+ All Categories
Home > Technology > Bredolab's Sudden Rise In Prominence Oct 2009

Bredolab's Sudden Rise In Prominence Oct 2009

Date post: 15-Jan-2015
Category:
Upload: trend-micro
View: 1,299 times
Download: 1 times
Share this document with a friend
Description:
Trend Micro threat researcher David Sancho examined BREDOLAB malware after it enjoyed a surge in popularity in August and September of 2009. He found interesting connections to other malware, Russian gangs and well-known botnets.
Popular Tags:
9
Trend Micro, Incorporated You Scratch My Back... BREDOLAB’s Sudden Rise in Prominence David Sancho Senior Threat Researcher A Trend Micro White Paper | October 2009
Transcript
Page 1: Bredolab's Sudden Rise In Prominence Oct 2009

Trend Micro, Incorporated

You Scratch My Back...BREDOLAB’s Sudden Rise in Prominence

David SanchoSenior Threat Researcher

A Trend Micro White Paper | October 2009

Page 2: Bredolab's Sudden Rise In Prominence Oct 2009

2 | WhiTe PAPer | YOu ScrATch MY BAck...

Table of ConTenTs

You Scratch My Back...BREDOLAB’s Sudden Rise in Prominence

inTrOducTiOn ........................................................................................................................................................3

i Think i’ve Seen ThiS BefOre... ........................................................................................................................4

WhY ZeuS? PArTnYOrkA cOnnecTiOnS ..........................................................................................................6

PuTTing The PieceS TOgeTher .........................................................................................................................7

cOncluSiOn ............................................................................................................................................................8

SOurceS ..................................................................................................................................................................9

Page 3: Bredolab's Sudden Rise In Prominence Oct 2009

3 | WhiTe PAPer | YOu ScrATch MY BAck...

You Scratch My Back...BREDOLAB’s Sudden Rise in Prominence

BREDOLAB’s sudden rise in prominence could not have been random so Trend Micro’s Threat Research Team decided to follow the malware and trace its place of origin and objective.

InTroduCTIon

in August 2009, Trend Micro’s Threat research Team started noticing a sudden spike in the activities of a new malware dubbed “BredOlAB,” which was, apparently, related to the Zeus malware family.

The sudden rise in prominence could not have been random so we decided to follow the malware and trace its place of origin and objective. This document is a product of the re-search we conducted.

This documents explores BredOlAB’s inner workings, the economics behind the threat, and recommendations to mitigate its effects on home users and corporations.

Figure 1. BREDOLAB malware’s growth

Page 4: Bredolab's Sudden Rise In Prominence Oct 2009

4 | WhiTe PAPer | YOu ScrATch MY BAck...

You Scratch My Back...BREDOLAB’s Sudden Rise in Prominence

I ThInk I’ve seen ThIs before...

BredOlAB is a simple downloading platform programmed by cybercriminals to facilitate virus infections and their timely updates. When we began analyzing BredOlAB, we im-mediately noted that upon infection, the first thing the malware did was execute a “call home” routine. The Web communication was encrypted so we could not read its contents. Subsequent connections followed albeit with significant differences, which made us think they were not directly related. The differences were substantial so we focused on under-standing the first batch of Web connections.

We conducted an in-depth analysis and arrived at a very clear conclusion—that the initial Web connections were downloading a series of executable files. These were then run on victims’ machines. We were able to decrypt each of the malicious programs and keep a record to see what kinds of software BredOlAB installed on infected Pcs.

BredOlAB has a particular noticeable trait—all the Web connections it made pointed to the same server, which was usually located in russia. The host’s name was hard-coded into the BredOlAB executable, indicating a weak point in the bad guys’ network infra-structure. So if the malicious server is taken down, none of the infected Pcs would be able to continue downloading updates to the malware.

After monitoring this particular server for a few weeks, we noticed that it was eventually taken down. however, the BredOlAB group owners was able to successfully move the server name to a different iP address, enabling it to very quickly become active from a dif-ferent location. it is likely that this routine has been taking place for some time now.

Other BredOlAB samples we have seen point to other servers, which may hold different malicious programs. The russian server we monitored, for instance, uploaded the follow-ing binaries into infected systems:

1. Rogue antivirus program called Antivirus Pro 2010. This program’s graphical user interface (gui) looks very professional, just like that of a real antivirus program. Once installed, it asks the victim to pay for an “unlicensed” copy of the software in order to clean nonexistent viruses from the machine.

BREDOLAB is a simple downloading platform programmed by cybercriminals to facilitate virus infections and their timely updates.

