)[0] == 0: AutorunSetup = 'Run Registry or Service setup' elif unpack_from('>B', cfg_blob, 0x90c)[0] == 1: AutorunSetup = 'Service setup' elif unpack_from('>B', cfg_blob, 0x90c)[0] == 2: AutorunSetup = 'Run Registry' elif unpack_from('>B', cfg_blob, 0x90c)[0] == 3: AutorunSetup = 'Disable' if unpack_from('B', cfg_blob, 0x1514)[0] == 0: InjectionFlag = 'Enable' else: InjectionFlag = 'Disable' if cfg_sz == 0x2540: if unpack_from('>B', cfg_blob, 0x2318)[0] == 0: ScCapFlug = 'Disable' else: ScCapFlug = 'Enable' else: if unpack_from('>B', cfg_blob, 0x2b1c)[0] == 0: ScCapFlug = 'Disable' else: ScCapFlug = 'Enable' CnCDay = 'Everyday' for x in xrange(672): if NetworkFlag[x] == 0x0: CnCDay = 'Network Activity Flag Enable(Check config file!)' # config write file p_data["Version"] = 2 p_data["Version Info"] = vinfo p_data["Config Size"] = "0x{0:X}".format(cfg_sz) p_data["Delete DLL list"] = DLLremove_flag p_data["File Delete"] = FileDelete_flag p_data["Key Logger"] = KeyLog_flag p_data["Sleep Time"] = SleepTime p_data["Network Activity"] = CnCDay if dns1 not in (0, 0xffffffff): p_data["Custom DNS 1"] = inet_ntoa(custom_dns[:4]) if dns2 not in (0, 0xffffffff): p_data["Custom DNS 2"] = inet_ntoa(custom_dns[4:8]) if dns3 not in (0, 0xffffffff): p_data["Custom DNS 3"] = inet_ntoa(custom_dns[8:12]) if dns4 not in (0, 0xffffffff): p_data["Custom DNS 4"] = inet_ntoa(custom_dns[12:16]) for z in xrange(4): if ServerData[z][0]: p_data["Server {0}".format(z + 1)] = "{0}:{1} (Type {2})".format(ServerData[z][2].replace('\0', ''), ServerData[z][1], ServerData[z][0]) for y in xrange(4): if ServerURL[y]: p_data["Server URL {0}".format(y + 1)] = ServerURL[y].replace('\0', '') for k in xrange(4): if proxy[k][1] != 0: p_data["Proxy {0}".format(k + 1)] = "{0}:{1}".format(proxy[k][2].replace('\0', ''), proxy[k][1]) if proxy[k][3] != '\x00': p_data["Proxy credentials {0}".format(k + 1)] = "{0}:{1}".format(proxy[k][3].replace('\0', ''), proxy[k][4].replace('\0', '')) p_data["Auto Start"] = AutorunSetup p_data["Install Folder"] = InstallFolder.replace('\0', '') p_data["Service Name"] = ServiceName.replace('\0', '') p_data["Service Display Name"] = ServiceDisplayName.replace('\0', '') p_data["Registry Subkey"] = RegistrySubkey p_data["Registry Key"] = RunKey.replace('\0', '') p_data["Registry Value"] = RunKeyValu.replace('\0', '') p_data["Injection"] = InjectionFlag p_data["Injection Process1"] = InjectionProcess1.replace('\0', '') p_data["Injection Process2"] = InjectionProcess2.replace('\0', '') p_data["Injection Process3"] = InjectionProcess3.replace('\0', '') p_data["Injection Process4"] = InjectionProcess4.replace('\0', '') p_data["Server ID1"] = ServerID1.replace('\0', '') p_data["Server ID2"] = ServerID2.replace('\0', '') p_data["Mutex"] = Mutex.replace('\0', '') p_data["Screen Capture"] = ScCapFlug p_data["Screen Capture Folder"] = ScreenCapFolder.replace('\0', '') return p_data def parse_config3(self, cfg_blob, cfg_sz, cfg_addr, vinfo): p_data = OrderedDict() # config parsing timer1 = unpack_from('4B', cfg_blob, 0x28) SleepTime1 = "" if timer1[0] != 0: SleepTime1 += "%d days, " % timer1[0] if timer1[1] != 0: SleepTime1 += "%d hours, " % timer1[1] if timer1[2] != 0: SleepTime1 += "%d mins, " % timer1[2] SleepTime1 += "%d secs" % timer1[3] timer2 = unpack_from('4B', cfg_blob, 0x2c) SleepTime2 = "" if timer2[0] != 0: SleepTime2 += "%d days, " % timer2[0] if timer2[1] != 0: SleepTime2 += "%d hours, " % timer2[1] if timer2[2] != 0: SleepTime2 += "%d mins, " % timer2[2] SleepTime2 += "%d secs" % timer2[3] NetworkFlag = unpack_from('>672B', cfg_blob, 0x30) ServerURL = unpack_from('<128s128s128s128s128s128s128s128s128s128s128s128s128s128s128s128s', cfg_blob, 0x720) InstallFolder = unpack_from('<512s', cfg_blob, 0x1234)[0] ServiceName = unpack_from('<512s', cfg_blob, 0x1434)[0] ServiceDisplayName = unpack_from('<512s', cfg_blob, 0x1634)[0] ServiceComment = unpack_from('<512s', cfg_blob, 0x1834)[0] InjectionProcess1 = unpack_from('<512s', cfg_blob, 0x1e3c)[0] InjectionProcess2 = unpack_from('<512s', cfg_blob, 0x203c)[0] InjectionProcess3 = unpack_from('<512s', cfg_blob, 0x223c)[0] InjectionProcess4 = unpack_from('<512s', cfg_blob, 0x243c)[0] BypassProcess1 = unpack_from('<512s', cfg_blob, 0x2640)[0] BypassProcess2 = unpack_from('<512s', cfg_blob, 0x2840)[0] BypassProcess3 = unpack_from('<512s', cfg_blob, 0x2a40)[0] BypassProcess4 = unpack_from('<512s', cfg_blob, 0x2c40)[0] ServerID1 = unpack_from('<512s', cfg_blob, 0x2e40)[0] ServerID2 = unpack_from('<512s', cfg_blob, 0x3040)[0] Mutex = unpack_from('<256s', cfg_blob, 0x3240)[0] ScreenCapFolder = unpack_from('<512s', cfg_blob, 0x3458)[0] RunKey = unpack_from('<512s', cfg_blob, 0x1a38)[0] RunKeyValu = unpack_from('<512s', cfg_blob, 0x1c38)[0] ServerData = [[0] * 3] * 16 proxy = [[0] * 5] * 6 if unpack_from('B', cfg_blob, 0x1230)[0] == 0: AutorunSetup = 'Run Registry or Service setup' elif unpack_from('>B', cfg_blob, 0x1230)[0] == 1: AutorunSetup = 'Service setup' elif unpack_from('>B', cfg_blob, 0x1230)[0] == 2: AutorunSetup = 'Run Registry' elif unpack_from('>B', cfg_blob, 0x1230)[0] == 3: AutorunSetup = 'Disable' if unpack_from('B', cfg_blob, 0x1e38)[0] == 0: InjectionFlag = 'Disable' else: InjectionFlag = 'Enable' if unpack_from('>B', cfg_blob, 0x3440)[0] == 0: ScCapFlug = 'Disable' else: ScCapFlug = 'Enable' CnCDay = 'Everyday' for x in xrange(672): if NetworkFlag[x] == 0x0: CnCDay = 'Network Activity Flag Enable(Check config file!)' IPscanValu1 = unpack_from('I', cfg_blob, 0x0c)[0] NetworkFlag = unpack_from('<672B', cfg_blob, 0x14) if cfg_sz == 0xd24: InstallDll = unpack_from('<32s', cfg_blob, 0xae4)[0] InstallData = unpack_from('<32s', cfg_blob, 0xb04)[0] ServiceName = unpack_from('<32s', cfg_blob, 0xb24)[0] ServiceDisplayName = unpack_from('<256s', cfg_blob, 0xc24)[0] ServerData = [[0] * 3] * 4 if unpack_from(' 0: offset = offset1 elif offset2 > 0: offset = offset2 elif offset3 > 0: offset = offset3 elif offset4 > 0: offset = offset4 elif offset5 > 0: offset = offset5 elif offset6 > 0: offset = offset6 else: continue while not (data[offset] == "\x68" and (data[offset + 5] == "\xe8" or data[offset + 6] == "\xe8")) and offset > 0: offset -= 1 if data[offset] != "\x68": continue # Now were at: # push 0xxxxxx <- config address # call 0xxxxxx (config_addr, ) = unpack("=I", data[offset + 1:offset + 5]) # Find previous push imm offset -= 1 while not data[offset] == "\x68": offset -= 1 if data[offset] != "\x68": continue # Version info info_start = data.find('\\work\\') if info_start > 0: info_end = data.find('\\', info_start + 6) version_info = str(data[info_start + 6: info_end]).decode("utf-8", "replace") else: version_info = "Null" (config_size, ) = unpack("=I", data[offset + 1:offset + 5]) config_addr -= vad_base_addr if config_size == 0x1510: config_addr = config_addr + 4 config_blob = data[config_addr:config_addr + config_size] if config_size == 0xd24 or config_size == 0xae4: config_data.append(self.parse_config_winnti(config_blob, config_size, config_addr, version_info)) elif config_size == 0x2540: config_data.append(self.parse_config2(config_blob, config_size, config_addr, version_info)) elif config_size == 0x2d58: config_data.append(self.parse_config2(config_blob, config_size, config_addr, version_info)) elif config_size == 0x36A4: config_data.append(self.parse_config3(config_blob, config_size, config_addr, version_info)) else: config_data.append(self.parse_config(config_blob, config_size, config_addr, version_info)) yield task, vad_base_addr, end, hit, memory_model, config_data break def render_text(self, outfd, data): delim = '-' * 70 for task, start, end, malname, memory_model, config_data in data: outfd.write("{0}\n".format(delim)) outfd.write("Process: {0} ({1})\n\n".format(task.ImageFileName, task.UniqueProcessId)) outfd.write("[Config Info]\n") for p_data in config_data: for id, param in p_data.items(): outfd.write("{0:<25}: {1}\n".format(id, param))