# Detecting Ursnif for Volatility # # LICENSE # Please refer to the LICENSE.txt in the https://github.com/JPCERTCC/MalConfScan/ # # How to use: # 1. cd "Volatility Folder" # 2. mv ursnifscan.py volatility/plugins/malware # 3. python vol.py ursnifconfig -f images.mem --profile=Win7SP1x64 import volatility.plugins.taskmods as taskmods import volatility.win32.tasks as tasks import volatility.utils as utils import volatility.debug as debug import volatility.plugins.malware.malfind as malfind import re import pefile from struct import unpack, unpack_from, pack from collections import OrderedDict try: import yara has_yara = True except ImportError: has_yara = False try: import aplib has_aplib = True except ImportError: has_aplib = False ursnif_sig = { 'namespace1' : 'rule Ursnif { \ strings: \ $a1 = "soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x"\ $b1 = "client.dll" fullword\ $c1 = "version=%u"\ $c2 = "user=%08x%08x%08x%08x"\ $c3 = "server=%u"\ $c4 = "id=%u"\ $c5 = "crc=%u"\ $c6 = "guid=%08x%08x%08x%08x"\ $c7 = "name=%s"\ $c8 = "soft=%u"\ $d1 = "%s://%s%s"\ $d2 = "PRI \x2A HTTP/2.0"\ $e1 = { A1 ?? ?? ?? 00 35 E7 F7 8A 40 50 }\ $e2 = { 56 56 56 6A 06 5? FF ?? ?? ?? ?? 00 }\ $f1 = { 56 57 BE ?? ?? ?? ?? 8D ?? ?? A5 A5 A5 }\ $f2 = { 35 8F E3 B7 3F }\ $f3 = { 35 0A 60 2E 51 }\ condition: $a1 or ($b1 and 3 of ($c*)) or (5 of ($c*)) or ($b1 and all of ($d*)) or all of ($e*) or all of ($f*)}' } # Magic pattern magic = "J[1J]" # Config pattern CONFIG_PATTERNS = [ re.compile("\x3D\xB7\x00\x00\x00\x0F\x84(...)\x00\xA1(....)\xC7(..)(....)\xC6(..)(.)\xC7(.)(....)", re.DOTALL), # cmp eax, 0B7h ; jz loc_xxxx; mov eax, dword_xxxx; mov dword ptr, offset c2_table; re.compile("\x3D\xB7\x00\x00\x00\x0F\x84(....)\x48\x8B\x05(....)\x48\x8D\x0D(....)(\x45\x8D)(..)\x48\x89(..)\x48\x8D\x0D(....)(\x33\xD2)", re.DOTALL), # 64bit ] # RSA key pattern RSA_PATTERNS = [ re.compile("\x68(....)\x8D\x85(....)\x50\xE8(....)\x68(....)\x8D\x85(....)\x50\xE8(....)\x6A\x11", re.DOTALL), re.compile("\x57\x48\x83\xEC\x20\x4C\x8D\x0D(....)(\x4C\x8D)(...)\x48\x8B\xF1", re.DOTALL), # 64bit ] DT_STR = 1 idx_list = { 0x0d20203c: ["lang_id", DT_STR], 0x11271c7f: ["sleep_time", DT_STR], 0x18a632bb: ["time_value", DT_STR], 0x31277bd5: ["SetWaitableTimer_value(CRC_TASKTIMEOUT)", DT_STR], 0x4b214f54: ["tor64_dll", DT_STR], 0x4fa8693e: ["serpent_key", DT_STR], 0x510f22d2: ["c2_tor_domain", DT_STR], 0x556aed8f: ["server", DT_STR], 0x584e5925: ["SetWaitableTimer_value", DT_STR], 0x602c2c26: ["capture_window_title?