Figure 2. Unlicensed Antivirus Pro 2010 GUI

Page 5: Bredolab's Sudden Rise In Prominence Oct 2009

� | WhiTe PAPer | YOu ScrATch MY BAck...

You Scratch My Back...BREDOLAB’s Sudden Rise in Prominence

rogue antivirus applications always claim to have found viruses in an infected ma-chine even though they never actually scan anything since they are not real. The name of a rogue antivirus program, in fact, changes every few weeks or months. This is a well-known scam.

2. Zeus bot. The second component that is always present in such an infection is the bot agent of a botnet dubbed “Zeus.” The Zeus botnet connects to a command and control (c&c) server through encrypted Web connections and gets further instructions for its information-stealing functionality. This includes monitoring and stealing banking credentials and other login data.

in our experience while monitoring the BredOlAB download server, we found that the executable files were always very similar. Though they might vary slightly every now and then, their general contents were pretty consistent.

While working with BredOlAB, we discovered that it had a strong similarity with PuSh-DO in the way it downloads and executes files. PUSHDO is a downloader that also con-nects back home through a Web connection and downloads a series of executable files in one single encrypted chunk. This chunk is then split into smaller pieces that the PuShdO downloader runs by either direct execution or injecting the code into a Microsoft OS com-ponent—a technique shared by BredOlAB. Both PuShdO and BredOlAB decide be-tween these two options by looking at a field that tells the downloader how the execution should take place.

PuShdO and BredOlAB both exhibit unusual behaviors, which led us to believe that they are probably products of the same programmer or development team. during our in-vestigation of PuShdO, we found out that its authors were russian and that their product primarily catered to the russian spam market.

While searching some underground russian sources, we were able to obtain the source code of the BREDOLAB C&C backend server that served the encrypted executable files. As we suspected, all the comments were in russian, which matched our expectations at this point.

BREDOLAB had strong similarities with PUSHDO, which led us to believe that they are probably products of the same programmer or development team.

Figure 3. Read Me file of the BREDOLAB C&C software installation

Page 6: Bredolab's Sudden Rise In Prominence Oct 2009

6 | WhiTe PAPer | YOu ScrATch MY BAck...

You Scratch My Back...BREDOLAB’s Sudden Rise in Prominence

Why Zeus? ParTnyorka ConneCTIons

So what is the exact relationship between BredOlAB and the two programs it down-loads? We started digging a bit more into the possible business relationships that exist among russian underground organizations.

Things in the Russian underground are organized by affiliate program or partnyorka. Af-filiate programs in both the commercial world and in the underground provide a means for Web vendors to create a network of business partners that help them out by redirecting traffic to their own servers. For instance, Some online pharmacy outfits in Russia that sell low-cost generic medicines made in lower-paying factories exclusively go to market online. One example of such a shady organization online-rx.biz has an affiliate program that earns affiliates 25% of each sale made. They even estimate that each customer’s average order is worth 130–160 euros so they only need to sell an average of 31 orders to make their first 1,150 euros.

Fake antivirus vendors have similar affiliate programs. The only difference is they do not sell anything, they just scam people. These vendors pay botnet owners sales commissions from the money scam victims dole out.

following this logic, this particular BredOlAB group seems to have partnered with a rogue antivirus company and uploads its software to every infected Pc. This way, the group makes money every time a victim falls for the trick and pays for the “premium ver-sion” of a fake antivirus software.

The fact that different BredOlAB versions download software from different servers just proves that its developers are selling their software (probably both client and server pro-grams) as an additional source of income.

Affiliate programs or partnyorka in both the commercial world and in the underground provide a means for Web vendors to create a network of business partners that help them out by redirecting traffic to their own servers.

Page 7: Bredolab's Sudden Rise In Prominence Oct 2009

7 | WhiTe PAPer | YOu ScrATch MY BAck...

You Scratch My Back...BREDOLAB’s Sudden Rise in Prominence

PuTTIng The PIeCes TogeTher

When it comes to malware, especially those that originate from russia, the impression is that it is all about business and making money. BredOlAB is no exception. keeping in mind the Russian underground economy and all of its affiliate programs, there seems to be at least two distinct groups of actors in this picture, namely:

1. Vendors. These refer to the creators of the scam. What they do may be borderline illegal or plainly criminal but they do not expose themselves much. They provide mar-keting tools and sales commissions to the second group.

2. Enablers. These try to expand the vendors’ businesses by exposing themselves in exchange for huge sales commissions. They range from spammers who try to sell the vendors’ products to botnet creators who infect victims’ systems with the latest scam software.

in certain cases, there may be a third group of people—developers. These make the soft-ware sold in the underground market and facilitate the enablers.

