15.07.2013 Views

sKyWIper (a.k.a. Flame a.k.a. Flamer): A complex ... - CrySyS Lab

sKyWIper (a.k.a. Flame a.k.a. Flamer): A complex ... - CrySyS Lab

sKyWIper (a.k.a. Flame a.k.a. Flamer): A complex ... - CrySyS Lab

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

6.1. Some interesting Lua scripts inside the code<br />

CRUISE_CRED.lua<br />

The script gathers credential information from an already infected machine. More precisely,<br />

it cruises all the token objects to find the ones belong to the administrator or the<br />

Administrators, Domain Admins groups. If it is successful, it updates cruiseAttackLog in the<br />

“CLAN” database by means of the user sd and the user name. For more information, please<br />

see the Tables creds and cruise_attack_log in Figure 48.<br />

basic_info_app.lua<br />

The script gathers basic information about an infected computer such as the flame version it<br />

has been infected with, the computer name, the ip address of the machine. Furthermore, it<br />

books various parameters about the nature of information leak (e.g.,<br />

AVERAGE_LEAK_BANDWIDTH, LAST_LEAK_TO_INTERNET, MEDIA_LEAKS_FROM_THIS_<br />

COMPUTER, etc). Note that the FLAME_VERSION parameter must have been used to avoid<br />

the reinfection of the same computer and also to update flame if it is neccessary.<br />

clan_seclog.lua<br />

The script parses the Security log by searching for certain event Ids and retrieves the<br />

correspondig username and ip information from it. It is supposedly used to collect<br />

information about the traces of infection, or the credentials and source IPs used to<br />

authenticate to the infected machine. The script examines the following event Ids, where<br />

the corresponding log entries store the required pieces of information (Account Name, User<br />

Name and IP address)<br />

Event Id: 540 – Refers to successful network logon. Among various parameters the log stores<br />

the User Name and Source Network Address as well.<br />

Event Id: 672 – Refers to Authentication Ticket Granted Audit event. In case of Windows, the<br />

Kerberos authentication uses the optional pre-authentication phase before issuing an<br />

authentication ticket by checking the credentials of the client. If the client successfully<br />

authenticated to the workstation, Windows puts a log entry with event id 672 into the<br />

Security log in order to demonstrate the successful initial logon event.<br />

<strong>Lab</strong>oratory of Cryptography and System Security (<strong>CrySyS</strong>)<br />

Budapest University of Technology and Economics<br />

www.crysys.hu 48

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!