(CRC_KEYLOGLIST)", DT_STR], 0x656b798a: ["botnet", DT_STR], 0x6de85128: ["not_use(CRC_BCTIMEOUT)", DT_STR], 0x73177345: ["dga_base_url", DT_STR], 0x746ce763: ["movie_capture", DT_STR], 0x75e6145c: ["c2_domain", DT_STR], 0x758a4250: ["check_vm", DT_STR], 0x955879a6: ["SetWaitableTimer_value(CRC_SENDTIMEOUT)", DT_STR], 0x9fd13931: ["SOCKS_backconnect_server(CRC_BCSERVER)", DT_STR], 0xacc79a02: ["SetWaitableTimer_value(CRC_KNOCKERTIMEOUT)", DT_STR], 0xb892845a: ["tor_server3", DT_STR], 0xc61efa7a: ["dga_tld", DT_STR], 0xd0665bf6: ["c2_domain", DT_STR], 0xd7a003c9: ["SetWaitableTimer_value(CRC_CONFIGTIMEOUT)", DT_STR], 0xdf351e24: ["tor32_dll", DT_STR], 0xefc574ae: ["dga_seed", DT_STR], 0xec99df2e: ["ip_check_url", DT_STR], 0xea9ea760: ["p2p_bootstrap", DT_STR], } class ursnifConfig(taskmods.DllList): """Parse the Ursnif configuration""" @staticmethod def is_valid_profile(profile): return (profile.metadata.get('os', 'unknown') == 'windows'), profile.metadata.get('memory_model', '32bit') def get_vad_base(self, task, address): for vad in task.VadRoot.traverse(): if address >= vad.Start and address < vad.End: return vad.Start, vad.End return None def parse_config(self, data): p_data = OrderedDict() (count,) = unpack_from(" number of elements : %d" % count) for i in range(count): (idx, flags, off, uid) = unpack_from(" 0x80000: print("[!] size is too large, skipped this entry") continue try: offset = addr except: print("[!] This PE is old Ursnif (not DreamBot)") (addr, size, crc32_name, flags) = unpack_from( "> 8 * i) & 0xff)) if (size >= 4): mod_data += dec_data[4:] dec_data = mod_data if crc32_name in (0x4f75cea7, 0x9e154a0c): fname = "ursnif_client32.bin" open(fname, "wb").write(dec_data) print("[+] dumped 32 bit client dll: {0}".format(fname)) fnames.append(dec_data) elif crc32_name in (0x90f8aab4, 0x41982e1f): fname = "ursnif_client64.bin" open(fname, "wb").write(dec_data) print("[+] dumped 64 bit client dll: {0}".format(fname)) # fnames.append(fname) elif crc32_name in (0xe1285e64,): fname = "ursnif_public_key.bin" open(fname, "wb").write(dec_data) print("[+] dumped public key: {0}".format(fname)) elif crc32_name in (0xd722afcb, 0x8365b957, 0x8fb1dde1): fname = "ursnif_st_config.bin" open(fname, "wb").write(dec_data) print("[+] dumped static config: {0}".format(fname)) config_data.append(self.parse_config(dec_data)) else: fname = "ursnif_" + hex(addr) + "_ap32_dec.bin" open(fname, "wb").write(dec_data) print("[+] dumped: {0}".format(fname)) for fname in fnames: config_data = self.parse_joinned_data(fname) return config_data def calculate(self): if not has_yara: debug.error("Yara must be installed for this plugin") if not has_aplib: debug.error("Aplib must be installed for this plugin") addr_space = utils.load_as(self._config) os, memory_model = self.is_valid_profile(addr_space.profile) if not os: debug.error("This command does not support the selected profile.") rules = yara.compile(sources=ursnif_sig) for task in self.filter_tasks(tasks.pslist(addr_space)): scanner = malfind.VadYaraScanner(task=task, rules=rules) for hit, address in scanner.scan(): vad_base_addr, end = self.get_vad_base(task, address) proc_addr_space = task.get_process_address_space() data = proc_addr_space.zread(vad_base_addr, end - vad_base_addr) config_data = [] # Parse standard Ursnif config_data = self.parse_joinned_data(data) # Parse static configuration type Ursnif if not config_data: p_data = OrderedDict() data = self.pe_magic_check(data) try: pe = pefile.PE(data=data) except: continue imagebase = pe.NT_HEADERS.OPTIONAL_HEADER.ImageBase for pattern in CONFIG_PATTERNS: m = re.search(pattern, data) if m: if pe.FILE_HEADER.Machine in (pefile.MACHINE_TYPE['IMAGE_FILE_MACHINE_IA64'], pefile.MACHINE_TYPE['IMAGE_FILE_MACHINE_AMD64']): c2_num = unpack("b", data[m.start(7) + 19])[0] else: c2_num = unpack("b", data[m.start(6)])[0] if c2_num >= 16: c2_num = 1 for i in range(c2_num): if pe.FILE_HEADER.Machine in (pefile.MACHINE_TYPE['IMAGE_FILE_MACHINE_IA64'], pefile.MACHINE_TYPE['IMAGE_FILE_MACHINE_AMD64']): c2_addr = m.start(4) + unpack("=I", data[m.start(3):m.start(3) + 4])[0] c2_table_offset = unpack("=Q", data[c2_addr + (8 * i):c2_addr + 8 + (8 * i)])[0] - imagebase else: c2_addr = unpack("=I", data[m.start(4):m.start(4) + 4])[0] - imagebase c2_table_offset = unpack("=I", data[c2_addr + (4 * i):c2_addr + 4 + (4 * i)])[0] - imagebase try: c2 = self.decode_data(data, pe, c2_table_offset) except: c2 = "Decode fail" p_data["Server " + str(i)] = c2 if pe.FILE_HEADER.Machine in (pefile.MACHINE_TYPE['IMAGE_FILE_MACHINE_IA64'], pefile.MACHINE_TYPE['IMAGE_FILE_MACHINE_AMD64']): serpent_key_offset = m.start(8) + unpack("=I", data[m.start(7):m.start(7) + 4])[0] else: serpent_key_offset = unpack("=I", data[m.start(8):m.start(8) + 4])[0] - imagebase try: serpent_key = self.decode_data(data, pe, serpent_key_offset) except: serpent_key = "Decode fail" p_data["Serpent key"] = serpent_key for pattern in RSA_PATTERNS: m = re.search(pattern, data) if m: if pe.FILE_HEADER.Machine in (pefile.MACHINE_TYPE['IMAGE_FILE_MACHINE_IA64'], pefile.MACHINE_TYPE['IMAGE_FILE_MACHINE_AMD64']): rsa_key_offset = m.start(2) + unpack("=I", data[m.start(1):m.start(1) + 4])[0] rsa_key = data[rsa_key_offset + 4:rsa_key_offset + 0x44] rsa_mod = data[rsa_key_offset + 0x44:rsa_key_offset + 0x84] else: rsa_key_offset = unpack("=I", data[m.start(1):m.start(1) + 4])[0] - imagebase rsa_key = data[rsa_key_offset:rsa_key_offset + 0x40] mod_offset = unpack("=I", data[m.start(4):m.start(4) + 4])[0] - imagebase rsa_mod = data[mod_offset:mod_offset + 0x40] p_data["RSA key"] = rsa_key.encode("hex") p_data["RSA modulus"] = rsa_mod.encode("hex") config_data.append(p_data) yield task, vad_base_addr, end, hit, memory_model, config_data break def render_text(self, outfd, data): delim = '-' * 70 for task, start, end, malname, memory_model, config_data in data: outfd.write("{0}\n".format(delim)) outfd.write("Process: {0} ({1})\n\n".format(task.ImageFileName, task.UniqueProcessId)) outfd.write("[Config Info]\n") for p_data in config_data: for id, param in p_data.items(): outfd.write("{0:<16}: {1}\n".format(id, param))