27.12.2014 Views

regin-analysis

regin-analysis

regin-analysis

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CONTENTS<br />

OVERVIEW...................................................................... 3<br />

Introduction................................................................... 5<br />

Timeline.......................................................................... 5<br />

Target profile.................................................................. 6<br />

Infection vector........................................................ 6<br />

Architecture................................................................... 8<br />

Stage 0 (dropper)..................................................... 9<br />

Stage 1...................................................................... 9<br />

Stage 2...................................................................... 9<br />

Stage 3...................................................................... 9<br />

Stage 4............................................................ 11<br />

Stage 5.................................................................... 11<br />

Encrypted virtual file system containers .............. 11<br />

Command-and-control operations......................... 12<br />

Logging................................................................... 12<br />

Payloads....................................................................... 14<br />

64-bit version............................................................... 15<br />

File names.............................................................. 15<br />

Stage differences................................................... 15<br />

Conclusion.................................................................... 16<br />

Protection..................................................................... 16<br />

Appendix...................................................................... 18<br />

Data files................................................................ 18<br />

Indicators of compromise............................................ 20<br />

File MD5s................................................................ 20<br />

File names/paths.................................................... 20<br />

Extended attributes............................................... 21<br />

Registry.................................................................. 21

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!