BredOlAB is a good example that shows how a criminal ecosystem works. developed and maintained by a group of developers then sold to enablers, BredOlAB furthers a vendor’s business by distributing fake antivirus software. Apart from that, this legitimate-looking malware also infects victims’ systems with a botnet agent to continue subverting users’ internet connection for other nefarious ends. We can thus surmise that the same group behind our BredOlAB samples is also establishing a Zeus botnet with a very concrete agenda—monetizing stolen data. This same group aims to get money from both techniques—fake antivirus pay-per-install and credential-stealing.

The same russian group that developed BredOlAB is quite likely behind a similar mal-ware—PUSHDO. While BREDOLAB focuses more on its fake antivirus affiliation, PUSH-dO builds a spamming platform for criminal groups’ enablers. Both activities—spamming and forceful installation— known in the underground as “loads,” are complementary and work well toward the vendors’ objective of enriching their affiliates while making a lot of money in the process.

Although the BredOlAB samples we analyzed came from spam campaigns, their en-ablers mainly infected victims via the Web. They infiltrated victims’ PCs by redirecting their browsers to malicious websites. This was usually done by either putting a malicious link in a legitimate page (e.g., posting malicious links in forums and guest books or hacking legiti-mate pages) or creating a page containing malicious links and making it score very high in search engines so that it appears as a top search result, a technique known as “blackhat search engine optimization (SeO).”

There seems to be at least two distinct groups of actors in the picture, namely: • vendors, which refer to the creators

of the scam.

• enablers who try to expand the vendors’ businesses by exposing themselves in exchange for huge commissions.

in certain cases, however, there may be a third group of people involved in the scam—developers. These make the software sold in the underground market and facilitate the enablers.

Page 8: Bredolab's Sudden Rise In Prominence Oct 2009

8 | WhiTe PAPer | YOu ScrATch MY BAck...

You Scratch My Back...BREDOLAB’s Sudden Rise in Prominence

ConClusIon

in order to avoid being hit but these shady organizations, users should ensure that they always have the latest versions of their antivirus software of choice running on their Pcs. if possible, it is also worth considering using security software that makes you a part of a community-based network such as the Trend Micro Smart Protection network™. Smart Protection network combines unique internet-based technologies with lightweight clients. By checking URLs, emails, and files against continuously updated and correlated threat databases in the cloud, customers always have immediate access to the latest protection wherever they connect—from home, within the company network, or on the go. This ap-proach is particularly effective in dealing with malware that propagate via the Web such as BredOlAB and PuShdO.

users who think they may have been affected by malware such as BredOlAB and PuShdO may also try using a free antivirus tools such as housecall, Trend Micro’s highly popular and capable on-demand scanner for identifying and removing viruses, Trojans, worms, unwanted browser plugins, and other malware.

The Trend Micro Smart Protection Network™ delivers security that is smarter than conventional approaches by blocking the latest threats before they reach you. Leveraged across Trend Micro’s solutions and services, the Smart Protection Network provides stronger protection while reducing your reliance on time-consuming signature-downloads.

Page 9: Bredolab's Sudden Rise In Prominence Oct 2009

9 | WhiTe PAPer | YOu ScrATch MY BAck...

Trend MicrO™Trend Micro, incorporated is a pioneer in secure content and threat management. founded in 1988, Trend Micro provides individuals and organizations of all sizes with award-winning security software, hard-ware and services. With headquarters in Tokyo and operations in more than 30 countries, Trend Micro solutions are sold through corporate and value-added resellers and service providers worldwide. for additional information and evaluation copies of Trend Micro products and services, visit our website at www.trendmicro.com.

TREND MICRO INC. 10101 n. de Anza Blvd. cupertino, cA 9�014

uS toll free: 1 +800.228.�6�1 Phone: 1 +408.2�7.2003 fax: 1 +408.2�7.2003

www.trendmicro.com

© 2009 by Trend Micro, incorporated. All rights reserved. Trend Micro, the Trend Micro t-ball logo are trademarks or registered trademarks of Trend Micro, incorporated. All other product or company names may be trademarks or registered trademarks of their owners.

You Scratch My Back...BREDOLAB’s Sudden Rise in Prominence

sourCes

• Alice decker, david Sancho, loucif kharouni, Max goncharov, and robert McArdle. (May 22, 2009). “A Study of the Pushdo/cutwail Botnet.” http://us.trendmicro.com/im-peria/md/content/us/pdf/threats/securitylibrary/study_of_pushdo.pdf (retrieved Octo-ber 2009).


Recommended