sb-eu logo
Story image

Researchers dissect 10-year-old Snowball malware

08 Sep 2017

The creators behind malware toolkit known as ‘Animal Farm’ may have been using one of its implants since at least 2007, and researchers happened on the discovery by chance.

The Animal Farm toolkit is made up of several implants called Bunny, NBot, Dino, Casper, Tafaclou and Babar/SNOWBALL.

While previous samples of Snowball malware dated back to 2011, researchers at Palo Alto Networks’ Unit 42 have discovered a sample with a timestamp of September 2007. Researchers only spotted the malware after scouring a repository for an unrelated malware.

“This earlier sample of Babar uses many features not present in later versions. The sample also uses a compromised third party website as a C2 server like later versions. We also found a simple bug and a design flaw in the code you wouldn’t expect from malware developed by mature actors,” comments researcher Dominik Reichel.

The sample, a portable executable, takes the form of a loader. Inside the loader is the payload. The malware attempts to obtain debug privileges and attempts to detect if the operating system is Windows Vista.  

If successful, the malware then insert event logs and attempts to gain access to the AppData folder path.

“The malware also tries to delete any traces it was executed by deleting the corresponding entries in the registry keys,” Reichel says.

After checking everything is functioning correctly, the malware then tries to access the default internet browser. These seem to work with Firefox and Internet Explorer, but not with Chrome.

Reichel says that Chrome was released in 2008, after the original malware was created. Therefore, it cannot be a bug.

A compromised website was used as a command & control server. In this case, it was the official site of the Permanent council of Accounting of the Democratic Republic of the Congo, however the attack was carried out so long ago the script behind the website is not online anymore.

After a number of tests, the malware can then conduct a number of commands. Those commands can shut down and reboot systems, download files, get lists and types of partitions, report a victim’s system information, terminate and delete itself, and change a range of characteristics via XML.

“This malware has a small set of features ranging from retrieving system information, to downloading files or killing processes on a victim’s system. Technically, it is not outstanding and can be considered only average compared to alleged state sponsored malware written at that time (e.g. Careto or Regin). The code and structure is similar to the Casper implant which is most likely based on this implant. The malware contains an obvious design flaw leaving the main part of the configuration data visible in clear text,” Reichel concludes.

Story image
High demand for hackers on the dark web
"Since March 2020, we have noticed a surge of interest in website hacking, which is seen by the increase in the number of ads on forums on the dark web."More
Story image
AppDynamics launches Cisco Secure Application to protect against vulnerabilities
AppDynamics, part of Cisco, has released Cisco Secure Application, a solution designed to simplify vulnerability management, defend against cyber attacks and protect applications.More
Story image
ExtraHop reveals methods used by attackers in SUNBURST breach
The network detection and response company says between late March and early October 2020, detections of probable malicious activity increased by approximately 150%, including detections of lateral movement, privilege escalation and command and control beaconing.More
Story image
Jetstack's new flagship product brings security to cloud native platforms
“With Jetstack Secure our customers can see a detailed view of each cluster and an instant visual status of all workload certificates, including their association with Kubernetes resources."More
Story image
Increase in emergence of new cloud watering hole attacks
"Cloud native apps and services are more vital than ever before, and any risk in the infrastructure has critical implications."More
Story image
Three steps to a security-driven network for a stronger security posture
As the threat landscape continues to evolve and organisations stand to lose so much if they fall victim to an attack, it’s essential to ensure that security measures evolve in line with the network itself.More