[nsp-sec] IceKernel DDOS bot

jose nazario jose at arbor.net
Mon Apr 21 13:23:54 EDT 2008


Kudos to ShadowServer for finding this one in their URL reports. They found
this while looking for CNN.com attack commands.

This is a Chinese DDoS bot that doesn't appear to be spread too far and wide
yet, but our visibility into Chinese malware infections is weaker than it
could be. [any help appreciated]

The bot uses Internet Explorer as a subprocess to grab the command files.

Live URLs:
www.shadowmp3.com/kernel/cmd.txt
888.17qb.com/hexinddos.txt

The command file grabbed by the malware is in an INI file format, which
makes parsing very easy. Below this message is an example cmd.txt, the
DDOS_*Flood sections are what are pretty obvious about it. The INI file
allows for the full range of bot control: updates, check-in, etc. the C&C
(ver HTTP) doesn't appear to have any access control or authorization
needed, anyone can grab the file(s).


AV detection is ambiguous but present:

F-Secure    Trojan-Downloader.Win32.Agent.jpy
F-Prot6     W32/Backdoor2.ONY
AntiVir     TR/Dldr.Root.258048
AntiVir     BDS/Agent.gsn
NOD32       Win32/NetGuy.A
Kaspersky    Trojan-Downloader.Win32.Agent.jpy
DrWeb       DLOADER.Trojan
AVG7        Agent.PCK
ClamAV      Trojan.Downloader-27207


Sample MD5s:
MD5: c321b997d4e8d442a7fb446c4107ba7b
SHA1: e7ab17a1d9ed8d3df9f7ca64eb387b514a294ca7
File type: application/x-ms-dos-executable
File size: 341504 bytes


MD5: c8d008b22252b2be2314db9beb769660
SHA1: f78ac1be2f4882cd8b7f750112b8e7fed7f14ac3
File type: application/x-ms-dos-executable
File size: 262144 bytes


MD5: b6b2af669e6bc44ee6c5c4cffc2c6f60
SHA1: 6b6536d4cd89a57b6084d783e01455bbeb2ecdc2
File type: application/x-ms-dos-executable
File size: 58368 bytes



About the Author, we think he uses the handle IceKernel:

http://v.wangyou.com/p14971.html
http://hi.csdn.net/iceker2008
http://twitter.com/icekernel
http://www.flickr.com/photos/icekernel/
http://www.bulaoge.com/?icekernel

Here's what we think is his picture:

http://images.v.wangyou.com/photo/2006/3/28/1020060328224720137_1.jpg



Analysis is ongoing, and I'm starting to track these attacks. Any additional
data etc would be greatly appreciated and would benefit the entire nsp-sec
community.

Thanks.


-------------------------------------------------------------
jose nazario, ph.d.  <jose at arbor.net>
security researcher, office of the CTO
Arbor Networks
v: +1 734 821 1427
m: +1 734 693 2969
PGP: 0x40A7BF94
www.arbornetworks.com
-------------------------------------------------------------



Notes:
1. an example cmd.txt file from a live site:

[UpdateServer]
NewVersion=20080419
UpdateFileUrl=http://888.17qb.com/hexinddos.exe


[KernelSetting]
IsReportState=1
ReportStateUrl=http://888.17qb.com/hexin.htm

IsDownFileRun0=0
DownFileRunName0=KernelDbg1.exe
DownFileRunUrl0=

IsDownFileRun1=0
DownFileRunName1=KernelDbg2.exe
DownFileRunUrl1=

IsDownFileRun2=0
DownFileRunName2=KernelDbg3.exe
DownFileRunUrl2=



[DDOS_ScriptFlood]
IsScriptFlood=0
CmdID=33
ScriptFloodUrl=http://www.xk45.cn/
ScriptFloodDNS=www.xk45.cn
ScriptFloodPort=80
ThreadCount=5
IsTimer=1
Timer=20


[DDOS_UdpFlood]
IsUdpFlood=0
CmdID=12
UdpFloodDNS=88.88.88.88
ThreadCount=1
IsTimer=1
Timer=10


[DDOS_SynFlood]
IsSynFlood=0
CmdID=12
SynFloodDNS=www.1698woool.com
SynFloodPort=80
ThreadCount=1
IsTimer=1
Timer=10


[DDOS_TcpFlood]
IsTcpFlood=0
CmdID=18
TcpFloodDNS=www.dadiyt.cn
TcpFloodPort=80
ThreadCount=10
IsTimer=1
Timer=15







More information about the nsp-security mailing list